• Title/Summary/Keyword: Token-bucket

Search Result 53, Processing Time 0.027 seconds

Fluid Flow Analysis of the Threshold based Leaky Bucket Scheme

  • Park, Chul-Geun
    • Journal of Electrical Engineering and information Science
    • /
    • v.3 no.2
    • /
    • pp.274-279
    • /
    • 1998
  • We investigate a Leaky Bucket(LB) scheme with a threshold in the data buffer, where leaky rate changes depending on the contents of data buffer. We use the fluid flow model for the analysis of the LB scheme with a threshold. We model the bursty input source as markov modulated fluid flow(MMFF) As performance measures we obtain loss probability and mean delay. We present some numerical results to show the effects of the level of a threshold, the rate of token generation, the size of token pool, and the size the data buffer on the performances of the LB scheme with a threshold.

  • PDF

A Queueing Model for Traffic Control in Leaky Bucket System (Leaky Bucket 시스템에서 트래픽제어에 관한 대기행렬모형)

  • 횡철희;이호우;윤승현;안부용;박노익
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.22 no.2
    • /
    • pp.45-65
    • /
    • 1997
  • We build a queueing model for buffered leaky bucket system. First, we set up system equations and them calculate the steady-state probabilities at an arbitrary time epoch by recursive method. We derive the mean waiting time and the mean number of cells in the input buffer, and evaluate the performance of the buffered leaky bucket system to find the optimal queue capacity and token generation rate that meet the quality of service(QoS).

  • PDF

An implementation of the dynamic rate leaky bucket algorithm combined with a neural network based prediction (신경회로망 예측기법을 결합한 Dynamic Rate Leaky Bucket 알고리즘의 구현)

  • 이두헌;신요안;김영한
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.2
    • /
    • pp.259-267
    • /
    • 1997
  • The advent of B-ISDN using ATM(asynchronous transfer mode) made possible a variety of new multimedia services, however it also created a problem of congestion control due to bursty nature of various traffic sources. To tackle this problem, UPC/NPC(user parameter control/network parameter control) have been actively studied and DRLB(dynamic rate leaky bucket) algorithm, in which the token generation rate is changed according to states of data source andbuffer occupancy, is a good example of the UPC/NPC. However, the DRLB algorithm has drawbacks of low efficiency and difficult real-time implementation for bursty traffic sources because the determination of token generation rate in the algorithm is based on the present state of network. In this paper, we propose a more plastic and effective congestion control algorithm by combining the DRLB algorithm and neural network based prediction to remedy the drawbacks of the DRLB algorithm, and verify the efficacy of the proposed method by computer simulations.

  • PDF

Dynamic VBR traffic characterization for video service in ATM network (ATM 망에서 비디오 서비스를 위한 동적 VBR 트래픽 특성화)

  • 황재철;조미령;이상원;이상훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.4
    • /
    • pp.455-470
    • /
    • 2001
  • This paper is focused on the traffic characterization for the efficient transmission of the VBR video source in the ATM network. For the traffic characterization, low traffic monitoring technique is applied and the dynamic VBR characterization method is suggested to satisfy the delay requirement. The dynamic VBR method uses the token bucket algorithm buffering though Cumulative Constraint Function. According to the Cumulative Constraint Function, the packet initially started transferring at the peak rate and the token bucket provided proper amount of buffer for traffic after a certain period of monitoring. It also reduced the network resource bandwidth through renewal of the cumulative frame and changed the rate from the previous frame information. It requires only small amount of monitoring and causes little overhead. In addition, it lowered the complexity of Deterministic Constraint Function to 0(n) and mapped the token rate and token depth to the token bucket. This study shows less network resource consumed than the previous method, comparing and analyzing the result of simulations.

  • PDF

Combination of Token Bucket and AMP Schemes to Solve Buffer Underflow and Overflow of Video Streaming in Wireless Communication (무선통신 환경에서 비디오 스트리밍의 버퍼 언더플로우와 오버플로우를 해결하기 위한 토큰버킷과 AMP 기법의 결합)

  • Lee, Hyun-no;Kim, Dong-hoi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1330-1338
    • /
    • 2015
  • In wireless communication network, the amount of packet data for the video streaming in the playout buffer of the receiver is changed with time according to network condition. If the amount of packet data is less than a specific buffer amount, the buffer underflow problem is generated. On the contrary, if the amount of packet data is more than a given buffer amount, the buffer overflow problem is occurred. When the playout of the video streaming is processed, these buffer underflow and overflow problems cause stop and skip phenomenons and then provide the discontinuity of playout. Therefore, to solve the buffer underflow and overflow problems of the video streaming in wireless communication network, This paper analyzes the combined effect of Token Bucket scheme, which controls the bursty traffic, and AMP(Adaptive Media Playout) scheme, which adaptively changes the playout speed of receiver. Through simulation, we found that the combination of Token Bucket and AMP schemes provides the superiority in terms of the occurrence number of buffer underflow and overflow, the stop duration time and the number of removed frames generated by underflow and overflow, and PSNR.

Priority Polling and Dual Token Bucket based HCCA Algorithm for IEEE 802.11e WLAN (IEEE 802.11e WLAN을 위한 우선순위 폴링 및 이중 토큰 버킷 기반의 HCCA 알고리즘)

  • Lee, Dong-Yul;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.31-41
    • /
    • 2009
  • IEEE 802.11e proposed by IEEE 802.11 working group to guarantee QoS has contention based EDCA and contention free based HCCA. HCCA, a centralized polling based mechanism of 802.11e, needs a scheduling algorithm to allocate the network resource efficiently. The existing standard scheduler, however, is inefficient to support for QoS guarantee for real-time service having VBR traffic. To improve these limit, in this paper, we First, we propose priority polling algorithm which additionally considers the size of MSI and TXOP based on EDD algorithm to increase number of QSTAs. We also propose a dual token bucket TXOP allocation algorithm to reduce congestion caused by stations which enters network with considerable delay variance. TSPEC parameters, Maximum Burst Size (MBS) and Peak Data Rate (PR), are applied to design depth and token generation rate of two buckets. Simulation results show that the proposed algorithm has much higher performance compared with reference and SETT-EDD scheduler in terms of throughput and delay.

A Performance Study on Congestion Control Schemes for the Broadband Communication Networks (광대역통신망에서 폭주제어 방식에 대한 성능연구)

  • Doo-yeong Park
    • The Journal of Engineering Research
    • /
    • v.6 no.2
    • /
    • pp.39-46
    • /
    • 2004
  • In this paper, we carry out a performance study related to the Broadband Network. For this network, it has been proposed to use the leaky bucket as a way of controlling congestion within the network. On the top of leaky bucket type rate based congestion control scheme for high speed networks, a user will typically operate an error control scheme for retransmitting lost and erroneous packets. We propose a performance model in order to study the interaction between a user's error control scheme and the leaky bucket congestion control scheme for high speed networks. Simulation results show that parameters such as the window size and the token generation rate in the leaky bucket are key factors affecting the end-to-end delay.

  • PDF

The Effect on the Quality of Service in ATM Network of Leaky Bucket Algorithm (ATM망의 서비스 품질에 Leaky Bucket 알고리즘이 미치는 영향)

  • 소경영;김영수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.1
    • /
    • pp.125-148
    • /
    • 1998
  • The use of shaping mechanism, realized by means of a leaky bucket based algorithm on input traffic of an ATM network allows to achieve higher utilization of network resources, and to guarantee the quality of service requested by the users. The functionalities of the shaping mechanism based on leaky bucket, are characterized by the token pool sire and by input queue size. In this paper we have analyzed, using simulations, the effect on the quality of service in ATM network of leaky bucket algorithm when shaper parameters described above are changed.

  • PDF

A Study on the Cell Loss Rates for Various Parameter Values of Leaky Bucket Mechanism in ATM Networks (ATM망의 Leaky Bucket 메카니즘에서 파라메타 값들에 대한 쎌손실율의 연구)

  • 이영옥;유기혁
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1991.10a
    • /
    • pp.174-178
    • /
    • 1991
  • ATM, the core technology of BISDN, provides a high degree of flexibility with regard to varying bandwidth requirements for different services. In ATM networks, since users may exceed the traffic volume negotiated at the call setup, traffic from users may need to be monitored and enforced to comply with traffic parameters. The leakybucket mechanism is one of the typical traffic enforcement methods based on the use of transmission tokens for each cell. In this mechanism the major system parameters are size of input buffer, size of token pool, and token generation ratio. In order to represent ATM cell arrivals we assume a Poisson process. In this paper, a state transition analysis technique is used to study the cell loss rates for various values of system parameters.

Analysis of a Queueing Model with Combined Control of Arrival and Token Rates (패킷 도착률과 토큰 생성률의 통합 관리를 적용한 대기모형의 분석)

  • Choi, Doo-Il;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.895-900
    • /
    • 2010
  • As the diverse telecommunication services have been developed, network designers need to prevent congestion which may be caused by properties of timecorrelation and burstiness, and unpredictable statistical fluctuation of traffic streams. This paper considers the leaky bucket scheme with combined control of arrival and token rates, in which the arrival rate and the token generation interval are controlled according to the queue length. By using the embedded Markov chain and the supplementary variable methods, we obtain the queue length distribution as well as the loss probability and the mean waiting time.