• Title/Summary/Keyword: leaky bucket

Search Result 63, Processing Time 0.037 seconds

An implementation of the dynamic rate leaky bucket algorithm combined with a neural network based prediction (신경회로망 예측기법을 결합한 Dynamic Rate Leaky Bucket 알고리즘의 구현)

  • 이두헌;신요안;김영한
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.2
    • /
    • pp.259-267
    • /
    • 1997
  • The advent of B-ISDN using ATM(asynchronous transfer mode) made possible a variety of new multimedia services, however it also created a problem of congestion control due to bursty nature of various traffic sources. To tackle this problem, UPC/NPC(user parameter control/network parameter control) have been actively studied and DRLB(dynamic rate leaky bucket) algorithm, in which the token generation rate is changed according to states of data source andbuffer occupancy, is a good example of the UPC/NPC. However, the DRLB algorithm has drawbacks of low efficiency and difficult real-time implementation for bursty traffic sources because the determination of token generation rate in the algorithm is based on the present state of network. In this paper, we propose a more plastic and effective congestion control algorithm by combining the DRLB algorithm and neural network based prediction to remedy the drawbacks of the DRLB algorithm, and verify the efficacy of the proposed method by computer simulations.

  • PDF

An Effective Hybrid UPC Algorithm for the Traffic Control of ATM Networks (ATM 망의 트래픽 제어를 위한 효율적인 하이브리드 UPC 알고리즘)

  • 윤석현
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.112-118
    • /
    • 2000
  • In this paper, a hybrid UPC algorithm is proposed, which combines the representative Leaky Bucket UPC algorithm with the EWMA window algorithm in the ATM network and then its performance Is evaluated. The hybrid UPC algorithm is made up of Leaky Bucket and EWMA, which control the Peak bit rate and the mean bit rate, respectively. According to the result of the simulation using BONeS with the On/off traffic source model. it is revealed that the proposed UPC algorithm has superior performance to the existing Leaky Bucket UPC algorithm with regard to both the cell loss rate and the buffer size.

  • PDF

Analysis of the Type-I/II Error for the Leaky Bucket Policing Algorithm in ATM Networks (ATM망에서 Leaky Bucket 사용 감시 알고리즘의 Type-I/II 에러 분석)

  • 이동호;안윤영;조유제
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.12
    • /
    • pp.1391-1400
    • /
    • 1992
  • In this paper, we suggested a method for evaluating the type-I/II error which is proposed by the CCITT as a criterion for the accuracy of policing algorithms in ATM networks, By the analysis of the type-I/II error of the Leaky Bucket(LB) algorithm, we investigated the relationships between the traffic parameters and the LB parameters to police the mean and peak cell rate effectively in the ON/OFF traffic. We showed that the LB parameters, the leaky rate a and the threshold M of the LB counter, could be determined as a pair of (a, M) satisfying the type-I/II error and minimizing the response time. In the ON/OFF traffic, it has been observed that the a-M characteristic curve of the LB policing algorithm only depends on the burstiness. As the results of the performance analysis, we found that the LB algorithm exhibits a good performance in the peak rate policing, but has some problems in the mean rate policing due to the trade-off between the accuracy and the response time.

  • PDF

The Performance Improvement of an Efficient Usage Parameter Control Algorithm in ATM Networks (ATM망에서의 효율적인 UPC 알고리즘의 성능 개선)

  • Park, Sung-Kon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3150-3158
    • /
    • 1997
  • In the ATM networks, there are two method in traffic control as schemes to improve the quality of service; one is the reactive control after congestion and the other is the preventive control before congestion. The preventive control include the CAC(Connection Admission Control), the UPC(Usage Parameter Control), the NPC(Network Parameter Control) and the PC(Priority co ntrol). In this paper, we propose an efficient UPC algorithm that has a complex structure using the Jumping window algorithm within the Leaky Bucket algorithm. The proposed algorithm controls peak hit rate by the Leaky Bucket algorithm, then it does the traffic control to evaluate by the Jumping Window whether violates mean bit rate or not. As we assume On/Off traffic source model, our simulation results showed cell loss rate less than the pre-existential Leaky Bucket algorithm method, and it could decrease the demanded Bucket size.

  • PDF

A Study on Policing Mechanism in ATM Network using Fuzzy Control (퍼지 제어를 이용한 ATM망에서 PM에 관한 연구)

  • 신관철;박세준;양태규
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.5
    • /
    • pp.931-940
    • /
    • 2001
  • In this paper, I propose Fuzzy Policing Mechanism(FPM) over ATM networks for the control of traffic which is unpredictable and bursty source. The FPM is consist of counter, subtracter and Fuzzy Logic Controller(FLC). The FLC is divided to fuzzifier, inference engine and defuzzifer The output of FLC inputs to the subtractor and it controls the counter. The counter works as a switch in transmission of cells. In simulation, I compared the FPM with the Leaky Bucket algorithm(LBM) in cell loss probability and performance characteristics. As a result, FPM gives lower cell loss probability than that of LBM and has good response behavior The FPM efficiently controls the transmission of packets which are variable traffic source and, it also has good selectivity.

  • PDF

A Study on the Cell Loss Rates for Various Parameter Values of Leaky Bucket Mechanism in ATM Networks (ATM망의 Leaky Bucket 메카니즘에서 파라메타 값들에 대한 쎌손실율의 연구)

  • 이영옥;유기혁
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1991.10a
    • /
    • pp.174-178
    • /
    • 1991
  • ATM, the core technology of BISDN, provides a high degree of flexibility with regard to varying bandwidth requirements for different services. In ATM networks, since users may exceed the traffic volume negotiated at the call setup, traffic from users may need to be monitored and enforced to comply with traffic parameters. The leakybucket mechanism is one of the typical traffic enforcement methods based on the use of transmission tokens for each cell. In this mechanism the major system parameters are size of input buffer, size of token pool, and token generation ratio. In order to represent ATM cell arrivals we assume a Poisson process. In this paper, a state transition analysis technique is used to study the cell loss rates for various values of system parameters.