• Title/Summary/Keyword: leaky bucket

Search Result 63, Processing Time 0.03 seconds

Fairness Improvement Leaky Bucket Algoriom for Group Connections in ATM Network (ATM 망에서 그룹 연결을 위한 효율적인 공평성 향상 Leaky Bucket 알고리즘)

  • Lee Jae-hwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9B
    • /
    • pp.591-595
    • /
    • 2005
  • In this paper, we propose the fairness improvement leaky bucket (PILB) algorithm as a traffic policing mechanism. In the proposed algorithm, there is a cell buffer for every ATM connection in order to store date cells. Network decides whether an ATM connection obeys the contracted traffic parameter, and stores data cells in the cell buffer if the connection obeys but is considered as violated the contract due to temporary lack of network resource. By using the proposed algorithm, we can obtain the statistical multiplexing gain that is the superiority of packet switching network. Moreover, when a connection tries to transmit more data cells by violating the contracted traffic parameters, the connection is prevented from using excess network resource, which incurs all connections sharing network resource fairly. The performance of the proposed FILB algorithm is investigated by using the simulation. The result shows that the proposed algorithm provides superior performance and all connections within a group share network resource fairly. The proposed algorithm can be applied not only the ATM network but also IP network.

QUEUEING ANALYSIS OF THE HOL PRIORITY LEAKY BUCKET SCHEME

  • Choi, Doo-Il
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.7 no.1
    • /
    • pp.15-23
    • /
    • 2003
  • ATM networks provide the various kinds of service which require the different Quality of Services(QoS) such as loss and delay. By statistically multiplexing of traffics and the uncertainty and fluctuation of source traffic pattern, the congestion may occur. The leaky bucket scheme is a representative policing mechanism for preventive congestion control. In this paper, we analyze the HOL(Head-of-Line) priority leaky bucket scheme. That is, traffics are classified into real-time and nonreal-time traffic. The real-time traffic has priority over nonreal-time traffic for transmission. For proposed mechanism, we obtain the system state distribution, finally the loss probability and the mean waiting time of real-time and nonreal-time traffic. The simple numerical examples also are presented.

  • PDF

An efficient the traffic control algorithm in ATM Network (ATM 망에서 효율적인 트래픽제어 알고리즘)

  • 류언무
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.4
    • /
    • pp.112-119
    • /
    • 2000
  • In this paper, it aims at two different situation such that a preventive control which means, it never has network information in case of occurring congestion in network, and a reactive control which means, after the congestion simply happens. it is not effective to recover with congestion just because of extensive delay for an electric wave. To solve the problems, threshold is set up with buffer in multiplex system, and executes a congestion control by FBLB which is FeedBack Leaky Bucket Algorithm. As suggested by FBLB Algorithm. the outcome of performance could be compared with Buffered Leaky Bucket Algorithm.

  • PDF

Dimensioning leaky bucket parameters considering the cell delay variation (셀 지연 변이를 고려한 리키 버킷 계수 결정 방법)

  • 이준원;이병기
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.8
    • /
    • pp.31-38
    • /
    • 1995
  • In this paper, we consider the leaky bucket parameter dimensioning problem in the presence of the cell delay variation(CDV) which arises at the customer premises network dud to the multiplexing with other traffic streams. We consider an ATM multiplexer in which a single CBR stream and several heterogeneous VBR traffic streams are multiplexed. Choosing an MMPP model for the bursty traffic streams, we derive an (MMPP+DD)/D/1/K queueing model for the evaluation of the CDV experienced by the CBR stream. We first evaluate the equilibrium queue length distribution embedded at tagged-cell arrival-time instants, based on whcih we calcuate the inter-cell time distribution and the distribution kof the number of tagged-cell departures in an arbitrary interval. Then we apply the analysis to the dimensionging problem of the leaky bucket parameters, examining how the employed traffic model affects the determination of the bucket size. Through numerical examples, we confirm that the Poisson traffic model can underestimate the bucket size, thus causing a considerable blocking probability for compliant use cells while the MMPP model can optimally design the bucket size which keeps the blocking probability under the target value.

  • PDF

Fluid Flow Analysis of the Threshold based Leaky Bucket Scheme

  • Park, Chul-Geun
    • Journal of Electrical Engineering and information Science
    • /
    • v.3 no.2
    • /
    • pp.274-279
    • /
    • 1998
  • We investigate a Leaky Bucket(LB) scheme with a threshold in the data buffer, where leaky rate changes depending on the contents of data buffer. We use the fluid flow model for the analysis of the LB scheme with a threshold. We model the bursty input source as markov modulated fluid flow(MMFF) As performance measures we obtain loss probability and mean delay. We present some numerical results to show the effects of the level of a threshold, the rate of token generation, the size of token pool, and the size the data buffer on the performances of the LB scheme with a threshold.

  • PDF

A Hybrid UPC Algorithm Combining Leaky Bucket and EWMA Algorithms on ATM Networks (ATM 망에서 리키버켓과 EWMA 방식을 결합한 복합형 UPC 알고리즘)

  • Yun, Seok-Hyeon;Seong, Yeong-Rak;O, Ha-Ryeong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1382-1390
    • /
    • 1999
  • 본 논문에서는 ATM 망에서 대표적 사용 파라미터 제어(UPC) 알고리즘인 리키버켓 알고리즘과 윈도우 알고리즘의 하나인 EWMA 알고리즘을 결합한 복합형 UPC 알고리즘을 제안하고 그 성능을 평가 분석하였다.제안된 알고리즘은 최대전송율을 제어하는 리키버켓과 평균전송율을 제어하는 EWMA를 병렬로 결합하여, 최대전송율과 평균전송율을 동시에 고려하였다. ON/OFF 트래픽 소스 모델을 적용, BONeS를 이용하여 모의실험한 결과 제안 알고리즘이 기존의 리키버켓 알고리즘에 비해 셀 손실율과 버퍼 크기면에서 우수한 성능을 나타냈다.Abstract In this paper, a hybrid UPC algorithm is proposed, which combines the representative Leaky Bucket UPC algorithm with the EWMA window algorithm in the ATM network and then its performance is evaluated. The hybrid UPC algorithm is made up of Leaky Bucket and EWMA, which control the peak bit rate and the mean bit rate, respectively. According to the result of the simulation using BONeS with the On/Off traffic source model, it is revealed that the proposed UPC algorithm has superior performance to the existing Leaky Bucket UPC algorithm with regard to both the cell loss rate and the buffer size.

The DLB Method for Multimedia Synchronization in the ATM Networks (ATM 망에서 멀티미디어 동기화를 위한 DLB 기법)

  • 구경옥;이병수;조용환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.4
    • /
    • pp.842-854
    • /
    • 1997
  • In this paper, the improved Dual Leaky-Bucket(DLB) algorithm is proposed to reduce the synchronous cell loss rate. The conventional DLB algorithm does not support synchronous cells, but the proposed algorithm gives higher priority to synchronous cells. To reduce synchronous cell loss rate, the synchronous cell detector is used in the proposed algorithm. Synchronous cell detector detects synchronous cells, and passes them cells to the 2nd Leaky-Bucket. So it is similar to give higher priority to synchronous cells. In this paper, the proposed algorithm used audio/videl traffic modeled by On/Off and Two-state MMPP, and simulated by SLAM II package. As simulation results, the proposed algorithm gets lower synchronous cell loss rate than the conventional DLB algorithms. The improved DLB algorithm for multimedia synchronization can be extended to any other cells which require higher priority.

  • PDF

Overflow Probability Analysis and Bandwidth Allocation for Traffic Regulated by Dual Leaky Bucket (Dual Leaky Bucket 에 의해 규제되는 트래픽의 오버플로 확률분석과 대역폭 할당방법)

  • Yoon, Y.H.;Lie, C.H.;Hong, J.S.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.25 no.3
    • /
    • pp.404-410
    • /
    • 1999
  • A scheme of more exact overflow probability analysis is proposed for traffic regulated by dual leaky bucket. To each regulated traffic stream is allocated bandwidth and buffer independent of other traffic stream and overflow occurs when total bandwidth or buffer allocated to each traffic exceed link capacity or physical buffer size. Ratio of buffer and bandwidth allocated to each traffic stream is assumed to be constant, and this ratio is larger than the ratio of physical buffer and bandwidth due to buffer sharing effect. Numerical experiments show that this sharing effect have significant influence on overflow probability and effective bandwidth.

  • PDF

QUEUEING ANALYSIS OF DYNAMIC RATE LEAKY BUCKET SCHEME WITH MARKOVIAN ARRIVAL PROCESS

  • Choi, Doo-Il;Kim, Hyun-Sook;Sur, Uk-Hwan
    • Journal of applied mathematics & informatics
    • /
    • v.6 no.2
    • /
    • pp.553-568
    • /
    • 1999
  • This paper is of concern to queueing analysis of the dynamic rate leaky bucket(LB) scheme in which the token generation interval changes according to the buffer state at a token generation epoch. Cell arrivals are assumed to follow a Markovian arrival process (MAP) which is weakly dense in the class of the stationary point processes. By using the embedded Markov chain method we obtain the probability distribution of the system state at a token generation epoch and an arbitrary time. Some simple numerical examples also are provided to show the effects of the proposed LB scheme.

PERFORMANCE ANALYSIS OF THE LEAKY BUCKET SCHEME WITH QUEUE LENGTH DEPENDENT ARRIVAL RATES

  • Choi, Doo-Il;Lee, Sang-Min
    • Bulletin of the Korean Mathematical Society
    • /
    • v.43 no.3
    • /
    • pp.657-669
    • /
    • 2006
  • In this paper, we analyze a leaky bucket (LB) scheme with queue length dependent arrival rates. In other words, if the queue length exceeds an appropriate threshold value on buffer, the arrivals need to be controlled. In ATM networks, if the congestion occurs, the input traffics must be controlled (reduced) for congestion resolution. By the bursty and correlated properties of traffics, the arrivals are assumed to follow a Markov-modulated Poisson process (MMPP). We derive the loss probability and the waiting time distribution for arbitrary cell. The analysis is done by using the embedded Markov chain and supplementary variable method. We also present some numerical examples to show the effects of our proposed LB scheme.