• 제목/요약/키워드: leaky bucket scheme

검색결과 18건 처리시간 0.027초

THE DISCRETE-TIME ANALYSIS OF THE LEAKY BUCKET SCHEME WITH DYNAMIC LEAKY RATE CONTROL

  • Choi, Bong-Dae;Choi, Doo-Il
    • 대한수학회논문집
    • /
    • 제13권3호
    • /
    • pp.603-627
    • /
    • 1998
  • The leaky bucket scheme is a promising method that regulates input traffics for preventive congestion control. In the ATM network, the input traffics are bursty and transmitted at high-speed. In order to get the low loss probability for bursty input traffics, it is known that the leaky bucket scheme with static leaky rate requires larger data buffer and token pool size. This causes the increase of the mean waiting time for an input traffic to pass the policing function, which would be inappropriate for real time traffics such as voice and video. We present the leaky bucket scheme with dynamic leaky rate in which the token generation period changes according to buffer occupancy. In the leaky bucket scheme with dynamic leaky rate, the cell loss probability and the mean waiting time are reduced in comparison with the leaky bucket scheme with static leaky rate. We analyze the performance of the proposed leaky bucket scheme in discrete-time case by assuming arrival process to be Markov-modulated Bernoulli process (MMBP).

  • PDF

광대역통신망에서 폭주제어 방식에 대한 성능연구 (A Performance Study on Congestion Control Schemes for the Broadband Communication Networks)

  • 박두영
    • 공학논문집
    • /
    • 제6권2호
    • /
    • pp.39-46
    • /
    • 2004
  • 본 논문은 leaky bucket을 이용하여 광대역통신망의 폭주를 제어하는 방식에 대한 성능을 분석한다. 제안된 네트워크는 손실 및 오류패킷에 대하여 재전송하는 오류제어 방식을 병행하여 사용된다. 네트워크 모델의 성능 분석을 통하여 사용자 차원의 오류제어와 망 차원의 폭주제어 방식간의 상호작용을 연구하여 윈도우 크기와 leaky bucket의 토큰 생성속도가 end-to-end delay에 영향을 미치는 중요한 파라미터들임을 알 수 있다.

  • PDF

Advanced Peer-to-Peer Network에서의 초고속 통신망의 성능연구 (A Performance Study on The Advanced Peer-to-Peer Network for Broadband Communications)

  • 황명상;류제영;주기호;박두영
    • 융합신호처리학회 학술대회논문집
    • /
    • 한국신호처리시스템학회 2000년도 추계종합학술대회논문집
    • /
    • pp.9-12
    • /
    • 2000
  • 본 논문은 leaky bucket을 이용하여 초고속망의 폭주를 제어하는 Advanced Peer-to-Peer Network(APPN)의 성능을 분석하였다. 제안된 논문에서는 손실 및 오류패킷에 대하여 재전송하는 오류제어 방식을 병행하여 사용하였다. APPN 모델의 성능 분석을 통하여 사용자 차원의 오류제어와 망 차원의 폭주제어 방식간의 상호작용을 연구하여 윈도우 크기와 leaky bucket의 토큰 생성속도가 end-to-end delay에 영향을 미치는 중요한 파라미터들임을 알 수 있었다.

  • PDF

버스트 토큰을 이용한 리키 버킷에 관한 연구 (A Study of Leaky Bucket using Burst Tokens)

  • 김동철
    • 디지털콘텐츠학회 논문지
    • /
    • 제8권4호
    • /
    • pp.573-579
    • /
    • 2007
  • 리키버킷 사용에 관해서 많은 연구가 있었다. 고속네트워크에서 제어기능을 다루는데 리키버킷 방식의 사용에 관해서 많은 관심을 가지고 있다. 본 논문에서 제안한 버스트 토큰 fill 방식은 최고율을 유지하고 버스트 크기도 조절하며 평균율에 그다지 큰 변화를 주지 않으면서 좋은 효과를 기대 할 수 있는 방법을 제안 하였다. 이러한 방법을 사용함으로써 어떤 효과가 있을지를 보여 주었다. 그러나 이방법의 사용에 있어서 on-off 방식과 같은 버스트 데이터의 특별한 형태에 보다 효율적이며 모든 데이터에 적용하는 데는 더욱 세심한 주의가 필요하다.

  • PDF

QUEUEING ANALYSIS OF THE HOL PRIORITY LEAKY BUCKET SCHEME

  • Choi, Doo-Il
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제7권1호
    • /
    • pp.15-23
    • /
    • 2003
  • ATM networks provide the various kinds of service which require the different Quality of Services(QoS) such as loss and delay. By statistically multiplexing of traffics and the uncertainty and fluctuation of source traffic pattern, the congestion may occur. The leaky bucket scheme is a representative policing mechanism for preventive congestion control. In this paper, we analyze the HOL(Head-of-Line) priority leaky bucket scheme. That is, traffics are classified into real-time and nonreal-time traffic. The real-time traffic has priority over nonreal-time traffic for transmission. For proposed mechanism, we obtain the system state distribution, finally the loss probability and the mean waiting time of real-time and nonreal-time traffic. The simple numerical examples also are presented.

  • PDF

Fluid Flow Analysis of the Threshold based Leaky Bucket Scheme

  • Park, Chul-Geun
    • Journal of Electrical Engineering and information Science
    • /
    • 제3권2호
    • /
    • pp.274-279
    • /
    • 1998
  • We investigate a Leaky Bucket(LB) scheme with a threshold in the data buffer, where leaky rate changes depending on the contents of data buffer. We use the fluid flow model for the analysis of the LB scheme with a threshold. We model the bursty input source as markov modulated fluid flow(MMFF) As performance measures we obtain loss probability and mean delay. We present some numerical results to show the effects of the level of a threshold, the rate of token generation, the size of token pool, and the size the data buffer on the performances of the LB scheme with a threshold.

  • PDF

QUEUEING ANALYSIS OF DYNAMIC RATE LEAKY BUCKET SCHEME WITH MARKOVIAN ARRIVAL PROCESS

  • Choi, Doo-Il;Kim, Hyun-Sook;Sur, Uk-Hwan
    • Journal of applied mathematics & informatics
    • /
    • 제6권2호
    • /
    • pp.553-568
    • /
    • 1999
  • This paper is of concern to queueing analysis of the dynamic rate leaky bucket(LB) scheme in which the token generation interval changes according to the buffer state at a token generation epoch. Cell arrivals are assumed to follow a Markovian arrival process (MAP) which is weakly dense in the class of the stationary point processes. By using the embedded Markov chain method we obtain the probability distribution of the system state at a token generation epoch and an arbitrary time. Some simple numerical examples also are provided to show the effects of the proposed LB scheme.

PERFORMANCE ANALYSIS OF THE LEAKY BUCKET SCHEME WITH QUEUE LENGTH DEPENDENT ARRIVAL RATES

  • Choi, Doo-Il;Lee, Sang-Min
    • 대한수학회보
    • /
    • 제43권3호
    • /
    • pp.657-669
    • /
    • 2006
  • In this paper, we analyze a leaky bucket (LB) scheme with queue length dependent arrival rates. In other words, if the queue length exceeds an appropriate threshold value on buffer, the arrivals need to be controlled. In ATM networks, if the congestion occurs, the input traffics must be controlled (reduced) for congestion resolution. By the bursty and correlated properties of traffics, the arrivals are assumed to follow a Markov-modulated Poisson process (MMPP). We derive the loss probability and the waiting time distribution for arbitrary cell. The analysis is done by using the embedded Markov chain and supplementary variable method. We also present some numerical examples to show the effects of our proposed LB scheme.

Dual Leaky Bucket 에 의해 규제되는 트래픽의 오버플로 확률분석과 대역폭 할당방법 (Overflow Probability Analysis and Bandwidth Allocation for Traffic Regulated by Dual Leaky Bucket)

  • 윤영하;이창훈;홍정식
    • 대한산업공학회지
    • /
    • 제25권3호
    • /
    • pp.404-410
    • /
    • 1999
  • A scheme of more exact overflow probability analysis is proposed for traffic regulated by dual leaky bucket. To each regulated traffic stream is allocated bandwidth and buffer independent of other traffic stream and overflow occurs when total bandwidth or buffer allocated to each traffic exceed link capacity or physical buffer size. Ratio of buffer and bandwidth allocated to each traffic stream is assumed to be constant, and this ratio is larger than the ratio of physical buffer and bandwidth due to buffer sharing effect. Numerical experiments show that this sharing effect have significant influence on overflow probability and effective bandwidth.

  • PDF

QUEUEING ANALYSIS FOR TRAFFIC CONTROL WITH COMBINED CONTROL OF DYNAMIC MMPP ARRIVALS AND TOKEN RATES

  • Choi, Doo Il
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제17권2호
    • /
    • pp.103-113
    • /
    • 2013
  • We analyze the queueing model for leaky bucket (LB) scheme with dynamic arrivals and token rates. In other words, in our LB scheme the arrivals and token rates are changed according to the buffer occupancy. In telecommunication networks, the LB scheme has been used as a policing function to prevent congestion. By considering bursty and correlated properties of input traffic, the arrivals are assumed to follow a Markov-modulated Poisson process (MMPP). We derive the distribution of system state, and obtain the loss probability and the mean waiting time. The analysis is done by using the embedded Markov chain and supplementary variable method. We also present some numerical examples to show the effect of our proposed model.