Performance Optimization of ATM Input Control using an Adaptive Leaky-Bucket Mechanism

نویسنده

  • Tolga ÖRS
چکیده

This paper investigates a combined reactive/preventive congestion control mechanism. Emphasis is given to optimize the Leaky Bucket (LB) mechanism chosen for source traffic policing in ATM networks, examining performance characteristics such as reaction time, cell loss and cell delay. The performance of both buffered and unbuffered LBs is analyzed using the fluid-flow model. Closed form formulas are derived to calculate the mean queuing delay and mean reaction time of the LB. Numerical calculations and simulations are performed for different traffic sources which are characterized by their mean bit rate, peak bit rate and average number of bits generated during the burst. The results obtained confirm the performance studies done so far, showing that one LB is not sufficient to police all the source traffic parameters. It has been found that a three-fold trade-off exists between sensitivity to violation, reaction time and cell queuing delay. According to the analysis done a triple LB mechanism is proposed which provides an effective solution if tight control, fast reaction time and a small queuing delay are required. The LB parameters are then dynamically changed according to the delayed congestion feedback information received from the network. The preventive control policy is finally compared with the adaptive control scheme showing that even for large propagation delays, major performance improvements are possible by using an appropriate feedback policy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Traffic Management for Atm Local Area Networks Using a Combined Preventive/reactive Control Mechanism

This paper investigates how the performance of a preventive control scheme using a Leaky Bucket can be improved by using a feedback control loop. The proposed scheme is adaptive to congestion within the network. The queue occupancy of a network element is used as an indication of congestion and the individual sources, whose transmission path passes through the congested switch, are informed to ...

متن کامل

A Survey of Managing Congestion Control in ATM Network Using Fuzzy Logic

This survey paper shows different mechanisms for controlling congestion in ATM network and some suggested solution for the existing mechanism to be modified using fuzzy logic. Different mechanisms are Jump Window (JW), Exponentially Weighted Moving Average (EWMA), and traditional Leaky Bucket (LB) and Fuzzy Leaky Bucket Algorithm. The Fuzzy Leaky Bucket (FLB) modifies the token rate according t...

متن کامل

An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network17 An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network

When congestion occurs in VDSL networks, it will drop incoming frames because the buffer fills up frames until it overflows. In backpressure algorithm suitable for low traffic [1], it prevents buffer overflows. In backoff time in leaky bucket over traffic policing mechanism suitable for high traffic [2], Backoff time computations are wildly used in order to avoid the impact on the network perfo...

متن کامل

Performance Analysis of Leaky-Bucket Controlled Pareto-Distributed On/Off Sources

An approximate performance analysis of a leaky bucket with Pareto-distributed On/Off sources is presented. The aggregate of Pareto-distributed On/Off sources is a self-similar traffic. This analysis is applicable to the leaky bucket policing device at the ingresses of (1) a base station in a Wireless ATM network, (2) a wireline ATM network, and (3) future generations of IP-based networks with q...

متن کامل

On the departure process of a leaky bucket system with long-range dependent input traffic

Due to the strong experimental evidence that the traffic to be offered to future broadband networks will display long-range dependence, it is important to study the possible implications that such traffic may have for the design and performance of these networks. In particular, an important question is whether the offered traffic preserves its long-range dependent nature after passing through a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995