A Design of Adaptive Double Leaky Bucket in Traffic Shaping over VDSL Network

نویسنده

  • SOMCHAI LEKCHAROEN
چکیده

Traffic shaping in high speed networks, including VDSL networks, occurs when congestion builds up in the outgoing VDSL network. Shaping mechanisms want smooth traffic. We used a leaky bucket too achieve traffic shaping. But leaky buckets still have a lot of non-conforming frames. However, as one way to solving this problem, we purpose a double-leaky bucket as the traffic shaping mechanism that has proven to be efficient in coping with conflicting requirements, that is, low non-conforming frames. We evaluate and compare the performance of a double-leaky bucket in traffic shaping mechanisms (DLB) and leaky buckets (LB). The performance of the double-leaky bucket was investigated through fluctuations in telecommunication traffic streams (burst/silent type). Simulation results showed that on VDSL frames, a double-leaky bucket helps improve the performance in a traffic-shaping system much better than conventional, leaky-bucket systems by about 30 %, in terms of conforming and non-conforming frames. Once various types of burst/silence traffic are generated, the leaky bucket is much better than other schemes by about 29 % in terms of utilization. Key-Words:Double leaky bucket , congestion, traffic shaping mechanism.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network17 An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network

When congestion occurs in VDSL networks, it will drop incoming frames because the buffer fills up frames until it overflows. In backpressure algorithm suitable for low traffic [1], it prevents buffer overflows. In backoff time in leaky bucket over traffic policing mechanism suitable for high traffic [2], Backoff time computations are wildly used in order to avoid the impact on the network perfo...

متن کامل

Buffered and Unbuffered Leaky Bucket Policing: Guaranteeing QoS, Design and Admission Control

Traffic shaping and smoothing using buffers or leaky buckets does not necessarily improve Quality of Service (QoS). In fact there is a trade-off between controlling user traffic and guaranteeing QoS to the users. We consider the first two stages (source node and border node before entering a network cloud) of an end-to-end QoS problem and assume that the QoS requirements across each of the two ...

متن کامل

A Curve Traffic Shaping Method for Vbr Mpeg Digital Video Sources

One of the most important traffic types in the future packet-switch networks is high bandwidth, variablebit-rate (VBR) video. A key challenge of incorporating VBR video traffic into networks with service guarantees lies in the difficulty of finding an appropriate traffic characterization that captures the dynamics of the source. A simple traffic model, such as leaky bucket, will lead to low net...

متن کامل

The interaction between TCP and traffic shapers - clever alternatives to the leaky bucket

The Differentiated Services (DS) architecture has been defined for implementing scalable service differentiation in the Internet. DS edge routers employ traffic conditioners that contain meter, marker and shaper functionalities. The way of traffic shaping in traffic conditioners is an open issue and we believe, using intelligent shaping algorithms instead of leaky bucket algorithms (LBAs) could...

متن کامل

Analysis of a self-similar traffic envelope for a trade-off of leaky bucket algorithm parameters

Numerous investigations have revealed that the packet network traffic is bursty and highly correlated. If many large bursts meet in a single queue an overflow is unavoidable even for a slightly loaded network, therefore shaping packet traffic becomes a crucial issue. One of the most commonly used traffic shaping algorithms is a leaky bucket. An important property of a leaky bucket algorithm is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006