Buffered and Unbuffered Leaky Bucket Policing: Guaranteeing QoS, Design and Admission Control
نویسنده
چکیده
Traffic shaping and smoothing using buffers or leaky buckets does not necessarily improve Quality of Service (QoS). In fact there is a trade-off between controlling user traffic and guaranteeing QoS to the users. We consider the first two stages (source node and border node before entering a network cloud) of an end-to-end QoS problem and assume that the QoS requirements across each of the two stages are given. We formulate and solve a mathematical programming problem to select optimal leaky bucket parameters that would enable high-speed telecommunication network providers to optimize traffic policing subject to guaranteeing a negotiated Quality of Service requirement across the first stage namely the source end. We address both the buffered and unbuffered leaky bucket cases where using fluid models we characterize the output process from the leaky buckets for general traffic sources. Using the optimal leaky bucket parameters and output characteristics (effective bandwidths in particular), we solve design and connection admission control problems given QoS requirements at the second stage, namely the border node.
منابع مشابه
Performance Analysis of Leaky-Bucket Controlled Pareto-Distributed On/Off Sources
An approximate performance analysis of a leaky bucket with Pareto-distributed On/Off sources is presented. The aggregate of Pareto-distributed On/Off sources is a self-similar traffic. This analysis is applicable to the leaky bucket policing device at the ingresses of (1) a base station in a Wireless ATM network, (2) a wireline ATM network, and (3) future generations of IP-based networks with q...
متن کاملPerformance Optimization of ATM Input Control using an Adaptive Leaky-Bucket Mechanism
This paper investigates a combined reactive/preventive congestion control mechanism. Emphasis is given to optimize the Leaky Bucket (LB) mechanism chosen for source traffic policing in ATM networks, examining performance characteristics such as reaction time, cell loss and cell delay. The performance of both buffered and unbuffered LBs is analyzed using the fluid-flow model. Closed form formula...
متن کاملMultiplexing Regulated Traffic Streams: Design and Performance
The main network solutions for supporting QoS rely on traffic policing (conditioning, shaping). In particular, for IP networks the IETF has developed Intserv (individual flows regulated) and Diffserv (only aggregates regulated). The regulator proposed could be based on the (dual) leaky-bucket mechanism. This explains the interest in network element performance (loss, delay) for leaky-bucket reg...
متن کاملAn Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network17 An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network
When congestion occurs in VDSL networks, it will drop incoming frames because the buffer fills up frames until it overflows. In backpressure algorithm suitable for low traffic [1], it prevents buffer overflows. In backoff time in leaky bucket over traffic policing mechanism suitable for high traffic [2], Backoff time computations are wildly used in order to avoid the impact on the network perfo...
متن کاملCongestion Control in an Atm Network
Broadband ISDN resource allocation and congestion control present a major challenge. A preventative control scheme based on a call admission procedure and source policing is favoured by a number of groups. This paper investigates the behaviour of the leaky bucket policing mechanism. Simulation studies of a simple ATM multiplexer model in which a number of policed sources feed a deterministicall...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Telecommunication Systems
دوره 21 شماره
صفحات -
تاریخ انتشار 2002