On the queueing behavior of multiplexed leaky bucket regulated sources

The leaky bucket algorithm, which has been proposed as a monitor/enforcer in the rate-based management of bandwidth in high-performance, integrated packet communication networks, is considered. The effectiveness of the unbuffered leaky bucket algorithm in protecting the quality of service (QOS) experienced by connections passing through a common internodal link queue is studied. It is shown that excess traffic generated by a source can pass through the leaky bucket without marked or discarded and cause unacceptable packet delay/loss to other connections sharing the queue. It is also shown that average bursts that are larger, or average rate that is higher, than that assumed at connection establishment can deteriorate the queue performance even with the leaky bucket enforcing the agreed throughput QOS by discarding packets. On the basis of this analysis, a strategy for alleviating these problems is devised, namely, allocating network bandwidth above the leaky bucket permit rate and configuring the leaky bucket with a loss/mark probability greater than 10/sup -2/.<<ETX>>

[1]  C.A. Cooper,et al.  Toward a broadband congestion control strategy , 1990, IEEE Network.

[2]  Israel Cidon,et al.  Paris: An approach to integrated high‐speed private networks , 1988 .

[3]  Arthur W. Berger,et al.  Performance analysis of a rate control throttle where tokens and jobs queue , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[4]  Moshe Sidi,et al.  On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes , 1991, IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings.

[5]  David M. Lucantoni,et al.  Meeting the challenge: congestion and flow control strategies for broadband information transport , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[6]  Debasis Mitra,et al.  Analysis and design of rate-based congestion control of high speed networks, I: stochastic fluid models, access regulation , 1991, Queueing Syst. Theory Appl..

[7]  J. Turner,et al.  New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.

[8]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[9]  Nanying Yin,et al.  Analysis of the Leaky Bucket Algorithm for ON-OFF Data Sources , 1993, J. High Speed Networks.

[10]  P. S. Richards,et al.  A congestion control framework for high-speed integrated packetized transport , 1988, IEEE Global Telecommunications Conference and Exhibition. Communications for the Information Age.

[11]  Debasis Mitra,et al.  Stochastic fluid models in the analysis of access regulation in high speed networks , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.

[12]  H. Ahmadi,et al.  Analysis of leaky bucket access control mechanism with batch arrival process , 1990, [Proceedings] GLOBECOM '90: IEEE Global Telecommunications Conference and Exhibition.

[13]  Nanying Yin,et al.  Analysis of the leaky bucket algorithm for on-off data sources , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.