Design of leaky bucket access control schemes in ATM networks

Depending on what enforcement action is taken and whether or not there is a 'shaping' buffer, four versions of the leaky bucket scheme are considered, and their cell loss performance is compared in conjunction with a statistical multiplexer. Based on the best-performing version, three architectures are proposed. Among them, a novel algorithm and its implementation method are proposed to accommodate a large number of virtual channel connections on each incoming STS-3c channel. A VLSI chip (called a sequencer), containing about 200 K CMOS transistors, has been designed to implement the architecture.<<ETX>>

[1]  R. Ballart,et al.  SONET: now it's the standard optical network , 1989, IEEE Communications Magazine.

[2]  J. Filipiak,et al.  M-architecture: a structural model of traffic management and control in broadband ISDNs , 1989, IEEE Communications Magazine.

[3]  P. S. Richards,et al.  A congestion control framework for high-speed integrated packetized transport , 1988, IEEE Global Telecommunications Conference and Exhibition. Communications for the Information Age.

[4]  Luigi Fratta,et al.  ATM: bandwidth assignment and bandwidth enforcement policies , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[5]  Masayuki Murata,et al.  Analysis of a Discrete-Time Single-Server Queue with Bursty Inputs for Traffic Control in ATM Networks , 1990, IEEE J. Sel. Areas Commun..

[6]  Lixia Zhang,et al.  A new architecture for packet switching network protocols , 1989 .

[7]  Israel Cidon,et al.  Congestion control through input rate regulation , 1993, IEEE Trans. Commun..

[8]  E. P. Rathgeb,et al.  The poucing function in atm networks , 1990, International Symposium on Switching.

[9]  Gerd Niestegge,et al.  The ‘leaky bucket’ policing method in the ATM (asynchronous transfer mode) network , 1990 .

[10]  W. E. Leland,et al.  Window-based congestion management in broadband ATM networks: the performance of three access-control policies , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[11]  Joseph Y. Hui Resource allocation for broadband networks , 1988, IEEE J. Sel. Areas Commun..

[12]  A. J. McAuley,et al.  A reconfigurable content addressable memory , 1990, IEEE Proceedings of the Custom Integrated Circuits Conference.

[13]  C. Anthony Cooper,et al.  A reasonable solution to the broadband congestion control problem , 1990 .

[14]  A. E. Eckberg,et al.  AN APPROACH TO CONTROLLING CONGESTION IN ATM NETWORKS , 1990 .

[15]  Walter Willinger,et al.  Performance of an ATM switch: simulation study , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[16]  R. Lehnert,et al.  The 'policing function' to control user access in ATM networks-definition and implementation , 1988, ISSLS 88., International Symposium on Subscriber Loops and Services.

[17]  J. Turner,et al.  New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.

[18]  Arthur W. Berger,et al.  Performance analysis of a rate control throttle where tokens and jobs queue , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[19]  Mary K. Vernon,et al.  Distributed round-robin and first-come first-serve protocols and their applications to multiprocessor bus arbitration , 1988, ISCA '88.

[20]  Laxmi N. Bhuyan,et al.  Arbiter designs for multiprocessor interconnection networks , 1989 .

[21]  Naoya Watanabe,et al.  Traffic characteristics and a congestion control scheme for an ATM network , 1990 .