Performance characteristics of end-stations in an ATM network as viewed for applications and network

Traffic shaping at a (traffic) source station as a prominent congestion control solution in ATM networks. The "leaky bucket" scheme in conjunction with a cell spacer is an extensively studied and used mechanism for such a traffic shaping. By dimensioning the leaky bucket and spacer parameters, a source station attempts to regulate the behavior of its own traffic in order to conform to a "good behavior" contract with the network. In this paper, we study the effect of the a single source's traffic characteristics and its leaky bucket parameters on the maximum burst size and the burst size distribution as seen by the network. The theoretical upper bound for the burst size is derived and simulation is used to study the effect of leaky bucket parameters on probability distribution of burst sizes. It is shown that while traffic shaping is done to abide to negotiated traffic characteristics, traffic shaping can lead to large queues of cells and result in large cell delay and delay jitter in the source station.<<ETX>>

[1]  Fabrice Guillemin,et al.  Jitter in ATM Networks and its Impact on Peak Rate Enforcement , 1992, Perform. Evaluation.

[2]  Roch Guérin,et al.  Analysis of a rate-based access control mechanism for high-speed networks , 1993, IEEE Trans. Commun..

[3]  Gerd Niestegge,et al.  The ‘leaky bucket’ policing method in the ATM (asynchronous transfer mode) network , 1990 .

[4]  Israel Cidon,et al.  Congestion control through input rate regulation , 1993, IEEE Trans. Commun..

[5]  Raif O. Onvural,et al.  Asynchronous Transfer Mode Networks: Performance Issues, Second Edition , 1993 .

[6]  Israel Cidon,et al.  Congestion control for high speed packet switched networks , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[7]  Fabrice Guillemin,et al.  Peak rate enforcement in ATM networks , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[8]  Moshe Sidi,et al.  On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes , 1991, IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings.

[9]  J. Turner,et al.  New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.