\limitations" and \pitfalls" of Leaky Bucket a Study with Video Traac

The Leaky Bucket policing mechanism has been extensively studied in both the academic as well as the industrial communities, resulting in numerous publications. Recently, there has been much interest in solving the issues of admission control in High Speed Networks using parameters determined by the leaky bucket as the access control mechanism. In this paper, we demonstrate that the leaky bucket performs exceedingly poorly for a very important class of traac, namely correlated traac with real time constraints. An example of such traac is Variable Bit Rate (VBR) video. For VBR video traac we show that the leaky bucket policing mechanism acts as nothing more than a peak rate controller. We also show that malicious users could take advantage of this weakness, and hence gravely impact the Quality of Service (QOS) of honest users sharing the network resources. We use actual video sequences to demonstrate our results. Furthermore, we show that the cell loss rate for such traf-c is insensitive to the token buuer and data buuer sizes. All of our results use nite buuers.

[1]  Hamid Ahmadi,et al.  Equivalent Capacity and Its Application to Bandwidth Allocation in High-Speed Networks , 1991, IEEE J. Sel. Areas Commun..

[2]  Arthur W. Berger,et al.  Performance analysis of a rate control throttle where tokens and jobs queue , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[3]  Rene L. Cruz,et al.  A calculus for network delay, Part I: Network elements in isolation , 1991, IEEE Trans. Inf. Theory.

[4]  Abhay Parekh,et al.  A generalized processor sharing approach to flow control in integrated services networks-the multiple node case , 1993, IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings.

[5]  Ken-ichi Sato,et al.  Performance Limitation of Leaky Bucket Algorithm for Usage Parameter Control and Bandwidth Allocation Methods , 1992 .

[6]  Gopalakrishnan Ramamurthy,et al.  Modeling and analysis of a variable bit rate video multiplexer , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[7]  Erwin P. Rathgeb Modeling and Performance Comparison of Policing Mechanisms for ATM Networks , 1991, IEEE J. Sel. Areas Commun..

[8]  James F. Kurose,et al.  Open issues and challenges in providing quality of service guarantees in high-speed networks , 1993, CCRV.

[9]  James F. Kurose,et al.  On computing per-session performance bounds in high-speed multi-hop computer networks , 1992, SIGMETRICS '92/PERFORMANCE '92.

[10]  Moshe Sidi,et al.  On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes , 1991, IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings.

[11]  Basil S. Maglaris,et al.  Models for packet switching of variable-bit-rate video sources , 1989, IEEE J. Sel. Areas Commun..

[12]  J. Turner,et al.  New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.

[13]  Ali Tabatabai,et al.  A scheme for smoothing delay-sensitive traffic offered to ATM networks , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[14]  Mischa Schwartz,et al.  A histogram-based model for video traffic behavior in an ATM network node with an application to congestion control , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[15]  Lars Dittmann,et al.  Flow Enforcement Algorithms for ATM Networks , 1991, IEEE J. Sel. Areas Commun..

[16]  Srinivasan Keshav Congestion control in high speed networks , 1990 .

[17]  Ness B. Shroff,et al.  Video modeling within networks using deterministic smoothing at the source , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[18]  Willem Verbiest,et al.  A variable bit rate video codec for asynchronous transfer mode networks , 1989, IEEE J. Sel. Areas Commun..