Letter effect of enhanced leaky bucket parameters on the maximum queue length: Worst-case analysis

In ATM networks, various usage parameter control (UPC) strategies are used to regulate incoming traffic according to the characteristics of the sources declared at call set-up. Among these UPC schemes, the Leaky Bucket method is well-known and has been discussed extensively. In this paper, we study the characteristics of the multiplexer in which cell arrivals are first policed by Enhanced Leaky-Buckets (ELBs) before entering the system. In addition to both policing mean cell rate and peak cell rate, cell delay variation (CDV) are also taken into consideration for each ELB. We derive the upper and lower bounds on the maximum queue length expressed as a funtion of the ELB parameters and the number of sources. We also rigorously prove that these bounds occur with respect to a coincident token-generating pattern and a perfectly interleaved token-generating pattern, respectively.

[1]  Mooi Choo Chuah,et al.  Approximate analysis of average performance of ( sigma , rho ) regulators , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[2]  Erwin P. Rathgeb Modeling and Performance Comparison of Policing Mechanisms for ATM Networks , 1991, IEEE J. Sel. Areas Commun..

[3]  Jung-Shyr Wu,et al.  Worst case analysis for multiplexed traffic enforced by enhanced leaky bucket with CDV tolerance , 1997 .

[4]  Daniel Chonghwan Lee Effects of leaky bucket parameters on the average queueing delay: worst case analysis , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[5]  Bharat T. Doshi,et al.  Deterministic rule based traffic descriptors for broadband ISDN: worst case behavior and connection acceptance control , 1993, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference.

[6]  Gerd Niestegge,et al.  The ‘leaky bucket’ policing method in the ATM (asynchronous transfer mode) network , 1990 .

[7]  Jung-Shyr Wu,et al.  Delay Bound Analysis for Multiplexed Traffic Controlled by Enhanced Leaky Bucket , 1996 .

[8]  Catherine Rosenberg,et al.  A generalization of some policing mechanisms , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.