Traffic policing in ATM networks with multimedia traffic: the super leaky bucket

Traffic policing and bandwidth management strategies at the User Network Interface (UNI) of an ATM network are investigated by simulation. The network is assumed to transport real time (RT) traffic like voice and video as well as non-real time (non-RT) data traffic. The proposed policing function, called the super leaky bucket (S-LB), is based on the leaky bucket (LB), but handles the three types of traffic differently according to their quality of service (QoS) requirements. Separate queues are maintained for RT and non-RT traffic. They are normally served alternately, but if the number of RT cells exceeds a threshold, it gets non-pre-emptive priority. Further increase of the RT queue causes low priority cells to be discarded. Non-RT cells are buffered and the sources are throttled back during periods of congestion. The simulations clearly demonstrate the advantages of the proposed strategy in providing improved levels of service (delay, jitter and loss) for all types of traffic.

[1]  Gerd Niestegge,et al.  The ‘leaky bucket’ policing method in the ATM (asynchronous transfer mode) network , 1990 .

[2]  Rosângela Coelho,et al.  A generic smoothing algorithm for real-time variable bit rate video traffic , 1998, Comput. Networks ISDN Syst..

[3]  Chul Geun Park,et al.  Performance analysis of a Leaky Bucket scheme with a threshold in the data buffer , 1997, Comput. Networks ISDN Syst..

[4]  Basil S. Maglaris,et al.  Models for packet switching of variable-bit-rate video sources , 1989, IEEE J. Sel. Areas Commun..

[5]  Gunnar Karlsson Capacity reservation in ATM networks , 1996, Comput. Commun..

[6]  Lily Cheng Quality of services based on both call admission and cell scheduling , 1997, Comput. Networks ISDN Syst..

[7]  S. McKenzie,et al.  Performance of an ATM network with multimedia traffic-a simulation study , 1995 .

[8]  Jonathan M. Pitts,et al.  Introduction to ATM Design and Performance: With Applications Analysis Software , 1996 .

[9]  Kris Steenhaut,et al.  Scheduling and admission control policies: A case study for ATM , 1997, Comput. Networks ISDN Syst..

[10]  Paul T. Brady,et al.  A model for generating on-off speech patterns in two-way conversation , 1969 .

[11]  Gopalakrishnan Ramamurthy,et al.  Delay analysis of a packet voice multiplexer by the ΣD i/D/1 queue , 1991, IEEE Trans. Commun..

[12]  D. Gan,et al.  Source modelling for B-ISDN networks with ATM switching , 1994 .

[13]  Tatsuya Suda,et al.  Survey of traffic control schemes and protocols in ATM networks , 1991, Proc. IEEE.

[14]  Raif O. Onvural,et al.  Asynchronous Transfer Mode Networks: Performance Issues, Second Edition , 1993 .

[15]  Tatsuya Suda,et al.  Analysis of a Finite Buffer Queue with Heterogeneous Markov Modulated Arrival Processes: A Study of Traffic Burstiness and Priority Packet Discarding , 1996, Comput. Networks ISDN Syst..

[16]  Stephen B. Weinstein Telecommunications: the next decade , 1987 .

[17]  Boudewijn R. Haverkort,et al.  Performance evaluation of ATM cell scheduling policies using stochastic petri nets , 1994 .

[18]  George D. Stamoulis,et al.  Traffic source models for ATM networks: a survey , 1994, Comput. Commun..

[19]  Yung-Terng Wang,et al.  First-order rate-based flow control with dynamic queue threshold for high-speed wide-area ATM networks , 1998, Comput. Networks ISDN Syst..

[20]  Athanasios V. Vasilakos,et al.  LB-SELA: Rate-Based Access Control for ATM Networks , 1998, Comput. Networks.

[21]  Chong Kwan Un,et al.  Performance Analysis of Leaky-Bucket Bandwidth Enforcement Strategy for Bursty Traffics in an ATM Network , 1992, Comput. Networks ISDN Syst..

[22]  Chung-Ju Chang,et al.  Study on Optimal Queue-Length-Threshold Scheduling Policy for an ATM Multiplexer with Finite Buffers and Natch Poisson Arrivals , 1994, Comput. Networks ISDN Syst..

[23]  Åke Arvidsson,et al.  On the Validity of Some Markovian Models in ATM Traffic Modelling , 1995 .

[24]  Paul T. Brady,et al.  A technique for investigating on-off patterns of speech , 1965 .

[25]  Boudewijn R. Haverkort,et al.  Performance evaluation of threshold-based ATM cell scheduling policies under Markov modulated Poisson traffic using stochastic Petri nets , 1994, Modelling and Evaluation of ATM Networks.

[26]  Theo A. Smit The Poor Gain from Statistical Multiplexing in the Homogeneous and the Heterogeneous Case , 1993, Integrated Broadband Communications.

[27]  Henry J. Fowler,et al.  Local Area Network Traffic Characteristics, with Implications for Broadband Network Congestion Management , 1991, IEEE J. Sel. Areas Commun..

[28]  S. B. Weinstein Telecommunications in the coming decades , 1987, IEEE Spectrum.

[29]  Raouf Boutaba,et al.  Performance analysis of cell discarding techniques for best effort video communications over ATM networks , 1998, Comput. Networks ISDN Syst..

[30]  D. Brandt,et al.  Implementation of a police criterion calculator based on the leaky bucket algorithm , 1993, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference.

[31]  S. Singhal,et al.  Source coding of speech and video signals , 1990, Proc. IEEE.