Bandwidth allocation and access control in high-speed networks

The problem of bandwidth allocation and access regulation arises in the congestion control of Broadband ISDN networks. This paper assumes that a single user, described by an on-off fluid model, is connected to the network via a leaky bucket access control mechanism. The bandwidth allocated to this user and the leaky bucket parameters are to be selected so as to guarantee a negotiated level of delay probability at the access point and packet loss probability in the network which is modelled as an output buffer. The design problem is to minimize the allocated bandwidth subject to service guarantees and stability conditions for the input and output buffers. We provide a desirable feasible solution to the design problem. The paper studies the effect of non-conforming users on the network performance using the leaky bucket access control corresponding to this feasible solution. We provide expressions that quantify the impact of the leaky bucket parameters in access regulation and the worst-case queueing behavior at the output buffer. Finally, we discuss the extension of this methodology to the multiple leaky buckets case.

[1]  Arthur W. Berger Performance Analysis of a Rate-Control Throttle where Tokens and Jobs Queue , 1991, IEEE J. Sel. Areas Commun..

[2]  M. Decina,et al.  Bandwidth assignment and virtual call blocking in ATM networks , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[3]  J. Turner,et al.  New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.

[4]  Hamid Ahmadi,et al.  Equivalent Capacity and Its Application to Bandwidth Allocation in High-Speed Networks , 1991, IEEE J. Sel. Areas Commun..

[5]  Gillian Woodruff,et al.  Multimedia Traffic Management Principles for Guaranteed ATM Network Performance , 1990, IEEE J. Sel. Areas Commun..

[6]  Manu Malek,et al.  Dynamic Access Capacity Management in a Multiservice Packet-Mode Environment , 1990 .

[7]  David M. Lucantoni,et al.  Meeting the challenge: congestion and flow control strategies for broadband information transport , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[8]  Debasis Mitra,et al.  Analysis and design of rate-based congestion control of high speed networks, I: stochastic fluid models, access regulation , 1991, Queueing Syst. Theory Appl..

[9]  Luigi Fratta,et al.  ATM: bandwidth assignment and bandwidth enforcement policies , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[10]  F Schoute SIMPLE DECISION RULES FOR ACCEPTANCE OF MIXED TRAFFIC STREAMS , 1988 .

[11]  Israel Cidon,et al.  Congestion control for high speed packet switched networks , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[12]  Israel Cidon,et al.  Paris: An approach to integrated high‐speed private networks , 1988 .

[13]  Alberto Tonietti,et al.  Effectiveness of the "Leaky Bucket" Policing Mechanism in ATM Networks , 1991, IEEE J. Sel. Areas Commun..

[14]  I. Cidon,et al.  Bandwidth management and congestion control in plaNET , 1991, IEEE Communications Magazine.

[15]  Roch Guérin,et al.  Analysis of a rate-based access control mechanism for high-speed networks , 1993, IEEE Trans. Commun..

[16]  M. Decina,et al.  On bandwidth allocation to bursty virtual connections in ATM networks , 1990, IEEE International Conference on Communications, Including Supercomm Technical Sessions.

[17]  Roch Guérin,et al.  Bandwidth Management and Congestion Control Framework of the Broadband Betwork Architecture , 1993, Comput. Networks ISDN Syst..

[18]  Harry G. Perros,et al.  Performance of the buffered leaky bucket policing mechanism , 1992 .

[19]  W. Verbiest,et al.  A statistical bandwidth allocation and usage monitoring algorithm for ATM networks , 1989, IEEE International Conference on Communications, World Prosperity Through Communications,.

[20]  Luigi Fratta,et al.  Statistical Multiplexing in ATM Networks , 1991, Perform. Evaluation.

[21]  Daniel P. Heyman A Performance Model of the Credit Manager Algorithm , 1992, Comput. Networks ISDN Syst..

[22]  Lars Dittmann,et al.  Statistical multiplexing of identical bursty sources in an ATM network , 1988, IEEE Global Telecommunications Conference and Exhibition. Communications for the Information Age.