Performance analysis of a Leaky Bucket scheme with a threshold in the data buffer

We investigate Leaky Bucket (LB) schemes with a threshold in the data buffer, where the leak rate changes depending on the contents of the data buffer. We use a Markov modulated Poisson process (MMPP) as a bursty input traffic. We obtain the limiting distributions of the system state at an embedded point and at an arbitrary time. As performance measures we obtain cell loss probability and mean cell delay. We present some numerical results to show the effects of the threshold value, the rate of token generation, the size of the token pool and the size of the data buffer on the performances of the LB scheme with a threshold. Numerical examples show that the LB scheme with a threshold improves the system performance in comparison with the LB scheme without a threshold.

[1]  Ward Whitt,et al.  Characterizing Superposition Arrival Processes in Packet Multiplexers for Voice and Data , 1986, IEEE J. Sel. Areas Commun..

[2]  Younghan Kim,et al.  Performance analysis of statistical multiplexing for heterogeneous bursty traffic in an ATM network , 1994, IEEE Trans. Commun..

[3]  Erwin P. Rathgeb Modeling and Performance Comparison of Policing Mechanisms for ATM Networks , 1991, IEEE J. Sel. Areas Commun..

[4]  Thomas E. Stern,et al.  Analysis of separable Markov-modulated rate models for information-handling systems , 1991, Advances in Applied Probability.

[5]  Wolfgang Fischer,et al.  The Markov-Modulated Poisson Process (MMPP) Cookbook , 1993, Perform. Evaluation.

[6]  Moshe Sidi,et al.  On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes , 1991, IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings.

[7]  Debasis Mitra,et al.  Analysis and design of rate-based congestion control of high speed networks, I: stochastic fluid models, access regulation , 1991, Queueing Syst. Theory Appl..

[8]  Chong Kwan Un,et al.  Performance Analysis of Leaky-Bucket Bandwidth Enforcement Strategy for Bursty Traffics in an ATM Network , 1992, Comput. Networks ISDN Syst..

[9]  Jon W. Mark,et al.  Discrete time analysis of leaky-bucket congestion control , 1992, [Conference Record] SUPERCOMM/ICC '92 Discovering a New World of Communications.

[10]  Anwar Elwalid,et al.  Fluid models for the analysis and design of statistical multiplexing with loss priorities on multiple classes of bursty traffic , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[11]  B. D. Choi,et al.  Discrete-time analysis of the leaky bucket scheme with threshold-based token generation intervals , 1996 .

[12]  David M. Lucantoni,et al.  A Markov Modulated Characterization of Packetized Voice and Data Traffic and Related Statistical Multiplexer Performance , 1986, IEEE J. Sel. Areas Commun..

[13]  Alberto Tonietti,et al.  Effectiveness of the "Leaky Bucket" Policing Mechanism in ATM Networks , 1991, IEEE J. Sel. Areas Commun..