Worst Case Arrivals of Leaky Bucket Constrained Sources: The Myth of the On-Off source

We have simulated a set of independent connections limited by leaky bucket shapers and fed into a buffered multiplexer. This scenario is typical of an ATM switch or in a looser sense of an RSVP capable router. We found periodic traffic patterns which result in much worse loss rates than the on-off or tristate patterns found in literature to date. We give an intuitive justification for what we believe is the worst case and back this with an extensive set of simulations. Our results are important for Connection Acceptance Control when connections are known to be statistically independent. They clearly invalidate the widespread belief that on-off patterns are the worst case traffic of independent leaky bucket constrained sources.

[1]  Ken-ichi Sato,et al.  Performance Limitation of Leaky Bucket Algorithm for Usage Parameter Control and Bandwidth Allocation Methods , 1992 .

[2]  Rene L. Cruz,et al.  A calculus for network delay, Part I: Network elements in isolation , 1991, IEEE Trans. Inf. Theory.

[3]  Julio A. Garceran A New Approach for Allocating Buffers and Bandwidth to Heterogeneous , Regulated Traffic in an ATM Node ” , 2022 .

[4]  Ken-ichi Sato,et al.  Usage parameter control and bandwidth allocation methods for ATM-based B-ISDN , 1992, CCRV.

[5]  Daniel Chonghwan Lee Effects of leaky bucket parameters on the average queueing delay: worst case analysis , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[6]  Debasis Mitra,et al.  A New Approach for Allocating Buffers and Bandwidth to Heterogeneous Regulated Traffic in an ATM Node , 1995, IEEE J. Sel. Areas Commun..

[7]  Erwin P. Rathgeb Modeling and Performance Comparison of Policing Mechanisms for ATM Networks , 1991, IEEE J. Sel. Areas Commun..

[8]  Donald F. Towsley,et al.  Source time scale and optimal buffer/bandwidth trade-off for regulated traffic in an ATM node , 1997, Proceedings of INFOCOM '97.

[9]  Pravin K. Johri,et al.  Estimating cell loss rates in high-speed networks with leaky bucket controlled sources , 1995 .

[10]  K. Kvols,et al.  Bounds and approximations for the periodic on/off queue with applications to ATM traffic control , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[11]  Tom Worster,et al.  Modelling Deterministic Queues: The Leaky Bucket as an Arrival Process , 1994 .

[12]  J. Boudec Network Calculus Made Easy , 1996 .

[13]  Harry G. Perros,et al.  Call admission control schemes: a review , 1996, IEEE Commun. Mag..