EFFECTIVENESS OF THE LEAKY BUCKET POLICING MECHANISM IN ATM NETWORKS

被引:91
作者
BUTTO, M
CAVALLERO, E
TONIETTI, A
机构
[1] CSELT
关键词
D O I
10.1109/49.76631
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents an analysis of the performance of the "Leaky Bucket," a device proposed [1] for controlling the source traffic parameters of an ATM network (policing function). The most critical situation, i.e., an on/off bursty source, is assumed. Moreover, the delay jitter introduced by a possible multiplexing of sources inside the customer premises network is not considered. The Leaky Bucket can be analyzed as a G/D/1/N queue with finite waiting room N and a suitable arrival process. But the complexity of the arrival pattern brings only to numerical solutions for the system performance. An alternative approach is presented in the paper: the "fluid flow" approximation, by which the bit flow is considered as a continuous variable. By comparison with the exact model, it is shown that the accuracy of the fluid flow approach can be considered sufficient for practical purposes. Following the fluid flow approximation, an explicit formula for the cell loss probability, in case of exponential distributions for both the burst duration and the inactivity period of the source, is derived. On the basis of that formula, some numerical evaluations with the aim of assessing the effectiveness of the Leaky Bucket mechanism are presented. Two approaches are investigated. The first approach considers the selectivity characteristics of the Leaky Bucket, i.e., the efficacy of the device in detecting a critical source behavior. According to the second approach, the Leaky Bucket is regarded as a device filtering the traffic offered by the source and allowing to load the network with a controlled flow. The conclusions are that, while the Leaky Bucket can easily control the peak rate, difficulties arise in controlling the mean bit rate (because of the long time required) and the burst duration (because of the poor selectivity).
引用
收藏
页码:335 / 342
页数:8
相关论文
共 12 条
[1]   STOCHASTIC-THEORY OF A DATA-HANDLING SYSTEM WITH MULTIPLE SOURCES [J].
ANICK, D ;
MITRA, D ;
SONDHI, MM .
BELL SYSTEM TECHNICAL JOURNAL, 1982, 61 (08) :1871-1894
[2]  
BOYER P, 1986, SPORADIC FLOW ASYNCH
[3]  
DANISSEN F, 1990, 1990 P INT ZUR SEM D, P131
[4]  
ECKBERG AE, 1989, SEP P ITC SPEC SEM A
[5]  
GALLASSI G, 1989, NOV P GLOBECOM 1989
[6]  
IVERSEN B, 1989, NOTES POLICING ADMIS
[7]  
KOWALK W, 1988, SEP P S SUBSCR LOOPS
[8]  
RATHGEB ER, 1990, 13TH INT SWIT S
[9]  
ROBERTS J, 1988, SOME QUEUEING MODELS
[10]   CHARACTERIZING SUPERPOSITION ARRIVAL PROCESSES IN PACKET MULTIPLEXERS FOR VOICE AND DATA [J].
SRIRAM, K ;
WHITT, W .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1986, 4 (06) :833-846