Discrete time analysis of leaky-bucket congestion control

https://doi.org/10.1016/0169-7552(93)90038-6Get rights and content

Abstract

Traffic control at an ATM multiplexer is of fundamental importance in B-ISDN. Due to the presence of large propagation delay, effective traffic control tends to use only local information. Leaky bucket has been introduced as a rate control method. The present paper studies the system performance of a leaky bucket controller with the arrivals being Poisson processes or Markov modulated Poisson processes (MMPP). Numerical results indicate that a small to medium sized controller is sufficient to attain the capability of a leaky bucket controller; increasing the size of the controller will not offer much improvement in performance. Controlling MMPP type of arrivals with a leaky bucket device may incur low performance especially when the burst duration is long. The performance can be improved by controlling a group of bursty users instead of a single bursty user.

References (17)

  • H. Ahmadi et al.

    Analysis of a rate-based access control mechanism for high-speed networks

  • K. Bala et al.

    Congestion control for high-speed packet switched networks

  • A.W. Berger

    Performance analysis of a rate control throttle where tokens and jobs queue

    A.W. Berger

    Performance analysis of a rate control throttle where tokens and jobs queue

    IEEE J. Selected Areas Comm.

    (1991)
  • M.C. Chuah et al.

    Approximate analysis of average performance of (σ, π) regulators

  • A.E. Eckberg et al.

    Meeting the challenge: congestion and flow control strategies for broadband information transport

  • M. Gerla et al.

    Flow control: a comparative survey

    IEEE Trans Comm.

    (1980)
  • A. Graham

    Kronecker Product and Matrix Calculus with Applications

    (1981)
  • H. Heffes et al.

    A Markov-modulated characterization of packetized voice and data traffic and related statistical multiplexer performance

    IEEE J. Selected Areas Comm.

    (1986)
There are more references available in the full text version of this article.

Cited by (18)

  • The sticky buffer flow control for the ATM

    1996, Performance Evaluation
  • SIR approach in modeling data packets forwarding at a leaky bucket

    2020, International Journal of Modeling, Simulation, and Scientific Computing
View all citing articles on Scopus

This work has been supported partially by the Natural Sciences and Engineering Research Council of Canada under Grant No. A7779, and the ITRC

View full text