JOURNAL BROWSE
Search
Advanced SearchSearch Tips
PERFORMANCE ANALYSIS OF THE LEAKY BUCKET SCHEME WITH QUEUE LENGTH DEPENDENT ARRIVAL RATES
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
PERFORMANCE ANALYSIS OF THE LEAKY BUCKET SCHEME WITH QUEUE LENGTH DEPENDENT ARRIVAL RATES
Choi, Doo-Il; Lee, Sang-Min;
  PDF(new window)
 Abstract
In this paper, we analyze a leaky bucket (LB) scheme with queue length dependent arrival rates. In other words, if the queue length exceeds an appropriate threshold value on buffer, the arrivals need to be controlled. In ATM networks, if the congestion occurs, the input traffics must be controlled (reduced) for congestion resolution. By the bursty and correlated properties of traffics, the arrivals are assumed to follow a Markov-modulated Poisson process (MMPP). We derive the loss probability and the waiting time distribution for arbitrary cell. The analysis is done by using the embedded Markov chain and supplementary variable method. We also present some numerical examples to show the effects of our proposed LB scheme
 Keywords
queueing analysis;leaky bucket;MMPP;telecommunication networks;
 Language
English
 Cited by
1.
고객 도착률이 시스템 상태에 의존하는 개별주문 생산시스템의 최적 선별수주 문제,손재동;

한국경영공학회지, 2011. vol.16. 1, pp.113-124
2.
QUEUEING ANALYSIS FOR TRAFFIC CONTROL WITH COMBINED CONTROL OF DYNAMIC MMPP ARRIVALS AND TOKEN RATES,;

Journal of the Korea Society for Industrial and Applied Mathematics, 2013. vol.17. 2, pp.103-113 crossref(new window)
1.
QUEUEING ANALYSIS FOR TRAFFIC CONTROL WITH COMBINED CONTROL OF DYNAMIC MMPP ARRIVALS AND TOKEN RATES, Journal of the Korea Society for Industrial and Applied Mathematics, 2013, 17, 2, 103  crossref(new windwow)
 References
1.
H. Ahmadi, R. Guerin, and K. Sohraby, Analysis of leaky bucket access control mechanism with batch arrival process, IEEE Globecom'90 (1990), 344-349

2.
M. Butto, E. Cavallero, and A. Tonietti, Effectiveness of the leaky bucket policing mechanism in ATM networks, IEEE J. Sel. Areas Commun. 9 (1991), no. 3, 335-342 crossref(new window)

3.
B. D. Choi and D. I. Choi, Discrete-time analysis of the leaky bucket scheme with threshold-based token generation intervals, IEE Proc. Commun. 143 (1996), 105-111

4.
B. D. Choi and D. I. Choi, The discrete-time analysis of the leaky bucket scheme with dynamic leacky rate control, Comm. Korean. Math. Soc. 13 (1998), no. 3, 603-627

5.
D. I. Choi, B. D. Choi, and D. K. Sung, Performance analysis of priority leaky bucket scheme with queue-length-threshold scheduling policy, IEE Proc. Commun. 145 (1998), no. 6, 395-401

6.
Y. H. Kim, B. C. Shin, and C. K. Un, Performance analysis of leaky bucket band-width enforcement strategy for bursty traffics in an ATM networks, Computer Networks ISDN Syst. 25(1992), 295-303 crossref(new window)

7.
J. Y. Lee and C. K. Un, Performance of dynamic rate leaky bucket algorithm, IEE Electron. Lett. 29 (1993), no. 17, 1560-1561 crossref(new window)

8.
C. G. Park, B. D. Choi, and D. K. Sung, Performance analysis of leaky bucket scheme with a threshold in the data buffer, Computer Networks ISDN Syst. 29 (1997), 781-795 crossref(new window)

9.
M. Sidi, Z. Lin, I. Cidon, and I. Gopal, Congestion control through input rate regulation, Proceedings of IEEE Globecom'89 ( 1989)

10.
K. Sohraby and M. Sidi, On the performance of bursty and modulated sources subject to leaky bucket rate based access control schemes, IEEE Trans. on Commun. 42 (1994), 477-487 crossref(new window)

11.
J. Tunner, New directions in communications(or Which way to the information age), IEEE Communi. Mag. 24 (1986), 17-24

12.
G. L. Wu and J. W. Mark, Discrete time analysis of leaky bucket congestion control, Computer Networks ISDN Syst. 26 (1993), 79-94 crossref(new window)

13.
J. Zeng and L. F. Merakos, Analysis of a priority leaky bucket regulator for virtual path traffic in ATM networks, Proceedings of IEEE Globecom'94. 1994, 606-611