Abstract
Leaky bucket and partial buffer sharing policy have already become classic examples of preventive and reactive traffic control functions implemented in ATM networks. They help to respect the negotiated connection parameters, to avoid the congestion and therefore to ensure the guaranteed quality of service. We revisit their performance models with the use of diffusion approximation adopting our previously developed method of transient state analysis and extending it to the case of state-dependent input. This kind of approach gives us an inside look upon the transient behaviour of the traffic. The dynamics of the traffic is displayed and the influence of both mechanisms on the traffic characteristics appears as a function of time. General cell interarrival times and the burstiness of the traffic are represented in a natural way in these models. The diffusion method is a second-order approximation and thus has certain superiority upon the fluid approximation. Both models can be easily implemented in a general queueing network model. Hence, the impact of both mechanisms on the performance of the whole network may be studied. The models may be applied also in cases of very small losses which are difficult to study by simulation.
Chapter PDF
References
Akhtar, S. (1987) Congestion control in a Fast Packet Switching Network, Master’s Thesis, Washington University.
Atmaca, T., Czachórski, T. and Pekergin, F. (1995) A Diffusion Model of the Dynamic Effects of Closed-Loop Feedback Control Mechanisms in ATM Networks, in Proceedings of 3rd IFIP Workshop on Performance Modelling and Evaluation of ATM Networks, Ilkley.
Cox, D.R. and Miller, H.D. (1965) The Theory of Stochastic Processes. Methuen, London.
Czachórski T., Fourneau J-M., Pekergin F. (1992) Diffusion model of a push-out buffer management policy, in Proceedings of IEEE INFOCOM, Florence.
Czachórski T. (1993) A method to solve diffusion equation with instantaneous return processes acting as boundary conditions. Bulletin of Polish Academy of Sciences, Technical Sciences, 41, 421–427.
Czachórski, T., Fourneau, J-M. and Pekergin, F. (1994) Diffusion Models to Study Nonstationary Traffic and Cell Loss in ATM Networks, in ACM 2nd Workshop on ATM Networks, Bradford.
Czachórski, T., Fourneau, J-M. and Kloul L. (1995) Diffusion Approximation to Study the Flow Synchronization in ATM Networks, in Proceedings of 3rd IFIP Workshop on Performance Modelling and Evaluation of ATM Networks, Ilkley.
Duda A., (1986) Diffusion Approximations for Time-Dependent Queueing Sys- tems. IEEE Journal on Selected Areas in Communications, SAC-4, 6.
Elwalid, A.I. and Mitra D., (1991) Stochastic Fluid Models in the Analysis of Access Regulation in High Speed Networks, in Procedings of GLOBECOM, Geneva.
Gelenbe, E. (1975) On Approximate Computer Systems Models. Journal of ACM 22, 261–273.
Gelenbe, E. and Pujolle, G. (1976) The Behaviour of a Single Queue in a General Queueing Network. Acta Informatica, 7, 123–136.
Gelenbe, E., Mang, X. and Feng, Y. (1996) A diffusion cell loss estimate for ATM with multiclass bursty traffic, in Performance Modelling and Evaluation of ATM Networks, Vol 2 (ed. D.D. Kouvatsos) Chapman and Hall, London.
Hébuterne G. and Gravey A. (1989) A Space Priority Queueing Mechanism for Multiplexing ATM Channels, in Proceedings of ITC Specialist Seminar, Adelaide
Holtsinger, D.S. (1992) Performance Analysis of Leaky Bucket Policing Mechanisms, Ph.D. thesis, Dept. of Electrical and Computer Engineering, North Carolina State University.
Kröner, H., Hébuterne, G., Boyer, P. and Gravey, A. (1991) Priority management in ATM switching nodes. IEEE Journal on Selected Areas in Communications, 9, 418–427.
Meyer J.F., Montagna, S. and Paglino, R. (1993) Dimentioning of an ATM switch with shared buffer and threshold priority. Computer Networks and ISDN Systems, 26, 95–108.
Newell, G.F. (1971) Applications of Queueing Theory. Chapman and Hall, London.
Örs, T. and Jones, S.P.W. (1995) Performance Optimization of ATM Input Control using Multiple Leaky-Buckets, in Proceedings of ACM 3rd Workshop on ATM Networks, Ilkley.
Stehfest H. (1970) Algorithm 368: Numeric Inversion of Laplace Transform. Communications of ACM, 13, 47–49.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 IFIP Published by Chapman & Hall
About this chapter
Cite this chapter
Czachórski, T., Pekergin, F. (1997). Diffusion models of leaky bucket and partial buffer sharing policy: transient analysis. In: Kouvatsos, D. (eds) ATM Networks. ATM 1996. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35185-8_22
Download citation
DOI: https://doi.org/10.1007/978-0-387-35185-8_22
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2950-3
Online ISBN: 978-0-387-35185-8
eBook Packages: Springer Book Archive