Skip to main content

A user Relief Approach to Congestion Control in ATM Networks

  • Chapter
Asynchronous Transfer Mode Networks

Abstract

In this paper a new, insightful description of the object functions of a Traffic Regulator (TR) — implementing a model traffic behavior (delivered to the network) and a (user) relief function — is introduced. By identifying the relief function associated with the Leaky Bucket (LB), an explanation for the inefficiency of this widely studied TR is presented. The new class of ρ — relief LB TRs is then developed by focusing on the implementation of more flexible and efficient relief mechanisms. The improved effectiveness of the proposed class is established through a comprehensive comparison with the standard LB. The results from this study, as well as the slotted nature of the ATM environment, have motivated the introduction and study of the σ — relief TR implementing a near-periodic spacer. The induced cell loss probabilities have been derived through the analysis of a finite capacity queueing system with service opportunities determined in terms of a periodic pattern consisted of C + 1 subframes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Bae, T. Suda, “Survey of Traffic Control Schemes and Protocols in ATM Networks,” Proc. IEEE, (79), 2, Feb. 1991.

    Google Scholar 

  2. J. Turner, “New Directions in Communications (or Which Way to the Information Age?),” IEEE Commun. Mag., Oct. 1986.

    Google Scholar 

  3. M. Butto, E. Cavallero, A. Tonietti, “Effectiveness of the “Leaky Bucket” Policing Mechanism in ATM Networks,” IEEE J. Select. Areas Commun., (9), 3, Apr. 1991.

    Google Scholar 

  4. M. Sidi, W. Liu, I. Cidon, I. Gopal, “Congestion Control Through Input Traffic Rate Regulation,” IEEE Globecom′89 Conf.

    Google Scholar 

  5. E. Rathgeb, “Modeling and Performance Comparisons at Policing Mechanisms for ATM Networks,” IEEE J. Select. Areas Commun., (9), 3, Apr. 1991.

    Google Scholar 

  6. “Congestion Control in High Speed Networks,” Special Issue, IEEE Commun. Mag., Oct. 1991.

    Google Scholar 

  7. “B-ISDN: High Performance Transport,” Special Issue, IEEE Commun. Mag., Sept. 1991.

    Google Scholar 

  8. W. Leland, “Window Based Congestion Management in Broadband ATM Networks: The Performance of Three Access-Control Policies,” IEEE Globecom′89 Conf.

    Google Scholar 

  9. K. Sohraby, M. Sidi, “On the Performance of Bursty and Correlated Sources Subject to Leaky Bucket Rate-based Access Control Scheme,” IEEE Infocom′91 Conf.

    Google Scholar 

  10. D. Hughes, H. Bradlow, “Congestion Control in ATM Network”, ITC-13, pp. 835-840, 1991, North-Holland.

    Google Scholar 

  11. F. Guillemin, A. Dupuis, “A basic Requirment for the Policing Function in ATM Networks”, Computer Networks and ISDN Systems, pp. 311-320, Vol. 24, 1992.

    Google Scholar 

  12. H. Ahmadi, R. Guerin, K.Sohraby, “Analysis of a Rate-Based Access Control Mechanism for High-Speed Networks,” IEEE Globecom′90 Conf.

    Google Scholar 

  13. Guoliang Wu and Jon W Mark, “Discrete Time Analysis Of Leaky Bucket Congestion Control”, ICC′92 Conf., pp. 1196-1200, June 14-18, Chicago.

    Google Scholar 

  14. K.Q.Liao, Z. Dziong, L.Mason, N. Tetreault, “Effectiveness of The Leaky Bucket Policing Mechanism”, ICC′92 Conf., pp. 1201-1205, June 14-18, Chicago.

    Google Scholar 

  15. I. Stavrakakis, “A Two-Server Queueing System with Periodic and Credit-Based Server Availabilities”, submitted to the Annals of Operations Research.

    Google Scholar 

  16. G. Gallasi, G. Rigolio, L. Fratta, “ATM: Bandwidth Assignment and Bandwidth Enforcement Policies”, IEEE Infocom′91, pp. 1788-1793,1991.

    Google Scholar 

  17. K. Bala, I. Cidon, K. Sohraby, “Congestion Control for High Speed Packet Switched Networks,” IEEE ICC′90 Conf.

    Google Scholar 

  18. P. Boyer, “A Congestion Control for ATM,” Int. Teletraf. Cong. Sem, Oct. 1990, New Jersey.

    Google Scholar 

  19. B. Lague, C. Rosenberg, F. Guillemin, “A Generalization of Some Policing Mechanisms”, IEEE Infocom′92, pp. 767-775, May 6-8, Florence, Italy.

    Google Scholar 

  20. F. Guillemin, P. Boyer, A. Dupuis, L. Romoeuf, “Peak Rate Enforcement in ATM Networks”, IEEE Infocom′92, pp. 753-758, May 6-8, Florence, Italy.

    Google Scholar 

  21. G. Rigolio, L. Fratta, “Input Rate Regulation and Bandwidth Assignment in ATM Networks: an Integrated Approach”, ITC-13, pp. 141-146, 1991, North-Holland.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer Science+Business Media New York

About this chapter

Cite this chapter

Stavrakakis, I., Abdelaziz, M., Hoag, D. (1993). A user Relief Approach to Congestion Control in ATM Networks. In: Viniotis, Y., Onvural, R.O. (eds) Asynchronous Transfer Mode Networks. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-2844-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-2844-9_12

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-6231-9

  • Online ISBN: 978-1-4615-2844-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics