• DocumentCode
    307278
  • Title

    Leaky buckets: sizing and admission control

  • Author

    Kulkarni, Vidyadhar G. ; Gautam, Natarajan

  • Author_Institution
    Dept. of Oper. Res., North Carolina Univ., Chapel Hill, NC, USA
  • Volume
    1
  • fYear
    1996
  • fDate
    11-13 Dec 1996
  • Firstpage
    785
  • Abstract
    In this paper we propose a new unified approach to address simultaneously the issues of traffic policing (using leaky buckets), admission control and network dimensioning. First we compute the effective bandwidth of the output of the leaky bucket. We find a surprising result that effective bandwidth of the output of a leaky bucket is independent of the token pool size. Furthermore, the output effective bandwidth exhibits discontinuous behavior as the token pool size approaches infinity. We use these results in an optimization model to find the “optimal” leaky bucket parameters. We explain how this optimization program can be used to do network dimensioning if the input traffic characteristics are known, or to do connection admission control if the network parameters are fixed
  • Keywords
    optimisation; telecommunication congestion control; telecommunication network management; telecommunication traffic; connection admission control; discontinuous behavior; effective bandwidth; input traffic characteristics; leaky buckets; network dimensioning; optimization; sizing; token pool size; traffic policing; Admission control; Asynchronous transfer mode; Bandwidth; Channel allocation; Communication system traffic control; High-speed networks; Operations research; Quality of service; Traffic control; USA Councils;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Decision and Control, 1996., Proceedings of the 35th IEEE Conference on
  • Conference_Location
    Kobe
  • ISSN
    0191-2216
  • Print_ISBN
    0-7803-3590-2
  • Type

    conf

  • DOI
    10.1109/CDC.1996.574481
  • Filename
    574481