DocumentCode :
3298508
Title :
The token-bank leaky bucket mechanism for group connections in ATM networks
Author :
Wu, Sheng-Lin ; Chen, W.-S.E.
Author_Institution :
Inst. of Comput. Sci., Nat. Chung-Hsing Univ., Taichung, Taiwan
fYear :
1996
fDate :
29 Oct-1 Nov 1996
Firstpage :
226
Lastpage :
233
Abstract :
A well accepted policing mechanism for ATM networks is the leaky bucket mechanism. The original leaky bucket has been shown to be effective for traffic with a constant bit rate, but reacts poorly to bursty traffic. Although there are some other policing mechanisms in the literature that provide improvements over the original leaky bucket, most of them enforce the negotiated parameters for individual source traffic and do not fully utilize the statistical multiplexing of multiple connections. As a result, the bandwidth utilisation is low. Even though some source policing mechanisms have been proposed for group connections, they either fail to explore statistical multiplexing fully or do not provide a scheme to protect well-behaved sources from malicious ones in the group. We propose a new source policing mechanism, called the token-bank leaky bucket, for group connections in ATM networks. The mechanism explores the statistical multiplexing of multiple connections in the group and allows the unused bandwidth to be effectively shared by the connections that need it. In addition, it sets a limit of excessive data cells a source can send in a cycle in order to protect well-behaved sources against malicious sources. It is shown by simulations to have a lower violation probability and better bandwidth utilization even for small group connections when compared to the original leaky bucket with a similar configuration
Keywords :
asynchronous transfer mode; buffer storage; probability; telecommunication congestion control; telecommunication traffic; token networks; ATM networks; bandwidth sharing; bandwidth utilisation; bursty traffic; connection admission control; constant bit rate traffic; group connections; multiple connections; negotiated parameters; policing mechanism; simulations; source policing; source traffic; statistical multiplexing; token-bank leaky bucket mechanism; violation probability; well-behaved sources; Application software; Asynchronous transfer mode; B-ISDN; Bandwidth; Bit rate; Communication system traffic control; Computer networks; Intelligent networks; Protection; Quality of service;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Protocols, 1996. Proceedings., 1996 International Conference on
Conference_Location :
Columbus, OH
Print_ISBN :
0-8186-7453-9
Type :
conf
DOI :
10.1109/ICNP.1996.564946
Filename :
564946
Link To Document :
بازگشت