Worst Average Queueing Delay of Multiple Leaky-Bucket-Regulated Streams and Jumping-Window Regulated Stream

  • Lee, Daniel C. (Department of Electrical Engineering, University of Southern California)
  • Published : 2004.03.01

Abstract

This paper presents deterministic, worst-case analysis of a queueing system whose multiple homogeneous input streams are regulated by the associated leaky buckets and the queueing system that has a single stream regulated by the jumping-window. Queueing delay averaged over all items is used for performance measure, and the worst-case input traffic and the worst-case performance are identified for both queueing systems. For the former queueing system, the analysis explores different phase relations among leaky-bucket token generations. This paper observes how the phase differences among the leaky buckets affect the worst-case queueing performance. Then, this paper relates the worst-case performance of the former queueing system with that of the latter (the single stream case, as in the aggregate streams from many users, whose item arrivals are regulated by one jumping-window). It is shown that the worst-case performance of the latter is identical to that of the former in which all leaky buckets have the same phase and have particular leaky bucket parameters.

Keywords

References

  1. J. S. Turner, 'New directions in communications (or which way to the information age?),' IEEE Commun. Mag., Oct. 1986
  2. E. P. Rathgeb, 'Modeling and performance comparison of policing mechanisms for ATM networks,' IEEE J. Select. Areas Commun., vol. 9, pp. 325-334, Apr. 1991 https://doi.org/10.1109/49.76630
  3. D. Bertsekas and R. Gallager, Data Networks. Englewood Cliffs, NJ: Prentice-Hall, 2nd ed., 1992
  4. S. Blake et al., An architecture for differentiated services. Internet Society, Dec. 1998. RFC 2475
  5. B. Erimli, J. Murphy, and J. Murphy, 'On worst case traffic in ATM networks,' in Twelfth UK lEE Teletraffic Symp., (Windsor, United Kingdom), Mar. 1995
  6. M. Bonatti and A. A. Gaivoronski, 'Worst case analysis of ATM sources with application to access engineering of broadband multiservice networks,' in The Fundamental Role of Teletraffic in the Evolution of Telecommunication Networks (J. Labetoulle and J. W. Roberts, eds.), pp. 559-569, Amsterdam: Elsevier Science, 1994
  7. R. L. Cruz, 'Calculus for network delay - part I: Network elements in isolation,' IEEE Trans. Infom. Theory, vol. 37, pp. 114-131, Jan. 1991 https://doi.org/10.1109/18.61109
  8. A. Parekh and R. Gallager, 'A generalized processor sharing approach to flow control in integrated service networks: The single-node case,' IEEE/ACM Trans. Networking, vol. 1, pp. 344-357, June 1993 https://doi.org/10.1109/90.234856
  9. R. L. Cruz, 'Calculus for network delay - part II: Network analysis,' IEEE Trans. Inform. Theory, vol. 37, pp. 132-141, Jan. 1991 https://doi.org/10.1109/18.61110
  10. A. Parekh and R. Gallager, 'A generalized processor sharing approach to flow control in integrated service networks: The multiple node case,' IEEE/ACM Trans. Networking, vol. 2, pp. 137-150, Apr. 1994 https://doi.org/10.1109/90.298432
  11. H. Ahmadi, R. Guerin, and K. Sohraby, 'Analysis of leaky bucket access control mechanism with batch arrival process,' in Proc. GLOBECOM'90, dec.1990,pp.344-349
  12. A. W. Berger and W. Whitt, 'The brownian approximation for rate-control throttles and the G/G/1/C queue,' Discrete Event Dynamic Systems: Theory and Applications, pp. 7-60, 1992 https://doi.org/10.1007/BF01797279
  13. A. W. Berger and W. Whitt, 'The pros and cons of a job buffer in a tokenbank rate-control throttle,' IEEE Trans. Commun., vol. 42, pp. 857-861, Feb./Mar./Apr. 1994 https://doi.org/10.1109/TCOMM.1994.580189
  14. R. Boorstyn et al., ,' in Proc. IEEE INFOCOM 2000, 2000, pp. 1223-1232
  15. G. de Veciana, 'Leaky buckets and optimal self-tuning rate control,' in Proc. GLOBECOM'94, 1994, pp. 1207-1211
  16. A. I. Elwalid and D. Mitra, 'Traffic shaping at a network node: Theory, optimum design, admission control,' in Proc. IEEE INFOCOM'97, 1997, pp. 444-454
  17. M. G. Hluchyj and N. Yin, 'A second-order leaky bucket algorithm to guarantee QoS in ATM networks,' in Proc.IEEE GLOBECOM'96, 1996, pp. 1090-1096
  18. J. S. M. Ho, H. Uzunalioglu, and I. Akyildiz, 'Cooperating leaky bucket for average rate enforcement of vbr video traffic in ATM networks,' in Proc. IEEE INFOCOM'95, 1995, pp. 1248-1255
  19. D. C. Lee, 'Effects of leaky bucket parameters on the average queueing delay: Worst case analysis,' in Proc. IEEE INFOCOM'94, 1994, pp. 482-489
  20. D. S. Holtsinger and H. G. Perros, 'Performance of the buffered leaky bucket policing mechanism,' in Proc. TriCom'92: High-Speed Communication Networks, 1992, pp. 47-69
  21. I. Khan and V.O. K. Li, 'A traffic control mechanism for ATM networks,' in Proc. IEEE GLOBECOM'93, (Houston, TX), 1993, pp. 1122-1126
  22. R. Krishnan and J. A. Silvester, 'The effect of variance reduction on the performance of the leaky bucket,' in Proc. ICC'95, (Seattle), 1995, pp. 1974-1980
  23. J. F. Kurose, ,' in Proc. ACM SIGMETRICS/IFIP Performance'92 Conf., (Newport, RI), June 1992, pp. 128-139
  24. S.-K. Kweon and K. G. Shin, 'Traffic-controlled rate monotonic priority scheduling of ATM cells,' in Proc. IEEE INFOCOM'96, (San Francisco, CA), Mar. 1996, pp. 655-662
  25. F. Lo Presti et al., 'Source time scale and optimal buffer/bandwidth tradeoff for heterogeneous regulated traffic in a network node,' IEEE/ACM Trans. Networking, vol. 7, pp. 490-501, Aug. 1999 https://doi.org/10.1109/90.793004
  26. S. Low and P. P. Varaiya, 'Burst reducing servers in ATM networks,' , vol. 20, pp. 61-84, Sept. 1995 https://doi.org/10.1007/BF01158432
  27. J. A. S. Monteiro, M. Gerla, and L. Fratta, 'Leaky bucket analysis for ATM networks,' in Proc. SBT/IEEE Int. Telecommun. Symp., 1990, pp. 498-502
  28. C.P. Su and G. de Veclana, 'On the overflow probability of deterministically constrained traffic,' in Proc. ICC'97, (Montreal), 1997, pp. 1704-1708
  29. M. K. Wong and P. P. Varaiya, 'A deterministic fluid model for cell loss in ATM networks,' in Proc. IEEE INFOCOM'93, 1993, pp. 395-400
  30. F. M. Guillemin et al., 'Extremal traffic and bounds for the mean delay of multiplexed traffic streams,' in Proc. IEEE INFOCOM 2002, 2002
  31. R. G. Gallager et al., IEEE J. Select. Areas Commun., vol. 13, Aug. 1995
  32. K. Sohraby et aI., IEEE J. Select. Areas Commun., vol. 9, Sept. 1991
  33. A. Atkinson, 'A traffic control scheme for virtual paths in an asynchronous transfer mode network,' in Proc. GLOBECOM'94, 1994, pp. 1768-1773
  34. K. C. Budka, 'Stochastic monotonicity and convexity properties of ratebased flow control mechanisms,' IEEE Trans. Automatic Control, vol. 39, pp. 544-548, Mar. 1994 https://doi.org/10.1109/9.280754
  35. P. Castelli, A. Forcina, and A. Tonietti, 'Dimensioning criteria for policing functions in ATM netwokrs,' in Proc. IEEE INFOCOM'92, 1992
  36. K. Shimokoshi, 'Resource management for multimedia broadband access networks,' in Proc. GLOBECOM'95, 1995, pp. 728-733
  37. S. Shioda and H. Saito, 'Satisfying QOS standard with combined strategy for CAC and UPC,' in Proc. ICC'95, (Seattle), 1995, pp. 965-969
  38. T. Tsuchya and H. Saito, 'The worst case cell arrival patterns in ATM networks,' IEICE Trans. Commun., vol. 81-B, pp. 996-1003, May 1998
  39. B. T. Doshi, 'Deterministic rule based traffic descriptors for broadband ISDN: Worst case behavior and connection acceptance control,' in The Fundamental Role of Teletraffic in the Evolution of Telecommunication Networks (J. Labetoulle and J. W. Roberts, eds.), Amsterdam: Elsevier Science, 1994, pp. 591-600
  40. T. Worster, 'Modelling deterministic queues: The leaky bucket as an arrival process,' in The Fundamental Role of Teletraffic in the Evolution of Telecommunication Networks (J. Labetoulle and J. W. Roberts, eds.), Amsterdam: Elsevier Science, 1994, pp. 581-590
  41. M. Reisslein, K. Ross, and S. Rajagopal, 'Guaranteeing statistical qos to regulated traffic: The single node case,' in Proc. IEEE INFOCOM'99, (New York), Mar. 1999, pp. 1061-1072
  42. D. C. Lee, 'Worst case fraction of CBR teletraffic unpunctual due to statistical multiplexing,' IEEE/ACM Trans. Networking, vol. 4, pp. 98-105, Feb. 1996 https://doi.org/10.1109/90.503765
  43. J. M. Barcelo, J. Garcia Vidal, and O. Casals, 'Worst case traffic in a tree network of ATM multiplexers,' IEEE/ACM Trans. Networking, vol. 8, pp. 507-516, Aug. 2000 https://doi.org/10.1109/90.865078
  44. N. Yamanaka, Y. Sato, and K. Sato, 'Performance limitation of leaky bucket algorithm for usage parameter control and bandwidth allocation methods,' IEICE Trans. Commun., vol. E75-B, pp. 82-86, Feb. 1992
  45. A. Skliros, 'Characterizing the worst traffic profile passing through an ATM-UNI,' in First UK Workshop on Performance Modeling and Evaluation of ATM Networks, IFIP, 1993, pp. 74-84