Leaky Bucket Algorithm

Slides:



Advertisements
Similar presentations
CprE 458/558: Real-Time Systems
Advertisements

Using Difference Intervals for Time-Varying Isosurface Visualization Kenneth W. Waters Christopher S. Co Kenneth I. Joy Institute for Data Analysis and.
Many useful applications, especially in queueing systems, inventory management, and reliability analysis. A connection between discrete time Markov chains.
CS 456: Computer Networks: Congestion Control/QoS Prof. Varsha Apte Slides based on William Stallings+Tanenbaum.
Network and Communications Hongsik Choi Department of Computer Science Virginia Commonwealth University.
Congestion Control Tanenbaum 5.3 Tanenbaum 6.5. Congestion Control Network Layer – Congestion control point to point Transport Layer – Congestion control.
1 Comnet 2010 Communication Networks Recitation 10 QoS.
Quality of Service Requirements
CS 4594 Broadband ATM GCRA and Leaky Bucket. From the ATM Forum The GCRA is used to define conformance to the traffic contract. For each cell that arrives.
Resource Allocation: Deterministic Analysis. Traffic Model Stochastic Different sample paths with different properties Expected case analysis Deterministic.
Introduction Token Bucket Regulator (TBR) used at network ingress to smoothen subscriber traffic TBR is a regulator or a linearly bounded arrival process:
Rivier College CS575: Advanced LANs ATM Traffic Management
Engineering Internet QoS
Jaringan Komputer Lanjut Traffic Management Aurelio Rahmadian.
Abhay.K.Parekh and Robert G.Gallager Laboratory for Information and Decision Systems Massachusetts Institute of Technology IEEE INFOCOM 1992.
THE SYSTEM THEORY OF NETWORK CALCULUS J.-Y. Le Boudec EPFL WoNeCa, 2012 Mars 21 1.
4. TRAFFIC MANAGEMENT.
Protocols and the TCP/IP Suite ATM Traffic & Congestion Control
Chapter 12. Traffic and Congestion Control In ATM Networks.
Traffic and Congestion Control in ATM Networks
University of Arizona ECE 478/ Optimality Principle Assume that “optimal” path is the shortest one OP indicates that any portion of any optimal.
Network Calculus: Reference Material: J.-Y. LeBoudec and Patrick Thiran: “Network Calculus: A Theory of Deterministic Queuing Systems for the Internet”,
(C) All rights reserved by Professor Wen-Tsuen Chen1 ä Interior Gateway Routing Protocol í A Routing Protocol within an autonomous system (AS). í OSPF.
1 Call Admission Control Carey Williamson Department of Computer Science University of Calgary.
Worst-case Fair Weighted Fair Queueing (WF²Q) by Jon C.R. Bennett & Hui Zhang Presented by Vitali Greenberg.
Supporting Stored Video: Reducing Rate Variability and End-toEnd Resource Requirements through Optimal Smoothing By James D. salehi, Zhi-Li Zhang, James.
Algorithm Orals Algorithm Qualifying Examination Orals Achieving 100% Throughput in IQ/CIOQ Switches using Maximum Size and Maximal Matching Algorithms.
Deterministic Network Calculus. Background ● Queueing Theory gives probabilistic results ● Critical applications need hard bounds ● Queueing theory extends.
Network Calculus: Reference Material: J.-Y. LeBoudec and Patrick Thiran: “Network Calculus: A Theory of Deterministic Queuing Systems for the Internet”,
1 Comnet 2006 Communication Networks Recitation 10 QoS.
Deterministic Network Calculus. DNC history DNC motivation.
ATM Dr. Abdulaziz Almulhem. Almulhem©20012 Agenda ATM Features Services Protocol ATM switching.
ATM Traffic Management
Exponential Distribution & Poisson Process
1 Exponential Distribution & Poisson Process Memorylessness & other exponential distribution properties; Poisson process and compound P.P.’s.
Outlines Received due 13 March 24 %. Homework n Review for Midterm on 1 March 2000 n Research Paper n Readings [11] “ATM Systems: What’s Next?” [12] “Long.
The Poisson Process. A stochastic process { N ( t ), t ≥ 0} is said to be a counting process if N ( t ) represents the total number of “events” that occur.
1 Chapter-4: Network Flow Modeling & Optimization Deep Medhi and Karthik Ramasamy August © D. Medhi & K. Ramasamy, 2007.
Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies CS490 Chapter 7b, Leon-Garcia Packet Switching Networks.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
Chapter 24. Congestion Control and Quality of Service part 3
A T M (QoS).
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
CSC 581 Communication Networks II Chapter 7c: Congestion Control Dr. Cheer-Sun Yang.
1 Job Scheduling for Grid Computing on Metacomputers Keqin Li Proceedings of the 19th IEEE International Parallel and Distributed Procession Symposium.
ECS5365 Lecture 6 ATM Traffic and Network Management
Computer Networking Queueing (A Summary from Appendix A) Dr Sandra I. Woolley.
Maciej Stasiak, Mariusz Głąbowski Arkadiusz Wiśniewski, Piotr Zwierzykowski Model of the Nodes in the Packet Network Chapter 10.
Networks: L11 1 Asynchronous Transfer Mode (ATM) A Connection-oriented network providing Quality of Service guarantees –developed in the mid-1980’s to.
Random Early Detection (RED) Router notifies source before congestion happens - just drop the packet (TCP will timeout and adjust its window) - could make.
1 On Maximum Rate Control of Weighted Fair Scheduling Jeng Farn Lee.
Deterministic Network Calculus. DNC history Queueing Theory, Agner Krarup Erlang, 1909 Queueing Networks, James R. Jackson, 1957 Scheduling Theory, Liu.
Traffic Control Different Levels of (Preventive) Congestion Control: - Admission Control: Ensure QoS of new connection without violating QoS of existing.
ATM NETWORK SIMULATOR Mavoungou B. MOUNANGA Network Planning.
1 3/27/ :29 CS575ATM Technology: Traffic Management1 Rivier College CS575: Advanced LANs ATM Traffic Management.
Updated 12/20011 Asynchronous Transfer Mode Networks Nirmala Shenoy Information Technology Department Rochester Institute of Technology.
Congestion Control Attributes Only feedback is defined – ABR and GFR – Actions taken by network and end systems to regulate traffic submitted ABR flow.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for data flow In Computer Networks Resource: Fayez Gebali, Analysis.
GRF Overview Simple as UBR from end system view – End system does no policing or traffic shaping – May transmit at line rate of ATM adaptor Modest requirements.
Congestion Control in Data Networks and Internets
QoS & Queuing Theory CS352.
Exponential Distribution & Poisson Process
Chapter 18 Frame Relay.
Buffer Management in a Switch
Pertemuan ke-7 s/d ke-10 (minggu ke-4 dan ke-5)
CONGESTION CONTROL.
COMPUTER NETWORKS –II Subject code:10CS64
A function f is increasing on an open interval I if, for any choice of x1 and x2 in I, with x1 < x2, we have f(x1) < f(x2). A function f is decreasing.
Computer Science Division
Congestion Control, Quality of Service, & Internetworking
Presentation transcript:

Leaky Bucket Algorithm

Generic Cell Rate Algorithm (GCRA) Used to define conformance with respect to the traffic contract Define the relationship b.w. PCR and the CDVT, and the relationship b.w. SCR and the BT Be a virtual scheduling algorithm or a continuous-state leaky bucket algorithm Be defined with two parameters: the Increment (I) and the Limit (L)  GCRA(I,L)

GCRA(I,L) Virtual Scheduling Continuous-state Algorithm Arrival of a cell k at time ta(k) X’=X-(ta(k)-LCT) Yes TAT<ta(k) ? Yes X’<0? No TAT=ta(k) No X’=0 Non Conforming cell Yes TAT>ta(k) +L? Non Conforming cell Yes X’>L? No No TAT=TAT+I Conforming cell X=X’+I LCT=ta(k) Conforming cell Virtual Scheduling Algorithm Continuous-state Leaky Bucket Algorithm X: Value of the Leaky Bucket counter X’: Auxiliary variable LCT: Last Compliance Time TAT: Theoretical Arrival Time ta(k): Time of arrival of a cell

Virtual scheduling algorithm Conforming cell Non-conforming cell At the time of arrival of the first cell of the connection, TAT = ta(k) (a) ta(k) Time TAT(k-1) TAT(k) TAT(k) TAT(k+1) (b) ta(k) Time TAT(k-1) TAT(k) TAT(k+1) ta(k) Time TAT(k-2) TAT(k-1) TAT(k)

Continuous-state leaky bucket algorithm Conforming cell Non-conforming cell At the time of arrival of the first cell of the connection, X=0 and LCT=ta(k) (a) (b) I+L I+L I+L I+L X X ta(k)-LCT L L L L ta(k)-LCT X’ X’(=0) I+L I+L X I ta(k)-LCT X’ L L L

These two algorithms are equivalent ( TAT=X+LCT ) For any sequence of cell arrival times , they determine the same cells to be conforming and thus the same cells to be non-conforming The capacity of the bucket is L+I As L increases, the minimum inter-arrival time between conforming cells decreases Given GCRA(T,) and the transmission time of a cell required,, the maximum number N of conforming back-to-back cells, i.e., at the full link rate, equals

If a cell stream conforms to the SCR (=1/Ts), the BT (=s), and the PCR (=1/T), then it offers traffic conforming to GCRA(Ts,s) and GCRA(T,0)  The maximum burst size (MBS) is Over any closed time interval of length t, the number of cells, N(t), can be emitted with spacing no less than T and still be in conformance with GCRA(Ts,s) is bounded by

If the minimum spacing between bursts and the MBS (with inter-cell spacing T) are TI and B, respectively, and the cell stream is conforming with GCRA(Ts,s), then Ts and s are chosen at least large enough to satisfy Time