Performance Analysis of Leaky Buckets Integrated in ATM Networks

Authors

  • F. Ahmadi Djajasugita Staf Pengajar Jurusan Teknik Elektro, ITB
  • Sony Sumaryo Staf Pengajar STT Telkom, Jl. Radio Palasari 31, Bandung

Keywords:

analisis, model, simulasi, proses kedatangan, burstiness, leaky bucket, kinerja, jaringan ATM, multiplekser, adaptif, prioritas, marking, pendimensian, analysis, simulation, arrival process, performance, ATM network, multiplexer, adaptive, prioritizing,

Abstract

Pada makalah ini dibahas analisis kinerja leaky bucket terintegrasi pada jaringan ATM dengan kombinasi control adaptif, metode marking dan metode prioritas. Juga ditinjau kinerja leaky bucket hasil dimensioning. Sebagai ukuran kinerja digunakan peluang sel hilang di jaringan dan throughput jaringan. Trafik masukan diasumsikan model 2-phase MMBP. Penelitian serupa yang telah dilakukan oleh X. Wu menggunakan model trafik masuk batch traffic dengan prores kedatangan Poisson dan panjang batch terdistribusi geometris. Hasil simulasi menunjukkan peluang sel hilang di jaringan makin berkurang dengan ukuran token pool K yang makin kecil; berkurangnya laju pembangkitan token mengakibatkan bertambahnya throughput jaringan; panjang burst rata-rata trafik masukan yang semakin besar akan memperbesar hilangnya sel di jaringan; dan kemudian, kinerja leaky bucket makin meningkat dengan digabungkannya mekanisme pengontrol kongesti lainnya seperti pengontrolan adaptif, marking, dan prioritas. Untuk leaky bucket hasil dimensioning, simulasi antara lain menunjukkan bahwa jika laju kedatangan sel conforming (sesuai dengan kontrak trafik), maka peluang sel hilang di jaringan makin kecil jika token pool makin kecil. Untuk (M+K) yang sama, leaky bucket dengan buffer menghasilkan peluang sel hilang di jaringan lebih kecil dibandingkan dengan tanpa buffer. Leaky bucket dengan buffer M besar dan pembangkitan token N besar menghasilkan peluang sel hilang di jaringan terkecil. Jika laju kedatangan sel makin jauh dari conforming, leaky bucket dengan N besar menghasilkan throughtput jaringan yang lebih besar.

Performance Analysis of Leaky Buckets Integrated in ATM Networks

This paper is an analysis of the performance of leaky buckets, which are integrated within ATM networks combined with adaptive control, marking and prioritizing. Also discussed is the performance of leaky bucket dimensioning. This performance is evaluated through network cell loss probabilities and network throughput. The arrival process is a 2-phase MMBP. Similar research has been done by Wu [10,11] using incoming traffic model batch traffic with a Poisson arrival process and a geometrically distributed batch length. The result of the simulation shows that the network cell loss probability is reduced as the token pool size K becomes smaller and smaller, the decrease of the token generation rate causes an increase in the network throughput; the network cell loss probability is higher in the case of a larger mean burst length; and the performance of the leaky bucket can be increased by incorporating other control mechanisms such as adaptive control, marking and prioritizing. For the leaky bucket dimensioning, the results of the simulation show, among other things, that if the incoming cell rate is conforming (appropriate to traffic contract) and the token pool is reduced, then the probability of network cell loss is also reduced. If (M + K) are the same, the buffered leaky bucket results in a network cell loss probability is smaller than for an unbuffered leaky bucket. The leaky bucket with big buffer M and big token generation N result in the smallest network cell loss probability. If the incoming cell rate is far from conforming, the leaky bucket with big N results in a bigger network throughput.

References

Akimaru, H. and K. Kawashima, Teletraffic: Theory and Applications, Springer-Verlag, New York, 1993.

De Pryeker, M., Asynchronous transfer mode: solution for broadband ISDN. Prentice Hall, 1995.

Holstinger, D., & H. Perros, Waiting Time and Cell Loss Probability Analysis for the Buffered Leaky Bucket, Technical Report, Department of Computer Science, North Caroline State University, North Carolina, September 1992.

Holtsinger, D.S, and H.G. Perros. Performance Analysis of Leaky Bucket Policing Mechanisms, Technical report, Department of Computer Science, North Caroline State University, November 1991.

Hong, Suk W. and H.G. Perros, An Approximate Analysis of an ATM Multiplexer with Multiple Heterogenous Bursty Arrivals, Technical report, Department of Computer Science, North Caroline State University, August 1991.

Kleinrock, Leonard, Queueing System, Vol. I: Theory, Wiley, New York, 1976.

M. Law, Averill & W. David Kelton, Simulation Modeling & Analysis, 2nd edition, Mc Graw-Hill International Editions, 1991, Singapore.

Onvural O., Raif, Asynchronous Transfer Mode. Performance Issues, Artech House, Inc. 1994.

S. Lavenberg, Stephen, Computer Performance Modeling Handbook, Academic Press, New York, 1983.

Wu, X., I. Lambadaris, H. Lee and A.R. Kaye, A Comparative Study of Some Leaky Bucket Network Access Schemes, ICC 94, pp. 1586-1591.

Wu, X., Leaky Bucket Congestion Control in ATM Networks, M. Eng. Thesis, Dept of Systems and Computer Engeering. Carleton University, 1993.

Downloads

How to Cite

Ahmadi Djajasugita, F., & Sumaryo, S. (2019). Performance Analysis of Leaky Buckets Integrated in ATM Networks. Journal of Mathematical and Fundamental Sciences, 30(3), 33-42. Retrieved from https://journals.itb.ac.id/index.php/jmfs/article/view/9387

Issue

Section

Articles