You are here
second order leaky bucket algorithm for traffic shaping in ATM networks
- Date Issued:
- 1998
- Summary:
- Asynchronous Transfer Mode (ATM) Networks are based on connections that are multiplexed dynamically on a single link. For satisfactory performance in an ATM network, congestion control is extremely necessary to guarantee the negotiated Quality of Service (QoS) for every connection. Traffic shaping is a congestion control mechanism that alters the traffic characteristics of a stream of cells on a connection to achieve better network efficiency by meeting the QoS objectives. We study a model for Traffic Shaping, Second Order Leaky Bucket, which consists of two leaky buckets to police the Sustained Cell Rate (SCR) and Burst Tolerance (BT) for each ATM connection. With this algorithm, ATM cells enter the first leaky bucket and the Cells conforming to the first leaky bucket enter the ATM network with Cell Loss Priority set to zero (CLP = 0). Any cell non-conforming to the first leaky bucket is sent to a second leaky bucket, and will be tagged CLP = 1 only if found to be non-conforming to the second leaky bucket. Cells conforming to the second leaky bucket are allowed to enter the ATM network with CLP = 0. We simulate the second-order leaky bucket for traffic shaping and show the effectiveness of second order leaky bucket in protecting the QoS experienced by connections passing through a common internodal link queue.
Title: | A second order leaky bucket algorithm for traffic shaping in ATM networks. |
271 views
36 downloads |
---|---|---|
Name(s): |
Bansal, Atul. Florida Atlantic University, Degree grantor Ilyas, Mohammad, Thesis advisor |
|
Type of Resource: | text | |
Genre: | Electronic Thesis Or Dissertation | |
Issuance: | monographic | |
Date Issued: | 1998 | |
Publisher: | Florida Atlantic University | |
Place of Publication: | Boca Raton, Fla. | |
Physical Form: | application/pdf | |
Extent: | 109 p. | |
Language(s): | English | |
Summary: | Asynchronous Transfer Mode (ATM) Networks are based on connections that are multiplexed dynamically on a single link. For satisfactory performance in an ATM network, congestion control is extremely necessary to guarantee the negotiated Quality of Service (QoS) for every connection. Traffic shaping is a congestion control mechanism that alters the traffic characteristics of a stream of cells on a connection to achieve better network efficiency by meeting the QoS objectives. We study a model for Traffic Shaping, Second Order Leaky Bucket, which consists of two leaky buckets to police the Sustained Cell Rate (SCR) and Burst Tolerance (BT) for each ATM connection. With this algorithm, ATM cells enter the first leaky bucket and the Cells conforming to the first leaky bucket enter the ATM network with Cell Loss Priority set to zero (CLP = 0). Any cell non-conforming to the first leaky bucket is sent to a second leaky bucket, and will be tagged CLP = 1 only if found to be non-conforming to the second leaky bucket. Cells conforming to the second leaky bucket are allowed to enter the ATM network with CLP = 0. We simulate the second-order leaky bucket for traffic shaping and show the effectiveness of second order leaky bucket in protecting the QoS experienced by connections passing through a common internodal link queue. | |
Identifier: | 9780599109216 (isbn), 15607 (digitool), FADT15607 (IID), fau:12365 (fedora) | |
Collection: | FAU Electronic Theses and Dissertations Collection | |
Note(s): |
College of Engineering and Computer Science Thesis (M.S.)--Florida Atlantic University, 1998. |
|
Subject(s): |
Asynchronous transfer mode Telecommunication--Traffic Computer networks |
|
Held by: | Florida Atlantic University Libraries | |
Persistent Link to This Record: | http://purl.flvc.org/fcla/dt/15607 | |
Sublocation: | Digital Library | |
Use and Reproduction: | Copyright © is held by the author, with permission granted to Florida Atlantic University to digitize, archive and distribute this item for non-profit research and educational purposes. Any reuse of this item in excess of fair use or other copyright exemptions requires permission of the copyright holder. | |
Use and Reproduction: | http://rightsstatements.org/vocab/InC/1.0/ | |
Host Institution: | FAU | |
Is Part of Series: | Florida Atlantic University Digital Library Collections. |