You are here

Virtual leaky bucket for congestion control in high-speed ATM networks

Download pdf | Full Screen View

Date Issued:
1999
Summary:
High speed ATM networks support a variety of communication services, that have different traffic characteristics, which causes the network to be congested quickly. An ATM network with different communication services, data, voice and video, is simulated to study the effect of congestion on network operation. A modified leaky bucket mechanism is used to shape the traffic entering the network, which improved the performance in terms of cell losses and cell delay. The original leaky bucket mechanism is so conservative, that it drops a large number of ATM cells. Another scheme called virtual leaky bucket is proposed in this thesis. In this scheme violating cells are marked and then allowed to enter the network. The scheme is simulated and its performance is compared to the leaky bucket mechanism. Shaped virtual leaky bucket with marking is shown to have much better performance as long as the minimum requirements of non-violating cells are guaranteed.
Title: Virtual leaky bucket for congestion control in high-speed ATM networks.
97 views
31 downloads
Name(s): AlFadhel, Fahad A.
Florida Atlantic University, Degree grantor
Ilyas, Mohammad, Thesis advisor
Type of Resource: text
Genre: Electronic Thesis Or Dissertation
Issuance: monographic
Date Issued: 1999
Publisher: Florida Atlantic University
Place of Publication: Boca Raton, Fla.
Physical Form: application/pdf
Extent: 152 p.
Language(s): English
Summary: High speed ATM networks support a variety of communication services, that have different traffic characteristics, which causes the network to be congested quickly. An ATM network with different communication services, data, voice and video, is simulated to study the effect of congestion on network operation. A modified leaky bucket mechanism is used to shape the traffic entering the network, which improved the performance in terms of cell losses and cell delay. The original leaky bucket mechanism is so conservative, that it drops a large number of ATM cells. Another scheme called virtual leaky bucket is proposed in this thesis. In this scheme violating cells are marked and then allowed to enter the network. The scheme is simulated and its performance is compared to the leaky bucket mechanism. Shaped virtual leaky bucket with marking is shown to have much better performance as long as the minimum requirements of non-violating cells are guaranteed.
Identifier: 9780599218673 (isbn), 15644 (digitool), FADT15644 (IID), fau:12401 (fedora)
Collection: FAU Electronic Theses and Dissertations Collection
Note(s): College of Engineering and Computer Science
Thesis (M.A.)--Florida Atlantic University, 1999.
Subject(s): Asynchronous transfer mode
Telecommunication--Traffic
Computer networks
Held by: Florida Atlantic University Libraries
Persistent Link to This Record: http://purl.flvc.org/fcla/dt/15644
Sublocation: Digital Library
Use and Reproduction: Copyright © is held by the author, with permission granted to Florida Atlantic University to digitize, archive and distribute this item for non-profit research and educational purposes. Any reuse of this item in excess of fair use or other copyright exemptions requires permission of the copyright holder.
Use and Reproduction: http://rightsstatements.org/vocab/InC/1.0/
Host Institution: FAU
Is Part of Series: Florida Atlantic University Digital Library Collections.