Title :
Using token allocations in a leaky bucket scheme
Author :
Ko, C.P. ; Yang, O.W. ; Barbosa, L. Orozco ; Mouftah, H.T.
Author_Institution :
Dept. of Electr. Eng., Ottawa Univ., Ont., Canada
Abstract :
In general, there are two categories of congestion control algorithms for ATM networks: the reactive and the preventive strategies. Leaky bucket is a common preventive bandwidth enforcement scheme to control the traffic smoothness that flows into the network. This paper investigates a simple modification of the leaky bucket method that can provide priority access to users by requiring different classes of cells to get different number of tokens before receiving services. The complexity of control is simplified since all classes share a common buffer pool. Cell delays and cell loss ratios performance are studied
Keywords :
asynchronous transfer mode; buffer storage; delays; queueing theory; telecommunication congestion control; telecommunication services; telecommunication traffic; token networks; ATM networks; buffer pool; cell delays; cell loss ratios performance; congestion control algorithms; leaky bucket method; leaky bucket scheme; preventive control; priority access; queueing theory; reactive control; token allocations; Admission control; Bandwidth; Chaos; Communication system traffic control; Delay; Performance loss; Roentgenium; Telecommunication traffic; Traffic control;
Conference_Titel :
Military Communications Conference, 1994. MILCOM '94. Conference Record, 1994 IEEE
Conference_Location :
Fort Monmouth, NJ
Print_ISBN :
0-7803-1828-5
DOI :
10.1109/MILCOM.1994.473831