Input rate flow control for high-speed communication networks: Blocking and delay at the access points
We present queueing models to study the system performance at the access points of a high-speed communication network. An input rate control mechanism, using a Leaky Bucket type scheme (also identified as a Credit Manager Algorithm), is applied to regulate traffic from end-user stations to the netwo...
Saved in:
| Published in | Computer networks and ISDN systems Vol. 26; no. 11; pp. 1457 - 1473 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier B.V
01.08.1994
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0169-7552 |
| DOI | 10.1016/0169-7552(94)90010-8 |
Cover
| Abstract | We present queueing models to study the system performance at the access points of a high-speed communication network. An input rate control mechanism, using a Leaky Bucket type scheme (also identified as a Credit Manager Algorithm), is applied to regulate traffic from end-user stations to the network. For the performance analysis, we select a sub-network topology which consists of a network switch (such as a fast packet or cell switch in high-speed metropolitan or wide area networks) and a number of regulated source stations. To reduce packet or cell loss probabilities at the access switch, each user station implements locally a replica of the input regulation scheme. The output traffic streams from the source stations feed into the switch, which is modeled as a multiple-server queueing system. An efficient recursive method is introduced to characterize the output traffic streams from the source stations as Markov Modulated Processes. We demonstrate the ensuing tradeoffs between message delays incurred at source stations due to the input rate control mechanism and the message delays incurred at the switch as affected by the statistical multiplexing of the input message streams. Performance curves are presented to illustrate the statistical behavior of the queue-size and message delays. Using our results, the system designer can properly select the parameters of the flow control scheme to guarantee acceptable limits of queue sizes and message delays at the source stations and at the network switches. |
|---|---|
| AbstractList | We present queueing models to study the system performance at the access points of a high-speed communication network. An input rate control mechanism, using a Leaky Bucket type scheme (also identified as a Credit Manager Algorithm), is applied to regulate traffic from end-user stations to the network. For the performance analysis, we select a sub-network topology which consists of a network switch (such as a fast packet or cell switch in high-speed metropolitan or wide area networks) and a number of regulated source stations. To reduce packet or cell loss probabilities at the access switch, each user station implements locally a replica of the input regulation scheme. The output traffic streams from the source stations feed into the switch, which is modeled as a multiple-server queueing system. An efficient recursive method is introduced to characterize the output traffic streams from the source stations as Markov Modulated Processes. We demonstrate the ensuing tradeoffs between message delays incurred at source stations due to the input rate control mechanism and the message delays incurred at the switch as affected by the statistical multiplexing of the input message streams. Performance curves are presented to illustrate the statistical behavior of the queue-size and message delays. Using our results, the system designer can properly select the parameters of the flow control scheme to guarantee acceptable limits of queue sizes and message delays at the source stations and at the network switches. |
| Author | David Lin, K. Rubin, Izhak |
| Author_xml | – sequence: 1 givenname: Izhak surname: Rubin fullname: Rubin, Izhak organization: Department of Electrical Engineering, University of California at Los Angeles, Los Angeles, CA 90024, USA – sequence: 2 givenname: K. surname: David Lin fullname: David Lin, K. organization: Information Services and Applied Research, U S WEST Advanced Technologies, Boulder, CO 80303, USA |
| BookMark | eNp9kEtLAzEUhbOoYKv-AxdZ6mI0mcm8XAhafBQKbnQdMjc3bew0KUlq6b93asWli8OFczmHwzchI-cdEnLJ2Q1nvLod1GZ1WeZXrbhuGeMsa0Zk_GefkkmMn2x48LodEzNzm22iQSWkpvc7Ct6l4HtqfKBLu1hmcYOoB3u93joLKlnvqMO082EV7-hj72Fl3YIqp6nGXu2pSjQtkSoAjJFuvHUpnpMTo_qIF7_3jHw8P71PX7P528ts-jDPIC-LlFVVIXImTFGD0F3XoqlYpZA3eV1gyyteARdGdYKhqHORFxp4UzaCaYQSoSvOiDj2QvAxBjRyE-xahb3kTB74yAMIeQAhWyF_-MhmiN0fYzhs-7IYZASLDlDbgJCk9vb_gm9Jd3GF |
| Cites_doi | 10.1109/TCOM.1986.1096584 10.1109/JSAC.1986.1146393 10.1109/MCOM.1986.1092946 |
| ContentType | Journal Article |
| Copyright | 1994 |
| Copyright_xml | – notice: 1994 |
| DBID | AAYXX CITATION |
| DOI | 10.1016/0169-7552(94)90010-8 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EndPage | 1473 |
| ExternalDocumentID | 10_1016_0169_7552_94_90010_8 0169755294900108 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29F 4G. 5GY 5VS 6J9 7-5 71M 8P~ AABNK AACTN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABEFU ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ADBBV ADEZE ADJOM ADMUD AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ ASPBG AVWKF AXJTR AZFZN BKOJK BLXMC CS3 EBS EFJIC EJD EO8 EO9 EP2 EP3 FDB FGOYB FIRID FNPLU FYGXN G-Q G8K GBOLZ HLZ HZ~ IHE JJJVA KOM LG9 M41 MO0 MS~ O-L O9- OAUVE OZT P-9 P2P PC. Q38 R2- RIG ROL RPZ RXW SBC SDF SDG SPC SST SSV SSZ T5K TAE TN5 UHS WUQ XFK XPP ZMT AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c253t-6634204f37c4dbb9ef606ae18273e91616c14fab40e472423dc185840dec5ecb3 |
| ISSN | 0169-7552 |
| IngestDate | Wed Oct 01 01:25:28 EDT 2025 Fri Feb 23 02:33:51 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Issue | 11 |
| Keywords | Input rate flow control Leaky bucket Credit manager algorithm |
| Language | English |
| License | https://www.elsevier.com/tdm/userlicense/1.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c253t-6634204f37c4dbb9ef606ae18273e91616c14fab40e472423dc185840dec5ecb3 |
| PageCount | 17 |
| ParticipantIDs | crossref_primary_10_1016_0169_7552_94_90010_8 elsevier_sciencedirect_doi_10_1016_0169_7552_94_90010_8 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 1900 |
| PublicationDate | 1994-08-01 |
| PublicationDateYYYYMMDD | 1994-08-01 |
| PublicationDate_xml | – month: 08 year: 1994 text: 1994-08-01 day: 01 |
| PublicationDecade | 1990 |
| PublicationTitle | Computer networks and ISDN systems |
| PublicationYear | 1994 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Heffes, Lucantoni (BIB4) 1986; SAC-4 Zukerman, Rubin (BIB14) 1986; COM-34 Suruagy Monteiro, Gerla, Fratta (BIB6) 1990 Sohraby, Sidi (BIB9) April 1991 Stallings (BIB10) 1985, 1988 Tanenbaum (BIB12) 1988 Leung, Sengupta, Yeung (BIB5) 1992 (BIB15) March 1989 Bae, Suda (BIB2) 1990 Sykas, Paschalidis, Mourtzinou, Vlakos (BIB11) May 1992 Turner (BIB13) 1986; 24 Cidon, Glopal (BIB3) 1988; 1 Murata, Ohba, Miyahara (BIB7) May 1992 Rubin, David Lin (BIB8) December 1991 Ahmadi, Guérin, Sohraby (BIB1) 1990 Stallings (10.1016/0169-7552(94)90010-8_BIB10) 1985 (10.1016/0169-7552(94)90010-8_BIB15) 1989 Heffes (10.1016/0169-7552(94)90010-8_BIB4) 1986; SAC-4 Sohraby (10.1016/0169-7552(94)90010-8_BIB9) 1991 Turner (10.1016/0169-7552(94)90010-8_BIB13) 1986; 24 Murata (10.1016/0169-7552(94)90010-8_BIB7) 1992 Zukerman (10.1016/0169-7552(94)90010-8_BIB14) 1986; COM-34 Cidon (10.1016/0169-7552(94)90010-8_BIB3) 1988; 1 Leung (10.1016/0169-7552(94)90010-8_BIB5) 1992 Bae (10.1016/0169-7552(94)90010-8_BIB2) 1990 Rubin (10.1016/0169-7552(94)90010-8_BIB8) 1991 Sykas (10.1016/0169-7552(94)90010-8_BIB11) 1992 Tanenbaum (10.1016/0169-7552(94)90010-8_BIB12) 1988 Ahmadi (10.1016/0169-7552(94)90010-8_BIB1) 1990 Suruagy Monteiro (10.1016/0169-7552(94)90010-8_BIB6) 1990 |
| References_xml | – year: March 1989 ident: BIB15 publication-title: Generic System Requirement in Supports of Switched Multi-megabit Data Service, Bellcore TA-TSY-000772 – year: April 1991 ident: BIB9 article-title: On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes publication-title: Proc. IEEE INFOCOM Conf. – volume: 1 year: 1988 ident: BIB3 article-title: PARIS: In approach to integrated high speed private networks publication-title: Proc. Int. J. Digital Analog Cabled Systems – volume: 24 year: 1986 ident: BIB13 article-title: New directions in communications (or which way to the information age?) publication-title: IEEE Comm. Mag. – year: May 1992 ident: BIB7 article-title: Analysis of flow enforcement algorithm publication-title: Proc. IEEE INFOCOM Conf. – year: 1985, 1988 ident: BIB10 article-title: Data and Computer Communications – year: 1988 ident: BIB12 article-title: Computer Networks – year: 1990 ident: BIB1 article-title: Analysis of leaky bucket access control mechanism with batch arrival process publication-title: Proc. IEEE GLOBECOM Conf. – year: December 1991 ident: BIB8 article-title: Input rate flow control for high-Speed networks: Source vs. switch level performance trade-off publication-title: Proc. IEEE GLOBECOM Conf. – year: May 1992 ident: BIB11 article-title: Congestion avoidance in ATM networks publication-title: Proc. IEEE INFOCOM Conf. – year: 1990 ident: BIB6 article-title: Leaky Bucket input rate control in ATM networks publication-title: Proc. Int. Conf. Computer Comm. (ICCC) – volume: COM-34 year: 1986 ident: BIB14 article-title: Queue size and delay analysis for a communication system subject to traffic activity mode changes publication-title: IEEE Trans. Comm. – year: 1990 ident: BIB2 article-title: Survey of traffic control protocols in ATM networks publication-title: Proc. IEEE GLOBECOM Conf. – volume: SAC-4 year: 1986 ident: BIB4 article-title: A Markov modulated characterization of packetized voice and data traffic and related statistical multiplexer performance publication-title: IEEE J. Selected Areas Comm. – year: 1992 ident: BIB5 article-title: Queueing analysis of a credit manager for flow control of high speed networks publication-title: Proc. IEEE INFOCOM Conf. – volume: COM-34 issue: 6 year: 1986 ident: 10.1016/0169-7552(94)90010-8_BIB14 article-title: Queue size and delay analysis for a communication system subject to traffic activity mode changes publication-title: IEEE Trans. Comm. doi: 10.1109/TCOM.1986.1096584 – year: 1990 ident: 10.1016/0169-7552(94)90010-8_BIB2 article-title: Survey of traffic control protocols in ATM networks – volume: SAC-4 issue: 6 year: 1986 ident: 10.1016/0169-7552(94)90010-8_BIB4 article-title: A Markov modulated characterization of packetized voice and data traffic and related statistical multiplexer performance publication-title: IEEE J. Selected Areas Comm. doi: 10.1109/JSAC.1986.1146393 – volume: 24 issue: 10 year: 1986 ident: 10.1016/0169-7552(94)90010-8_BIB13 article-title: New directions in communications (or which way to the information age?) publication-title: IEEE Comm. Mag. doi: 10.1109/MCOM.1986.1092946 – year: 1988 ident: 10.1016/0169-7552(94)90010-8_BIB12 – issue: Issue 2 year: 1989 ident: 10.1016/0169-7552(94)90010-8_BIB15 publication-title: Generic System Requirement in Supports of Switched Multi-megabit Data Service, Bellcore TA-TSY-000772 – volume: 1 year: 1988 ident: 10.1016/0169-7552(94)90010-8_BIB3 article-title: PARIS: In approach to integrated high speed private networks – year: 1990 ident: 10.1016/0169-7552(94)90010-8_BIB6 article-title: Leaky Bucket input rate control in ATM networks – year: 1991 ident: 10.1016/0169-7552(94)90010-8_BIB9 article-title: On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes – year: 1992 ident: 10.1016/0169-7552(94)90010-8_BIB11 article-title: Congestion avoidance in ATM networks – year: 1985 ident: 10.1016/0169-7552(94)90010-8_BIB10 – year: 1990 ident: 10.1016/0169-7552(94)90010-8_BIB1 article-title: Analysis of leaky bucket access control mechanism with batch arrival process – year: 1992 ident: 10.1016/0169-7552(94)90010-8_BIB5 article-title: Queueing analysis of a credit manager for flow control of high speed networks – year: 1992 ident: 10.1016/0169-7552(94)90010-8_BIB7 article-title: Analysis of flow enforcement algorithm – year: 1991 ident: 10.1016/0169-7552(94)90010-8_BIB8 article-title: Input rate flow control for high-Speed networks: Source vs. switch level performance trade-off |
| SSID | ssj0001179 |
| Score | 1.2339998 |
| Snippet | We present queueing models to study the system performance at the access points of a high-speed communication network. An input rate control mechanism, using a... |
| SourceID | crossref elsevier |
| SourceType | Index Database Publisher |
| StartPage | 1457 |
| SubjectTerms | Credit manager algorithm Input rate flow control Leaky bucket |
| Title | Input rate flow control for high-speed communication networks: Blocking and delay at the access points |
| URI | https://dx.doi.org/10.1016/0169-7552(94)90010-8 |
| Volume | 26 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: Elsevier Journals issn: 0169-7552 databaseCode: AKRWK dateStart: 19930101 customDbUrl: isFulltext: true mediaType: online dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001179 providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbo9kIPCCioCy3yAaSiKG2ymbx6W15qqeihD9FbZDuOWoGyK0iF2l_PTPzILlQV5RKtImWyynzyfLbn-8zY6zQTyIJIoqxSEYKk_d0mScJUYIFQeV6qiNTIX46y_TP4fJ6eDzv4vbqkkzvq5lZdyf9kFe9hXkkle4_M-qB4A39jfvGKGcbrP-X4oJ1fdQGZPQTN99kv33dOrYPkQxz-nGNxorbxQQQStKbxu2-Fe4el7JuTKZJf5LUVNwaiP0gxmM8urdeTtzOwx0D4OKaj-OTDkXWFXmiel8ag4ODmQnhBUN9ET0sB_RCzM6w6GPvgwq062IXIrAzzNF0aSY323SEmXhgXYzA21LbGxmDOL_lr_DZLCT44kuwS3lDFpD37YqhZbp_-j1LmGwxd7xpFqihSVULVR6mKFbY6wRIQjdjq9PD466Ev3OSOZ6zgzdud0jLOdv297RLe2n9zO5NZYCenj9kjO63gU4ORJ-yBbp-ytQWzyXXW9GjhhBZOaOEWLRzRwge08CW0cJflPe6wwjHfvMcKFx1HrHCDFW6w8oydffp4-n4_tKdshGqSJl2IlBMmETRJrqCWstQNzmmFxnlnnmicPMSZiqEREiINObHvWiHHKyCqtUq1kslzNmpnrd5gXNaxgFzhDL6ZgM7oELtE1VIT65dQwJiF7otVc2OmUt2VqTHL3WetLCE0RK9CvNz55It7vuklezigfJONuh9XegvZZidfWZT8BrPXeVE |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Input+rate+flow+control+for+high-speed+communication+networks%3A+Blocking+and+delay+at+the+access+points&rft.jtitle=Computer+networks+and+ISDN+systems&rft.au=Rubin%2C+Izhak&rft.au=David+Lin%2C+K.&rft.date=1994-08-01&rft.issn=0169-7552&rft.volume=26&rft.issue=11&rft.spage=1457&rft.epage=1473&rft_id=info:doi/10.1016%2F0169-7552%2894%2990010-8&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_0169_7552_94_90010_8 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0169-7552&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0169-7552&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0169-7552&client=summon |