Skip to main content
Log in

Bandwidth allocation and access control in high-speed networks

  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

The problem of bandwidth allocation and access regulation arises in the congestion control of Broadband ISDN networks. This paper assumes that a single user, described by an on-off fluid model, is connected to the network via a leaky bucket access control mechanism. The bandwidth allocated to this user and the leaky bucket parameters are to be selected so as to guarantee a negotiated level of delay probability at the access point and packet loss probability in the network which is modelled as an output buffer. The design problem is to minimize the allocated bandwidth subject to service guarantees and stability conditions for the input and output buffers. We provide a desirable feasible solution to the design problem. The paper studies the effect of non-conforming users on the network performance using the leaky bucket access control corresponding to this feasible solution. We provide expressions that quantify the impact of the leaky bucket parameters in access regulation and the worst-case queueing behavior at the output buffer. Finally, we discuss the extension of this methodology to the multiple leaky buckets case.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. H. Ahmadi, R. Guérin and K. Sohraby, Analysis of a rate-based access control mechanism for high-speed networks, IBM Research Report, no. RC15831 (June 1990).

  2. K. Bala, I. Cidon and K. Sohraby, Congestion control for high-speed packet switch,Proc. INFOCOM'90, San Francisco (1990).

  3. A.W. Berger, Performance analysis of a rate control throttle where tokens and jobs queue, IEEE J. Sel. Areas Commun. SAC-9 (1991) 165–170.

    Google Scholar 

  4. M. Buttó, E. Cavallero and A. Tonietti, Effectiveness of the “leaky bucket” policing mechanism in ATM networks, IEEE J. Sel. Areas Commun. SAC-9 (1991) 335–342.

    Google Scholar 

  5. I. Cidon and I. Gopal, PARIS: an approach to integrated high-speed private networks, Int. J. Digit. Analog Cabled Syst. 1 (1988) 77–86.

    Google Scholar 

  6. I. Cidon, I. Gopal and R. Guérin, Bandwidth management and congestion control in plaNET, IEEE Commun. Mag. 29 (1991) 54–63.

    Google Scholar 

  7. M. Decina and T. Toniatti, On bandwidth allocation to bursty virtual connections in ATM networks,Proc. ICC'90 (1990) pp. 844–851.

  8. M. Decina, T. Toniatti, P. Vaccari and L. Verri, Bandwidth assignment and virtual call blocking in ATM networks,Proc. INFOCOM'90 (1990) pp. 991–888.

  9. L. Dittman and S. Jacobsen, Statistical multiplexing of identical bursty sources in an ATM network,Proc. GLOBECOM'88 (1988) pp. 1293–1297.

  10. A.E. Eckberg, D.T. Luan and D.M. Luciantoni, Meeting the challenge: congestion and flow control strategies for broadband information transport,Proc. GLOBECOM'89, Dallas (1989) pp. 49.3.1–49.3.5.

  11. A.I. Elwalid and D. Mitra, Analysis and design of rate-based congestion control of high-speed networks, I: Stochastic fluid models, access regulation, Queueing Syst. 9 (1991) 29–64.

    Google Scholar 

  12. S. Erfani and M. Malek, Dynamic access management in a multiservice packet-mode environment,Proc. 1989 Network Management and Control Workshop (Plenum Press, 1990) pp. 277–285.

  13. L. Gün and R. Guérin, Bandwidth management, and congestion control framework for the broadband network architecture, Computer Networks & ISDN Systems 26 (1993) 61–78.

    Google Scholar 

  14. G. Gallassi, G. Rigolio and L. Fratta, ATM: bandwidth assignment and bandwidth enforcement policies,Proc. GLOBECOM'89 (1989) pp. 1788–1793.

  15. R. Guérin, H. Ahmadi and M. Naghshineh, Equivalent capacity and its application to bandwidth allocation in high-speed networks, IEEE J. Sel. Areas Commun. SAC-9 (1991) 968–981.

    Google Scholar 

  16. D.P. Heyman, A performance model of the credit manager algorithm, presented at ORSA/TIMS, Las Vegas (May 1990).

  17. D. Holtsinger and H. Perros, Performance analysis of leaky bucket policing mechanisms,Proc. Tricomm'92, Raleigh, NC (February 1992).

  18. P. Joos and W. Verbiest, A statistical bandwidth allocation and usage monitoring algorithm for ATM networks,Proc. ICC'89 (1989) pp. 415–422.

  19. J.A.S. Monteiro, M. Gerla and L. Fratta, Statistical multiplexing in ATM networks,Proc. 4th Int. Conf. on Data Communication and Their Performance, Barcelona, Spain (1990) pp. 148–162.

  20. R.O. Onvural and I. Nikolaidis, A bibliography on performance issues in ATM networks, to appear in ACM Comt. Commun. Rev.

  21. Special Issues onAsynchronous Transfer Mode, Int. J. Digit, Analog Cabled Syst. (1988).

  22. F.C. Schoutte, Simple decision rules for acceptance of mixed traffic streams,Proc. 12th Int. Teletraffic Congres (ITC'12) (1988) pp. 771–777.

  23. M. Sidi, W.-Z. Liu, I. Cidon and I. Gopal, Congestion control through input rate regulation,Proc. GLOBECOM'89 (1989) pp. 49.2.1–49.2.5.

  24. J.S. Turner, New directions in communications (or Which way to the information age)), IEEE Commun. Mag. 24 (1986) 8–15.

    Google Scholar 

  25. G.M. Woodruff and R. Kositpaiboon, Multimedia traffic management principles for guaranteed ATM network performance, IEEE J. Sel. Areas Commun. SAC-8 (1990) 437–446.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

This research was supported in part by IBM Research Contract No. 1374.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gün, L., Kulkarni, V.G. & Narayanan, A. Bandwidth allocation and access control in high-speed networks. Ann Oper Res 49, 161–183 (1994). https://doi.org/10.1007/BF02031596

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02031596

Keywords

Navigation