Abstract
The capability of releasing a connection has been recognized within standardization bodies as a desirable feature for the policing function in ATM networks. In this paper, we investigate how to implement this new scheme. For this purpose, we introduce a simple modification to some well known policing mechanisms, namely the Leaky Bucket, the EWMA, the Jumping and Moving Window. We first draw attention to the fact that all of them suffer from the drawback that they discard useful information which could be used to enforce tighter policing and to shut a connection off when too much excess traffic is submitted to the connection. We then propose a modification to the above mentioned schemes in which the discarded cell information is used, with almost no overhead compared to the usual ones. In the context of the Leaky Bucket, analysis using Bernoulli and On/Off MMBP input processes shows that the modified version has a behavior which differs significantly from its original counterpart. A major difference is that the new mechanism stops serving sources requiring much more resources than negotiated. It also reacts more severely to abuses of smaller magnitude and polices the sources closer to their declared resource utilization. A method is then presented to select the appropriate parameters of the modified Leaky Bucket in order to achieve a faster response time.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
The ATM Forum, UNI Specification. Version 2.2, Boston (June 1993).
P. Boyer, F. Guillemin, M. Servel and J.P. Coudreuse, Spacing cells protects and enhances utilization of ATM network links, IEEE Network Magazine, special issue on Switching and Congestion Control in ATM Networks (September 1992) pp. 38–49.
CCITT Recommendations I.371, Traffic control and congestion in B-ISDN, Geneva (June 1992).
J.N. Daigle and J.D. Langford, Models for analysis of packet voice communications systems, IEEE J. Select. Areas Commun. SAC-4(1986)847–855.
G. Galassi, G. Rigolio and L. Fratta, ATM bandwidth assignment and bandwidth enforcement policies,IEEE Globecom'89, Dallas, (1989) paper 49.6.
A. Gravey, J.R. Louvion and P. Boyer, On theGeo/D/1 andGeo/D/1n queues, Performance Evaluation 11(1990)117–125.
F. Guillemin and A. Dupuis, A basic requirement for the policing function in ATM networks, Computer Networks and ISDN Syst. 24(1992)311–320.
H. Heffes and D.M. Lucantoni, A Markov modulated characterization of packetized voice and data traffic and related statistical multiplexer performance, IEEE J. Select. Areas Commun. SAC-4(1986)856–868.
K. Tutufor, On admission control and policing in an ATM-based network,ITC Specialist Seminar, October 1990, paper 5.4.
B. LaguË, C. Rosenberg and F. Guillemin, A generalization of some policing mechanisms,IEEE Infocom '92, Florence, May 1992, paper 6A.3, pp. 767–775.
J.A.S. Monteiro, M. Gerla and L. Fratta, Input rate control for ATM networks,ITC'13, Copenhagen, June 1991, pp. 117–122.
E. Rathgeb,Modeling and performance analysis of policing mechanisms for ATM networks, IEEE J. Select. Areas Commun. SAC-9(3) (April 1991).
C. Rosenberg and B. LaguË, A unified framework for source policing in ATM networks, IEEE Trans. Network., submitted.
J. Turner, New directions in communications (or which way in the information age?),Proc. of the Zurich Seminar on Digital Communications, Zurich, March 1986, pp. 25–32.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
LaguË, B., Rosenberg, C. & Guillemin, F. On the capability of the policing function to release an ATM connection. Telecommunication Systems 2, 239–259 (1993). https://doi.org/10.1007/BF02109860
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF02109860