Performance of a Leaky Bucket System with Long-Range Dependent Input Traffic

被引:0
作者
Bárbara González-Arévalo
机构
[1] University of Louisiana at Lafayette,Department of Mathematics
来源
Queueing Systems | 2004年 / 46卷
关键词
fluid queue; flow control; leaky bucket; finite buffer; heavy tails; long-range dependence; time until overflow;
D O I
暂无
中图分类号
学科分类号
摘要
The leaky bucket is a flow control mechanism that is designed to reduce the effect of the inevitable variability in the input stream into a node of a communication network. In this paper we study what happens when an input stream with heavy tailed work sessions arrives to a server protected by such a leaky bucket. Heavy tailed sessions produce long-range dependence in the input stream. Previous studies of the systems suggested that such long-range dependence can have dramatic effect on the system performance. By concentrating on the time until overflow of large finite buffers, we characterize the distribution of the time until buffer overflow, and we show that the leaky bucket flow control does make the system overflow less often, but long-range dependence still makes its presence felt.
引用
收藏
页码:439 / 459
页数:20
相关论文
共 55 条
[1]  
Altman E.(2002)State-dependent Computer Networks 39 789-808
[2]  
Avratchenov K.(1995)/1 type queuing analisys for congestion control in data networks IEEE Trans. Commun. 43 1566-1579
[3]  
Barakat C.(1992)Long-range dependence in variable-bit-rate video traffic Discret Event Dyn. Systems Theory Appl. 2 7-60
[4]  
Queija R.N.(1992)The Brownian approximation for rate-control throttles and the G/G/1/C queue Commun. Statist. Stochastic Models 8 685-717
[5]  
Beran J.(1992)The impact of a job buffer in a token-bank rate-control throttle Commun. Statist. Stochastic Models 8 719-732
[6]  
Sherman R.(1994)Comparisons of multi-server queues with finite waiting rooms IEEE Trans. Commun. 42 857-861
[7]  
Willinger W.(1996)The pros and cons of a job buffer in a token-bank rate-control throttle Performance Evaluation Rev. 24 160-169
[8]  
Taqqu M.(2003)Self-similarity in World Wide Web traffic: Evidence and possible causes J. Appl. Probab. 40 581-601
[9]  
Berger A.W.(1997)Buffer content of a leaky bucket system with long-range dependent input traffic Ann. Appl. Probab. 7 1021-1057
[10]  
Whitt W.(1998)Patterns of buffer overflow in a class of queues with long memory in the input stream Math. Oper. Res. 23 145-165