Premium
Deterministic rule based traffic descriptors for broadband ISDN: Worst case behaviour and its impact on connection acceptance controls
Author(s) -
Doshi B. T.
Publication year - 1995
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.4500080203
Subject(s) - computer science , quality of service , homogeneous , traffic classification , broadband , computer network , multiplexer , cellular traffic , simple (philosophy) , real time computing , multiplexing , telecommunications , mathematics , philosophy , epistemology , combinatorics
Deterministic rule based traffic descriptors in general, and leaky bucket based (LBB) traffic descriptors in particular, offer many advantages over statistical descriptors for specifying and monitoring traffic in the ATM based broadband ISDN (BISDN). However, these traffic descriptors do not specify the traffic pattern uniquely. Thus, acceptance of a connection request with specific traffic descriptor parameter values implies that the network has agreed to guaranteeing the quality of service (QOS) for the worst case traffic compliant with the traffic descriptor (and hence allowed by the monitor). This poses challenges which have not been addressed adequately. Two of the important ones are: (i) definition of the worst case behaviour and characterization of the worst case traffic compliant with the traffic descriptor; (ii) connection acceptance controls (CAC) for the worst case traffic sources compliant with the traffic descriptors. In this paper we address these questions for leaky bucket based (LBB) traffic descriptors. The focus is on the first problem. The implications on the second problem are discussed briefly. The performance measure and QOS requirements are in terms of the cell loss ratios. We first define the worst case behaviour for homogeneous and heterogeneous environments in terms of collective cell loss ratio (CLR)) from the multiplexer. We consider both the unbuffered and buffered cases. However, most of the results here are for the unbuffered case. FOTthe case of an unbuffered multiplexer and homogeneous source environment, we show that a simple on‐off source represents the worst case behaviour of an LBB source. In a heterogeneous source traffic environment, the on‐off behaviour is the worst only in a limited sense and the use of a collective measure results in anomalous relationships between the source behaviour and the CLR. A more appropriate measure should be based on individual cell loss ratios or on the maximum of the individual CLRs. We analyse LBB sources with respect to these measures and unbuffered resources, and obtain further characterization of the worst case behaviour. However, we also uncover some counter‐intuitive relationships. In particular, a seemingly ‘smooth’ source may be worse for the other sources than a seemingly ‘bursty’ source. For a buffered multiplexer, we show, via an example, that a three‐state source may be worse than an on‐off source even in a homogeneous source traffic environment. A complete characterization of the worst case behaviour for a buffered multiplexer remains an open challenge. Moreover, the LBB sources exhibit deterministic behaviour and their equivalent bandwidth need not be sub‐additive in sources. That is, adding the equivalent bandwidths of individual sources to obtain an ‘estimate’ of the equivalent bandwidth for a collection of such sources could be too optimistic in some situations. A fresh look at the connection acceptance control for such sources is therefore warranted.