1 / 8

Leaky Bucket Algorithm

Leaky Bucket Algorithm. Generic Cell Rate Algorithm (GCRA). Used to define conformance with respect to the traffic contract Define the relationship b.w. PCR and the CDVT, and the relationship b.w. SCR and the BT Be a virtual scheduling algorithm or a continuous-state leaky bucket algorithm

wan
Download Presentation

Leaky Bucket Algorithm

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Leaky Bucket Algorithm

  2. Generic Cell Rate Algorithm (GCRA) • Used to define conformance with respect to the traffic contract • Define the relationship b.w. PCR and the CDVT, and the relationship b.w. SCR and the BT • Be a virtual scheduling algorithm or a continuous-state leaky bucket algorithm • Be defined with two parameters: the Increment (I) and the Limit (L)  GCRA(I,L)

  3. Arrival of a cell k at time ta(k) X’=X-(ta(k)-LCT) Yes TAT<ta(k) ? Yes • GCRA(I,L) X’<0? No TAT=ta(k) No X’=0 Yes Non Conforming cell TAT>ta(k) +L? Yes Non Conforming cell X’>L? No No X=X’+I LCT=ta(k) Conforming cell TAT=TAT+I Conforming cell Virtual Scheduling Algorithm Continuous-state Leaky Bucket Algorithm X: Value of the Leaky Bucket counter X’: Auxiliary variable LCT: Last Compliance Time TAT: Theoretical Arrival Time ta(k): Time of arrival of a cell

  4. ta(k) (a) Time • Virtual scheduling algorithm • Conforming cell • Non-conforming cell • At the time of arrival of the first cell of the connection, TAT = ta(k) TAT(k-1) TAT(k+1) TAT(k) TAT(k) ta(k) (b) Time TAT(k-1) TAT(k) TAT(k+1) ta(k) Time TAT(k-2) TAT(k-1) TAT(k)

  5. (a) (b) I+L I+L I+L I+L X X ta(k)-LCT • Continuous-state leaky bucket algorithm • Conforming cell • Non-conforming cell • At the time of arrival of the first cell of the connection, X=0 and LCT=ta(k) L L L L X’ ta(k)-LCT X’(=0) I+L I+L X ta(k)-LCT I X’ L L L

  6. These two algorithms are equivalent ( TAT=X+LCT ) • For any sequence of cell arrival times , they determine the same cells to be conforming and thus the same cells to be non-conforming • The capacity of the bucket is L+I • As L increases, the minimum inter-arrival time between conforming cells decreases • Given GCRA(T,) and the transmission time of a cell required,, the maximum number N of conforming back-to-back cells, i.e., at the full link rate, equals

  7. If a cell stream conforms to the SCR (=1/Ts), the BT (=s), and the PCR (=1/T), then it offers traffic conforming to GCRA(Ts,s) and GCRA(T,0) •  The maximum burst size (MBS) is • Over any closed time interval of length t, the number of cells, N(t), can be emitted with spacing no less than T and still be in conformance with GCRA(Ts,s) is bounded by

  8. If the minimum spacing between bursts and the MBS (with inter-cell spacing T) are TI and B, respectively, and the cell stream is conforming with GCRA(Ts,s), then Tsand s are chosen at least large enough to satisfy Time

More Related