Bounds for multiplexing leaky-bucket enforced sources in ATM networks

被引:0
|
作者
Wu, JS
Kuo, FJ
机构
[1] Natl Central Univ, Chung-Li, Taiwan
关键词
usage parameter control; leaky-bucket; queue length;
D O I
10.1002/(SICI)1099-1131(199611)9:6<299::AID-DAC317>3.0.CO;2-#
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Leaky-bucket (LB) based traffic parameters are widely used for traffic declaration and monitoring (enforcing) in asynchronous transfer mode (ATM) networks. For such a system, every traffic source is policed by an LB enforcer before entering the access node at the edge of the network. In this article, we investigate the characteristics of the model that such traffic sources are multiplexed together by a multiplexer in the edge node. Based on the worst case performance, we derive the upper bound and the lower bound of queue length at the multiplexer as functions of the LB parameters and number of connections. In particular, we also take the peak cell rate, which is an important parameter, into consideration. We also modify the well-known Little's formula which is derived based on long-term average, to be suitable for a complete busy period. It helps us to derive bounds on average waiting time by way of average queue length.
引用
下载
收藏
页码:299 / 307
页数:9
相关论文
共 50 条
  • [21] Consecutive cell loss controls for leaky-bucket admission systems
    Lee, CW
    Andersland, MS
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1732 - 1738
  • [22] A multiplexer controlled by fuzzy associate memory leaky bucket in ATM networks
    Jiang, ZF
    Liu, ZM
    Zhou, Z
    Lu, F
    ISCAS '97 - PROCEEDINGS OF 1997 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I - IV: CIRCUITS AND SYSTEMS IN THE INFORMATION AGE, 1997, : 669 - 672
  • [23] Performance analysis of leaky bucket policing with priority management on ATM networks
    Xu, SG
    Huang, ZL
    1996 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLUMES 1 AND 2 - PROCEEDINGS, 1996, : 13 - 15
  • [25] Credit Token Leaky Bucket algorithm with fuzzy logic in ATM networks
    Pinaikul, S
    Benjapolakul, W
    NINTH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, PROCEEDINGS, 2001, : 296 - 301
  • [26] Traffic policing in ATM networks with multimedia traffic: the super leaky bucket
    Gan, D
    McKenzie, S
    COMPUTER COMMUNICATIONS, 1999, 22 (05) : 439 - 450
  • [27] MULTIPLEXING DIGITAL TELEVISION SOURCES ON ATM NETWORKS
    LEDUC, JP
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 1994, 6 (05) : 435 - 462
  • [28] A second-order leaky bucket algorithm to guarantee QOS in ATM networks
    Hluchyj, MG
    Yin, NY
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1090 - 1096
  • [29] Leaky bucket algorithm with penalty mechanisms for usage parameter control in ATM networks
    Chang, Chung-Ju
    Eul, Zohnshiun
    Chang, Chih-Sheng
    Journal of the Chinese Institute of Electrical Engineering, Transactions of the Chinese Institute of Engineers, Series E/Chung KuoTien Chi Kung Chieng Hsueh K'an, 2000, 7 (04): : 275 - 285
  • [30] The token-bank leaky bucket mechanism for group connections in ATM networks
    Wu, SL
    Chen, WSE
    1996 INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 1996, : 226 - 233