PERFORMANCE ANALYSIS OF A LEAKY-BUCKET CONTROLLED ATM MULTIPLEXER

被引:4
|
作者
REN, JF
MARK, JW
WONG, JW
机构
[1] UNIV WATERLOO,DEPT ELECT & COMP ENGN,WATERLOO N2L 3G1,ONTARIO,CANADA
[2] UNIV WATERLOO,DEPT COMP SCI,WATERLOO N2L 3G1,ONTARIO,CANADA
关键词
LEAKY BUCKET; ATM; STATISTICAL MULTIPLEXER; SPECTRAL EXPANSION; KRONECKER PRODUCT; DECOMPOSITION;
D O I
10.1016/0166-5316(94)90055-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There are at least three levels where network access control should be exercised: the call level, the burst level and the cell level. These control levels have different time scales. The present paper is concerned primarily with the burst and cell level control. Our system consists of a number of input sources, each controlled by a leaky-bucket mechanism. The outputs from the leaky-buckets are fed to a statistical multiplexer. The cell level loss occurs at the individual leaky-buckets and the burst level loss occurs at the statistical multiplexer. We use a unified state space representation for the leaky-buckets-multiplexer system and a spectral expansion method to analyze the cell level and the burst level behaviors. Numerical results obtained offer insight into the allocation and management of the buffers to attain the best performance tradeoffs.
引用
下载
收藏
页码:73 / 101
页数:29
相关论文
共 50 条
  • [21] Consecutive cell loss controls for leaky-bucket admission systems
    Lee, CW
    Andersland, MS
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1732 - 1738
  • [22] Analysis of the leaky bucket algorithm for bursty sources in ATM networks
    Jiang, Zhigang
    Li, Lemin
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1995, 23 (01): : 8 - 14
  • [23] ANALYSIS OF THE LEAKY BUCKET OUTPUT PROCESSES FOR BURSTY SOURCES IN ATM NETWORKS
    Liao Jianxin(National Lab. of Switching Tech. and Telecom. Networks BUPT of China
    Journal of Electronics(China), 1997, (03) : 228 - 235
  • [24] Video compression with output traffic conforming to leaky-bucket network access control
    Li, N
    Liew, SC
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL II, 1996, : 441 - 444
  • [25] Leaky-bucket based rate control algorithm for C_VBR video encoding
    Bai, JF
    Liao, QM
    Lin, XG
    ELECTRONICS LETTERS, 1999, 35 (18) : 1529 - 1530
  • [26] Performance analysis of an ATM service multiplexer in the NCIH
    Ouyang, T
    Nilsson, AA
    PROCEEDINGS OF THE TWENTY-EIGHTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 1996, : 34 - 39
  • [27] Buffer content of a leaky-bucket system with long-range dependent input traffic
    González-Arévalo, B
    Samorodnitsky, G
    JOURNAL OF APPLIED PROBABILITY, 2003, 40 (03) : 581 - 601
  • [28] Characterization of long-range dependent traffic regulated by leaky-bucket policers and shapers
    Bregni, Stefano
    Giacomazzi, Paolo
    Saddemi, Gabriella
    COMPUTER COMMUNICATIONS, 2010, 33 (06) : 714 - 720
  • [29] EFFECTIVENESS OF THE LEAKY BUCKET POLICING MECHANISM IN ATM NETWORKS
    BUTTO, M
    CAVALLERO, E
    TONIETTI, A
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1991, 9 (03) : 335 - 342
  • [30] The fuzzy leaky bucket for policing mechanism in ATM networks
    Jiang, ZF
    Liu, ZM
    NEURAL NETWORKS FOR SIGNAL PROCESSING VI, 1996, : 510 - 517