PERFORMANCE ANALYSIS OF A LEAKY-BUCKET CONTROLLED ATM MULTIPLEXER

被引:4
|
作者
REN, JF
MARK, JW
WONG, JW
机构
[1] UNIV WATERLOO,DEPT ELECT & COMP ENGN,WATERLOO N2L 3G1,ONTARIO,CANADA
[2] UNIV WATERLOO,DEPT COMP SCI,WATERLOO N2L 3G1,ONTARIO,CANADA
关键词
LEAKY BUCKET; ATM; STATISTICAL MULTIPLEXER; SPECTRAL EXPANSION; KRONECKER PRODUCT; DECOMPOSITION;
D O I
10.1016/0166-5316(94)90055-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There are at least three levels where network access control should be exercised: the call level, the burst level and the cell level. These control levels have different time scales. The present paper is concerned primarily with the burst and cell level control. Our system consists of a number of input sources, each controlled by a leaky-bucket mechanism. The outputs from the leaky-buckets are fed to a statistical multiplexer. The cell level loss occurs at the individual leaky-buckets and the burst level loss occurs at the statistical multiplexer. We use a unified state space representation for the leaky-buckets-multiplexer system and a spectral expansion method to analyze the cell level and the burst level behaviors. Numerical results obtained offer insight into the allocation and management of the buffers to attain the best performance tradeoffs.
引用
下载
收藏
页码:73 / 101
页数:29
相关论文
共 50 条
  • [31] Efficient video multiplexing for delay-sensitive sources based on leaky-bucket characterization
    Ibrahim, AAM
    Hamdi, M
    Rolin, P
    MULTIMEDIA SYSTEMS AND APPLICATIONS-BOOK, 1999, 3528 : 101 - 112
  • [32] Properties of the traffic output by a leaky-bucket policer with long-range dependent input traffic
    Bregni, Stefano
    Giacomazzi, Paolo
    Saddemi, Gabriella
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 603 - 609
  • [33] PERFORMANCE ANALYSIS OF AN ATM STATISTICAL MULTIPLEXER WITH BATCH ARRIVALS
    ABBAS, M
    AHMAD, ZA
    IEE PROCEEDINGS-COMMUNICATIONS, 1994, 141 (03): : 190 - 195
  • [34] PERFORMANCE ANALYSIS OF ATM CELL MULTIPLEXER WITH MMPP INPUT
    LEE, JW
    LEE, BG
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1992, E75B (08) : 709 - 714
  • [35] Performance analysis of ATM multiplexer with Bernoulli traffic sources
    Chiang, SY
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2002, 8 (06) : 541 - 552
  • [36] Buffered leaky bucket algorithm for congestion control in ATM networks
    Indumathi, P
    Shanmugavel, S
    Mahesh, HC
    IETE JOURNAL OF RESEARCH, 2002, 48 (01) : 59 - 67
  • [37] Leaky bucket mechanism with learning algorithm for ATM traffic policing
    Atlasis, AF
    Stassinopoulos, GI
    Vasilakos, AV
    SECOND IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1997, : 68 - 72
  • [38] Performance analysis of a Leaky Bucket scheme with a threshold in the data buffer
    Choi, BD
    Park, CG
    Sung, DK
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1997, 29 (07): : 781 - 795
  • [39] Performance analysis of a Leaky Bucket scheme with a threshold in the data buffer
    Korea Advanced Inst of Science and, Technology, Taejon, Korea, Republic of
    Comput Networks ISDN Syst, 7 (781-795):
  • [40] Delay bound analysis for multiplexed traffic controlled by enhanced leaky bucket
    Wu, JS
    Kuo, FJ
    Sue, SW
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1996, E79B (11) : 1615 - 1622