The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Shyh-Wen SUE(3hit)

1-3hit
  • Worst Case Analysis for Multiplexed Traffic Enforced by Enhanced Leaky Bucket with CDV Tolerance

    Jung-Shyr WU  Shyh-Wen SUE  

     
    PAPER-Communication Networks and Services

      Vol:
    E80-B No:4
      Page(s):
    557-563

    In ATM networks, a usage parameter control (UPC) strategy must regulate incoming traffic according to the characteristics of the sources declared at call set-up. Among various UPC schemes, Leaky Bucket is a conventionally method having been discussed extensively. This paper examines the characteristics of the multiplexer with a sufficient buffer in which cell arrivals are policed by Enhanced Leaky-Bucket (ELB) before entering the system. In addition to the factor of mean rate, peak rate and cell delay variation (CDV) are also considered for each ELB. We find out the worst output pattern from the ELB and derive the upper bound on average waiting time as a function of the ELB parameters.

  • Delay Bound Analysis for Multiplexed Traffic Controlled by Enhanced Leaky Bucket

    Jung-Shyr WU  Fang-Jang KUO  Shyh-Wen SUE  

     
    PAPER-Communication Networks and Services

      Vol:
    E79-B No:11
      Page(s):
    1615-1622

    In ATM networks, two main functions for achieving traffic control and congestion control are Call Admission Control (CAC) and Usage Parameter Control (UPC). Among various UPC schemes, Leaky Bucket is a popular one. In this paper, we study the characteristics of the system in which every traffic source is regulated by an enhanced leaky-bucket before entering the multiplexer at the edge node of the ATM network. In addition to the factor of mean cell rate, peak cell rate is also taken into consideration. Based on the criteria of average waiting time at the multiplexer, we derive the performance bounds expressed as the functions of the LB parameters and numbers of connections.

  • Effects of Dual Leaky Bucket Parameters on Cell Loss Ratio: Worst Case Analysis

    Jung-Shyr WU  Shyh-Wen SUE  

     
    PAPER-Communication Networks and Services

      Vol:
    E79-B No:6
      Page(s):
    836-841

    Leaky Bucket based traffic parameters are widely used for traffic declaration and enforcing in an ATM network. In this paper, we investigate the characteristics of the system that every traffic source is policed by a dual leaky bucket before entering the network. In addition to mean cell rate, peak cell rate of traffic is also taken into consideration. We find the worst output pattern from the dual leaky bucket and derive the performance bound of maximum cell loss ratio encountered in the multiplexer. It is obtained as every source transmits cells according to the criteria for extreme synchronous transmission in a coincident token-generating condition.