A uniquely-structured Usage Parameter Control (UPC) method named Virtual-shaping is proposed which considers cell arrival time jitter between user and UPC point. The method uses a modified Dangerous Bridge UPC circuit (Sliding window type) and virtually (logically) shapes cell traffic using cell arrival time compensation to offset cell delay variation (CDV). In addition, the proposed method is based on a cell-buffer-less structure and can be realized with reasonable hardware. The method yields precise and accurate monitoring. Computer simulations show that the method offers higher network utilization than the conventional Leaky Bucket based UPC method. The proposed method will make it possible to create more effective B-ISDNs, and more cost-effective broadband VBR services.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Naoaki YAMANAKA, Toyofumi TAKENAKA, Youichi SATO, Ken-ichi SATO, "Jitter Tolerant Usage Parameter Control Method for ATM-based B-ISDN" in IEICE TRANSACTIONS on Communications,
vol. E78-B, no. 4, pp. 485-493, April 1995, doi: .
Abstract: A uniquely-structured Usage Parameter Control (UPC) method named Virtual-shaping is proposed which considers cell arrival time jitter between user and UPC point. The method uses a modified Dangerous Bridge UPC circuit (Sliding window type) and virtually (logically) shapes cell traffic using cell arrival time compensation to offset cell delay variation (CDV). In addition, the proposed method is based on a cell-buffer-less structure and can be realized with reasonable hardware. The method yields precise and accurate monitoring. Computer simulations show that the method offers higher network utilization than the conventional Leaky Bucket based UPC method. The proposed method will make it possible to create more effective B-ISDNs, and more cost-effective broadband VBR services.
URL: https://global.ieice.org/en_transactions/communications/10.1587/e78-b_4_485/_p
Copy
@ARTICLE{e78-b_4_485,
author={Naoaki YAMANAKA, Toyofumi TAKENAKA, Youichi SATO, Ken-ichi SATO, },
journal={IEICE TRANSACTIONS on Communications},
title={Jitter Tolerant Usage Parameter Control Method for ATM-based B-ISDN},
year={1995},
volume={E78-B},
number={4},
pages={485-493},
abstract={A uniquely-structured Usage Parameter Control (UPC) method named Virtual-shaping is proposed which considers cell arrival time jitter between user and UPC point. The method uses a modified Dangerous Bridge UPC circuit (Sliding window type) and virtually (logically) shapes cell traffic using cell arrival time compensation to offset cell delay variation (CDV). In addition, the proposed method is based on a cell-buffer-less structure and can be realized with reasonable hardware. The method yields precise and accurate monitoring. Computer simulations show that the method offers higher network utilization than the conventional Leaky Bucket based UPC method. The proposed method will make it possible to create more effective B-ISDNs, and more cost-effective broadband VBR services.},
keywords={},
doi={},
ISSN={},
month={April},}
Copy
TY - JOUR
TI - Jitter Tolerant Usage Parameter Control Method for ATM-based B-ISDN
T2 - IEICE TRANSACTIONS on Communications
SP - 485
EP - 493
AU - Naoaki YAMANAKA
AU - Toyofumi TAKENAKA
AU - Youichi SATO
AU - Ken-ichi SATO
PY - 1995
DO -
JO - IEICE TRANSACTIONS on Communications
SN -
VL - E78-B
IS - 4
JA - IEICE TRANSACTIONS on Communications
Y1 - April 1995
AB - A uniquely-structured Usage Parameter Control (UPC) method named Virtual-shaping is proposed which considers cell arrival time jitter between user and UPC point. The method uses a modified Dangerous Bridge UPC circuit (Sliding window type) and virtually (logically) shapes cell traffic using cell arrival time compensation to offset cell delay variation (CDV). In addition, the proposed method is based on a cell-buffer-less structure and can be realized with reasonable hardware. The method yields precise and accurate monitoring. Computer simulations show that the method offers higher network utilization than the conventional Leaky Bucket based UPC method. The proposed method will make it possible to create more effective B-ISDNs, and more cost-effective broadband VBR services.
ER -