In ATM networks, a usage parameter control (UPC) strategy must regulate incoming traffic according to the characteristics of the sources declared at call set-up. Among various UPC schemes, Leaky Bucket is a conventionally method having been discussed extensively. This paper examines the characteristics of the multiplexer with a sufficient buffer in which cell arrivals are policed by Enhanced Leaky-Bucket (ELB) before entering the system. In addition to the factor of mean rate, peak rate and cell delay variation (CDV) are also considered for each ELB. We find out the worst output pattern from the ELB and derive the upper bound on average waiting time as a function of the ELB parameters.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Jung-Shyr WU, Shyh-Wen SUE, "Worst Case Analysis for Multiplexed Traffic Enforced by Enhanced Leaky Bucket with CDV Tolerance" in IEICE TRANSACTIONS on Communications,
vol. E80-B, no. 4, pp. 557-563, April 1997, doi: .
Abstract: In ATM networks, a usage parameter control (UPC) strategy must regulate incoming traffic according to the characteristics of the sources declared at call set-up. Among various UPC schemes, Leaky Bucket is a conventionally method having been discussed extensively. This paper examines the characteristics of the multiplexer with a sufficient buffer in which cell arrivals are policed by Enhanced Leaky-Bucket (ELB) before entering the system. In addition to the factor of mean rate, peak rate and cell delay variation (CDV) are also considered for each ELB. We find out the worst output pattern from the ELB and derive the upper bound on average waiting time as a function of the ELB parameters.
URL: https://global.ieice.org/en_transactions/communications/10.1587/e80-b_4_557/_p
Copy
@ARTICLE{e80-b_4_557,
author={Jung-Shyr WU, Shyh-Wen SUE, },
journal={IEICE TRANSACTIONS on Communications},
title={Worst Case Analysis for Multiplexed Traffic Enforced by Enhanced Leaky Bucket with CDV Tolerance},
year={1997},
volume={E80-B},
number={4},
pages={557-563},
abstract={In ATM networks, a usage parameter control (UPC) strategy must regulate incoming traffic according to the characteristics of the sources declared at call set-up. Among various UPC schemes, Leaky Bucket is a conventionally method having been discussed extensively. This paper examines the characteristics of the multiplexer with a sufficient buffer in which cell arrivals are policed by Enhanced Leaky-Bucket (ELB) before entering the system. In addition to the factor of mean rate, peak rate and cell delay variation (CDV) are also considered for each ELB. We find out the worst output pattern from the ELB and derive the upper bound on average waiting time as a function of the ELB parameters.},
keywords={},
doi={},
ISSN={},
month={April},}
Copy
TY - JOUR
TI - Worst Case Analysis for Multiplexed Traffic Enforced by Enhanced Leaky Bucket with CDV Tolerance
T2 - IEICE TRANSACTIONS on Communications
SP - 557
EP - 563
AU - Jung-Shyr WU
AU - Shyh-Wen SUE
PY - 1997
DO -
JO - IEICE TRANSACTIONS on Communications
SN -
VL - E80-B
IS - 4
JA - IEICE TRANSACTIONS on Communications
Y1 - April 1997
AB - In ATM networks, a usage parameter control (UPC) strategy must regulate incoming traffic according to the characteristics of the sources declared at call set-up. Among various UPC schemes, Leaky Bucket is a conventionally method having been discussed extensively. This paper examines the characteristics of the multiplexer with a sufficient buffer in which cell arrivals are policed by Enhanced Leaky-Bucket (ELB) before entering the system. In addition to the factor of mean rate, peak rate and cell delay variation (CDV) are also considered for each ELB. We find out the worst output pattern from the ELB and derive the upper bound on average waiting time as a function of the ELB parameters.
ER -