File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Scopus: eid_2-s2.0-0028527719
- WOS: WOS:A1994PR88000006
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Traffic control in ATM networks
Title | Traffic control in ATM networks |
---|---|
Authors | |
Keywords | (L,M,T) mechanism ATM Congestion control Leaky bucket Traffic control |
Issue Date | 1994 |
Citation | Computer Networks And Isdn Systems, 1994, v. 27 n. 1, p. 85-100 How to Cite? |
Abstract | This paper presents a framework to study the problem of traffic control in ATM networks. Bursty traffic sources are modelled by Interrupted Bernoulli Processes. Probability of violation and dimensioning issues are addressed for the leaky bucket mechanism and the (L,M,T) mechanism, proposed by the authors. We present two schemes to demonstrate that improved statistical multiplexing can be achieved if the traffic control mechanisms are not used in isolation for each session, rather they are used on groups of sessions. In the first scheme, traffic control is performed on the aggregate traffic of a group. In the second scheme, traffic control is performed on single sessions with information about the status of all the sessions of the group being available and used at each traffic control mechanism. Numerical examples that illustrate the improvement in statistical multiplexing as a result of the above schemes are presented. |
Persistent Identifier | http://hdl.handle.net/10722/155009 |
ISSN | |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Khan, Irfan | en_US |
dc.contributor.author | Li, Victor OK | en_US |
dc.date.accessioned | 2012-08-08T08:31:29Z | - |
dc.date.available | 2012-08-08T08:31:29Z | - |
dc.date.issued | 1994 | en_US |
dc.identifier.citation | Computer Networks And Isdn Systems, 1994, v. 27 n. 1, p. 85-100 | en_US |
dc.identifier.issn | 0169-7552 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/155009 | - |
dc.description.abstract | This paper presents a framework to study the problem of traffic control in ATM networks. Bursty traffic sources are modelled by Interrupted Bernoulli Processes. Probability of violation and dimensioning issues are addressed for the leaky bucket mechanism and the (L,M,T) mechanism, proposed by the authors. We present two schemes to demonstrate that improved statistical multiplexing can be achieved if the traffic control mechanisms are not used in isolation for each session, rather they are used on groups of sessions. In the first scheme, traffic control is performed on the aggregate traffic of a group. In the second scheme, traffic control is performed on single sessions with information about the status of all the sessions of the group being available and used at each traffic control mechanism. Numerical examples that illustrate the improvement in statistical multiplexing as a result of the above schemes are presented. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | Computer networks and ISDN systems | en_US |
dc.subject | (L,M,T) mechanism | - |
dc.subject | ATM | - |
dc.subject | Congestion control | - |
dc.subject | Leaky bucket | - |
dc.subject | Traffic control | - |
dc.title | Traffic control in ATM networks | en_US |
dc.type | Article | en_US |
dc.identifier.email | Li, Victor OK:vli@eee.hku.hk | en_US |
dc.identifier.authority | Li, Victor OK=rp00150 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.scopus | eid_2-s2.0-0028527719 | en_US |
dc.identifier.volume | 27 | en_US |
dc.identifier.issue | 1 | en_US |
dc.identifier.spage | 85 | en_US |
dc.identifier.epage | 100 | en_US |
dc.identifier.isi | WOS:A1994PR88000006 | - |
dc.identifier.scopusauthorid | Khan, Irfan=36861646700 | en_US |
dc.identifier.scopusauthorid | Li, Victor OK=7202621685 | en_US |
dc.identifier.issnl | 0169-7552 | - |