File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Traffic control in ATM networks

TitleTraffic control in ATM networks
Authors
Keywords(L,M,T) mechanism
ATM
Congestion control
Leaky bucket
Traffic control
Issue Date1994
Citation
Computer Networks And Isdn Systems, 1994, v. 27 n. 1, p. 85-100 How to Cite?
AbstractThis paper presents a framework to study the problem of traffic control in ATM networks. Bursty traffic sources are modelled by Interrupted Bernoulli Processes. Probability of violation and dimensioning issues are addressed for the leaky bucket mechanism and the (L,M,T) mechanism, proposed by the authors. We present two schemes to demonstrate that improved statistical multiplexing can be achieved if the traffic control mechanisms are not used in isolation for each session, rather they are used on groups of sessions. In the first scheme, traffic control is performed on the aggregate traffic of a group. In the second scheme, traffic control is performed on single sessions with information about the status of all the sessions of the group being available and used at each traffic control mechanism. Numerical examples that illustrate the improvement in statistical multiplexing as a result of the above schemes are presented.
Persistent Identifierhttp://hdl.handle.net/10722/155009
ISSN
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorKhan, Irfanen_US
dc.contributor.authorLi, Victor OKen_US
dc.date.accessioned2012-08-08T08:31:29Z-
dc.date.available2012-08-08T08:31:29Z-
dc.date.issued1994en_US
dc.identifier.citationComputer Networks And Isdn Systems, 1994, v. 27 n. 1, p. 85-100en_US
dc.identifier.issn0169-7552en_US
dc.identifier.urihttp://hdl.handle.net/10722/155009-
dc.description.abstractThis paper presents a framework to study the problem of traffic control in ATM networks. Bursty traffic sources are modelled by Interrupted Bernoulli Processes. Probability of violation and dimensioning issues are addressed for the leaky bucket mechanism and the (L,M,T) mechanism, proposed by the authors. We present two schemes to demonstrate that improved statistical multiplexing can be achieved if the traffic control mechanisms are not used in isolation for each session, rather they are used on groups of sessions. In the first scheme, traffic control is performed on the aggregate traffic of a group. In the second scheme, traffic control is performed on single sessions with information about the status of all the sessions of the group being available and used at each traffic control mechanism. Numerical examples that illustrate the improvement in statistical multiplexing as a result of the above schemes are presented.en_US
dc.languageengen_US
dc.relation.ispartofComputer networks and ISDN systemsen_US
dc.subject(L,M,T) mechanism-
dc.subjectATM-
dc.subjectCongestion control-
dc.subjectLeaky bucket-
dc.subjectTraffic control-
dc.titleTraffic control in ATM networksen_US
dc.typeArticleen_US
dc.identifier.emailLi, Victor OK:vli@eee.hku.hken_US
dc.identifier.authorityLi, Victor OK=rp00150en_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.scopuseid_2-s2.0-0028527719en_US
dc.identifier.volume27en_US
dc.identifier.issue1en_US
dc.identifier.spage85en_US
dc.identifier.epage100en_US
dc.identifier.isiWOS:A1994PR88000006-
dc.identifier.scopusauthoridKhan, Irfan=36861646700en_US
dc.identifier.scopusauthoridLi, Victor OK=7202621685en_US
dc.identifier.issnl0169-7552-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats