Design and evaluation of GCRA shaper and enforcer architecture in ATM networks

Fang Jang Kuo, Jung Shyr Wu

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

The leaky bucket scheme has been widely treated as a traffic control mechanism. The corresponding multi-connection shaper, which intends to make the passing traffic comply with the declared parameters in the enforcer, has also been implemented. However, we must point out that the regulated cells may be invalid at the corresponding enforcer, even if the CDV between the shaper and enforcer is neglected. In order to cope with this problem, two enforcing methods, say ALP_LB and GCRA, are tried and evaluated. We modify the GCRA algorithm, which was suggested by ITU-T recommendation 1.371 and even extended by ATM Forum '93, to be suitable for shaping. The shaper and enforcer architecture which is suitable for both ALP_LB and GCRA methods is proposed. Simulation results verify the shaping and UPC functions of GCRA. They also reveal that the GCRA shaper would not introduce long delay and queue length. The proposed shaper architecture does have some merits compared with others. Such a shaper is also suitable for regulating traffic for NPC (network parameter control) at the NNI (network node interface).

Original languageEnglish
Pages (from-to)13-22
Number of pages10
JournalInternational Journal of Communication Systems
Volume9
Issue number1
DOIs
StatePublished - 1996

Keywords

  • CDV
  • Enforcer
  • GCRA
  • Leaky bucket
  • Shaper
  • UPC

Fingerprint

Dive into the research topics of 'Design and evaluation of GCRA shaper and enforcer architecture in ATM networks'. Together they form a unique fingerprint.

Cite this