Leaky Bucket based traffic parameters are widely used for traffic declaration and monitoring (enforcing) in ATM networks. In this article, we investigate the characteristics of a system in which all traffic sources are policed by a Leaky Bucket enforcer before entering the network. In addition to mean cell rate, peak cell rate of traffic is also taken into consideration. We examine the worst output pattern from the leaky bucket and derive performance bounds of maximum queue length and maximum waiting time for the shared memory ATM switch at zero cell loss. Both quantities are obtained as all sources transmit cells according to the pattern of absolute synchronous transmission under coincident token-generating conditions. These results can be used as references for call admission control and resource allocation.
|Number of pages||8|
|Journal||Journal of the Chinese Institute of Electrical Engineering, Transactions of the Chinese Institute of Engineers, Series E/Chung KuoTien Chi Kung Chieng Hsueh K'an|
|State||Published - May 1998|