Leaky Bucket based traffic parameters are widely used for traffic declaration and monitoring (enforcing) in ATM network. In this article, we investigate the characteristics of the system that every traffic source is policed by a Leaky Bucket enforcer before entering the network. In addition to mean cell rate, peak cell rate of traffic is also taken into consideration. We find out the worst output pattern from leaky bucket and derive performance bounds of maximum queue length and maximum waiting time for the shared memory ATM switch so that there is no cell loss. Both quantities are obtained as every source transmits cells according to the pattern of absolute synchronous transmission under coincident token-generating condition. These results can be used as the reference for call admission control and resource allocation.
|Number of pages||5|
|State||Published - 1996|
|Event||Proceedings of the 1996 IEEE International Conference on Communications, ICC'96. Part 1 (of 3) - Dallas, TX, USA|
Duration: 23 Jun 1996 → 27 Jun 1996
|Conference||Proceedings of the 1996 IEEE International Conference on Communications, ICC'96. Part 1 (of 3)|
|City||Dallas, TX, USA|
|Period||23/06/96 → 27/06/96|