Maximum buffer requirement of ATM shared memory switch with enforced sources

Jung Shyr Wu, Fang Jang Kuo

Research output: Contribution to conferencePaperpeer-review

Abstract

Leaky Bucket based traffic parameters are widely used for traffic declaration and monitoring (enforcing) in ATM network. In this article, we investigate the characteristics of the system that every traffic source is policed by a Leaky Bucket enforcer before entering the network. In addition to mean cell rate, peak cell rate of traffic is also taken into consideration. We find out the worst output pattern from leaky bucket and derive performance bounds of maximum queue length and maximum waiting time for the shared memory ATM switch so that there is no cell loss. Both quantities are obtained as every source transmits cells according to the pattern of absolute synchronous transmission under coincident token-generating condition. These results can be used as the reference for call admission control and resource allocation.

Original languageEnglish
Pages1664-1668
Number of pages5
StatePublished - 1996
EventProceedings of the 1996 IEEE International Conference on Communications, ICC'96. Part 1 (of 3) - Dallas, TX, USA
Duration: 23 Jun 199627 Jun 1996

Conference

ConferenceProceedings of the 1996 IEEE International Conference on Communications, ICC'96. Part 1 (of 3)
CityDallas, TX, USA
Period23/06/9627/06/96

Fingerprint

Dive into the research topics of 'Maximum buffer requirement of ATM shared memory switch with enforced sources'. Together they form a unique fingerprint.

Cite this