Leaky Bucket based traffic parameters are widely used for traffic declaration and monitoring (enforcing) in ATM network. In this article, we investigate the characteristics of the system that every traffic source is policed by a Leaky Bucket enforcer before entering the network. In addition to mean cell rate, peak cell rate of traffic is also taken into consideration. We find out the worst output pattern from leaky bucket and derive performance bounds of maximum queue length and maximum waiting time for the shared memory ATM switch so that there is no cell loss. Both quantities are obtained as every source transmits cells according to the pattern of absolute synchronous transmission under coincident token-generating condition. These results can be used as the reference for call admission control and resource allocation.
|出版狀態||已出版 - 1996|
|事件||Proceedings of the 1996 IEEE International Conference on Communications, ICC'96. Part 1 (of 3) - Dallas, TX, USA|
持續時間: 23 6月 1996 → 27 6月 1996
|???event.eventtypes.event.conference???||Proceedings of the 1996 IEEE International Conference on Communications, ICC'96. Part 1 (of 3)|
|城市||Dallas, TX, USA|
|期間||23/06/96 → 27/06/96|