Presentation 1995/7/14
A Depth Identification Method for Leaky Buckets from the View of CAC
Atsuo Hatono,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In QOS(Quality Of Service) control of VBR(Variable Bit Rate) services of ATM networks, UPC(Usage Parameter Control) is required to identify uniquely worst burst traffic passing through and to keep false alarm rate (error probability of observance cells with violation cells) less than bearable cell loss probability. This paper proposes a new UPC method which consists of a dual leaky buckets, a bucket monitor and a burst counter to identify uniquely the worst burst traffic when maximum burst length is used for a traffic descriptor. In this UPC method, the bucket monitor monitors variation rates of the 2nd leaky bucket. The burst counter counts burst lengths. Furthermore, to enable to keep false alarm rate for this UPC method, this paper proposes a leaky bucket model for burst traffic of which burst lengths are subject to General processes (burst intervals are subject to Markovian). Simulations show that this model is accurate enough if the safe coefficient is greater than 0.8. Therefore, these proposals enable to keep cell loss probability due to switching less than bearable cell loss probability.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) QOS / VBR / Leaky bucket / Diffusion model / Depth of bucket / False alarm rate
Paper #
Date of Issue

Conference Information
Committee SSE
Conference Date 1995/7/14(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Switching Systems Engineering (SSE)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Depth Identification Method for Leaky Buckets from the View of CAC
Sub Title (in English)
Keyword(1) QOS
Keyword(2) VBR
Keyword(3) Leaky bucket
Keyword(4) Diffusion model
Keyword(5) Depth of bucket
Keyword(6) False alarm rate
1st Author's Name Atsuo Hatono
1st Author's Affiliation Systems Development Laboratory Hitachi, LTD()
Date 1995/7/14
Paper #
Volume (vol) vol.95
Number (no) 142
Page pp.pp.-
#Pages 6
Date of Issue