Presentation | 1995/7/14 A Depth Identification Method for Leaky Buckets from the View of CAC Atsuo Hatono, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In QOS(Quality Of Service) control of VBR(Variable Bit Rate) services of ATM networks, UPC(Usage Parameter Control) is required to identify uniquely worst burst traffic passing through and to keep false alarm rate (error probability of observance cells with violation cells) less than bearable cell loss probability. This paper proposes a new UPC method which consists of a dual leaky buckets, a bucket monitor and a burst counter to identify uniquely the worst burst traffic when maximum burst length is used for a traffic descriptor. In this UPC method, the bucket monitor monitors variation rates of the 2nd leaky bucket. The burst counter counts burst lengths. Furthermore, to enable to keep false alarm rate for this UPC method, this paper proposes a leaky bucket model for burst traffic of which burst lengths are subject to General processes (burst intervals are subject to Markovian). Simulations show that this model is accurate enough if the safe coefficient is greater than 0.8. Therefore, these proposals enable to keep cell loss probability due to switching less than bearable cell loss probability. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | QOS / VBR / Leaky bucket / Diffusion model / Depth of bucket / False alarm rate |
Paper # | |
Date of Issue |
Conference Information | |
Committee | SSE |
---|---|
Conference Date | 1995/7/14(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Switching Systems Engineering (SSE) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Depth Identification Method for Leaky Buckets from the View of CAC |
Sub Title (in English) | |
Keyword(1) | QOS |
Keyword(2) | VBR |
Keyword(3) | Leaky bucket |
Keyword(4) | Diffusion model |
Keyword(5) | Depth of bucket |
Keyword(6) | False alarm rate |
1st Author's Name | Atsuo Hatono |
1st Author's Affiliation | Systems Development Laboratory Hitachi, LTD() |
Date | 1995/7/14 |
Paper # | |
Volume (vol) | vol.95 |
Number (no) | 142 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |