Queueing Systems: Theory and Applications
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 1)
Priority performance of ATM packet switches
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 2)
Performance analysis of statistical multiplexing of VBR sources
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 2)
Computer Networks and ISDN Systems
Queueing analysis of a threshold based priority scheme for ATM networks
IEEE/ACM Transactions on Networking (TON)
On the self-similar nature of Ethernet traffic (extended version)
IEEE/ACM Transactions on Networking (TON)
Performance analysis of a leaky-bucket controlled ATM multiplexer
Performance Evaluation - Special issue on bandwidth management and congestion control of high-speed networks
Performance '93 Proceedings of the 16th IFIP Working Group 7.3 international symposium on Computer performance modeling measurement and evaluation
Analysis of a nonpreemptive priority queue with SPP arrivals of high class
Performance Evaluation
Communications of the ACM
Performance analysis of a leaky bucket scheme with a threshold in the data buffer
Computer Networks and ISDN Systems
Broadband ISDN resource management: the role of virtual paths
IEEE Communications Magazine
Traffic management for ATM local area networks
IEEE Communications Magazine
Traffic policing in ATM networks with multimedia traffic: the super leaky bucket
Computer Communications
Queueing analysis of delay constrained voice traffic in a packet switching system
IEEE Journal on Selected Areas in Communications
Performance analysis of a rate-control throttle where tokens and jobs queue
IEEE Journal on Selected Areas in Communications
Modeling and performance comparison of policing mechanisms for ATM networks
IEEE Journal on Selected Areas in Communications
Effectiveness of the `leaky bucket' policing mechanism in ATM networks
IEEE Journal on Selected Areas in Communications
An efficient solution method for Markov models of ATM links with loss priorities
IEEE Journal on Selected Areas in Communications
Priority management in ATM switching nodes
IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications
Resource management with virtual paths in ATM networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.24 |
In integrated services networks (B-ISDN/ATM) incoming traffic streams with different Quality of Service (QoS) requirements, sharing a single contract for use of a policed virtual path, may be jointly regulated on the basis of their type and QoS requirements to make the best use of available bandwidth in the path. The shaping/policing mechanism may use the information about the network policer located at the User-Network Interface (UNI) to perform policing with a form of priority service to ensure satisfactory levels of cell loss and delay for both real-time and non-real time traffic. This paper proposes and analyzes such a priority, buffered leaky-bucket mechanism for shaping/policing high-priority and low-priority sources, which share an ATM virtual path under a single, common user-network connection contract. The proposed priority traffic regulator maintains a dedicated cell buffer for each type of traffic to be able to trade off cell delay and loss (or tagging) on the basis of the QoS requirements for each priority class. The analysis adopts a Discrete Batch Markovian Arrival Process (D-BMAP) model for both high-priority and low-priority sources. It is shown that the system model has an M/G/1 type queuing structure, which is exploited for the computation of the joint buffer content distribution and cell loss probabilities of the high-priority and low-priority traffic streams. The obtained numerical results capture the effect of the shaper/policer and source parameters on the cell loss performance, and may be used for design optimization. A comparison of the priority leaky-bucket with the classical single buffer leaky-bucket regulator is carried out to quantify the improvement in terms of bandwidth utilization.