A traffic control mechanism for ATM networks

The paper presents a traffic control mechanism, termed (L,M,T) mechanism, for ATM networks. The (L,M,T) mechanism polices the peak rate, the long term average rate and the maximum burst length that is allowed to enter the ATM network. The L in the (L,M,T) mechanism refers to the minimum inter-cell distance that is permitted within a burst. This feature is used to control the peak rate of traffic entering the ATM network. M refers to the maximum number of cells per burst that are allowed to enter the ATM network. T is the minimum distance that is enforced between two adjacent bursts. The value of T fluctuates between a minimum value and a maximum value depending upon information that is collected from a few previous bursts. Assuming a bursty on/off traffic source, the authors demonstrate how to dimension the mechanism. They develop an analytic model for their mechanism to determine the probability of violation for a cell belonging to an on/off traffic source. A comparison of the scheme with the leaky bucket scheme is presented.<<ETX>>

[1]  Xiaoqiang Chen,et al.  Performance evaluation of input traffic control , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[2]  Kenn S. Kvols,et al.  Source-Independent Call Acceptance Procedures in ATM Networks , 1991, IEEE J. Sel. Areas Commun..

[3]  David M. Lucantoni,et al.  A Markov Modulated Characterization of Packetized Voice and Data Traffic and Related Statistical Multiplexer Performance , 1986, IEEE J. Sel. Areas Commun..

[4]  H. Ahmadi,et al.  Analysis of leaky bucket access control mechanism with batch arrival process , 1990, [Proceedings] GLOBECOM '90: IEEE Global Telecommunications Conference and Exhibition.

[5]  Erwin P. Rathgeb Modeling and Performance Comparison of Policing Mechanisms for ATM Networks , 1991, IEEE J. Sel. Areas Commun..

[6]  Ward Whitt,et al.  Characterizing Superposition Arrival Processes in Packet Multiplexers for Voice and Data , 1986, IEEE J. Sel. Areas Commun..

[7]  J. Turner,et al.  New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.

[8]  Catherine Rosenberg,et al.  A generalization of some policing mechanisms , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[9]  Israel Cidon,et al.  Paris: An approach to integrated high‐speed private networks , 1988 .