A heuristic framework for source policing in ATM networks

Provides a heuristic framework for the analysis and design of source policing mechanisms for ATM networks. The authors first introduce a function called the time /spl epsiv/-quantile function associated with a source and a second function associated with the policing mechanism. These two characteristics when used in conjunction allow to obtain a useful design tool for source policing. The authors illustrate the use of this framework on source models as well as on real video sources. This framework leads also to a new and natural notion of the response time (called detection time) of the policing mechanism and show how the heuristic framework allows for a quick estimation of this detection time. >

[1]  Annie Gravey,et al.  On the Geo/D/1/and Geo/D/1/n Queues , 1990, Perform. Evaluation.

[2]  J. Turner,et al.  New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.

[3]  Debasis Mitra,et al.  Effective bandwidth of general Markovian traffic sources and admission control of high speed networks , 1993, TNET.

[4]  Frank P. Kelly,et al.  Effective bandwidths at multi-class queues , 1991, Queueing Syst. Theory Appl..

[5]  Erwin P. Rathgeb,et al.  Policing of realistic VBR video traffic - a case study , 1992, Broadband Communications.

[6]  Ramón M. Rodríguez-Dagnino,et al.  Prediction of Bit Rate Sequences of Encoded Video Signals , 1991, IEEE J. Sel. Areas Commun..

[7]  M. Decina,et al.  Bandwidth assignment and virtual call blocking in ATM networks , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[8]  M. Csorgo Quantile processes with statistical applications , 1987 .

[9]  Kenn S. Kvols,et al.  Source-Independent Call Acceptance Procedures in ATM Networks , 1991, IEEE J. Sel. Areas Commun..

[10]  Luigi Fratta,et al.  ATM: bandwidth assignment and bandwidth enforcement policies , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[11]  Fabrice Guillemin,et al.  Peak rate enforcement in ATM networks , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[12]  Alberto Tonietti,et al.  Effectiveness of the "Leaky Bucket" Policing Mechanism in ATM Networks , 1991, IEEE J. Sel. Areas Commun..

[13]  Catherine Rosenberg,et al.  A generalization of some policing mechanisms , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[14]  Mark William Garrett Contributions toward real-time services on packet switched networks , 1993 .

[15]  A. Jalali,et al.  Open loop schemes for network congestion control , 1991, ICC 91 International Conference on Communications Conference Record.

[16]  Erwin P. Rathgeb Modeling and Performance Comparison of Policing Mechanisms for ATM Networks , 1991, IEEE J. Sel. Areas Commun..