Buffer losses vs. deadline violations for ABR traffic in an ATM switch: A computational approach

被引:6
作者
Balakrishnan, M
Puliafito, A
Trivedi, K
Viniotis, Y
机构
[1] UNIV CATANIA,INST INFORMAT,I-95125 CATANIA,ITALY
[2] DUKE UNIV,DEPT ELECT & COMP ENGN,DURHAM,NC 27708
[3] N CAROLINA STATE UNIV,DEPT ELECT & COMP ENGN,RALEIGH,NC 27695
关键词
Buffer Size; Output Buffer; Output Link; Markovian Arrival Process; Virtual Path;
D O I
10.1023/A:1019164110511
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The B-ISDN will carry a variety of traffic types: the Variable Bit Rate traffic (VER), of which compressed video is an example, Continuous Bit Kate traffic (CBR:), of which telemetry is an example, Data traffic, and Available Bit Rate traffic (ABR) that represents aggregate data traffic with very limited guarantees on quality. Of these, VER and CBR have timing constraints and need synchronous bandwidth; data traffic is relatively delay insensitive. In this paper, we consider the VER, Data and ABR traffic types and obtain the cumulative distribution function (cdf) of the queueing delay experienced by a burst of ABR traffic in the output buffer of an ATM switch. The cdf is used to trade off buffer loss probabilities against deadline violation probabilities through adjusting the buffer size and (delay) deadline values. Large buffers result in low losses but queueing delays can become excessive and cause a high level of deadline violations. Both losses and violations are detrimental and an operating point must be chosen to achieve a balance. In this paper we study the nature of the trade off. We develop a stochastic Petri net model assuming periodic burst arrivals for VER and Poisson arrival processes for the Data and ABR traffic types at the burst level; and solve the model analytically (numerically) using a decomposition approach. This decomposition, along with the inherent decomposability of the tagged customer approach for obtaining the cdf opens up a possibility of carrying out fast computations using a parallel machine for selecting the operating point each time that a call is admitted.
引用
收藏
页码:105 / 123
页数:19
相关论文
共 14 条
[1]  
CIARDO G, 1989, 3RD P INT WORKSH PET, P142
[2]  
Demers A., 1990, Internetworking: Research and Experience, V1, P3
[3]  
Fischer W, 1992, PERFORM EVALUATION, V18, P149
[4]  
GOLESTANI SJ, 1990, SEP P ACM SIGCOMM 90, P8
[5]  
GROVENSTEIN LW, 1994, IEEE NETWORK, V8, P20
[6]  
HANDEL R, 1991, INTEGRATED BROADBAND
[7]   2 VACATION MODELS FOR TOKEN-RING NETWORKS WHERE SERVICE IS CONTROLLED BY TIMERS [J].
LEUNG, KK ;
LUCANTONI, DM .
PERFORMANCE EVALUATION, 1994, 20 (1-3) :165-184
[8]  
LUCANTONI DM, 1994, STOCHASTIC MODELS, V10
[9]  
McKenney P. E., 1991, Internetworking: Research and Experience, V2, P113
[10]  
MUPPALA JK, 1994, ANN OPER RES, V48, P267