• DocumentCode
    310959
  • Title

    Enforcement mechanisms for priority traffic in ATM networks

  • Author

    Pang, Qixiang ; Cheng, Shiduan

  • Author_Institution
    Nat. Lab. of Switching Technol. & Telecommun. Networks, Beijing Univ. of Posts & Telecommun., China
  • fYear
    1997
  • fDate
    12-14 Apr 1997
  • Firstpage
    126
  • Lastpage
    130
  • Abstract
    Traditional traffic policing mechanisms such as “leaky bucket”, “window” and “delta policing” can only police traffic with a single class of cells. But it is possible that there are different priority-classes of cells in one connection (VC/VP) in ATM networks. Six mechanisms for policing traffic with different priorities of cells are presented. All of them are variants of the original “leaky bucket”. They are different from each other in the following aspects: cell buffer sharing, token grabbing, FIFO and HOL effect. Their performance evaluations are obtained through simulations. The study results can provide a helpful guideline for access control of priority traffic
  • Keywords
    asynchronous transfer mode; buffer storage; queueing theory; telecommunication networks; telecommunication traffic; ATM networks; FIFO; HOL effect; VC/VP connection; access control; cell buffer sharing; cell priorities; delta policing; enforcement mechanisms; leaky bucket; performance evaluations; priority classes; priority traffic; simulations; token grabbing; window; Asynchronous transfer mode; Communication system traffic control; Electronic mail; Guidelines; Intelligent networks; Laboratories; Telecommunication switching; Telecommunication traffic; Traffic control; Virtual colonoscopy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Southeastcon '97. Engineering new New Century., Proceedings. IEEE
  • Conference_Location
    Blacksburg, VA
  • Print_ISBN
    0-7803-3844-8
  • Type

    conf

  • DOI
    10.1109/SECON.1997.598625
  • Filename
    598625