DocumentCode
310959
Title
Enforcement mechanisms for priority traffic in ATM networks
Author
Pang, Qixiang ; Cheng, Shiduan
Author_Institution
Nat. Lab. of Switching Technol. & Telecommun. Networks, Beijing Univ. of Posts & Telecommun., China
fYear
1997
fDate
12-14 Apr 1997
Firstpage
126
Lastpage
130
Abstract
Traditional traffic policing mechanisms such as “leaky bucket”, “window” and “delta policing” can only police traffic with a single class of cells. But it is possible that there are different priority-classes of cells in one connection (VC/VP) in ATM networks. Six mechanisms for policing traffic with different priorities of cells are presented. All of them are variants of the original “leaky bucket”. They are different from each other in the following aspects: cell buffer sharing, token grabbing, FIFO and HOL effect. Their performance evaluations are obtained through simulations. The study results can provide a helpful guideline for access control of priority traffic
Keywords
asynchronous transfer mode; buffer storage; queueing theory; telecommunication networks; telecommunication traffic; ATM networks; FIFO; HOL effect; VC/VP connection; access control; cell buffer sharing; cell priorities; delta policing; enforcement mechanisms; leaky bucket; performance evaluations; priority classes; priority traffic; simulations; token grabbing; window; Asynchronous transfer mode; Communication system traffic control; Electronic mail; Guidelines; Intelligent networks; Laboratories; Telecommunication switching; Telecommunication traffic; Traffic control; Virtual colonoscopy;
fLanguage
English
Publisher
ieee
Conference_Titel
Southeastcon '97. Engineering new New Century., Proceedings. IEEE
Conference_Location
Blacksburg, VA
Print_ISBN
0-7803-3844-8
Type
conf
DOI
10.1109/SECON.1997.598625
Filename
598625
Link To Document