Approximation of Loss Probability for Multiplexing System with Large Number of On-off Sources Regulated by Leaky Bucket

نویسندگان

  • Shoji Kasahara
  • Toshiharu Hasegawa
چکیده

This paper considers the loss probability of the multiplexing system with the large size of the buffer and the large number of homogeneous ON-OFF sources. We model the multiplexing system as the fluid queueing system with the regulated input fluid traffic. Each traffic generated by an ON-OFF source (original traffic) is regulated by the leaky bucket and aggregated output traffic (regulated traffic) flows into the buffer of the multiplexer. Using the CDE approximat,ion method, which consists of the loss probability for the bufferless system and that for the system with the large buffer, we explicitly derive the approximated probability of the buffer overflow for the multiplexing system. Our result includes the two important parameters of the leaky bucket; the size of a token pool and the token generation rate. Hence, our result provides the significant indication for designing the input source regulator with the leaky bucket.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiple Time Scale Regulation and Worst Case

Recent research on congestion control in high speed ATM networks has sought to extract statistical multiplexing eeciencies while guaranteeing quality of service. To facilitate network control, traac regulators are positioned at network edges, with Leaky Bucket regulation ubiquitous. We consider the composite of conventional Leaky Bucket regulators, one for each time scale. Over longer time scal...

متن کامل

Multiplexing Regulated Traffic Streams: Design and Performance

The main network solutions for supporting QoS rely on traffic policing (conditioning, shaping). In particular, for IP networks the IETF has developed Intserv (individual flows regulated) and Diffserv (only aggregates regulated). The regulator proposed could be based on the (dual) leaky-bucket mechanism. This explains the interest in network element performance (loss, delay) for leaky-bucket reg...

متن کامل

Measurement Based Optimal Source Shaping with a Shaping+Multiplexing Delay Constraint

Most on-line (i.e., not stored) Variable Bit Rate sources would find it difficult to a priori declare the traffic parameters required by a connection admission control strategy. There is thus the problem of measurement based on-line estimation of source parameters. In this paper we address the problem of selection of source parameters based on minimising a bufferbandwidth cost function in the n...

متن کامل

Measurement Based Optimal Source Shaping with a Shaping+Multiplexing Delay Constraint - INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies

Most on-line (i.e., not stored) Variable Bit Rate sources would find it difficult to a priori declare the traffic parameters required by a connection admission control strategy. There is thus the problem of measurement based on-line estimation of source parameters. In this paper we address the problem of selection of source parameters based on minimising a bufferbandwidth cost function in the n...

متن کامل

A New Approach for Allocating Buffers and Bandwidth to Heterogeneous Regulated Traffic in an ATM Node

A new approach to determining the admissibility of variable bit rate (VBR) traffic in buffered digital networks is developed. In this approach all traffic presented to the network is assumed to have been subjected to leaky-bucket regulation, and extremal, periodic, on-off regulated traffic is considered; the analysis is based on fluid models. Each regulated traffic stream is allocated bandwidth...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997