首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A bursty traffic model is introduced in this paper to describe the statistical characteristics of packet video. The performance of leady bucket algorithm with bursty traffic input is analyzed. The influences of various parameters on QOS (Quality of Service) are investigated. The analysis shows that although the loss probability decreases through expanding the buffer capacity, the delay and delay jitter increase, whose effect on QOS will not be negligible.  相似文献   

2.
The available bit rate (ABR) service class is a solution for the integration of data traffic in asynchronous transfer mode networks. Many algorithms have been proposed to implement ABR services. The authors present simulation results showing poor performance by a common ABR algorithm when supporting TCP bursty traffic. As a solution to this problem, the authors propose time averaging of the parameters calculated by the ABR algorithms  相似文献   

3.
Delay-bounded packet scheduling of bursty traffic over wireless channels   总被引:4,自引:0,他引:4  
In this paper, we study minimal power transmission of bursty sources over wireless channels with constraints on mean queuing delay. The power minimizing schedulers adapt power and rate of transmission based on the queue and channel state. We show that packet scheduling based on queue state can be used to trade queuing delay with transmission power, even on additive white Gaussian noise (AWGN) channels. Our extensive simulations show that small increases in average delay can lead to substantial savings in transmission power, thereby providing another avenue for mobile devices to save on battery power. We propose a low-complexity scheduler that has near-optimal performance. We also construct a variable-rate quadrature amplitude modulation (QAM)-based transmission scheme to show the benefits of the proposed formulation in a practical communication system. Power optimal schedulers with absolute packet delay constraints are also studied and their performance is evaluated via simulations.  相似文献   

4.
The periodic cell stream is a very important member among the input traffic sources in ATM networks. In this paper, a finite-buffered ATM multiplexer with traffic sources composed of a periodic cell stream, multiple i.i.d Bernoulli cell streams and bursty two-state Markov Modulated Bernoulli Process (MMBP) cell streams is exactly analyzed. The probability mass function of queuing delay, the autocorrelation and power spectrum of delay jitter for this periodic cell stream are derived. The analysis is used to expose the behavior of delay jitter for a periodic cell stream through an ATM multiplexer in a bursty traffic environment. The simulation results indicate that the analytical results are accurate.  相似文献   

5.
This paper introduces two source models: MAP(Markovian arrival process) model for the traffic with correlation and burst, e.g., voice, video, etc. and PAP(Poisson arrival process) model for the traffic with non-correlation, such as data, etc. Then a movable boundary bandwidth access policy is chosen.Basing on above model, the performance measures, e.g., mean waiting time and loss probability,especially the queue length time distribution are obtained. Finally, a number of numerical results are provided and shown through simulation.  相似文献   

6.
The Data Vortex switch architecture has been proposed as a scalable low-latency interconnection fabric for optical packet switches. This self-routed hierarchical architecture employs synchronous timing and distributed traffic-control signaling to eliminate optical buffering and to reduce the required routing logic, greatly facilitating a photonic implementation. In previous work, we have shown the efficient scalability of the architecture under uniform and random traffic conditions while maintaining high throughput and low-latency performance. This paper reports on the performance of the Data Vortex architecture under nonuniform and bursty traffic conditions. The results show that the switch architecture performs well under modest nonuniform traffic, but an excessive degree of nonuniformity will severely limit the scalability. As long as a modest degree of asymmetry between the number of input and output ports is provided, the Data Vortex switch is shown to handle very bursty traffic with little performance degradation.  相似文献   

7.
In this letter, we analyze the performance of multiple input-queued asynchronous transfer mode (ATM) switches that use parallel iterative matching (PIM) for scheduling the transmission of head-of-line cells in the input queues. A queueing model of the switch is developed under independently, identically distributed, two-state Markov modulated Bernoulli processes bursty traffic. The underlying Markov chain of the queueing model is a quasi-birth-death (QBD) chain. The QBD chain is solved using an iterative computing method. Interesting performance metrics of the ATM switch such as the throughput, the mean cell delay, and the cell loss probability can be derived from the model. Numerical results from both the analytical model and simulation are presented, and the accuracy of the analysis is briefly discussed  相似文献   

8.
Packet contention is a major issue in an optical packet switching network. It is not a trivial task to resolve contention due to lack of optical RAM technology. This article proposes a two-stage shared fiber delay line (FDL) optical packet switch for contention resolution. In this article, shared FDLs are used to buffer optical packets, in which a pool of buffer memory is shared among all switch output ports. Most of the existing optical buffering schemes are output-based which require a huge number of FDLs as well as a larger switch size that incur extra implementation cost. However, a shared buffering approach is considered in this article in order to reduce implementation cost. In this article, FDLs are implemented in two stages using an extremely simple auxiliary switch. The proposed switch architecture leads to more efficient use of buffer space. The superiority of the proposed switch architecture has been established by means of extensive simulations. The performance of the proposed switch is investigated under bursty traffic. Simulation result shows that the proposed switch can achieve satisfactory performance at the price of a reasonable amount of FDLs. Moreover, the significance of the proposed switch is confirmed by simulation.  相似文献   

9.
Turner  J.S. 《IEEE network》1992,6(5):50-58
Three approaches to the bandwidth management problem that have been proposed and studied by various groups are reviewed to illustrate three distinctly different approaches and identify their strengths and weaknesses. Based on these approaches, a bandwidth management and congestion control scheme for asynchronous transfer mode (ATM) networks that supports both point-to-point and one-to-many multicast virtual circuits is proposed. It is shown that the method can handle fully heterogeneous traffic and can be effectively implemented. The algorithm for making virtual circuit acceptance decisions is straightforward and fast, and the hardware mechanisms needed to implement buffer allocation and traffic monitoring at the user-network interface have acceptable complexities. It is also shown, through numerical examples, that the approach can achieve reasonable link efficiencies even in the presence of very bursty traffic. No advance reservation required, simplifying the interface between the network and the user and avoiding an initial network round trip delay before data can be transmitted  相似文献   

10.
Consideration is given to the effects of time-multiplexed stream traffic on the performance of a store-and-forward packet switch. Substantially reducing the amount of buffering in the switch results in only a small probability that an existing circuit will be disrupted during the length of its connection. For example, with a circuit-switched frame of length 1000 and 100% loading, reducing the buffer size from 999 packets to 83 results in only a 10-6 circuit-disruption probability  相似文献   

11.
A statistical multiplexer supporting a number of bursty sources is modeled as a discrete time, single server queueing system with an infinite buffer. The probability generating function (PGF) method is used to analyze the queueing behavior. The PGF method requires the determination of a large number of boundary values and, hence, the roots of the characteristic equation. An iterative algorithm to evaluate the characteristic roots is proposed. When the arrival process is a superposition of independent processes, a decomposition approach is used to reduce the state space involved in the computational algorithm. Additionally, the computational algorithm is made efficient through the establishment of conditions under which all the roots are either real or nonnegative real numbers. A set of equations to recursively compute the moments of the queue length are established. Sample applications of the computational methods to evaluate the performance of a multiplexer supporting voice and video sources, modeled by two-state Markov and L-state MMPP processes, respectively, demonstrate the viability of the proposed methods  相似文献   

12.
针对采用共享缓存(shared memory)做为交换机构(switching fabric)的输入输出排队交换机,该文给出了一个分布式分组调度方法DHIOS(Distriduted Hierarchical Ingress and OutputScheduling)并做了详细的仿真。表明DHIOS可以支持变长分组,能够确保业务流的QoS,性能优良。  相似文献   

13.
This work studies the performance of a nonblocking space-division packet switch in a correlated input traffic environment. In constructing the input traffic model, the author considers that each input is a time division multiaccess (TDM) link connecting to multiple sources. Every source on a link supports one call at a time. Each call experiences the alternation of ON and OFF periods, and generates packets periodically while in ON period. The stochastic property of each call does not have to be identical. Packets from each individual call are destined to the same output. The output address of each call is assumed to be uniformly assigned at random. The author derives both upper and lower bounds of the maximum throughput at system saturation. His study indicates that, if the source access rate is substantially lower than the link transmission rate, the effect of input traffic correlation on the output contentions can generally be ignored. Also, the analysis of each input queue becomes separable from the rest of the switch. The same study is carried out with nonuniform call address assignment  相似文献   

14.
This paper presents new research results of the DARPA-funded ONRAMP consortium on the next generation Internet to study efficient WDM-based network architectures and protocols for supporting broadband services in regional access networks. In particular, we present new efficient scheduling algorithms for bandwidth sharing in WDM distribution networks. The current ONRAMP distribution network architecture has a tree topology with each leaf node (e.g., a router or workstation) sharing access to the root node of the tree, which corresponds to an access node in the feeder network. Our model allows a leaf node to use one or more fixed-tuned or tunable transceivers; moreover, different leaf nodes can support different subsets of wavelengths depending on their expected traffic volumes. An important goal of ONRAMP is to support bandwidth-on-demand services with QoS guarantee over WDM. As a first step toward this goal, we have developed several fast scheduling algorithms for flexible bandwidth reservations in a WDM distribution network. The scheduling algorithms can provably guarantee any bandwidth reservations pattern that does not overbook network resources, i.e., bandwidth reservation (throughput) up to 100% network capacity can be supported.  相似文献   

15.
The performance analysis of an input access scheme in a high-speed packet switch for broadband ISDN is presented. In this switch, each input port maintains a separate queue for each of the outputs, thus n 2 input queues in an (n×n) switch. Using synchronous operation, at most one packet per input and output will be transferred in any slot. We derive lower and upper bounds for the throughput which show close to optimal performance. The bounds are very tight and approach to unity for switch sizes on the order of a hundred under any traffic load, which is a significant result by itself. Then the mean packet delay is derived and its variance is bounded. A neural network implementation of this input access scheme is given. The energy function of the network, its optimized parameters and the connection matrix are determined. Simulation results of the neural network fall between the theoretical throughput bounds  相似文献   

16.
Admission control in asynchronous transfer mode (ATM) networks is considered. An ATM switch is modeled as a discrete-time single-server queue at which the following three different kinds of arrival processes are allowed to join together: arrivals of cells with a general interarrival time distribution; Bernoulli arrivals of cells in batches; and interrupted Poisson processes. An exact analysis is given to derive the waiting-time distributions and interdeparture-time distributions for arriving cells subject to admission control in ATM networks. The model is extended to approximately obtain the end-to-end delay distributions for the designated traffic stream. Such an analysis is important for voice or coded video because they require a playout mechanism at the destination. Since the analysis is approximate, the simulation results needed to assess its accuracy are provided. Numerical examples show how the traffic characteristics of the designated traffic stream are affected by the total traffic load at the switching node, the number of other bursty traffic sources, and the degree of burstiness of the traffic source itself  相似文献   

17.
The performance analysis of the 32?×?32 crosspoint-queued switch is presented in this paper. Switches with small buffers in crosspoints have been evaluated in the late 1980s but mostly for uniform traffic. However, due to technological limitations of that time, it was impractical to implement large buffers together with switching fabric. The crosspoint-queued switch architecture has been recently brought back into focus since modern technology enables an easy implementation of large buffers in crosspoints. An advantage of this solution is the absence of control communication between linecards and schedulers. In this paper, the performances of four algorithms (longest queue first, round robin, exhaustive round robin, and frame-based round robin matching) are analyzed and compared. The results obtained for the crosspoint-queued switch are compared with the output queued switch. Throughput, average cell latency and instantaneous packet delay variance are evaluated under uniform and nonuniform traffic patterns. The results will show that the longest queue first algorithm has the highest throughput in many simulated cases but the highest average cell latency and delay variance among observed algorithms. It will also be shown that the choice of the scheduling algorithm does not play a role in the switch performance if the buffers are long enough. This will prove that some form of round-robin-based algorithms become a better choice for implementation due to their simplicity, small hardware requirements, and avoidance of the starvation problem, which is a major drawback of the longest queue first algorithm.  相似文献   

18.
Among various cell scheduling schemes for ATM networks, weighted round‐robin (WRR) seems a promising algorithm for explicit bandwidth allocation [15]. In this paper, we present a method for analyzing a discrete‐time queueing model of a statistical multiplexer with contiguous slot assignments, deterministic vacations, and bursty input sources, which serves as a bound analysis for WRR scheduling in ATM networks. Similar models have been studied as well in the context of TDMA (time division multiple access) schemes with multiple contiguous slots assigned per frame [3,16]. For the model under study, after establishing an expression for the probability generating function (pgf) of the system contents, we derive closed‐form expressions for performance measures such as the expected value, and an asymptotic approximation for the tail probabilities of the system contents distribution. Also, after examining the cell delay, we formulate the pgf of the cell delay in a closed form in terms of the system contents pgf. The numerical results obtained for the system contents and cell delay distributions illustrate that they match with simulation results extremely well, especially in the low probability area. We also discuss the impact of the slot assignment cycle of WRR on the system performance. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   

19.
The maximum throughput of an N×N nonblocking packet switch with input queues and two priority classes is analyzed. Packets are of fixed length and the switch operation is slotted. Packets of both priority classes are queued when waiting for service. High-priority packets preempt low-priority ones and move ahead of all low-priority packets waiting in the queue. A new method of analysis is employed. The calculated results of the maximum throughput obtained are close to the simulation results  相似文献   

20.
The performance of an asynchronous transfer mode (ATM) network subject to admission control and traffic smoothing is analyzed. Basically, an ATM switch is modeled as a discrete-time single-server queuing system in which a new call joins existing calls. Cell arrivals from a new call are assumed to follow a general distribution. It is also assumed that aggregated arrivals of cells from existing calls form batch arrivals with a general batch size distribution and a geometric distribution of the interarrival times between batches. Both finite- and infinite-buffer cases are considered. An exact analysis yields the waiting time distribution and cell loss probability for a new call and for existing calls. Numerical examples are given to show how the network performance depends on the statistics of a new call (burstiness, time that a call stays in an active or inactive state, etc.) and to demonstrate the effectiveness of admission control and traffic smoothing  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号