Premium
Bursty ATM user traffic allowed by a jitter tolerant leaky bucket and its impact on link utilization
Author(s) -
Heiss Herbert
Publication year - 1994
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.4500070302
Subject(s) - jitter , leaky bucket , token bucket , computer science , asynchronous transfer mode , computer network , queueing theory , quality of service , asynchronous communication , traffic shaping , real time computing , transfer (computing) , network traffic control , telecommunications , operating system , network packet
In a network based on the asynchronous transfer mode (ATM), quality of service requirements have to be met even in the presence of users who send traffic as bursty as the policing device allows. For peak cell rate policing with a jitter tolerant leaky bucket, a periodic maximally bursty traffic pattern allowed by the leaky bucket is derived. The impact of this kind of bursty user traffic on the cell loss performance of the remaining sources is investigated by introducing, solving and applying the queueing model Geo( n ) + P / D /1/ K , where P stands for ‘periodic’. Taking bursty user traffic into account, it is shown that the maximal jitter or cell delay variation allocated to the user and tolerated by the leaky bucket is an important parameter for link utilization. The results help to answer the question under which conditions a shaping function is needed in conjunction with the usage parameter control function.