Abstract
Broadband networks (B-ISDN) based on the ATM technology are designed to support a wide variety of services characterised by heterogeneous ATM traffic descriptors and Quality of Service (QoS) parameters. According to the ATM-Forum User Network Interface Specification, an ATM connection can be characterised by four parameters, the Peak Cell Rate, the Cell Delay Variation tolerance, the Sustainable Cell Rate and the Burst tolerance. User Parameter Control and Connection Admission Control algorithms should consider all the above traffic parameters for effective network management. However, there is a large number of traffic patterns that can be characterised by the same four parameters. Supposing that no additional information is known about the traffic profiles of the incoming streams, the CAC mechanisms should consider the worst traffic profiles, so that the ATM network will be able to efficiently allocate resources and satisfy its QoS commitments.
This paper evaluates the worst traffic profile of an ATM connection which is characterised by four parameters. Such a traffic stream can pass through the Leaky Bucket policing algorithms of an ATM UNI as conformant and have the worst implications on the ATM networks performance. The mean and squared coefficient of variation of the inter-cell times of the worst traffic profile are estimated and the statistical behaviour of the traffic pattern is modelled by the Generalised Geometric distribution.
Chapter PDF
Similar content being viewed by others
Keywords
References
ITU-T Recommendation I.371,“Traffic Control and Resource Management in B-ISDN”, 1992.
ATM-Forum, “ATM - User Network Interface Specification”, Version 3. 0, 1993.
G. Niestegge, “The Leaky Bucket policing method in the ATM Network”, Intern. Journ. of Digital and Analog Communic. Sys.,Vol. 3, pp 187–197, 1990.
COST 224, “Information technologies and sciences, Performance evaluation and design of multiservice networks”, ed. J.W.Roberts, EEC public.,. 1991.
F. Guillemin, J.W. Roberts, “Jitter and Bandwidth Enforcement”, GLOBECOM’91.
A. Skliros, “Dimensioning the CDV tolerance parameter (T) for ATM multiplexers”, 10th UK Teletraffic Symposium, IEE, April 1993.
A. Skliros, “Characterisation of the worst traffic pattern departing from an ATM leaky bucket ”, 1st Workshop on Perf. Model. and Evaluation of ATM Networks, IFIP, Univ. Bradford, June 1993.
A. Skliros, “A Connection Admission Control algorithm for ATM traffic distorted by Cell Delay Variation”, 14th Intern. Teletraffic Congress, France, Elsevier, June 1994.
D.D. Kouvatsos, N.M. Tabet-Aouel,“GGeo-type approximations for general discrete-time queueing systems”, Proc. of IFIP Workshop on Modelling and Performance Evaluation of ATM Technology, La Martinique, H.Perros et al.(eds), Elsevier, Jan. 1993.
D.D. Kouvatsos, “Maximum Entropy methods for general queueing networks”, Proc. Model. Tech. and Tools for Perf. Anal., ed. D.Potier, North-Holland, pp. 589–608, 1985.
D.D. Kouvatsos, N.M.Tabet-Aouel, S.G.Denazis, “Approximate analysis of discrete-time networks with blocking”, in High Speed Networks, 5th Intern. Conf. on Data Comp. Sys. and Performance, Raleigh-USA, Nov. 1993.
D.D. Kouvatsos, “Maximum Entropy and the G/G/1/N queue”, Acta Informatica, Vol. 23, pp. 545–565, 1986.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Skliros, A. (1995). Characterising the Worst Traffic Profile Passing Through an ATM-UNI. In: Kouvatsos, D.D. (eds) Performance Modelling and Evaluation of ATM Networks. ATM 1994. IFIP — The International Federation for Information Processing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34881-0_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-34881-0_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6164-1
Online ISBN: 978-0-387-34881-0
eBook Packages: Springer Book Archive