Abstract
According to ITU Rec. I.371 (see [1])/usage parameter control (UPC) “is the set of actions taken by the network to monitor and control traffic, in terms of traffic offered and validity of the ATM connection at the user access network”. In other words, after a connection is accepted by the network using a connection admission control (CAC) procedure, it must be ensured that network resources are protected from malicious or unintentional misbehaviour of the source producing the call, which can affect the quality of service (QoS) of other calls already estabhshed in the network. This is the job of the UPC function, sometimes also called traffic policing and access control, situated at the access point to the network, i.e. the user Network interface (UNI). Typical locations for the UPC function include the entrances to a local switching node and a cross-connect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ITU-T (CCITT) recommendation I.371 Trajfic Control and Congestion Control in B-ISDN, 1993
Saito H, Teletrajfic Technologies in ATM Networks, Artech House, 1994
Buttò M, Cavaliere E and Tonietti A, Effectiveness of the Leaky Bucket Policing Mechanism in ATM Networks, IEEE Selected Areas in Communications, 9, (3), 335–42, 1991
Cuthbert L G and Sapanel J-C, ATM, The Broadband Telecommunications Solution, lEE Telecom. Series 29, 1993
ATM Forum: Leaky Bucket Based UPC Algorithms, Doc No 92–256, November 1992
ATM Forum: Performance Analysis of GCRA for CBR Sources, Doc No 94–0182, March 1994
Mark B L and Ramamurthy G, UPC Based Traffic Descriptors for ATM: How to determine, interpret and use them. Proceedings of the ATM Traffic Expert Symposium, Basel, Switzerland, April 1995
Onvural R O, Asynchronous Transfer Mode Networks: Performance Issues, Artech House, 1994
Ahmadi H R, Guérin R and Sohraby K, Analysis of Leaky Bucket Access Control Mechanisms with Batch Arrival Process, GLOBECOM, 1990
Castelli P, Cavaliere E and Tonietti A, Policing and Call Admission Problems in ATM Networks, ITC-13, 1991, 847–52
Chao H J, Design of Leaky Bucket Access Control Schemes in ATM Networks, ICC ’91, 1991, 180–87
Rathgeb E P, Modelling and Performance Comparison of Policing Mechanisms for ATM Networks, IEEE Journal on Selected Areas in Communications, 9, (3), April 1991, 325–34
Kim Y H, Shin B C and Un C K, Performance Analysis of Leaky-Bucket Bandwidth Enforcement Strategy for Bursty Traffics in an ATM Network, Computer Networks and ISDN Systems, 25, (3), 1992, 295–303
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 John Wiley & Sons Ltd. and B.G. Teubner
About this chapter
Cite this chapter
Killat, U. (1996). Usage Parameter Control. In: Killat, U. (eds) Access to B-ISDN via PONs. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-82999-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-322-82999-3_6
Publisher Name: Vieweg+Teubner Verlag
Print ISBN: 978-3-322-83001-2
Online ISBN: 978-3-322-82999-3
eBook Packages: Springer Book Archive