Title :
Enforcement mechanisms for priority traffic in ATM networks
Author :
Pang, Qixiang ; Cheng, Shiduan
Author_Institution :
Nat. Lab. of Switching Technol. & Telecommun. Networks, Beijing Univ. of Posts & Telecommun., China
Abstract :
Traditional traffic policing mechanisms such as “leaky bucket”, “window” and “delta policing” can only police traffic with a single class of cells. But it is possible that there are different priority-classes of cells in one connection (VC/VP) in ATM networks. Six mechanisms for policing traffic with different priorities of cells are presented. All of them are variants of the original “leaky bucket”. They are different from each other in the following aspects: cell buffer sharing, token grabbing, FIFO and HOL effect. Their performance evaluations are obtained through simulations. The study results can provide a helpful guideline for access control of priority traffic
Keywords :
asynchronous transfer mode; buffer storage; queueing theory; telecommunication networks; telecommunication traffic; ATM networks; FIFO; HOL effect; VC/VP connection; access control; cell buffer sharing; cell priorities; delta policing; enforcement mechanisms; leaky bucket; performance evaluations; priority classes; priority traffic; simulations; token grabbing; window; Asynchronous transfer mode; Communication system traffic control; Electronic mail; Guidelines; Intelligent networks; Laboratories; Telecommunication switching; Telecommunication traffic; Traffic control; Virtual colonoscopy;
Conference_Titel :
Southeastcon '97. Engineering new New Century., Proceedings. IEEE
Conference_Location :
Blacksburg, VA
Print_ISBN :
0-7803-3844-8
DOI :
10.1109/SECON.1997.598625