Current Search: Telecommunication--Traffic (x)
View All Items
- Title
- Analysis of multiplexed ATM traffics: A large-deviation theoretic approach.
- Creator
- Palaniappa, Malathi., Florida Atlantic University, Neelakanta, Perambur S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
ATM multiplexing, (which is essentially a statistical multiplexing process with priority constraints) leads to a departure pattern of cells on the trunk (or bearer) line, characterized by the profiles of incoming traffics at the multiplexer. Such profiles are decided by the bit-rate variations and workload fluctuations of the associated sources, namely voice, data and video of the cells. Bit rate statistics of incoming traffic with priority constraints decide the clustered and/or non...
Show moreATM multiplexing, (which is essentially a statistical multiplexing process with priority constraints) leads to a departure pattern of cells on the trunk (or bearer) line, characterized by the profiles of incoming traffics at the multiplexer. Such profiles are decided by the bit-rate variations and workload fluctuations of the associated sources, namely voice, data and video of the cells. Bit rate statistics of incoming traffic with priority constraints decide the clustered and/or non-clustered epochs of cells on the multiplexed fine. If the incoming traffic is delay-sensitive, it gets the priority in the multiplexing strategy and the associated cells inbiting no clusters; whereas, the non-isochronous traffics (facing low priority flow service) induce stagnation in the queue and pose eventually a clustered structure of cells on the trunk line. Workload fluctuation is largely application-dependent. The corresponding teletraffic statistics would also show deviations in the performance from the mean-field regime. In essence, the cell-stream departing from ATM multiplexer would exhibit statistics of deviations. In the present study, the associated delay parameter is considered and modeled under constant and variable bit rate conditions for fluctuating workloads. Mean-field theory is applied in modeling constant bit rate traffics. For variable and bursty rate transmissions, it is shown that the delay is governed by a non-homogeneous compound Poisson process. Relevant statistical bounds are established via large-deviation theory. Determination of the bounds of ATM cell-delay variations is important in developing call admission control algorithms.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15737
- Subject Headings
- Asynchronous transfer mode, Telecommunication--Traffic, Multiplexing
- Format
- Document (PDF)
- Title
- A traffic design tool for microcellular voice communication systems.
- Creator
- Koutras, Nicholas S., Florida Atlantic University, Kostopoulos, George, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The primary objective of this thesis is to design and construct a program which will permit the user to obtain immediate results for a microcellular communication traffic engineering problem, although he may not have a thorough knowledge of telephone environment. The program is related to multi-channel, trunked communication systems, and it associates the number of channels and users as a function of system grade of service by implementing Poisson, Erlang B, Erland C and Crommelin-Pollaczek...
Show moreThe primary objective of this thesis is to design and construct a program which will permit the user to obtain immediate results for a microcellular communication traffic engineering problem, although he may not have a thorough knowledge of telephone environment. The program is related to multi-channel, trunked communication systems, and it associates the number of channels and users as a function of system grade of service by implementing Poisson, Erlang B, Erland C and Crommelin-Pollaczek traffic models. The user will be able to choose between the different traffic models mentioned above via a menu. Then he will be asked to enter the parameters for the unknown variable(s) he wants to find. At this point, he will have to enter some other parameter values for which he is designing, and finally, the computer program will give the desired results (i.e., the number of servers needed, possible total traffic offered to the system, probability of loss or delay).
Show less - Date Issued
- 1988
- PURL
- http://purl.flvc.org/fcla/dt/14509
- Subject Headings
- Telecommunication--Traffic, Queuing theory, Telephone, Wireless
- Format
- Document (PDF)
- Title
- Studies on traffic characteristics in asynchronous transfer mode telecommunications.
- Creator
- Abeygunawardana, Sumudi Man., Florida Atlantic University, Neelakanta, Perambur S., Hsu, Sam
- Abstract/Description
-
This thesis is concerned with an outline survey on the modern aspects of asynchronous transmission mode (ATM) telecommunication; also considered are certain specific issues such as the performance characteristics of ATM-based telecommunication networks under fluctuating workloads. Estimation of the stochasticity of the jitter associated with the cell-delay arising out of buffering within the network as well as due to signal-to-noise considerations which induce bit-errors and eventually lead...
Show moreThis thesis is concerned with an outline survey on the modern aspects of asynchronous transmission mode (ATM) telecommunication; also considered are certain specific issues such as the performance characteristics of ATM-based telecommunication networks under fluctuating workloads. Estimation of the stochasticity of the jitter associated with the cell-delay arising out of buffering within the network as well as due to signal-to-noise considerations which induce bit-errors and eventually lead to cell-losses manifesting as delay(s) in the cells being transmitted, is also addressed as a part of this thesis efforts. Relevant theoretical models are proposed, algorithms are developed and simulations are done on the above considerations. Based on these efforts, inferential conclusions are drawn and discussed. Scope for future research and developments towards engineering design of softwares suitable for practical applications by ATM networking planners and traffic forecasters is indicated. Merits and shortcomings of the models are proposed and algorithmic approaches pursued in the present study are also specified with relevant discussions.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15247
- Subject Headings
- Asynchronous transfer mode, Telecommunication--Traffic, Telematics
- Format
- Document (PDF)
- Title
- Virtual leaky bucket for congestion control in high-speed ATM networks.
- Creator
- AlFadhel, Fahad A., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
High speed ATM networks support a variety of communication services, that have different traffic characteristics, which causes the network to be congested quickly. An ATM network with different communication services, data, voice and video, is simulated to study the effect of congestion on network operation. A modified leaky bucket mechanism is used to shape the traffic entering the network, which improved the performance in terms of cell losses and cell delay. The original leaky bucket...
Show moreHigh speed ATM networks support a variety of communication services, that have different traffic characteristics, which causes the network to be congested quickly. An ATM network with different communication services, data, voice and video, is simulated to study the effect of congestion on network operation. A modified leaky bucket mechanism is used to shape the traffic entering the network, which improved the performance in terms of cell losses and cell delay. The original leaky bucket mechanism is so conservative, that it drops a large number of ATM cells. Another scheme called virtual leaky bucket is proposed in this thesis. In this scheme violating cells are marked and then allowed to enter the network. The scheme is simulated and its performance is compared to the leaky bucket mechanism. Shaped virtual leaky bucket with marking is shown to have much better performance as long as the minimum requirements of non-violating cells are guaranteed.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15644
- Subject Headings
- Asynchronous transfer mode, Telecommunication--Traffic, Computer networks
- Format
- Document (PDF)
- Title
- A study on ATM multiplexing and threshold-based connection admission control in connection-oriented packet networks.
- Creator
- Yuan, Xiaohong., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The research reported in this dissertation studies ATM multiplexing and connection admission control schemes for traffic management in connection-oriented packet networks. A new threshold-based connection admission control scheme is proposed and analyzed. The scheme uses effective bandwidth to make decision whether to accept or reject the connection request. This threshold specified effective-bandwidth method is first simulated on a simple 4-node connection-oriented packet network model, and...
Show moreThe research reported in this dissertation studies ATM multiplexing and connection admission control schemes for traffic management in connection-oriented packet networks. A new threshold-based connection admission control scheme is proposed and analyzed. The scheme uses effective bandwidth to make decision whether to accept or reject the connection request. This threshold specified effective-bandwidth method is first simulated on a simple 4-node connection-oriented packet network model, and then extended to a more complex 8-node network model under a variety of environments. To reduce the cell-loss ratio when the arrival rates of the connection requests are large, the dynamic effective bandwidth mechanism is proposed and relevant simulations are addressed on the two network models. The traffic used in the simulation is a multiplexed stream of cells from video, voice and data sources, which is typical in ATM environments. The multiplexed traffic is generated using a discrete event scheduling method. The simulation programs for the 4-node network model and for the 8-node network model are verified by the theoretical values of the blocking probabilities of the connection requests, and Little's Theorem. Simulations on the two network models show similar results. Pertinent to a network that supplying several service categories, the threshold-based connection admission control is shown to affect the blocking probabilities of each type of traffic. In some environments, having a threshold is advantageous over the case without a threshold in terms of cell-loss ratio, cell transfer delay and power (throughput divided by cell transfer delay). The simulation results also show that the dynamic effective bandwidth based method helps to reduce the cell-loss ratio significantly when the arrival rates of the connection requests are large.
Show less - Date Issued
- 2000
- PURL
- http://purl.flvc.org/fcla/dt/12647
- Subject Headings
- Asynchronous transfer mode, Packet switching (Data transmission), Telecommunication--Traffic
- Format
- Document (PDF)
- Title
- A second order leaky bucket algorithm for traffic shaping in ATM networks.
- Creator
- Bansal, Atul., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
Asynchronous Transfer Mode (ATM) Networks are based on connections that are multiplexed dynamically on a single link. For satisfactory performance in an ATM network, congestion control is extremely necessary to guarantee the negotiated Quality of Service (QoS) for every connection. Traffic shaping is a congestion control mechanism that alters the traffic characteristics of a stream of cells on a connection to achieve better network efficiency by meeting the QoS objectives. We study a model...
Show moreAsynchronous Transfer Mode (ATM) Networks are based on connections that are multiplexed dynamically on a single link. For satisfactory performance in an ATM network, congestion control is extremely necessary to guarantee the negotiated Quality of Service (QoS) for every connection. Traffic shaping is a congestion control mechanism that alters the traffic characteristics of a stream of cells on a connection to achieve better network efficiency by meeting the QoS objectives. We study a model for Traffic Shaping, Second Order Leaky Bucket, which consists of two leaky buckets to police the Sustained Cell Rate (SCR) and Burst Tolerance (BT) for each ATM connection. With this algorithm, ATM cells enter the first leaky bucket and the Cells conforming to the first leaky bucket enter the ATM network with Cell Loss Priority set to zero (CLP = 0). Any cell non-conforming to the first leaky bucket is sent to a second leaky bucket, and will be tagged CLP = 1 only if found to be non-conforming to the second leaky bucket. Cells conforming to the second leaky bucket are allowed to enter the ATM network with CLP = 0. We simulate the second-order leaky bucket for traffic shaping and show the effectiveness of second order leaky bucket in protecting the QoS experienced by connections passing through a common internodal link queue.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15607
- Subject Headings
- Asynchronous transfer mode, Telecommunication--Traffic, Computer networks
- Format
- Document (PDF)