首页 > 最新文献

IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings最新文献

英文 中文
Architecture and design of connectionless data service for a public ATM network 公共ATM网络无连接数据业务的体系结构与设计
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253298
D. Box, D. Hong, T. Suda
The backward compatibility dilemma introduced by the deployment of a high-speed, wide-area asynchronous transfer mode (ATM) network is examined. The problem is that emerging ATM network must be capable of transporting traffic sources such as digital voice and video, but many of the design choices that optimize ATM for these sources make the transport of traditional connectionless data traffic difficult. The overlay of a virtual datagram network of connectionless servers onto a public ATM network to provide connectionless service is proposed to solve the problem. This method provides low transfer delay and efficiently utilizes network resources. Architectural issues are described, and an implementation of a connectionless server is presented.<>
研究了高速广域异步传输模式(ATM)网络部署所带来的向后兼容性问题。问题是,新兴的ATM网络必须能够传输诸如数字语音和视频等流量源,但是许多针对这些流量源优化ATM的设计选择使得传统的无连接数据流量的传输变得困难。为了解决这一问题,提出了将无连接服务器组成的虚拟数据报网络覆盖到公共ATM网络上,以提供无连接服务。该方法具有传输延迟低、有效利用网络资源的优点。描述了体系结构问题,并给出了无连接服务器的实现。
{"title":"Architecture and design of connectionless data service for a public ATM network","authors":"D. Box, D. Hong, T. Suda","doi":"10.1109/INFCOM.1993.253298","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253298","url":null,"abstract":"The backward compatibility dilemma introduced by the deployment of a high-speed, wide-area asynchronous transfer mode (ATM) network is examined. The problem is that emerging ATM network must be capable of transporting traffic sources such as digital voice and video, but many of the design choices that optimize ATM for these sources make the transport of traditional connectionless data traffic difficult. The overlay of a virtual datagram network of connectionless servers onto a public ATM network to provide connectionless service is proposed to solve the problem. This method provides low transfer delay and efficiently utilizes network resources. Architectural issues are described, and an implementation of a connectionless server is presented.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116367956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Fast connection establishment in large-scale networks 在大规模网络中快速建立连接
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253326
Willibald A. Doeringer, D. Dykeman, Antonius P. J. Engbersen, R. Guérin, A. Herkersdorf, L. Heusler
A hierarchical decomposition of network nodes which permits the networkwide topology database and algorithms to be independent of node internals, yet allows (implicit) access to special intranodal features when required is described. A complementary procedure for the establishment of bandwidth-reserved connections is outlined that makes efficient use of this node structure to support network-level optimization through use of node-level features. Based on a significantly increased concurrency of path computation and bandwidth reservation, the execution time of the setup procedure is independent of the network's complexity (such as number of nodes and links) and is essentially bounded from above by the round-trip delay only.<>
网络节点的分层分解允许网络范围的拓扑数据库和算法独立于节点内部,但在需要时允许(隐式)访问特殊的节点内特性。本文概述了建立带宽保留连接的补充过程,该过程有效地利用该节点结构,通过使用节点级特征来支持网络级优化。基于显著增加的路径计算并发性和带宽保留,设置过程的执行时间与网络的复杂性(如节点和链路的数量)无关,并且基本上只受往返延迟的限制。
{"title":"Fast connection establishment in large-scale networks","authors":"Willibald A. Doeringer, D. Dykeman, Antonius P. J. Engbersen, R. Guérin, A. Herkersdorf, L. Heusler","doi":"10.1109/INFCOM.1993.253326","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253326","url":null,"abstract":"A hierarchical decomposition of network nodes which permits the networkwide topology database and algorithms to be independent of node internals, yet allows (implicit) access to special intranodal features when required is described. A complementary procedure for the establishment of bandwidth-reserved connections is outlined that makes efficient use of this node structure to support network-level optimization through use of node-level features. Based on a significantly increased concurrency of path computation and bandwidth reservation, the execution time of the setup procedure is independent of the network's complexity (such as number of nodes and links) and is essentially bounded from above by the round-trip delay only.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132252476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis and implementation of a priority knockout switch 优先级淘汰开关的分析与实现
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253370
Joseph B. Evans, Edgardo Duron, Yizhen Wang
A priority knockout switch (PKS) architecture using priority based congestion control mechanisms is presented for broadband ISDN (BISDN) networks. This architecture provides the capability of assigning qualities of service to connections through per cell or virtual circuit priority mechanisms. Performance studies that use an analytical model for uniform traffic and simulation models for uniform and bursty traffic are presented. These studies indicate that the PKS architecture provides excellent cell loss rates for high priority traffic at minor expense to the low priority traffic. CMOS implementations of the switch modules that demonstrate the feasibility of the architecture are described.<>
提出了一种基于优先级的宽带ISDN (BISDN)网络拥塞控制机制的优先级淘汰开关(PKS)体系结构。该体系结构提供了通过每个单元或虚拟电路优先级机制为连接分配服务质量的能力。提出了使用均匀交通的解析模型和均匀交通和突发交通的仿真模型进行性能研究。这些研究表明,PKS体系结构为高优先级流量提供了极好的小区损失率,而对低优先级流量的损失很小。介绍了交换模块的CMOS实现,证明了该架构的可行性。
{"title":"Analysis and implementation of a priority knockout switch","authors":"Joseph B. Evans, Edgardo Duron, Yizhen Wang","doi":"10.1109/INFCOM.1993.253370","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253370","url":null,"abstract":"A priority knockout switch (PKS) architecture using priority based congestion control mechanisms is presented for broadband ISDN (BISDN) networks. This architecture provides the capability of assigning qualities of service to connections through per cell or virtual circuit priority mechanisms. Performance studies that use an analytical model for uniform traffic and simulation models for uniform and bursty traffic are presented. These studies indicate that the PKS architecture provides excellent cell loss rates for high priority traffic at minor expense to the low priority traffic. CMOS implementations of the switch modules that demonstrate the feasibility of the architecture are described.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116991300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Occupancy distribution of a DQDB station based on a queueing system with Markov-structured service requirements 基于马尔可夫结构服务需求排队系统的DQDB站占用分布
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253368
I. Stavrakakis, S. Tsakiridou
The queue occupancy distribution of the distributed queue-dual-bus (DQDB) station is derived through the formulation and exact analysis of a queuing model with the following characteristic: the packet service time requirements depends on the state of an underlying Markov-structured process at the time when the packet is forwarded to the server (head of the queue). Numerical results are presented and compared with simulation results to evaluate the accuracy of the involved approximations.<>
分布式队列双总线(DQDB)站的队列占用分布是通过对具有以下特征的队列模型的制定和精确分析得出的:数据包服务时间需求取决于底层马尔可夫结构进程在数据包转发到服务器(队列头部)时的状态。给出了数值结果,并与仿真结果进行了比较,以评价所涉及的近似的准确性。
{"title":"Occupancy distribution of a DQDB station based on a queueing system with Markov-structured service requirements","authors":"I. Stavrakakis, S. Tsakiridou","doi":"10.1109/INFCOM.1993.253368","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253368","url":null,"abstract":"The queue occupancy distribution of the distributed queue-dual-bus (DQDB) station is derived through the formulation and exact analysis of a queuing model with the following characteristic: the packet service time requirements depends on the state of an underlying Markov-structured process at the time when the packet is forwarded to the server (head of the queue). Numerical results are presented and compared with simulation results to evaluate the accuracy of the involved approximations.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116440285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A fundamental property for traffic management in ATM networks ATM网络中流量管理的基本性质
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253386
S. Liew, T. Lee
It is desirable that the traffic control policy at a network node depend on the external traffic loads on the input and output links, but not on the detailed addressing or distribution of packets from inputs to outputs. It should be possible to guarantee the grade of service of an input-output connection by controlling the aggregate loads on the input and output. Switch nodes in which such a traffic control policy is possible are said to have the property of the sufficiency of the knowledge of external loads (SKEL). The authors clarify issues related to SKEL and establish its feasibility for a generic switch node on a rigorous basis.<>
希望网络节点上的流量控制策略取决于输入和输出链路上的外部流量负载,而不取决于从输入到输出的数据包的详细地址或分布。通过控制输入和输出的总负荷,应该可以保证输入输出连接的服务等级。这种流量控制策略可能存在的交换节点被称为具有外部负载知识充分性(SKEL)的特性。作者澄清了与SKEL相关的问题,并在严格的基础上建立了通用交换节点的可行性。
{"title":"A fundamental property for traffic management in ATM networks","authors":"S. Liew, T. Lee","doi":"10.1109/INFCOM.1993.253386","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253386","url":null,"abstract":"It is desirable that the traffic control policy at a network node depend on the external traffic loads on the input and output links, but not on the detailed addressing or distribution of packets from inputs to outputs. It should be possible to guarantee the grade of service of an input-output connection by controlling the aggregate loads on the input and output. Switch nodes in which such a traffic control policy is possible are said to have the property of the sufficiency of the knowledge of external loads (SKEL). The authors clarify issues related to SKEL and establish its feasibility for a generic switch node on a rigorous basis.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123206129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Traffic characteristics of the T1 NSFNET backbone T1 NSFNET骨干网的流量特性
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253279
K. Claffy, George C. Polyzos, Hans-Werner Braun
The results of a measurement study of the T1 NSFNET backbone are presented. The measurement environment and the approach to data collection are discussed. Measurements results are then presented for: long-term growth in traffic volume, including attribution to domains and protocols; trends in average packet size on the network, over both long- and medium-term intervals; most popular sources, destinations, and site pairs; traffic locality; international distribution of traffic; mean utilization statistics of the overall backbone as well as of specific links of interest: and delay statistics.<>
本文介绍了对T1 NSFNET主干网的测量研究结果。讨论了测量环境和数据采集方法。测量结果然后提出:流量的长期增长,包括归因到域和协议;网络上平均数据包大小的趋势,在长期和中期的间隔;最受欢迎的资源、目的地和站点对;交通位置;交通的国际分布;总体骨干网的平均利用率统计以及特定感兴趣链路的平均利用率统计和时延统计
{"title":"Traffic characteristics of the T1 NSFNET backbone","authors":"K. Claffy, George C. Polyzos, Hans-Werner Braun","doi":"10.1109/INFCOM.1993.253279","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253279","url":null,"abstract":"The results of a measurement study of the T1 NSFNET backbone are presented. The measurement environment and the approach to data collection are discussed. Measurements results are then presented for: long-term growth in traffic volume, including attribution to domains and protocols; trends in average packet size on the network, over both long- and medium-term intervals; most popular sources, destinations, and site pairs; traffic locality; international distribution of traffic; mean utilization statistics of the overall backbone as well as of specific links of interest: and delay statistics.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123579045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 151
Calculating performance bounds in communication networks 通信网络中性能界限的计算
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253320
Opher Yaron, M. Sidi
A way to calculate the performance of packet switching communication networks under a fixed (session-based) routing strategy, based on properly bounding the probability distribution functions of the system input processes, is proposed. The bounds suggested, which are decaying exponentials, posses three convenient properties. When the inputs to an isolated network element are all bounded, they result in bounded outputs and ensure that the delays and queues in this element have exponentially decaying distribution. In some network settings, the bounded inputs result in bounded outputs. Finally, natural traffic processes can be shown to satisfy such bounds. These properties enable the calculation of upper bounds for all the interesting parameters of network performance, in a variety of settings.<>
提出了一种计算固定(基于会话)路由策略下分组交换通信网络性能的方法,该方法基于对系统输入过程的概率分布函数的适当限定。所建议的界是衰减指数,它具有三个方便的性质。当一个孤立的网络元素的输入都是有界的,它们会导致有界的输出,并确保该元素中的延迟和队列具有指数衰减分布。在某些网络设置中,有界输入导致有界输出。最后,可以证明自然交通过程满足这些边界。这些属性允许在各种设置下计算所有有趣的网络性能参数的上限。
{"title":"Calculating performance bounds in communication networks","authors":"Opher Yaron, M. Sidi","doi":"10.1109/INFCOM.1993.253320","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253320","url":null,"abstract":"A way to calculate the performance of packet switching communication networks under a fixed (session-based) routing strategy, based on properly bounding the probability distribution functions of the system input processes, is proposed. The bounds suggested, which are decaying exponentials, posses three convenient properties. When the inputs to an isolated network element are all bounded, they result in bounded outputs and ensure that the delays and queues in this element have exponentially decaying distribution. In some network settings, the bounded inputs result in bounded outputs. Finally, natural traffic processes can be shown to satisfy such bounds. These properties enable the calculation of upper bounds for all the interesting parameters of network performance, in a variety of settings.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Stability of a class of dynamic routing protocols (IGRP) 一类动态路由协议IGRP的稳定性
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253311
S. Low, P. Varaiya
An exact analysis of the dynamic behavior of IGRP, an adaptive shortest-path routing algorithm, is performed. The distance metric is a weighted sum of traffic-sensitive and traffic-insensitive delay components. The optimality and stability of the protocol is related to the ratio of the weights. In particular, it is shown that if the traffic-sensitive component is not given enough weight, then starting from any initial routing, the subsequent routings after finitely many update periods will oscillate between two worst cases. Otherwise, the successive routings will converge to the unique equilibrium routing. It is also shown that load sharing among routes whose distances are within a threshold of the minimum distance helps stabilize the dynamic behavior.<>
对自适应最短路径路由算法IGRP的动态行为进行了精确分析。距离度量是交通敏感和交通不敏感延迟分量的加权和。协议的最优性和稳定性与权重的比例有关。特别是,如果没有给予流量敏感组件足够的权重,则从任何初始路由开始,经过有限多个更新周期后的后续路由将在两种最坏情况之间振荡。否则,连续的路由将收敛到唯一的平衡路由。研究还表明,在距离小于最小距离阈值的路由之间进行负载分担有助于稳定动态行为。
{"title":"Stability of a class of dynamic routing protocols (IGRP)","authors":"S. Low, P. Varaiya","doi":"10.1109/INFCOM.1993.253311","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253311","url":null,"abstract":"An exact analysis of the dynamic behavior of IGRP, an adaptive shortest-path routing algorithm, is performed. The distance metric is a weighted sum of traffic-sensitive and traffic-insensitive delay components. The optimality and stability of the protocol is related to the ratio of the weights. In particular, it is shown that if the traffic-sensitive component is not given enough weight, then starting from any initial routing, the subsequent routings after finitely many update periods will oscillate between two worst cases. Otherwise, the successive routings will converge to the unique equilibrium routing. It is also shown that load sharing among routes whose distances are within a threshold of the minimum distance helps stabilize the dynamic behavior.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129329664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Applying security to SMDS: a practical example 将安全性应用到SMDS:一个实际示例
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253407
Paola Fulchignoni, Giovanni Marrota, A. J. Wiley
The need for secure data exchange within the public Switched Multimegabit Data Service (SMDS) environment is addressed by applying the IEEE 802.10 Secure Data Exchange (SDE) protocol. A result of this study has been the implementation of an efficient protection mechanism for information transfer over the public SMDS network, providing security against unauthorized disclosure, data modification, masquerading attacks, and unauthorized access to resources. A security and key management system, consisting of applications and protocols, has also been provided. This has been used for configuring security system attributes such as cryptographic keys, session keys, and security flags, and for the supervision of the SDE protocol and the maintenance of local secure management information bases.<>
通过应用IEEE 802.10安全数据交换(SDE)协议,解决了在公共交换多兆数据服务(SMDS)环境中对安全数据交换的需求。本研究的结果是为公共SMDS网络上的信息传输实现了有效的保护机制,提供了防止未经授权的披露、数据修改、伪装攻击和未经授权访问资源的安全性。还提供了一个由应用程序和协议组成的安全和密钥管理系统。这已被用于配置安全系统属性,如加密密钥、会话密钥和安全标志,以及用于监督SDE协议和维护本地安全管理信息库。
{"title":"Applying security to SMDS: a practical example","authors":"Paola Fulchignoni, Giovanni Marrota, A. J. Wiley","doi":"10.1109/INFCOM.1993.253407","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253407","url":null,"abstract":"The need for secure data exchange within the public Switched Multimegabit Data Service (SMDS) environment is addressed by applying the IEEE 802.10 Secure Data Exchange (SDE) protocol. A result of this study has been the implementation of an efficient protection mechanism for information transfer over the public SMDS network, providing security against unauthorized disclosure, data modification, masquerading attacks, and unauthorized access to resources. A security and key management system, consisting of applications and protocols, has also been provided. This has been used for configuring security system attributes such as cryptographic keys, session keys, and security flags, and for the supervision of the SDE protocol and the maintenance of local secure management information bases.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125676629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shaping of virtual path traffic for ATM B-ISDN ATM B-ISDN虚拟路径流量整形
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253236
L. Reiss, L. Merakos
Two mechanisms for shaping private network traffic in asynchronous transfer mode (ATM) broadband ISDN (B-ISDN) are proposed and analyzed. The shapers utilize the information about the network policer and implement a form of priority service to assure satisfactory levels of cell loss and delay for traffic streams with differing service requirements multiplexed into a policed ATM virtual path. The performance of the shapers is analyzed using stochastic-fluid methods and Markov-modulated models of bursty traffic sources. The numerical results illustrate the performance benefits and flexibility obtainable through the use of the proposed shapers in comparison to a simple policed path without traffic shaping.<>
提出并分析了异步传输模式(ATM)宽带ISDN (B-ISDN)中专网流量形成的两种机制。整形器利用有关网络策略器的信息并实现一种形式的优先级服务,以确保具有不同服务需求的流量流多路复用到受策略控制的ATM虚拟路径中的单元损失和延迟达到令人满意的水平。利用随机流体方法和突发交通源的马尔可夫调制模型分析了整形器的性能。数值结果表明,与没有流量整形的简单监管路径相比,使用所提出的整形器可以获得性能优势和灵活性
{"title":"Shaping of virtual path traffic for ATM B-ISDN","authors":"L. Reiss, L. Merakos","doi":"10.1109/INFCOM.1993.253236","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253236","url":null,"abstract":"Two mechanisms for shaping private network traffic in asynchronous transfer mode (ATM) broadband ISDN (B-ISDN) are proposed and analyzed. The shapers utilize the information about the network policer and implement a form of priority service to assure satisfactory levels of cell loss and delay for traffic streams with differing service requirements multiplexed into a policed ATM virtual path. The performance of the shapers is analyzed using stochastic-fluid methods and Markov-modulated models of bursty traffic sources. The numerical results illustrate the performance benefits and flexibility obtainable through the use of the proposed shapers in comparison to a simple policed path without traffic shaping.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132891807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1