{"title":"Performance analysis of an ATM multiplexer with different classes of bursty sources","authors":"F. Callegati, C. Raffaelli","doi":"10.1109/ICCS.1992.254972","DOIUrl":null,"url":null,"abstract":"An ATM multiplexer with different classes of bursty sources is considered for evaluation of the effects of bursty traffic variations on its performance. A discrete-time Markov chain model is developed to obtain cell loss probability both for the whole set of sources and for each class. Calculations carried out for the particular case of two classes, with a first class behaving as declared at call set up and a second class violating that reference situation by variation of some of the bursty traffic parameters. The results show that the most dangerous violation is represented by burst length increase, which will play a key role for the definition of congestion avoidance strategies.<<ETX>>","PeriodicalId":223769,"journal":{"name":"[Proceedings] Singapore ICCS/ISITA `92","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[Proceedings] Singapore ICCS/ISITA `92","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS.1992.254972","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
An ATM multiplexer with different classes of bursty sources is considered for evaluation of the effects of bursty traffic variations on its performance. A discrete-time Markov chain model is developed to obtain cell loss probability both for the whole set of sources and for each class. Calculations carried out for the particular case of two classes, with a first class behaving as declared at call set up and a second class violating that reference situation by variation of some of the bursty traffic parameters. The results show that the most dangerous violation is represented by burst length increase, which will play a key role for the definition of congestion avoidance strategies.<>