By Topic

Teletraffic Symposium, 11th. Performance Engineering in Telecommunications Networks. IEE Eleventh UK

Date 23-25 Mar 1994

Filter Results

Displaying Results 1 - 25 of 40
  • Multicast algorithms evaluation using an adaptative routing in ATM networks

    Publication Year: 1994, Page(s):7/1 - 7/6
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (332 KB)

    This paper proposes a multicast implementation based on adaptive routing with anticipated calculation. Three different cost measures for a point-to-multipoint connection: bandwidth cost, connection establishment cost and switching cost can be considered. The application of the method based on pre-evaluated routing tables makes possible the reduction of bandwidth cost and connection establishment c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Permit delivery rates of an ATM cell based access network MAC protocol

    Publication Year: 1994, Page(s):8A/1 - 8A/9
    Cited by:  Papers (1)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (440 KB)

    RACE 2024, Broadband Access Facilities (BAF) project has developed a Medium Access Control (MAC) Protocol that explicitly manages the transmission of each individual ATM cell. This mechanism polls each Network Termination (NT) and depending on the NT's queue length issues permits to send. Multiplexing several variable bit rate sources together causes cell clumping when issuing permits at the sum o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real time management system for the Two-Level CAC algorithm

    Publication Year: 1994, Page(s):9A/1 - 9A/5
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (272 KB)

    RACE 2059, Integrated Communications Management (ICM) project is investigating ways in which a Connection Admission Control (CAC) function can be manipulated by the Telecommunications Management Network (TMN) in order to achieve optimal network performance. The Two-level CAC Algorithm is a compromise between the speed and accuracy required. This paper reviews the Two-Level approach and looks at wa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing user-network interfaces between networked multimedia applications

    Publication Year: 1994, Page(s):10A/1 - 10A/8
    Cited by:  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (428 KB)

    The effective use between these applications of the limited bandwidth at the User-Network Interface (UNI) has raised increasing interest from both end-system and telecommunication networks researchers. This paper addresses the structure of higher layer traffic controls at the end-systems. A session scheduling priority scheme is proposed which reflects the user specified service priority and the im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video source modelling for ATM networks

    Publication Year: 1994, Page(s):18/1 - 18/9
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (408 KB)

    The one layer codec presented is based on a discrete time Markov chain. The two layer model is modelled by its individual layers. Both are derived from an analysis of video conference data. The models are simulated using a commercial discrete event simulation tool. Evaluations of the characteristics of each source are presented, as are the capabilities and limitations of the models View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The cell delay variation introduced from an ATM access multiplexer

    Publication Year: 1994, Page(s):15A/1 - 15A/8
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (352 KB)

    This paper develops an analytical model of the multiplexer based on the work of Roberts and Virtamo (IEEE Trans. vol.COM-39, no.2, p. Feb.1991) and Skliros (1993 Symposium). The M+D/D/1 queue is used to model the CDV introduced into a Constant Bit Rate traffic stream when multiplexed with Poisson background traffic. The results from simulation and analytical models are compared, and conclusions dr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network level support for QOS commitment

    Publication Year: 1994, Page(s):11A/1 - 11A10
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (700 KB)

    Distributed multimedia applications such as those supported by emerging multimedia workstations will generate communications traffic with a wide range of service requirements. This paper addresses the problems of supporting QoS in the network region, focusing on the provision of services to continuous media traffic. The main objective is to determine what resources must be allocated throughout the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical approach to video source modelling

    Publication Year: 1994, Page(s):19/1 - 1910
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (596 KB)

    The authors consider models of compressed video sources with different scene types changing suddenly and producing a multiple activity output bit rate. The long-term autocorrelation effects are topics of interest in variable bit rate traffic. Moreover, video sources show different short-term and long-term (sample) autocorrelation behaviour. New classes of models are described which can explain the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical issues raised by the Bellcore data

    Publication Year: 1994, Page(s):1/1 - 1/8
    Cited by:  Papers (6)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (348 KB)

    There has been a surge of literature claiming that `Ethernet traffic is self similar' and possesses long range dependence; similar claims have been justified using traffic observations taken from an Ethernet local area network at Bellcore Laboratories. The authors discuss the implications of such claims for the problem of estimating loss probabilities in networks, and their validity View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dimensioning playout buffers from an ATM network

    Publication Year: 1994, Page(s):16A/1 - 16A/9
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (324 KB)

    The authors investigate how earlier work of van den Berg and Resing and of D'Ambrosio and Melen (1993) can be combined with classical bounds for the GI/G/1 queue to give insight into the output buffer required for a smooth playout of cells. The effect of both the number of stages across the network and the rate of the stream is considered. A possibly surprising conclusion is that as the rate of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy logic based techniques for connection admission control in ATM networks

    Publication Year: 1994, Page(s):12A/1 - 12A/8
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (372 KB)

    This paper describes an approach for CAC that uses fuzzy logic techniques and a method for learning the behaviour of the traffic in an ATM link. The learning process is performed by collecting, at specific times, examples of information on the current traffic pattern in the system. Using fuzzy reasoning, the system will then infer, from the knowledge extracted from the examples, a value for the ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulated allocation: a suboptimal solution to the multicommodity flow problem

    Publication Year: 1994, Page(s):31/1 - 31/7
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (328 KB)

    The paper discusses a stochastic approach to multicommodity flow problems, whose idea comes from simulation of alternative call routing in circuit-switched networks. The proposed method can be used to find suboptimal solutions for a vast class of integer-valued multicommodity flow problems. The preliminary results illustrate the effectiveness of the method in application to reconfiguration of mesh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The transmission of compressed video over ATM networks

    Publication Year: 1994, Page(s):20/1 - 20/6
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (312 KB)

    Using simulation modelling techniques, the influence of cell loss and jitter on image quality is investigated and the optimum bandwidth requirements for a number of multiplexed video sources are quantified to achieve an acceptable quality of service for each video connection View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance modelling of a bridged router wide area network

    Publication Year: 1994, Page(s):23/1 - 23/9
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (320 KB)

    This paper describes the design and implementation of a bridged router wide area network simulator to model the Northumbrian Water communications network. Some examples of typical simulation experiments are provided and conclusions made for future capacity planning and possible implementation of dynamic routing strategies under failure conditions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network flow algorithms for routing in networks with wavelength division multiplexing

    Publication Year: 1994, Page(s):3/1 - 310
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (424 KB)

    Relationships between resource requirements for WDM systems are investigated in terms of the optimal design of a lightwave network. The multihop network with a fixed number of transceivers is chosen as the prototype. A model is formulated with a heuristic algorithm for design of the virtual network topology and for routing paths in order to reflect the traffic patterns. Examples of application for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic management in satellite ATM bridge

    Publication Year: 1994, Page(s):8B/1 - 8B/9
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (492 KB)

    This paper presents the studies of traffic management in the satellite ATM bridge based on a RACE II project-CATALYST R2074. The objective is to allocate adequate resources to the given traffic for specified quality of service. A traffic management mechanism has been developed in the light of CCITT recommendations on B-ISDN. The satellite ATM bridge will play a very important role in the initial i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multilink ATM switch capable of supporting two priority classes

    Publication Year: 1994, Page(s):13A/1 - 13A/6
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (288 KB)

    The switch employs a pre-emptive priority mechanism in which delay sensitive traffic (class 1) can preempt delay insensitive traffic (class 2) in input buffers when competing for the same output port. The architecture uses a simplified Batcher Banyan Switch (SBBS) fabric which requires a simple hardware structure, running a 4-phase algorithm on a slot-by-slot basis. Performance studies have shown ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the performance of a dynamic bandwidth management scheme

    Publication Year: 1994, Page(s):32/1 - 32/8
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (312 KB)

    Previous dynamic bandwidth management schemes essentially involved some kind of real-time bandwidth negotiation on-demand. However, these methods can perform poorly if the parameter settings are not matched to the arrival traffic. This paper presents an improved scheme whereby the parameter settings are adjusted adaptively so as to meet performance requirements. Simulation results show that this i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The entropy of an arrivals process: a tool for estimating QoS parameters of ATM traffic

    Publication Year: 1994, Page(s):21/1 - 21/8
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (384 KB)

    Classical queueing theory is applicable to telephone traffic at the call level: incoming calls to an exchange may be assumed to be independent so that the input stream can be modelled by a Poisson process; consequently, classical theory concerns itself with queues with Poissonian inputs. In the buffers of ATM multiplexers are queues of data packets waiting to be processed and the statistical chara... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed cooperative agents for service management in communications networks

    Publication Year: 1994, Page(s):24/1 - 24/7
    Cited by:  Papers (1)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (300 KB)

    This paper concentrates on issues of resilience and fault tolerance of cooperative intelligent agents (complex software systems), introducing some basic concepts of global multiservice networks, and identifying service provision and restoration as problem areas. The distributed nature of the network of agents gives scope for reducing the total amount of data passed to a central point, and so impro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing algorithms in ATM networks

    Publication Year: 1994, Page(s):4/1 - 4/7
    Cited by:  Papers (2)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (392 KB)

    The authors identify and discuss issues in the design of dynamic routing algorithms for integrated ATM networks. The relevant results from already published research are appraised and remaining problems described. Basic routing strategies are introduced, and routing of traffic with different call profiles and multiple quality-of-service requirements is considered View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of time stepping mechanism for parallel cell rate simulation of ATM networks

    Publication Year: 1994, Page(s):15B/1 - 15B/9
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (464 KB)

    A time stepping approach has been adopted by RACE project R2059 ICM for time synchronisation in an event driven ATM network simulator. This paper describes the results of a study into the effects of varying the size of the timestep, on both the measured traffic characteristics and the simulation speed. A simplified version of the ICM cell rate simulator is used; the traffic events are described as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel automatic call restriction scheme for control of focused overloads

    Publication Year: 1994, Page(s):27/1 - 2710
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (504 KB)

    The contol scheme described has been designed so that it is automatic in two senses. The called party number identifying the resource in overload is automatically identified. The level of call restriction performed at nodes remote from the resource is updated dynamically in such a way that the ineffective calling rate at the resource is kept within an acceptable limit whilst the occupancy of the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic analysis for CODENET-a multiservice VSAT network

    Publication Year: 1994, Page(s):9B/1 - 9B10
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (660 KB)

    A VSAT satellite network providing interconnection between Local Area Networks located at academic sites in Eastern and Western Europe is described. Some of the services that the system will support are discussed and an initial performance analysis is developed. The authors focus on the multiple access schemes that allow efficient sharing of the satellite bandwidth among the users. Analytical and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-rate call congestion: fixed point models and trunk reservation

    Publication Year: 1994, Page(s):6/1 - 610
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (592 KB)

    This document gives a brief survey of the state-of-the-art techniques in calculating the call congestion in a heterogenous traffic environment on a single link when Trunk Reservation (TR) is used to equalise the blockings. By means of exact and approximate techniques, it is shown that the blockings are sensitive to changes in mean holding time ratio. TR may not be a robust method when heterogeneou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.