Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Advanced Wireless Networks - 4G Technologies

.pdf
Скачиваний:
52
Добавлен:
17.08.2013
Размер:
21.94 Mб
Скачать

228ADAPTIVE NETWORK LAYER

[4]M. Capobianco and J.C. Molluzzo, Examples and Counterexamples in Graph Theory. North-Holland: New York, 1978.

[5]W.-K. Chen, Theory of Nets. Flows in Networks. Wiley: New York, 1990.

[6]N. Deo, Graph Theory with Applications to Engineering and Computer Science. Prentice Hall: Englewood Cliffs, NJ, 1974.

[7]F. Harary, Graph Theory. Addison-Wesley: Reading, MA, 1969.

[8]F. Harary, R.Z. Norman and D. Cartwright, Structural Models: an Introduction to the Theory of Directed Graphs. Wiley: New York, 1965.

[9]F. Harary and E.M. Palmer, Graphical Enumeration. Academic Press: New York, 1973.

[10]D.F. Robinson and L.R. Foulds, Digraphs: Theory and Techniques. Gordon and Breach: New York, 1980.

[11]R.E. Tarjan, Data Structures and Network Algorithms. SIAM: Philadelphia, PA, 1983.

[12]S. Even, Graph Algorithms. Computer Science Press: Rockville, MD, 1979.

[13]S. Even, Algorithmic Combinatorics. Macmillan: New York, 1973.

[14]A. Gibbons, Algorithmic Graph Theory. Cambridge University Press: Cambridge, 1985.

[15]L. Ammeraal, Programs and Data Structures in C. Wiley: New York, 1987.

[16]W. Arnsbury, Data Structures: From Arrays to Priority Queues. Wadsworth: Belmont, CA, 1985.

[17]N. Christofides, Graph Theory: an Algorithmic Approach. Academic Press: New York, 1975.

[18]C.J. Colbourn, The Combinatorics of Network Reliability. Oxford University Press: London, 1987.

[19]N. Dale and S.C. Lilly, Pascal Plus Data Structures (2nd edn). D. C. Heath: Lexington, MA, 1988.

[20]J. Esakov and T. Weiss, Data Structures: an Advanced Approach Using C. PrenticeHall: Englewood Cliffs, NJ, 1989.

[21]A.H. Estahanian and S.L. Hakimi, On computing the connectivity of graphs and digraphs, Networks, vol. 14, 1984, pp. 355–366.

[22]J.A. McHugh, Algorithmic Graph Theory. Prentice Hall: Englcwood Cliffs, NJ, 1990.

[23]U. Manber, Introduction to Algorithms. Addison-Wesley: Reading, MA, 1989.

[24]E. Minieka, Optimization Algorithms for Networks and Graphs. Marcel Dekker: New York, 1978.

[25]C.H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and Complexity. Prentice-Hall: Englewood Cliffs, NJ, 1982.

[26]M.N.S. Swarny and K. Thulasiraman. Graphs, Networks, and Algorithms. Wiley: New York, 1981.

[27]A.M. Tenenbaum and M.J. Augenstein, Data Structures Using Pascal (2nd edn). Prentice-Hall: Englewood Cliffs, NJ, 1986.

[28]A.M. Tenenbaum, Y. Langsarn, and M.J. Augenstein, Data Structures Using C. Prentice-Hall: Englewood Cliffs, NJ, 1990.

[29]A.V. Aho, J.E. Hopcroft, and J.D. Ullman, The Design and Analysis of Computer Programs. Addison-Wesley: Reading, MA, 1974.

[30]A.V. Aho, J.E. Hopcroft, and J.D. Ullrnan, Data Structures and Algorithms. AddisonWesley: Reading, MA, 1983.

REFERENCES 229

[31]T.H. Cormen, C.E. Leiserson, and R.L. Rivest, Introduction to Algorithms. MIT Press: Cambridge, MA, 1990.

[32]M.R. Garey and D.S. Johnson, Computers and Intractibility. A Guide to the Theory of NP-Completeness. Freeman: San Francisco, CA, 1979.

[33]D. Hare, Algorithmics. The Spirit of Computing. Addison-Wesley: Reading, MA, 1987.

[34]E. Horowitz and S. Sahni, Fundamentals of Computer Algorithms. Computer Science Press: Rockville, MD, 1978.

[35]D.S. Johnson, The NP-completeness column: an ongoing guide, Algorithms (this column appears several times per year).

[36]D.E. Knuth, The Art of Computing: Vol. 1: Fundamental Algorithms (2nd edn). Addison-Wesley: Reading, MA, 1973.

[37]D.E. Knuth, The Art of Computing: Vol. 2: Scm inunierical Algorithms (2nd edn). Addison-Wesley: Reading, MA, 1981.

[38]D.E. Knuth, The Art of Computing: Vol. 3: Sorting and Searching, Addison-Wesley: Reading, MA, 1973.

[39]R. Sedgewick, Algorithms (2nd edn). Addison-Wesley: Reading, MA, 1988.

[40]H.S. Wilf, Algorithms and Complexity. Prentice-Hall: Englewood Cliffs, NJ, 1986.

[41]T. Egeland and A.B. Huseby, On Dependence and Reliability Computation, Networks, vol. 21, 1991, pp. 521–546.

[42]H. Heffes and A. Kumar, Incorporating dependent node damage in deterministic connectivity analysis and synthesis of networks, Networks, vol. l6, l986, pp. Sl–65.

[43]Y.F. Lam and V. Li, On Network Reliability Calculations with Dependent Failures, in Proc. IEEE 1983 Global Telecommunications Conf. (GTC ’83), San Diego, CA, November, 1977, pp. 1499–1503.

[44]Y.F. Lam and V. Li, Reliability modeling and analysis of communication networks with dependent failures, in Proc. IEEE INFOCOM, 3–7 June 1985, pp. 196–199.

[45]Y.F. Lam and V. Li, Reliability modeling and analysis of communication networks with dependent failures, IEEE Trans. Commun., vol 34, 1986, pp. 82–84.

[46]K.V. Lee and V.O. K. Li, A path-based approach for analyzing reliability of systems with dependent failures and multinode components, Proc. IEEE INFOCOM, 1990, pp. 495–503.

[47]L.B. Page and J.E. Perry, A model for system reliability with common-cause failures, IEEE Trans. Reliab., vol. 38, 1989, pp. 406–410.

[48]E. Zemel, Polynomial algorithms for estimation of network reliability, Networks, vol. 12, 1982, pp. 439–452.

[49]A. Agrawal and A. Satayanarana, An OIE time algorithm for computing the relaibility of a class of directed networks, Op. Res., vol. 32, 1984, pp. 493–515.

[50]D. Bienstock, An algorithm for reliability analysis of planar graphs, Networks, vol. 16, 1986, pp. 411–422.

[51]F. Beichelt and P. Tittman, A generalized reduction method for the connectedness probability of stochastic networks, IEEE Trans. Reliab., vol. 40, (1991), pp. 198–204.

[52]F.T. Boesch, On unreliability polynomials and graph connectivity in reliable network synthesis, J. of Graph Theory, vol. 10, 1988, pp. 339–352.

[53]A. Bobbio and A. Premoli, Fast algorithm for unavailibility and sensitivity analysis of series–parallel systems, IEEE Trans. Reliab., vol. 31, 1982, pp. 359–361.

230ADAPTIVE NETWORK LAYER

[54]B.N. Clark and C.L. Colbourn, Unit disk graphs, Discrete Math., vol. 86, 1990,

pp.165–177.

[55]C.L. Colbourn, Network resiliance, SIAM J. Algebra Discrete Math., vol. 8, 1987,

pp.404–409.

[56]W.H. Debany, P.K. Varshney and C.R.P. Hartman, Network reliability evaluation using probability expressions, IEEE Trans. Reliab., vol. 35, 1986, pp. 161–166.

[57]T. Politof and A. Satyanarayana, A linear-time algorithm to compute the reliability of planar cube-free networks, IEEE Trans. Reliab., vol. 39, 1990, pp. 557–563.

[58]K.W. Pullen, A random network model of message transmission, Networks, vol. 16, 1986, pp. 397–409.

[59]O.W.W. Yang, Terminal pair reliability of tree-type computer communication networks, in Proc. IEEE 1991 Military Communications Conf. (MILCOM ’91), vol. 3, November 1991, pp. 905–909.

[60]H.M. AboElFotoh and C.J. Colbourn, Computing 2-terminal reliability for radiobroadcast networks, IEEE Trans. Reliab., vol. 38, 1989, pp. 538–555.

[61]M.O. Ball and J.S. Provan, Calculating bounds on reachability and connectedness in stochastic networks, Networks, vol. 13, 1983, pp. 253–278.

[62]M.O. Ball and J.S. Provan, Bounds on the reliabilty polynomial for shellable independence systems, SIAM J. Algebra Discrete Math., vol. 3, 1981, pp. 166–181.

[63]T.B. Brecht and C.J. Colbourn, Improving reliabilty bounds in computer networks, Networks, vol. 16, 1986, pp. 369–380.

[64]T.B. Brecht and C.J. Colbourn, Multplicative improvements in network reliabilty bounds, Networks, vol. 19, 1989, pp. 521–529.

[65]T.B. Brecht and C.L. Colbourn, Lower bounds on two-terminal network reliability, Discrete Appl. Math., vol. 21, 1988, pp. 185–198.

[66]C.J. Colbourn and A. Ramanathan, Bounds for all-terminal reliability by arc packing, Ars Combinatorica, vol. 23A, 1987, pp. 229–236.

[67]C.J. Colboum, Edge-packings of graphs and network reliability, Discrete Math., vol. 72, 1988, pp. 49–61.

[68]C.J. Colbourn and D.D. Harms, Bounding all-terminal reliability in computer networks, networks, vol. 18, 1988, pp. 1–12.

[69]D. Torrieri, Algorithms for finding an optimal set of short disjoint paths in a communication network, in Proc. IEEE 1991 Military Communications Cont. (MILCOM ’91), vol. 1, November, 1991, pp. 11–15.

[70]D.K. Wagner, Disjoint (s, t)-cuts in a network, Networks, vol. 20, 1990, pp. 361–371.

[71]G.S. Fishman, A comparison of four Monte Carlo methods for estimating the probability of st-connectedness, IEEE Trans. Reliab., vol. 35, 1986, pp. 145–154.

[72]G.S. Fishman, A Monte Carlo sampling plan for estimating network reliability, Opns. Res., vol. 34, 1986, pp. 581–594.

[73]G.S. Fishman, Estimating the st-reliability function using importance and stratified sampling, Opns. Res., vol. 37, 1989, pp. 462–473.

[74]G.S. Fishman, A Monte Carlo sampling plan for estimating reliability parameters and related functions, Networks, vol. 17, 1987, pp. 169–186.

[75]R.M. Karp and M.G. Luby, Monte-Carlo algorithms for enumeration and reliability problems, in Proc. IEEE 24th Annual Symp. on Foundations of Computer Science, 7–9 November 1983 Tuscon, AZ, pp. 56–64.

REFERENCES 231

[76]P. Kubat, Estimation of reliability for communication/computer networks – simulation/analytic approach, IEEE Trans. Commun., vol. 37, 1989, pp. 927–933.

[77]L.D. Nd and C.J. Colbourn, Combining Monte Carlo estimates and bounds for network reliability, Networks, vol. 20, 1990, pp. 277–298.

[78]K.T. Newport and M.A. Schroeder, Network survivability through connectivity optimization’, in Proc. 1987 IEEE Int. Conf. Communications, vol. 1, 1987, pp. 471–477.

[79]K.T. Newport and P. Varshney, Design of communications networks under performance constraints, IEEE Trans. Reliab., vol. 40, 1991, pp. 443–439.

[80]K.T. Newport and M.A. Schroeder, Techniques for evaluating the nodal survivability of large networks, in Proc. IEEE 1990 Military Communications Conf. (MILCOM ’90), Monterey, CA, 1990, pp. 1108–1113.

[81]K.T. Newport, M.A. Schroeder and G.M. Whittaker, A knowledge based approach to the computation of network nodal survivability, in Proc. IEEE 1990 Military Communications Conf. (MILCOM ’90), Monterey, CA, 1990, pp. 1114–1119.

[82]M.A. Schroeder and K.T. Newport, Tactical network survivability through connectivity optimization, in Proc. 1987 Military Communications Conf. (MILCOM ’87), Monterey, CA, vol. 2, 1987, pp. 590–597.

[83]G.M. Whittaker, A knowledge-based design aid for survivable tactical networks, in

Proc. the IEEE 1990 Military Communications Conf. (MILCOM ’90), Monterey, CA, 1990, Section 53.5.

[84]M.A. Schroeder and K.T. Newport, Enhanced network survivability through balanced resource criticality, in Proc. IEEE 1989 Military Communications Conf. (MILCOM ’89), Boston, MA, 1989, Section 38.4.

[85]K.S. Bagga, L.W. Beineke, M.J. Lipman and R.E. Pippert, The concept of leverage in network vulnerability, in Conf. Graph Theory, Kalamazoo, MI, 1988, pp. 29–39.

[86]K.S. Bagga, L.W. Beineke, M.J. Lipman and R.E. Pippert, Explorations into graph vulnerability, in Conf. Graph Theory, Kalamazoo, MI, 1988, pp. 143–158.

[87]D. Bienstock and E. Gyori, Average distance in graphs with removed elements, J. Graph Theory, vol. 12, 1988, pp. 375–390.

[88]F.T. Boesch and I.T. Frisch, On the smallest disconnecting set in a graph, IEEE Trans. Circuit Theory, vol. 15, 1986, pp. 286–288.

[89]F. Buckley and M. Lewinter, A note on graphs with diameter preserving spanning trees, J. Graph Theory, vol. 12, 1988, pp. 525–528.

[90]F.R.K. Chung, The average distance and the independence number, J. Graph Theory, vol. 12, 1988, pp. 229–235.

[91]G. Exoo, On a measure of communication network vulnerability, Networks, vol. 12, 1982, pp. 405–409.

[92]O. Favaron, M. Kouider and M. Makeo, Edge-vulnerability and mean distance, Networks, vol. 19, 1989, pp. 493–509.

[93]F. Harary, F.T. Boesch and J.A. Kabell, Graphs as models of communication network vulnerability: connectivity and persistence, Networks, vol. 11, 1981, pp. 57–63.

[94]F. Haraty, Conditional connectivity, Networks, vol. 13, 1983, pp. 347–357.

[95]S.M. Lee, Design of e-invariant Networks, Congressus Nurner, vol. 65, 1988, pp. 105–102.

[96]O.R. Oellermann, Conditional graph connectivity relative to hereditary properties, Networks, vol. 21, 1991, pp. 245–255.

232ADAPTIVE NETWORK LAYER

[97]J. Plesnik, On the sum of all distances in a graph or digraph, J. Graph Theory, vol. 8, 1984, pp. 1–21.

[98]A.A. Schoone, H.L. Bodlaender and J. van Leeuwer, Diameter increase caused by edge deletion, J. Graph Theory, vol. 11, 1987, pp. 409–427.

[99]M.O. Ball, J.S. Provan and D.R. Shier, Reliability covering problems, Networks, vol. 21, 1991, pp. 345–357.

[100]L. Caccetta, Vulnerability in communication networks, Networks, vol. 14, 1984,

pp.141–146.

[101]L.L. Doty, Extremal connectivity and vulnerability in graphs, Networks, vol. 19, 1989, pp. 73–78.

[102]T.J. Ferguson, J.H. Cozzens and C. Cho, SDI network connectivity optimization, in

Proc. the IEEE 1990 Military Communications Conf. (MILCOM ’90), Monterey, CA, 1990, Sec. 53.1.

[103]J.F. Fink, M.S. Jacobson, L.F. Kinch and J. Roberts, The bondage number of a graph, Discrete Math, vol. 86, 1990, pp. 47–57.

[104]G. Gunther, Neighbor-connectedness in regular graphs, Discrete Appl. Math., vol. 11, 1985, pp. 233–242.

[105]G. Gunther, B.L. Hartnell and R. Nowakowski, Neighbor-connected graphs and projective planes, Networks, vol. 17, 1987, pp. 241–247.

[106]P.L. Hammer, Cut-threshold graphs, Discrete Appl. Math., vol. 30, 1991, pp. 163–179.

[107]A.M. Hobbs, Computing edge-toughness and fractional arboricity, Contemp. Math., Am. Math. Soc., 1989, pp. 89–106.

[108]T.Z. Jiang, A new definition on survivability of communication networks, in Proc. IEEE 1991 Military Communications Conf. (MJLCOM ’91), vol. 3, November 1991,

pp.901–904.

[109]L.M. Lesniak and R.E. Pippert, On the edge-connectivity vector of a graph, Networks, vol. 19, 1989, pp. 667–671.

[110]Z. Miller and D. Pritikin, On the separation number of a graph, Networks, vol. 19, 1989, pp. 651–666.

[111]L. Wu and P.K. Varshney, On survivability measures for military networks, in Proc. IEEE 1990 Military Communications Conf. (MILCOM ’90), Monterey, CA, pp. 1120– 1124.

[112]K.-S. Lui, K. Nahrstedt and S. Chen, Routing with topology aggregation in delaybandwidth sensitive networks, IEEE/ACM Trans. Networking, vol. 12, No. 1, 2004 ,

pp.17–29.

[113]Private Network-Network Interface Specification Version 1.0, March 1996.

[114]Y. Rekhter and T. Li, A border gateway protocol 4 (BGP-4), Network Working Group, RFC 1771, 26–30 March 1995.

[115]R. Guerin and A. Orda, QoS-based routing in networks with inaccurate information: theory and algorithms, IEEE/ACM Trans. Networking, vol. 7, 1999, pp. 350–364.

[116]F. Hao and E.W. Zegura, On scalable QoS routing: performance evaluation of topology aggregation, in Proc. IEEE INFOCOM, 2000, pp. 147–156.

[117]W. Lee, Minimum equivalent subspanner algorithms for topology aggregation in ATM networks, in Proc. 2nd Int. Conf. ATM (ICATM), 21–23 June 1999, pp. 351– 359.

[118]B. Awerbuch and Y. Shavitt, Topology aggregation for directed graphs, IEEE/ACM Trans. Networking, vol. 9, 2001, pp. 82–90.

REFERENCES 233

[119]W. Lee, Spanning tree method for link state aggregation in large communication networks, in Proc. IEEE INFOCOM, 2–6 April 1995, pp. 297–302.

[120]A. Iwata, H. Suzuki, R. Izmailow and B. Sengupta, QoS aggregation algorithms in hierarchical ATM networks, in IEEE Int. Conf. Communications Conf. Rec., 7–11 June 1998, pp. 243–248.

[121]T. Korkmaz and M. Krunz, Source-oriented topology aggregation with multiple QoS parameters in hierarchical networks, ACM Trans. Modeling Comput. Simulation, vol. 10, no. 4, 2000, pp. 295–325.

[122]S. Chen and K. Nahrstedt, An overview of quality-of-service routing for the next generation high-speed networks: problems and solutions, IEEE Network, vol. 12, 1998, pp. 64–79.

[123]W. Lee, Topology aggregation for hierarchical routing in ATM networks, in ACMSIGCOMM Comput. Commun. Rev., vol. 25, 1995, pp. 82–92.

[124]L. Guo and I. Matta, On state aggregation for scalable QoS routing, in IEEE Proc. ATM Workshop, May 1998, pp. 306–314.

[125]Z. Wang and J. Crowcroft, Bandwidth-delay based routing algorithms, in Proc. IEEE GLOBECOM, vol. 3, 26–29 May 1995, pp. 2129–2133.

[126]D. Bauer, J.N. Daigle, I. Iliadis and P. Scotton, Efficient frontier formulation for additive and restrictive metrics in hierarchical routing, in IEEE Int. Conf. Communications Conf. Rec., vol. 3, June 2000, p. 1353.

[127]Z. Wang and J. Crowcroft, Quality-of-service routing for supporting multimedia applications, IEEE J. Select. Areas Commun., vol. 14, 1996, pp. 1228–1234.

[128]M. Faloutsos, P. Faloutsos, and C. Faloutsos, On power-law relationships of the internet topology, in Proc. ACM SIGCOMM, 1999, pp. 251–262.

[129]C. Jin, Q. Chen, and S. Jamin, Inet-3.0: Internet Topology Generator, University of Michigan, Technical Report CSE-TR-456-02, 2002.

[130]B.M. Waxman, Routing of multipoint connections, IEEE J. Select. Areas Commun., vol. 6, 1988, pp. 1617–1622.

[131]T.H. Cormen, C.E. Leiserson, and R.L. Rivest, Introduction to Algorithms. MIT Press: Cambridge, MA, 1990.

[132]M. Garey and D. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman: New York, 1979.

8

Effective Capacity

8.1 EFFECTIVE TRAFFIC SOURCE PARAMETERS

For efficient resource allocation for connections requiring QoS, reliable and accurate characterizations of the offered traffic and available effective capacity in the network are needed [1–5, 7–21]. The ATM forum [1] has adopted an open-loop flow control mechanism for ATM networks known as usage parameter control (UPC). A UPC algorithm accepts a cell stream as input and determines whether or not each cell conforms to the parameters of the algorithm. Depending on the network policy, nonconforming cells are either dropped prior to entering the network or tagged as low priority. The UPC function acts as a traffic policer at the network access point. In contrast, a traffic shaper smoothes out the bitrate variations in a stream by delaying rather than dropping or tagging cells. A user can avoid possible cell loss at the network access point due to UPC by shaping its cell stream to conform to the negotiated UPC. All those actions will result in an effective traffic source. The UPC mechanisms proposed by the ATM Forum are variants of the leaky bucket algorithm. The leaky bucket is a simple means of shaping or policing a traffic stream and has desirable attributes in terms of network control [2–4].

A leaky bucket is parameterized by a leak rate μ and a bucket size B. It is convenient to describe the operation of the leaky bucket in terms of a fictitious x/D/1/B queue for a deterministic input (D) served at constant rate μ with capacity B [2]. In this model, each cell arrival to the leaky bucket generates a corresponding customer arrival to the fictitious queue. At the time of a cell arrival, if the number of customers in the fictitious queue is less than B, the cell is said to be conforming, otherwise the cell is nonconforming. Nonconforming cells are either dropped or tagged as low priority cells.

A leaky bucket shaper parameterized by (μ, B) operates in a manner similar to the leaky bucket policer, except that nonconforming cells are delayed, rather than dropped or tagged. The operation of the leaky bucket shaper can be understood in terms of an x/D/1 queue. Upon arrival of a cell, if the number of customers in the fictitious queue is B or more, the

Advanced Wireless Networks: 4G Technologies Savo G. Glisic

C 2006 John Wiley & Sons, Ltd.

236 EFFECTIVE CAPACITY

cell is placed in an infinite capacity first-in, first-out (FIFO) buffer. Whenever a customer leaves the fictitious queue, a cell (if any) is removed and transmitted from the FIFO buffer.

The dual leaky bucket consists of two leaky buckets: a peak rate leaky bucket with parameters (λp, Bp) and a sustainable rate leaky bucket with parameters (λs, Bs), where λp > λs. A cell is conforming with respect to the dual leaky bucket if and only if it is conforming with respect to both the peak and sustainable rate buckets. The sustainable rate λs represents the maximum long-run average rate for conforming cell streams. The peak rate λp specifies a minimum intercell spacing of 1p with burst tolerance Bp. In this section, we shall assume that Bp = 1, so that the intercell spacing of conforming streams is constrained to be at most 1p. Values of Bp > 1 allow for cell delay variation (CDV) between the customer premises and the network access point.

The set (λp, λs, Bs) constitutes a UPC descriptor that the user negotiates with the network. If the connection is accepted, the user applies a dual leaky bucket shaper to shape its cell stream according to the negotiated UPC. The dual leaky bucket limits the peak rate to λp, the long-term average rate to λs, and the maximum burst length (transmitted at peak rate)

to Bc = Bsλp/(λp λs).

Deterministic traffic characterization is based on the queueing model of the leaky bucket [5]. Suppose that the cell stream is of finite length and that the peak rate λp is known. The cell stream is offered as input to a queue served at constant service rate μ. Let Bmax(μ) be the maximum number of cells observed in the system over the duration of the cell stream. The stream then can be characterized by the peak rate and the values Bmax(μ) for 0 < μ < λp

as

 

CD = λp, Bmax(μ), 0 < μ < λp

(8.1)

Equation (8.1) can be interpreted as follows. For each μ, 0 < μ < λp, the cell stream passes through a leaky bucket parameterized by [μ, Bmax(μ)] without being shaped, i.e. the cell stream conforms to the leaky bucket parameters [μ, Bmax(μ)]. The notation B(CD, μ) = Bmax(μ) is introduced to show that the choice of bucket size, for a given leak rate μ, depends on CD. The characterization is tight in the following sense. If the cell stream conforms to a given set of leaky bucket parameters (μ, B ), then necessarily B B(CD, μ). For a given leak rate μ*, the minimum bucket size for conformance is B* B(CD, μ*).

Ideal statistical traffic characterization is based on assumption that the peak rate of the cell stream λp and the mean rate λm are known. Suppose that the cell stream is offered to a leaky bucket traffic shaper with leak rate μ, where λm < μ < λp, and bucket size B.

The shaping probability is defined as the probability that an arbitrary arriving cell has to wait in the data buffer of the leaky bucket. In the x/D/1 queueing model of the leaky bucket, this event corresponds to a customer arrival to the fictitious queue when the number in the system exceeds B. If B(μ, ε) is defined as the minimum bucket size necessary to ensure

that the shaping probability does not exceed ε, then

 

CS(ε) = λp, λm, (μ, B(μ, ε)), λm < μ < λp

(8.2)

represents statistical traffic characterization.

Approximate statistical traffic characterization is based on the assumption that the cell stream is offered to a queue with constant service rate μ, where λm < μ < λp. If W is the steady-state waiting time, in the queue, for an arbitrary cell arriving in the queue, then the complementary waiting time distribution, can be approximated as (see Appendix C; please

EFFECTIVE TRAFFIC SOURCE PARAMETERS

237

go to www.wiley.com/go/glisic):

P(W > t)

a(μ)eb(μ)t , t

0

(8.3)

 

 

 

 

Two asymptotic approximations are of interest:

ebt P(W > t) a ; t → ∞

(8.4)

t1 log P(W > t)

→ −

b ; t

→ ∞

 

 

 

Also the following approximation is of interest, as suggested in Chang [6]: a bE(W ). In many cases, the approximation in Equation (8.3) with a = 1 tends to be conservative,

i.e. the bound, P(W > t) ebt , holds under certain conditions [6, 7]. The one-parameter approximation

P(W > t) ebt , t 0

(8.5)

is the basis for the theory of effective bandwidths that will be discussed below.

More extensive discussions of this class of approximations can be found in References [7, 8]. In this section Equation (8.3) is used as a reasonable approximation for an ATM cell stream modeled as a general Markovian source. Over the relatively short observation windows of interest (on the order of seconds), these approximations are fairly robust for a large class of real traffic sources, in particular, MPEG video sequences. Therefore, parameters [a(μ), b(μ)] provide a statistical characterization of the cell stream when offered to a queue with a constant service rate μ. A more complete characterization of the cell stream records the values [a(μ), b(μ)] for all μ in the range (λm, λp) as follows:

˘

(8.6)

C S = λp, λm, [a(μ), b(μ)] : λm < μ < λp

Values of [a(μ), b(μ)] are chosen such that Equation (8.3) holds approximately for values of t in range of interest. Assuming that Equation (8.3) holds at equality, we have (see Chapter 6)

a(μ)/b(μ) = E[W ] = τr(μ)E[Sa] + E[Qa]

(8.7)

In Equation (8.7) Sa denotes the number of customers in service, Qa the number of customers in queue seen by an arbitrary customer arrival, and τr(μ) the average remaining service time for the customer in service as seen by an arriving customer conditional on there being a customer in service. Bearing in mind that

E [Sa] = P(W > 0) = a(μ)

(8.8a)

and defining q(μ) = E [Qa], Equation (8.7) gives

 

b(μ) =

μa(μ)

(8.8b)

 

 

q(μ) + μa(μ)τr(μ)

The estimation of the above parameters is discussed later in this section. Once these parameters are obtained they are used in Equation (8.6) for statistical characterization of a cell stream. The next step is to map the characterization to a suitable UPC descriptor.