Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Advanced Wireless Networks - 4G Technologies

.pdf
Скачиваний:
60
Добавлен:
17.08.2013
Размер:
21.94 Mб
Скачать

248 EFFECTIVE CAPACITY

queue length Q(t) could be nonzero. As already discussed in Section 8.1 [analogous to Equation (8.5)] or by using the theory of large deviations [14] , it can be shown that the probability of Q(t) exceeding a threshold B satisfies

t

{

Q(t)

B

}

eθB (r)B as B

→ ∞

(8.23)

sup Pr

 

 

 

where f (x) g(x) means that limx→∞ f (x)/g(x) = 1. For smaller values of B, the following approximation, analogous to Equation (8.3), is more accurate [15]:

t

{

Q(t)

B

} ≈

γ (r)eθB (r)B

(8.24)

sup Pr

 

 

where both γ (r) and θB (r) are functions of channel capacity r. According to the theory,

γ (r) = Pr {Q(t) 0} is the probability that the buffer is nonempty for randomly chosen time t, while the QoS exponent θB is the solution of α(θB ) = r. Thus, the pair of functions {γ (r), θB (r)} model the source. Note that θB (r) is simply the inverse function corresponding to the effective bandwidth function α(u).

If the quantity of interest is the delay D(t) experienced by a source packet arriving at time t, then with same reasoning the probability of D(t) exceeding a delay bound Dmax satisfies

sup Pr

{

D(t)

D

max}

γ (r)eθ (r)Dmax

(8.25)

t

 

 

 

 

where θ (r) = θB (r) × r [16]. Thus, the key point is that for a source modeled by the pair {γ (r), θ (r)}, which has a communication delay bound of Dmax, and can tolerate a delaybound violation probability of at most ε, the effective bandwidth concept shows that the constant channel capacity should be at least r, where r is the solution to ε = γ (r)eθ (r)Dmax . In terms of the traffic envelope (t) (Figure 8.7), the slope λ(ss) = r and σ (s) = r Dmax.

In Section 8.1 a simple and efficient algorithm to estimate the source model functions γ (r) and θ (r) was discussed. In the following section, we use the duality between traffic modeling {γ (r), θ (r)}, and channel modeling to present an EC link model, specified by a pair of functions {γ (c)(μ), θ (c)(μ)}. The intention is to use {γ (c)(μ), θ (c)(μ)} as the channel duals of the source functions {γ (r), θ (r)}. Just as the constant channel rate r is used in source traffic modeling, we use the constant source traffic rate μ in modeling the channel. Furthermore, we adapt the source estimation algorithm from Section 8.1 to estimate the link model parameters {γ (c)(μ), θ (c)(μ)}.

8.2.2.2 Effective capacity link model

 

 

˜

t

r(τ ) dτ , which is

Let r(t) be the instantaneous channel capacity at time t. Define S(t) =

0

the service provided by the channel. Note that the channel service ˜ ( ) is different from the

S t

actual service ( ) received by the source; ˜ ( ) only depends on the instantaneous channel

S t S t

capacity and thus is independent of the arrival A(t). Paralleling the development of Equation (8.21) and (8.22) we assume that

 

1

 

˜

 

(c)(u) = tlim

 

 

log E

eu S(t)

(8.26)

 

t

→∞

 

 

 

 

 

EFFECTIVE LINK LAYER CAPACITY

249

exists for all u 0. This assumption is valid, for example, for a stationary Markov-fading process r(t). Then, the EC function of r(t) is defined as

α(c)(u)

=

 

(c)(u)

,

 

u

0

(8.27)

u

 

 

 

 

 

 

Consider a queue of infinite buffer size supplied by a data source of constant data rate μ (see Figure 8.6). The theory of effective bandwidth can be easily adapted to this case. The difference is that, whereas in the previous case the source rate was variable while the channel capacity was constant, now the source rate is constant while the channel capacity is variable. Similar to Equation (8.25), it can be shown that the probability of D(t) exceeding a delay bound Dmax satisfies

sup Pr

{

D(t)

D

max}

γ (c)(μ)eθ (c)(μ)Dmax

(8.28)

t

 

 

 

 

where {γ (c)(μ), θ (c)(μ)} are functions of source rate μ. This approximation is accurate for large Dmax, but we will see later in the simulation results, that this approximation is also accurate even for smaller values of Dmax.

For a given source rate μ, γ (c)(μ) = Pr {Q(t) 0} is again the probability that the buffer is nonempty at a randomly chosen time t, while the QoS exponent θ (c)(μ) is defined as θ (μ) = μα1(μ), where α1(·) is the inverse function of α(c)(u). Thus, the pair of functions {γ (c)(μ), θ (c)(μ)} model the link.

So, if a link that is modeled by the pair {γ (c)(μ), θ (c)(μ)} is used, a source that requires a communication delay bound of Dmax, and can tolerate a delay-bound violation probability of at most ε, needs to limit its data rate to a maximum of μ, where μ is the solution to

ε

=

γ (c)(μ)eθ (c)(μ)Dmax . In terms of the SC (t) shown in Figure 8.7, the channel sustainable

 

(c)

= μ and σ

(c)

= Dmax.

rate

λs

 

If the channel-fading process r(t) is stationary and ergodic, then a simple algorithm to estimate the functions {γ (c)(μ), θ (c)(μ)} is similar to the one described in Section 8.1. Paralleling Equation (8.7) we have

γ (c)(μ)

= E [D(t)] = τs(μ) +

E [Q(t)]

(8.29)

θ (c)(μ)

μ

γ (c)(μ) = Pr {D(t) > 0}

 

(8.30)

where τs(μ) is the average remaining service time of a packet being served. Note that τs(μ) is zero for a fluid model (assuming infinitesimal packet size). Now, the delay D(t) is the sum of the delay incurred due to the packet already in service, and the delay in waiting for the queue Q(t) to clear which results in Equation (8.29), using Little’s theorem. Substituting Dmax = 0 in Equation (2.28) results in Equation (3.30). As in Section 8.1, solving Equation (8.29) for θ (c)(μ) gives similarly to Equation (8.8a)

θ (c)(μ)

=

γ (c)(μ) × μ

(8.31)

μ × τs (μ) + E [Q(t)]

 

 

According to Equation (8.30) and (8.31) , as in Section 8.1, the functions γ and θ can be estimated by estimating Pr {D(t) > 0} , τs(μ), and E [Q(t)]. The latter can be estimated by taking a number of samples, say N , over an interval of length T , and recording the following quantities at the nth sampling epoch: Sn the indicator of whether a packets is in service (Sn {0, 1}), Qn the number of bits in the queue (excluding the packet in service),

250 EFFECTIVE CAPACITY

and Tn the remaining service time of the packet in service (if there is one in service). Based on the same measurements, as in Section 8.1,

 

 

 

=

 

N

 

 

 

 

 

 

γˆ

 

 

Sn /N

 

 

 

 

 

 

 

 

n=1

 

 

 

 

 

 

=

 

N

 

 

 

 

 

 

qˆ

 

 

Qn /N

 

 

 

 

 

 

 

 

n=1

 

 

 

 

 

τˆs =

 

N

 

 

 

 

 

 

 

 

Tn /N

 

 

 

 

 

 

 

 

n=1

 

 

 

are computed and then, from Equation (8.31), we have

 

 

 

 

θˆ

=

 

 

γˆ × μ

 

 

(8.32)

 

 

 

μ × τˆs + qˆ

 

 

 

 

 

 

 

 

 

These parameters are used to predict the QoS by approximating Equation (8.28) with

sup Pr

 

D(t)

 

 

D

 

 

ˆ

(8.33)

{

max}

γˆ eθ Dmax

t

 

 

 

 

 

 

If the ultimate objective of EC link modeling is to compute an appropriate SC

(t), then,

given the delay-bound Dmax and the target delay-bound violation probability ε of a connec-

tion, we can

find (t)

= {

σ (c), λ(c)

}

by setting σ (c)

=

D

max

, solving Equation (8.33) for μ

(c)

= μ.

s

 

 

 

and setting λs

 

 

 

 

 

 

 

 

8.2.3 Physical layer vs link-layer channel model

In Jack’s model of a Rayleigh flat-fading channel, the Doppler spectrum S( f ) is given as

S( f ) =

1.5

(8.34)

π fm 1 (F/ fm)2

where fm is the maximum Doppler frequency, fc is the carrier frequency, and F = f fc. Below we show how to calculate the EC for this channel [11].

Denote a sequence of N measurements of the channel gain, spaced at a time interval δ apart, by x = [x0, x1, · · · , xN 1], where {xn , n [0, N 1]} are the complex-valued Gaussian distributed channel gains (|xn | are, therefore, Rayleigh distributed). For simplicity, the constant noise variance will be included in the definition of xn . The measurement xn is a realization of a random variable sequence denoted by Xn , which can be written as the vector X = [X0, X1, · · · , X N 1]. The pdf of a random vector X for the Rayleigh-fading channel is

fX(X) =

1

e

xR1xH

(8.35)

π N det(R)

 

where R is the covariance matrix of the random vector X, det(R) the determinant of matrix R, and xH the conjugate transpose (Hermitan) of x. To calculate the EC, we start with

˜

exp u

 

t

(a)

u

N 1

E[eu S(t)] = E

0

r(τ ) dτ

exp

δ × r(τn ) fx(x) dx

 

 

 

 

 

 

 

n=0

 

 

 

 

EFFECTIVE LINK LAYER CAPACITY

251

(b)

exp

u

N 1

δ log(1 + |xn |2)

fx(x) dx

 

 

(8.36)

n=0

 

 

 

 

 

 

 

 

 

 

 

 

 

(c)

 

 

N 1

2

 

1

e

xR1xH

 

 

exp

u

 

δ log(1 + |xn |

)

.

 

 

dx

 

n=0

π N det(R)

 

 

 

 

 

 

 

 

 

 

 

 

 

where (a) approximates the integral by a sum, (b) is the Shannon result for channel capacity (i.e. γ (τn ) = log(1 + |xn |2), and (c) is from Equation (8.35). This gives the EC, Equation (8.27), as

α(c)(u)

=

1

 

lim log exp

u

N 1

δ log(1

x

n |

2) .

1

 

exR1xH dx

u

n

 

0

π N det(R)

 

t→∞

 

=

 

+ |

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

(8.37)

Using the approximation (a) log(1 + |xn |2) ≈ |xn |2 for low SNR [11], Equation (8.37) can be further simplified as

˜ (a)

E[e u S(t)]

(b)

=

=

exp

 

 

 

 

 

N 1

 

 

2

 

 

1

 

e

xR1xH

dx

 

 

 

 

 

 

 

 

uδ

|xn |

 

.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

π N det(R)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

n=0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

uδ x

 

2

1

 

 

 

xR1xH

(b)

1

 

 

 

 

x(R1

 

uδI)xH

 

e

 

|| ||

 

 

 

e

 

 

dx =

 

 

 

 

 

e

 

 

 

+

 

dx (8.38)

 

 

 

π N det(R)

 

 

π N det(R)

 

 

 

 

 

 

1

 

 

 

 

 

× π N det (R1 + uδI)1

=

 

 

1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

π N det(

R

)

det(uδ

R

+ I

)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

where approximation (b) is due to the definition of the norm of the vector x, and (c) the relation x 2 = xxH (I is identity matrix). Reference [11] considers three cases of interest for Equation (8.38).

8.2.3.1 High mobility scenario

In the extreme high mobility (HM) case there is no correlation between the channel samples and we have R = rI, where r = E |xn |2 is the average channel capacity. From Equation (8.38), we have

˜

1

 

 

 

1

 

 

1

 

 

 

E[eu S(t)]

 

 

 

=

 

 

 

=

 

 

 

(8.39)

det(uδ

R + I

)

(urδ

+

1)N

(urt/N

+

1)N

 

 

 

 

 

 

 

 

 

 

where δ t/N . As the number of samples N → ∞, we have

 

˜

lim (urt/N

 

1)N

 

eurt

(8.40)

lim E[eu S(t)]

+

=

N

→∞

N

→∞

 

 

 

 

 

 

 

 

 

 

Thus, in the limiting case, the Rayleigh-fading channel reduces to an AWGN channel. Note that this result would not apply at high SNRs because of the concavity of the log(·) function.

252 EFFECTIVE CAPACITY

8.2.3.2 Stationary scenario

In this case all the samples are fully correlated, R = [Ri j ] = [r]. In other words all elements of R are the same and Equation (8.38) now gives

 

˜

 

 

1

 

 

 

1

 

 

 

 

 

 

 

 

1

 

 

 

 

 

1

 

 

 

E[eu S

(t)]

 

 

 

=

 

 

 

 

=

 

 

 

 

 

 

 

 

=

 

 

 

 

(8.41)

det(uδ

R + I

)

urδ N

+

1

 

 

 

t

 

 

 

 

1

+

urt

 

 

 

 

 

 

 

 

 

 

 

 

 

ur

 

 

 

N

 

1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

× N

×

+

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8.2.3.3 General case

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Denote

the

eigenvalues of matrix

R

by

{

λ

n , n

H [0, N

1]}. Since R is symmetric, we

 

 

H

 

 

 

 

 

 

 

have R = UDU

 

, where U is a unitary matrix, U is its Hermitian, and the diagonal matrix

D = diag (λ0, λ1, · · · , λN 1). From Equation (8.38), we have

˜

1

 

 

 

1

 

 

E[eu S(t)]

 

=

 

 

det(uδR + I)

det(uδUDUH + UUH)

=

 

 

 

 

1

 

 

det[U diag (uδλ0 + 1, uδλ1 + 1, . . . , uδλN 1 + 1)UH]

=

1

 

= exp

n

log(uδλn + 1)

 

n (uδλn + 1)

 

 

 

 

 

 

 

˜

 

 

 

 

 

 

 

We now use the calculated E[eu S(t)] to get

 

 

 

 

 

 

 

 

1

 

˜

(a)

1

 

 

(c)(

u)

lim

 

 

log

E[eu S(t)]

 

lim

 

 

log exp

 

 

 

 

 

= t→∞ t

 

t→∞ t

 

 

 

 

(b)

 

 

 

 

 

λn

 

 

 

(c)

 

 

 

= limf

0 f

log

u

 

 

+ 1

= −

 

 

 

B

 

 

 

 

 

 

n

 

w

 

 

 

 

log(uδλn + 1)

n

log(u S( f ) + 1) d f

(8.42)

(8.43)

where (a) follows from Equation (8.42), (b) follows from the fact that the frequency intervalf = 1/t and the bandwidth Bw = 1, and (c) from the fact that the power spectral density S( f ) = λn /Bw and that the limit of a sum becomes an integral. This gives the EC, Equation (8.27), as

α(c)(u)

=

log(u S( f ) + 1)d f

(8.44)

u

 

 

Thus, the Doppler spectrum allows us to calculate α(c)(u). The EC function, Equation (8.44), can be used to guarantee QoS using Equation (8.28).

One should keep in mind that the EC function, Equation (8.44), is valid only for a Rayleigh flat-fading channel, at low SNR. At high SNR, the EC for a Rayleigh-fading channel is specified by the complicated integral in Equation (8.37). To the best of our knowledge, a closed-form solution to Equation (8.37) does not exist. It is clear that a numerical calculation of EC is also very difficult, because the integral has a high dimension. Thus, it is difficult to extract QoS metrics from a physical-layer channel model, even for a Rayleigh flat-fading channel. The extraction may not even be possible for more general fading channels. In contrast, the EC link model that was described in this section can be easily translated into QoS metrics for a connection, and we have shown a simple estimation algorithm to estimate the EC model functions.

 

EFFECTIVE LINK LAYER CAPACITY

253

Rate = μ

Data

 

source

 

 

 

Qn

 

 

rn

 

 

 

Transmitter

 

 

Transmitted

 

 

data

 

Gain

 

 

Noise

Fading

 

 

channel

 

Received

signal

Receiver

Figure 8.8 Queueing model used for simulations.

8.2.4 Performance examples

The discrete-time system depicted in Figure 8.8 is simulated. The data source generates packets at a constant rate μ which are first sent to the (infinite) buffer at the transmitter, whose queue length is Qn , where n refers to the nth sample interval. The head-of-line packet in the queue is transmitted over the fading channel at data rate rn . The fading channel has a random channel gain xn (the noise variance is absorbed into xn ). We use a fluid model that is the size of a packet is infinitesimal. A perfect knowledge of the channel gain xn (the SNR, really) at the transmitter side is assumed. Therefore, as described in Chapter 4, it can use rate-adaptive transmissions and strong channel coding to transmit packets without errors. Thus, the transmission rate rn is equal to the instantaneous (time-varying) capacity of the fading channel, defined by the Shannon law, rn = Bc log2(1 + |xn |2) where Bc is the channel bandwidth.

The average SNR is fixed in each simulation run. We define rg as the capacity of an equivalent AWGN channel, which has the same average SNR, i.e. rg = Bc log2(1 + SNRavg) where SNRavg is the average SNR, i.e. E |xn |2. Then, rn /rg relation

r

n =

rawgn log2(1 + |xn |2)

 

(8.45)

log2(1 + SNRavg)

 

 

Simulation parameters as in Wu and Negi [11] were used. Channel samples xn are generated by the following AR(1) (autoregressive) model: xn = kxn1 + vn where the modeling error vn is zero-mean complex Gaussian with unit variance per dimension and is statistically independent of xn1. The coefficient k can be determined by the following procedure:

(1) compute the coherence time Tc by Tc 9/16π fm, where the coherence time is defined as the time over which the time autocorrelation function of the fading process is above 0.5; (2)

254 EFFECTIVE CAPACITY

 

1

 

 

 

 

 

 

 

SNRavg = 0 dB, fm = 5 Hz

 

 

 

 

0.8

SNRavg = 0 dB, fm = 30 Hz

 

 

 

 

SNRavg

= 15 dB, fm = 5 Hz

 

 

 

 

 

 

 

 

 

 

SNRavg = 15 dB, fm = 30 Hz

 

 

 

Parameter

0.6

 

 

 

 

 

0.4

 

 

 

 

 

 

 

 

 

 

 

 

0.2

 

 

 

 

 

 

0

 

 

 

 

 

 

30

40

50

60

70

80

Source rate (kb/s)

Figure 8.9 Estimated function γˆ (μ) vs source rate μ.

compute the coefficient k by k = 0.5Ts/ Tc where Ts is the sampling interval. The other parameters are: fm = 5–30 Hz, rg = 100 kb/s, average SNR = 0/15 dB, Ts = 1 ms, bit rate

μ = 30–85 kb/s.

ˆ

(μ). As the source

Figures 8.9 and 8.10 show the estimated EC functions γˆ (μ) and θ

rate μ increases from 30 to 85 kb/s, γˆ (μ) increases, indicating a higher buffer occupancy,

while ˆ ( ) decreases, indicating a slower decay of the delay-violation probability. Thus,

θ μ

the delay-violation probability is expected to increase with increasing source rate μ. From Figure 8.10, we also observe that SNR has a substantial impact on γˆ (μ). This is because higher SNR results in larger channel capacity, which leads to smaller probability that a packet will be buffered, i.e. smaller γˆ (μ). In contrast, Figure 8.9 shows that fm has little effect on γˆ (μ).

Parameter

100

 

 

 

 

 

 

10-1

 

 

 

 

 

 

10-2

 

 

 

 

 

 

 

 

 

 

SNRavg = 0 dB, fm = 5 Hz

 

 

 

 

 

 

SNRavg = 0 dB, fm = 30 Hz

 

 

10-3

 

 

SNRavg = 15 dB, fm = 5 Hz

 

 

 

 

 

 

SNRavg = 15 dB, fm = 30 Hz

 

 

10-

4

 

 

 

 

 

 

30

40

50

60

70

80

 

 

 

 

 

Source rate

(kb/s)

 

 

ˆ

(μ) vs source rate μ.

Figure 8.10 Estimated function θ

Probability Pr{D(t)>Dmax}

100

10-1

10-2

10-3

fm=5

fm=10 fm=15 fm=30

50 100 150 200 250 300 Delay bound D max (ms)

REFERENCES 255

 

100

}

 

max

10-1

D

Pr{D(t)>

 

Probability

10-2

 

 

10-3

50 100 150 200 250 300 Delay bound D max (ms)

Figure 8.11 Actual delay-violation probability vs Dmax for various Doppler rates. (a) Rayleigh fading and (b) Ricean fading K = 3.

Figure 8.11 shows the actual delay-violation probability supt Pr{D(t) > Dmax} vs the delay bound Dmax, for various Doppler rates. It can be seen that the actual delay-violation probability decreases exponentially with the delay bound Dmax, for all the cases. This justifies the use of an exponential bound, Equation (8.33), in predicting QoS, thereby justifying

the link model { ˆ ˆ }. The figure shows that delay-violation probability reduces with the

γ , θ

Doppler rate. This is reasonable since the increase of the Doppler rate leads to the increase

of time diversity, resulting in a larger decay rate ˆ ( ) of the delay-violation probability.

θ μ

More details on the topic can be found in References [11–17].

REFERENCES

[1]ATM Forum Technical Committee, Traffic Management Specification, Version 4.0.

ATM Forum, 1996.

[2]A.I. Elwalid and D. Mitra, Analysis and design of rate-based congestion control of high speed networks – I: stochastic fluid models, access regulation, Queueing Syst., vol. 9, 1991, pp. 29–63.

[3]J.S. Turner, New directions in communications (or which way to the information age?),

IEEE Commun. Mag., 1986, pp. 8–15.

[4]R.L. Cruz, A calculus for network delay, part I: network elements in isolation, IEEE Trans. Inform. Theory, vol. 37, 1991, pp. 114–131.

[5]B.L. Mark, and G. Ramamurthy, Real-time estimation and dynamic renegotiation of UPC parameters for arbitrary traffic sources in ATM networks, IEEE/ACM Trans. Networking, vol. 6, no. 6, 1998, pp. 811–828.

[6]C. Chang, Stability, queue length and delay of deterministic and stochastic queueing networks, IEEE Trans. Automat. Contr., vol. 39, 1994, pp. 913–931.

[7]G.L. Choudhury, D.M. Lucantoni and W. Whitt, Squeezing the most out of ATM, IEEE Trans. Commun., vol. 44, 1996, pp. 203–217.

256EFFECTIVE CAPACITY

[8]P.W. Glynn and W. Whitt, Logarithmic asymptotics for steadystate tail probabilities in a single-server queue, in Studies in Applied Probability, Papers in Honor of Lajos Takacs, J. Galambos and J. Gani, eds, Applied Probability Trust, 1994, pp. 131– 156.

[9]H. Kobayashi and Q. Ren, A diffusion approximation analysis of an ATM statistical multiplexer with multiple types of traffic, part I: equilibrium state solutions, in Proc. 1993 IEEE Int. Conf. Communications, Geneva, May 1993, vol. 2, pp. 1047–1053.

[10]B.L. Mark and G. Ramamurthy, Joint source-channel control for realtime VBR over ATM via dynamic UPC renegotiation, in Proc. IEEE Globecom’96, London, November, 1996, pp. 1726–1731.

[11]D. Wu, and R. Negi, Effective capacity: a wireless link model for support of quality of service, IEEE Trans. Wireless Commun., vol. 2, no. 4, 2003, pp. 630–643.

[12]R. Guerin and V. Peris, Quality-of-service in packet networks: Basic mechanisms and directions, Comput. Networks, ISDN, vol. 31, no. 3, 1999, pp. 169–179.

[13]S. Hanly and D. Tse, Multiaccess fading channels: Part II: Delay-limited capacities, IEEE Trans. Inform. Theory, vol. 44, 1998, pp. 2816–2831.

[14]C.-S. Chang and J.A. Thomas, Effective bandwidth in high-speed digital networks, IEEE J. Select. Areas Commun., vol. 13, 1995, pp. 1091–1100.

[15]G.L. Choudhury, D.M. Lucantoni and W. Whitt, Squeezing the most out of ATM, IEEE Trans. Commun., vol. 44, 1996, pp. 203–217.

[16]Z.-L. Zhang, End-to-end support for statistical quality-of-service guarantees in multimedia networks, Ph.D. dissertation, Department of Computer Science, University of Massachusetts, 1997.

[17]B. Jabbari, Teletraffic aspects of evolving and next-generation wireless communication networks, IEEE Pers. Commun., vol. 3, 1996, pp. 4–9.

[18]S. Chong and S. Li, (σ ; ρ)-characterization based connection control for guaranteed services in high speed networks, in Proc. IEEE INFOCOM’95, Boston, MA, April 1995, pp. 835–844.

[19]O. Yaron and M. Sidi, Performance and stability of communication networks via robust exponential bounds, IEEE/ACM Trans. Networking, vol. 1, 1993, pp. 372–385.

[20]T. Tedijanto and L. Gun, Effectiveness of dynamic bandwidth management in ATM networks, in Proc. INFOCOM’93, San Francisco, CA, March 1993, pp. 358–367.

[21]M. Grossglauser, S. Keshav, and D. Tse, RCBR: a simple and efficient service for multiple time-scale traffic, in Proc. ACM SigCom’95, Boston, MA, August 1995,

pp.219–230.

[22]D. Reininger, G. Ramamurthy and D. Raychaudhuri, VBR MPEG video coding with dynamic bandwidth renegotiation, in Proc. ICC’95, Seattle, WA, June 1995, pp. 1773– 1777.

[23]J. Abate, G.L. Choudhury, and W. Whitt, Asymptotics for steady-state tail probabilities in structured Markov queueing models, Stochastic Models, vol. 10, 1994, pp. 99–143.

[24]D.P. Heyman and T.V. Lakshman, What are the implications of long-range dependence for VBR-video traffic engineering? IEEE/ACM Trans. Networking, vol. 4, 1996,

pp.301–317.

[25]W. Whitt, Tail probabilities with statistical multiplexing and effective bandwidths in multi-class queues, Telecommun. Syst., vol. 2, 1993, pp. 71–107.

[26]D.E. Knuth, The Art of Computer Programming, Volume 2: Seminumerical Algorithms, 2nd edn. Addison-Wesley: Reading, MA, 1981.

REFERENCES 257

[27]A.I. Elwalid and D. Mitra, Effective bandwidth of general Markovian traffic sources and admission control of high speed networks, IEEE/ACM Trans. Networking, vol. 1, 1993, pp. 323–329.

[28]A.K. Parekh and R.G. Gallager, A generalized processor sharing approach to flow control in integrated services networks: The singlenode case, IEEE/ACM Trans. Networking, vol. 1, 1993, pp. 344–357.

[29]B.L. Mark and G. Ramamurthy, UPC-based traffic descriptors for ATM: How to determine, interpret and use them, Telecommun. Syst., vol. 5, 1996, pp. 109–122.