An Efficiency study of different model-based and measurement-based Connection Admission Control techniques using heterogeneous traffic sources

Teck Kiong Lee, Moshe Zukerman

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

5 Citations (Scopus)

Abstract

Numerous researches have been done on modeling the traffic flows in a multiservice network. Recently, an alternative proposal was made by Addie et al. The authors argued that because the central limit theorem can be applied to heavy traffic processes, therefore as more traffic is aggregated together through the sharing of a transmission link, the aggregated traffic will weakly converges to a Gaussian process. In this paper, we apply this Gaussian model to the Connection Admission Control (CAC) of a multiservice network. We also make efficiency comparison with a CAC based on an Effective Bandwidth model. Two scenarios were considered: the first assumes that all a priori traffic specifications are known before a CAC acceptance/rejection decision is made; while the second assumes that only the peak rate of a new (requesting admission) connection is declared to the CAC mechanism. The latter scenario entails measurement-based CAC approach.
Original languageEnglish
Title of host publicationIEEE ATM Workshop '99 Proceedings
Subtitle of host publicationOpening the New Horizons to ward Global Multimedia Services
PublisherIEEE
Pages89-94
ISBN (Print)4-88552-164-5
Publication statusPublished - May 1999
Externally publishedYes
Event5th IEEE ATM Workshop 'Opening the New Horizons toward Global Multimedia Services' - Kochi, Japan
Duration: 24 May 199927 May 1999

Publication series

NameIEEE ATM Workshop, Proceedings

Conference

Conference5th IEEE ATM Workshop 'Opening the New Horizons toward Global Multimedia Services'
Country/TerritoryJapan
CityKochi
Period24/05/9927/05/99

Fingerprint

Dive into the research topics of 'An Efficiency study of different model-based and measurement-based Connection Admission Control techniques using heterogeneous traffic sources'. Together they form a unique fingerprint.

Cite this