Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
DOI: 10.1109/infcom.2005.1498353
|View full text |Cite
|
Sign up to set email alerts
|

Connection admission control for flow level QoS in bufferless models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…We note that predicting the loss probability of statistical multiplexing from statistical descriptors of the video traffic has been extensively studied for MPEG encoded videos and verified through simulations with traces of MPEG encoded videos, see e.g., [56], [65]- [70]. Generally, such prediction works relatively well when the number of multiplexed streams is high and the streams are relatively smooth.…”
Section: B Bufferless Statistical Multiplexingmentioning
confidence: 84%
See 2 more Smart Citations
“…We note that predicting the loss probability of statistical multiplexing from statistical descriptors of the video traffic has been extensively studied for MPEG encoded videos and verified through simulations with traces of MPEG encoded videos, see e.g., [56], [65]- [70]. Generally, such prediction works relatively well when the number of multiplexed streams is high and the streams are relatively smooth.…”
Section: B Bufferless Statistical Multiplexingmentioning
confidence: 84%
“…In the real-time frame-based video streaming scenario based on a bufferless statistical multiplexer [56], [65]- [67], a channel with bandwidth capacity [bit/s] connects a streaming video server with a bufferless statistical multiplexer to receivers. Each video frame is transmitted during one frame period (e.g., 33 ms for a frame rate of 30 frames/s).…”
Section: B Bufferless Statistical Multiplexingmentioning
confidence: 99%
See 1 more Smart Citation
“…Deciding who will gain the access has been an active research topic on admission control for decades [e.g., 10,12,13,14,15,16,17]. Many theories and practical solutions have been developed for admission control of connectionoriented traffic flows, but there are two fundamental approaches [18].…”
Section: Introductionmentioning
confidence: 99%
“…Many theories and practical solutions have been developed for admission control of connectionoriented traffic flows, but there are two fundamental approaches [18]. They are parameter-based schemes, where decisions are derived from the known traffic and network descriptors [12,14,15], and measurement-based methods, in which traffic is characterized from the network measurements rather than relying on known traffic descriptors [10,13,17,20]. Furthermore, from the control granularity view point, most of the work for packet networks focused on flow or connection level control, so that a new connection or flow is admitted if it does not degrade the performance of existing flows.…”
Section: Introductionmentioning
confidence: 99%