1994
DOI: 10.1016/0166-5316(94)90005-1
|View full text |Cite
|
Sign up to set email alerts
|

Effective bandwidth and fast simulation of ATM intree networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
114
0

Year Published

1996
1996
2008
2008

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 121 publications
(117 citation statements)
references
References 23 publications
2
114
0
Order By: Relevance
“…For c 1 < −κ (t) the first queue plays a more explicit role in delaying and reshaping the traffic before entering the second queue. This sharp dichotomy is in line with those in, e.g., [15,33].…”
Section: Lemma 41 For Allsupporting
confidence: 65%
See 1 more Smart Citation
“…For c 1 < −κ (t) the first queue plays a more explicit role in delaying and reshaping the traffic before entering the second queue. This sharp dichotomy is in line with those in, e.g., [15,33].…”
Section: Lemma 41 For Allsupporting
confidence: 65%
“…[26] considers a series of queues with exponential service times, and uses sample-path large deviations to characterize the queueing asymptotics. An early reference on the concept of effective bandwidths, and particularly those of departure processes, is [15]; related results are presented in [9,10,19]. Results for sojourn times in the heavy-tailed case are given in [6], and see also [23] for recent results on a specific class of light-tailed distributions.…”
Section: Introductionmentioning
confidence: 99%
“…To improve the simulation accuracy, we use importance-sampling (IS) [16] whenever applicable. The rate matrices of the on-off Markov fluid sources are adjusted according to the techniques presented in [17] to speed up the simulation.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…One thing to note is that in each run of the iterative root-finding algorithm to check a candidate solution point , the calculation of and its inclusion in the sum in the left side of (17) need to be done only for those regions with overload states. With the value, can be easily solved from (16). If the input peak rate decreases below the channel capacity when buffer content exceeds , the algorithm gives , and there is no packet loss for the traffic of classes .…”
Section: ) Wherementioning
confidence: 99%
See 1 more Smart Citation