2016
DOI: 10.1016/j.comnet.2016.08.015
|View full text |Cite
|
Sign up to set email alerts
|

Modelling overflow systems with distributed secondary resources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 34 publications
(24 citation statements)
references
References 27 publications
0
21
0
Order By: Relevance
“…The occupancy distribution in SR can be approximated by the distribution proposed in [47] which, in the adopted notation for the distribution (11) for v = (V 0 +V vir 0 )/Z 0 , can be written as follows: (21) Note that if the compression mechanism is applied only in PR (SR), then to model the resources of SR (PR) the model (19) (model (18)) is used.…”
Section: Model Of a System With Streaming Trafficmentioning
confidence: 99%
See 1 more Smart Citation
“…The occupancy distribution in SR can be approximated by the distribution proposed in [47] which, in the adopted notation for the distribution (11) for v = (V 0 +V vir 0 )/Z 0 , can be written as follows: (21) Note that if the compression mechanism is applied only in PR (SR), then to model the resources of SR (PR) the model (19) (model (18)) is used.…”
Section: Model Of a System With Streaming Trafficmentioning
confidence: 99%
“…The model [41], [42] has provided a basis for a construction of a large number of advanced models of overflow systems. For example, in [47], [48], limited availability of secondary resources is taken into consideration, while in [49], systems with multiservice Engset traffic streams, generated by a finite number of traffic sources, are considered. A possibility to service elastic traffic is taken into consideration in [47], [50], while in [51] a model of an overflow system with adaptive traffic is developed.…”
Section: Introductionmentioning
confidence: 99%
“…Kaufman-Roberts formula ( [18,28]) has led to various extensions of the EMLM either in wired (e.g., [10,12,13,15,16,19,21,26,31,33,34,36,39]) or wireless (e.g., [5,7,17,22,27,35,37,38,44,47]), satellite (e.g., [45,46]) and optical networks (e.g., [3,4,6,[41][42][43]).…”
Section: Moscholiosmentioning
confidence: 99%
“…In the case of the CS policy, G(j)'s can be determined by the classical Kaufman-Roberts recursion (9), CBP by (10) and the values of y k (j) by (11) ( [18,28]):…”
Section: Moscholiosmentioning
confidence: 99%
“…The traffic overflow mechanism is applied in optimization of network resources, irrespective of the actual networking technology involved. The possibility to limit the amount of network resources being used offered by the operation of the mechanism, simultaneously with guaranteed demanded quality parameters being retained, has resulted in its wide application in both Public Switched Telephone Networks [2, 5, 25-27, 29, 32], 2G, 3G, and 4G mobile networks [4,9,17,19,20,28,30,31] and packet networks [6,8,10].…”
Section: Introductionmentioning
confidence: 99%