期刊文献+

一种新的信源模型分析

Analysis of a New Source Model
下载PDF
导出
摘要 从 Oechslin提出的模型出发 ,对媒体流的业务模型进行了理论分析 .讨论了丢失率随网络利用率 ρ、中间态的转移速率 β的变化情况 ,发现对称三态 ON/ OFF模型能产生比标准 ON/ OFF模型更大的丢失率 .而且对称三态 ON/ OFF模型计算相对简单 ,对于某些特殊的信源 ,采用对称三态 ON/ OFF模型能提供更好的近似和估计 . The traffic modeling of multimedia stream provided by Oechslin is theoretically analyzed. The PLP (packet loss probability) variation with network utility and the transition rate of middle state has been studied. It shows that the new symmetric three states ON/OFF model can give a higher loss rate than the standard ON/OFF model. As the symmetric three states ON/OFF is relatively simple in computation, in some special case, it can provide better estimation than the traditional ON/OFF model.
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2002年第5期633-636,共4页 Transactions of Beijing Institute of Technology
关键词 信源模型 包丢失率 利用率 峰值速率 服务速率 多媒体通信 网络传输 packet loss probability utility peak rate service rate
  • 相关文献

参考文献10

  • 1[1]Stamoulis G D, Anagnostou M E, Georgantas A D. Traffic source models for ATM networks: A survey[J]. Computer Communication,1994,17(6):428-438.
  • 2[2]Yang T, Tsang H K. A novel approach to estimating the cell loss probability in an multiplexer with homogeneous ON-OFF sources[J]. IEEE Trans Commun, 1995,43(1):117-126.
  • 3[3]Cosmas J P, Petit G H, Lehnert R, et al. A review of voice, data and video traffic models for ATM[J]. ETT,1994,5(2):11-26.
  • 4[4]Worster T. Modeling deterministic queues: The leaky bucket as an arrival process[J].Proceedings of International Telecommunication 14, 1994,1:581-590.
  • 5[5]Johri P K. Estimating cell loss rates in high-speed networks with leaky bucket controlled sources[J]. International Journal of Communication Systems, 1995,8:303-311.
  • 6[6]Elwalid A, Mitra D, Wentworth R. A new approach for allocating buffers and bandwidth to heterogeneous, regulated traffic in an ATM node[J]. IEEE Journal of Selected Area on Communication, 1995,13(6):1115-1127.
  • 7[7]Doshi B T. Deterministic rule based traffic descriptors for broadband ISDN: Worst case behavior and connection acceptance control[J]. Proceedings of International Telecommunication 14, 1994,1:591-600.
  • 8[8]Yamanaka N, Sato Y, Stao K I. Performance limitation of leaky bucket algorithm for usage parameter control and bandwidth allocation methods[J]. IEICE Transaction on Communication, 1998,E75-B(2):82-86.
  • 9[9]Oechslin P, Worst case arrivals of leaky bucket constrained sources: The myth of the on-off, source[M]. London: Campbell and Hall,1997.67-76.
  • 10[10]Schwartz M. Broadband integrated networks[M]. Englewood Cliffs, New Jersey: Prentice Hall PTR, 1996.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部