UM  > 科技學院  > 電腦及資訊科學系
Queuing analysis of shared-buffer switches with control scheme under bursty traffic
Fong S.; Singh S.
Source PublicationComputer Communications

Shared-buffer switches have many advantages such as relatively low cell loss rate and good buffer utilization, and they are increasingly favoured in recent VLSI switch designs for ATM. However, their performance degrades dramatically under nonuniform traffic due to the monopolization of the buffer by some favoured cells. To overcome this, restricted types of sharing and hot-spot pushout (HSPO) have been proposed, and the latter has been shown by simulation to perform better in all situations. In this paper we develop an analytical model for performance evaluation of a shared-buffer asynchronous transfer mode (ATM) switch with HSPO under bursty traffic. This analytical model is an improved version of the first model ever developed for this purpose. We balance the relative queues to approximate the effects of pushout, while keeping only four state-variables, and our model gives a good agreement with simulation, for calculating throughput and cell loss. © 1998 Elsevier Science B.V. All rights reserved.

KeywordBursty Traffic Queuing Analysis Shared-buffer Switches
URLView the original
WOS Research AreaComputer Science ; Engineering ; Telecommunications
WOS SubjectComputer Science, Information Systems ; Engineering, Electrical & Electronic ; Telecommunications
WOS IDWOS:000077741300004
Fulltext Access
Citation statistics
Cited Times [WOS]:0   [WOS Record]     [Related Records in WOS]
Document TypeJournal article
AffiliationLa Trobe University
Recommended Citation
GB/T 7714
Fong S.,Singh S.. Queuing analysis of shared-buffer switches with control scheme under bursty traffic[J]. Computer Communications,1998,21(18):1681-1692.
APA Fong S.,&Singh S..(1998).Queuing analysis of shared-buffer switches with control scheme under bursty traffic.Computer Communications,21(18),1681-1692.
MLA Fong S.,et al."Queuing analysis of shared-buffer switches with control scheme under bursty traffic".Computer Communications 21.18(1998):1681-1692.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Fong S.]'s Articles
[Singh S.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Fong S.]'s Articles
[Singh S.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Fong S.]'s Articles
[Singh S.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.