Proceedings of INFOCOM '97
DOI: 10.1109/infcom.1997.644509
|View full text |Cite
|
Sign up to set email alerts
|

Exact and efficient analysis of schedulability in fixed-packet networks: a generic approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
7
0

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…To provide the flexible but assured differentiation at the flow granularity, the best IntServ designs employ such complicated link scheduling algorithms as WFQ (Weighted Fair Queuing) [9], WF 2 Q (Worst-case Fair Weighted Fair Queueing) [2], Start-time Fair Queueing (SFQ) [20], Virtual Clock (VC) [40], or Earliest Deadline First (EDF) [10] and restrict network access with distributed admission control [17,28]. In contrast, RD routers maintain only two FIFO queues per output link and schedule the link capacity with the simple algorithm which is easy to implement even at high bitrates.…”
Section: Related Workmentioning
confidence: 99%
“…To provide the flexible but assured differentiation at the flow granularity, the best IntServ designs employ such complicated link scheduling algorithms as WFQ (Weighted Fair Queuing) [9], WF 2 Q (Worst-case Fair Weighted Fair Queueing) [2], Start-time Fair Queueing (SFQ) [20], Virtual Clock (VC) [40], or Earliest Deadline First (EDF) [10] and restrict network access with distributed admission control [17,28]. In contrast, RD routers maintain only two FIFO queues per output link and schedule the link capacity with the simple algorithm which is easy to implement even at high bitrates.…”
Section: Related Workmentioning
confidence: 99%
“…This sections discusses some of them related to our own. The approach of Gorinsky et al (1997) develops schedulability tests for traffic flow in multimedia network applications. Like in the work presented here the Processor Demand Analysis is used to determine the schedulability of a task set.…”
Section: Related Workmentioning
confidence: 99%
“…At the same time, making the traffic conform to a dual leaky bucket specification can be beneficial. According to (4) and (5), the end-to-end delay bound reaches its minimal value d,,, = 80 ms when p' = 10 F. In other words, changing the connection specification from (100 KB, 3 F) to (0, 10 y, 3 F , 80 ms) reduces the minimumendto-end delay bound almost thrice (see Figure 3 ) . Now, consider a network where all connections are characterized by the dual leaky bucket model.…”
Section: K € S " Kmentioning
confidence: 93%
“…According to [4], the minimumdelay bound that can be guaranteed over link k without reshaping is equal to: Then the end-to-end delay for connection C without reshaping is bounded by:…”
Section: K € S " Kmentioning
confidence: 99%
See 1 more Smart Citation