2004
DOI: 10.1109/tnet.2004.836133
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Call Admission Control on a Single Link With a GPS Scheduler

Abstract: Abstract-In this paper the problem of Call Admission Control (CAC) is considered for leaky bucket constrained sessions with deterministic service guarantees (zero loss and finite delay bound), served by a Generalized Processor Sharing scheduler at a single node in the presence of best effort traffic. Based on an optimization process a CAC algorithm capable of determining the (unique) optimal solution is derived. The derived algorithm is also applicable, under a slight modification, in a system where the best e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2006
2006
2008
2008

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…The reverse problem of selecting suitable weight factors so as to satisfy given Quality-of-Service requirements and the closely related issue of characterizing the admissible region, have received considerably less attention, see for instance [32,52,55,63,76]. Kleinrock [45,Section 4.7] introduced a class of nonanticipating and work-conserving disciplines called Multilevel ProcessorSharing (MLPS) disciplines.…”
Section: Generalized Processor Sharingmentioning
confidence: 99%
“…The reverse problem of selecting suitable weight factors so as to satisfy given Quality-of-Service requirements and the closely related issue of characterizing the admissible region, have received considerably less attention, see for instance [32,52,55,63,76]. Kleinrock [45,Section 4.7] introduced a class of nonanticipating and work-conserving disciplines called Multilevel ProcessorSharing (MLPS) disciplines.…”
Section: Generalized Processor Sharingmentioning
confidence: 99%
“…Our algorithm is designed for a single-node system but, as explained in [15], it can be extended to multiple-node systems in many situations of practical interests. For instance, when it is applied at the bottleneck node, or when it is applied at an edge node and the same bandwidth is reserved for each connection at all the nodes included in its end-to-end path.…”
Section: The Proposed Cac Algorithmmentioning
confidence: 99%
“…The "checkpoints" for a session j are defined as those time instants at which the maximum delay d j can be achieved (i.e., candidates for t * j ) [15]. According to Theorem 1, the checkpoints include d j itself and those t L (k ) greater than d j , k ∈ {1, 2, .…”
Section: Theorem 6 D J (T) Is a Monotonically Increasing Function Fomentioning
confidence: 99%
See 2 more Smart Citations