Proceedings of 19th Conference on Local Computer Networks
DOI: 10.1109/lcn.1994.386607
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of admission policies in ATM based embedded real-time systems

Abstract: In this paper u e study the effect of the output link scheduling disciplin6 of an A T M switch on ihe ability of an ATM L A N lo admit real-time connections. Three ouiput link scheduling policies are studied: First Come Farst Served (FCFS), Round Robin (RR), and Packei-by-packet Generalized Processor Sharing (PGPS). Wc derive connection admission criteria for the threc: scheduling policies. To evaluate the performance of the three scheduling policies, we introduce the metric of admission probability. The admis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…We will use the admission probability (introduced by Raha, Malcom and Zhao [17]) to measure performance. The admission probability for a specific level of network load is defined as the probability of performing a successful CAC for a scenario with that load.…”
Section: Evaluation By Comparing Cac Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We will use the admission probability (introduced by Raha, Malcom and Zhao [17]) to measure performance. The admission probability for a specific level of network load is defined as the probability of performing a successful CAC for a scenario with that load.…”
Section: Evaluation By Comparing Cac Resultsmentioning
confidence: 99%
“…Instead, a firmer commitment is needed from the network, saying that it will always deliver all messages completely and within specified deadlines (with reservation for hardware failure and external physical interference). Several methods for providing such guarantees have been proposed in the literature [6,8,9,12,14,15,17,18,19,21,28]. They all provide or assume some mechanism of bandwidth sharing, and have an associated analysis that can be used by an admission control procedure toá priori answer the crucial question:…”
Section: Introductionmentioning
confidence: 99%
“…The convergence of the iterative procedure follows as a corollary, given that we showed earlier (Theorem 5) that in a stable system 1 holds, and therefore lim n!1 n 1 , = 0 : (21) As the value for n increases, the right-hand side of Equation (20) tends to go to zero. Hence, the iterative procedure converges.…”
Section: Theorem 5 For a Given Priority Assignment Ifmentioning
confidence: 69%
“…Real-time systems typically operate in a modal fashion; at any given instant of time the system operates in one of a set of known modes [20]. System operation in a specific mode is characterized by the execution and the requirements of a previously defined set of applications.…”
Section: Connection and Network Modesmentioning
confidence: 99%
“…switch is patterned after [2] and [3]. The inputs to the switch are from plant sensors or are feedback signals generated by the control processors.…”
mentioning
confidence: 99%