咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Policing method for Markovian ... 收藏

Policing method for Markovian traffic descriptors of VBR MPEG sources over ATM networks

作     者:Yoo, SJ Kim, SD 

作者机构:Inha Univ Grad Sch Informat Technol & Telecommun Inchon 402751 South Korea Korea Adv Inst Sci & Technol Dept Elect Engn Taejon 305701 South Korea 

出 版 物:《IEE PROCEEDINGS-COMMUNICATIONS》 (IEE Proc Commun)

年 卷 期:2001年第148卷第2期

页      面:70-76页

核心收录:

学科分类:0810[工学-信息与通信工程] 0808[工学-电气工程] 08[工学] 081001[工学-通信与信息系统] 

主  题:code standards variable rate codes exponential bounding function quality of service video coding telecommunication standards telecommunication congestion control network resource allocation management monitoring parameters ATM networks bandwidth utilisation Communication switching call admission control input traffic monitoring telecommunication network management Markov processes network resources protection malicious traffic QoS prediction policing method packet switching video sequence scene-based Markov model telecommunication traffic Markovian traffic descriptor visual communication VBR MPEG sources abnormally behaved traffic Image and video coding Network management flow control simulation results asynchronous transfer mode dynamic behaviour MPEG video traffic image sequences resource allocation 

摘      要:An efficient policing mechanism for Markov model-based traffic descriptors of VBR MPEG video traffic is proposed. A VBR video sequence is described by a set of traffic descriptors using a scene-based Markov model for effective resource allocation and accurate QoS prediction. To monitor the input traffic from the source, the authors have defined a set of a limited number of representative monitoring parameters and also defined an exponential bounding function in order to accommodate dynamic behaviour. The simulation results show that the proposed policing mechanism for Markovian traffic descriptors monitors sophisticated traffic, such as MPEG video, effectively and also protects network resources from both malicious and abnormally behaved traffic.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分