Diffusion approximation as a modelling tool
T Czachórski, F Pekergin - … Engineering: A Handbook on Convergent Multi …, 2011 - Springer
Diffusion theory is already a vast domain of knowledge. This tutorial lecture does not cover
all results; it presents in a coherent way an approach we have adopted and used in analysis …
all results; it presents in a coherent way an approach we have adopted and used in analysis …
[PDF][PDF] Diffusion approximation as a modeling tool in congestion control and performance evaluation
T Czachórski, F Pekergin - Proc. of HET-NET, 2004 - researchgate.net
Diffusion theory is already a vast domain of modelling and performance evaluation. This
tutorial does not cover all results but it presents in a coherent way an approach we have …
tutorial does not cover all results but it presents in a coherent way an approach we have …
Performance analysis of fuzzy thresholding-based buffer management for a large-scale cell-switching network
Q Razouqi, SS Joo, S Ghosh - IEEE Transactions on Fuzzy …, 2000 - ieeexplore.ieee.org
This paper addresses three key issues in buffer management in cell switching networks
including asynchronous transfer mode (ATM) networks. First, it develops a model of fuzzy …
including asynchronous transfer mode (ATM) networks. First, it develops a model of fuzzy …
A tool to model network transient states with the use of diffusion approximation
T Czachórski, M Pastuszka, F Pekergin - … Evaluation: Modelling Techniques …, 1998 - Springer
The paper presents a library of classes which are written in C++ and help to construct
queueing network models based on diffusion approximation. The models have the form of …
queueing network models based on diffusion approximation. The models have the form of …
Diffusion models of leaky bucket and partial buffer sharing policy: transient analysis
T Czachórski, F Pekergin - … : Performance modelling and analysis volume 3 …, 1997 - Springer
Leaky bucket and partial buffer sharing policy have already become classic examples of
preventive and reactive traffic control functions implemented in ATM networks. They help to …
preventive and reactive traffic control functions implemented in ATM networks. They help to …
A performance study of a new congestion management scheme in ATM broadband networks: the multiple push-out
In this paper, we present a new congestion management scheme intended to control cell
loss in ATM switches. Most of the research propositions tackling the congestion control …
loss in ATM switches. Most of the research propositions tackling the congestion control …
The impact of the reactive functions on the LAN interconnection by a Frame-Relay Net
This article proposes the use of a diffusion approximation to model the effect of preventive
and reactive functions implemented in a Frame-Relay network interconnecting LAN …
and reactive functions implemented in a Frame-Relay network interconnecting LAN …
Monotonicity and efficient computation of bounds with time parallel simulation
We adapt Nicol's approach for the time parallel simulation with fix-up computations. We use
the concept of monotonicity of a model related to the initial state of the simulation to derive …
the concept of monotonicity of a model related to the initial state of the simulation to derive …
A guaranteed-no-cells-dropped buffer management scheme with selective blocking for cell-switching networks
Q Razouqi, T Lee, S Ghosh - Computer Communications, 1998 - Elsevier
Fundamentally, the inclusion of bursty traffic, the desire to achieve a cost-effective network
design, ie to obtain maximum throughput in a given network while minimizing cell loss, and …
design, ie to obtain maximum throughput in a given network while minimizing cell loss, and …
A performance analysis of the ATM multiplexer with selective discarding of the cells during congestion
MMA Asrin - Performance Evaluation, 2001 - Elsevier
In this paper, we present a discrete-time queuing analysis of the ATM multiplexer fed by
independent binary Markov sources with two priority classes of cells. Each source alternates …
independent binary Markov sources with two priority classes of cells. Each source alternates …