For there is no overload control signal between Service Switch Point and Service Control Point at CALEL 2 stage of mobile intelligent network, we provide an overload control algorithm realized in SCP. In the algorithm...For there is no overload control signal between Service Switch Point and Service Control Point at CALEL 2 stage of mobile intelligent network, we provide an overload control algorithm realized in SCP. In the algorithm, we use a leaky bucket controller in access module to filter user calls and set an appropriate finite buffer in SCF module for protection further. The results of analysis and simulation indicate that by making the call arrival rate to SCF module equal its service rate when SCP become overloaded, the call processing rate of SCP system can keep its optimal value.展开更多
针对移动智能网在CAMEL 2阶段业务控制点(Service Control Point,SCP)与业务交换点(Service SwitchPoint,SSP)之间没有过载控制信令的情况,提出了一种多业务环境下在SCP内部实现的过载控制算法。算法通过在SCP系统的接入服务器(AS)上使...针对移动智能网在CAMEL 2阶段业务控制点(Service Control Point,SCP)与业务交换点(Service SwitchPoint,SSP)之间没有过载控制信令的情况,提出了一种多业务环境下在SCP内部实现的过载控制算法。算法通过在SCP系统的接入服务器(AS)上使用漏桶控制器,动态调整进入SCF(Service Control Function)的呼叫到达率来实现过载控制。仿真结果表明,此算法的有效性、健壮性和公平性都较好。展开更多
In ATM networks, bursty sources can be described as the Interrupted Bernoulli Process(IBP). With the use of the thin process theory, the Probability Generating Function(PGF) of the IBP is obtained. An iterative algori...In ATM networks, bursty sources can be described as the Interrupted Bernoulli Process(IBP). With the use of the thin process theory, the Probability Generating Function(PGF) of the IBP is obtained. An iterative algorithm, which can be used to calculate the IBP probability distribution, is presented. The bursty source’s equivalent description is discussed. It is proposed that the leaky bucket output process can be approximately described as the IBP. The accuracy of the analytical results has been largely validated by means of the simulation approach. Moreover, how to improve its accuracy is discussed. The smoothing function of the leaky bucket algorithm is quantitatively analyzed.展开更多
The leaky bucket algorithm with loss priorities is studied in this paper. The analytical expression of the relation among leaky bucket performance, statistical parameters of input traffic and leaky bucket, parameters ...The leaky bucket algorithm with loss priorities is studied in this paper. The analytical expression of the relation among leaky bucket performance, statistical parameters of input traffic and leaky bucket, parameters for various priority services is obtained, and the effect of adjustment factor on leaky bucket performance of higher-priority service and lower-priority service is studied with two priority classes.展开更多
基金This workis supported by Specialized Research Fundfor the Doctoral Programof Higher Education(20030013006) ,and National Specialized R&DPro-ject for the Product of Mobile Communications.
文摘For there is no overload control signal between Service Switch Point and Service Control Point at CALEL 2 stage of mobile intelligent network, we provide an overload control algorithm realized in SCP. In the algorithm, we use a leaky bucket controller in access module to filter user calls and set an appropriate finite buffer in SCF module for protection further. The results of analysis and simulation indicate that by making the call arrival rate to SCF module equal its service rate when SCP become overloaded, the call processing rate of SCP system can keep its optimal value.
文摘针对移动智能网在CAMEL 2阶段业务控制点(Service Control Point,SCP)与业务交换点(Service SwitchPoint,SSP)之间没有过载控制信令的情况,提出了一种多业务环境下在SCP内部实现的过载控制算法。算法通过在SCP系统的接入服务器(AS)上使用漏桶控制器,动态调整进入SCF(Service Control Function)的呼叫到达率来实现过载控制。仿真结果表明,此算法的有效性、健壮性和公平性都较好。
文摘In ATM networks, bursty sources can be described as the Interrupted Bernoulli Process(IBP). With the use of the thin process theory, the Probability Generating Function(PGF) of the IBP is obtained. An iterative algorithm, which can be used to calculate the IBP probability distribution, is presented. The bursty source’s equivalent description is discussed. It is proposed that the leaky bucket output process can be approximately described as the IBP. The accuracy of the analytical results has been largely validated by means of the simulation approach. Moreover, how to improve its accuracy is discussed. The smoothing function of the leaky bucket algorithm is quantitatively analyzed.
文摘The leaky bucket algorithm with loss priorities is studied in this paper. The analytical expression of the relation among leaky bucket performance, statistical parameters of input traffic and leaky bucket, parameters for various priority services is obtained, and the effect of adjustment factor on leaky bucket performance of higher-priority service and lower-priority service is studied with two priority classes.