Index 663
efficiency of, 249
performance, 249–252
performance bounds, 252–253
M
m
/M/1/B queue, 225, 241–242
alternative solution method, 247
efficiency, 243
performance, 242–246
performance bounds on, 246–247
stability of queue, 241
M/M/1 queue, 225, 227–230
average queue size versus distribution
index ρ, 225, 227–230
continuous-time, 230
for discrete-time
state transition diagram, 228
efficiency of, 230, 231
example, 227
performance, 230–233
queue performance, 230–233
throughput, 231
throughput for, 230–231
Modeling network traffic, 383–384
continuous-time modeling: Poisson traffic
description, 387–389
extracting Poisson traffic parameters,
394–395
flow description, 392
interarrival time description, 392–394
memoryless property of Poisson traffic,
389–391
Poisson traffic and queuing analysis,
395–398
realistic models for Poisson traffic, 391
destination statistics, 420
broadcast traffic, 420–421
hot-spot traffic, 421–422
uniform traffic, 420
discrete-time modeling: interarrival time
for Bernoulli traffic, 398–401
extracting parameters, 404–405
memoryless property of, 402
queuing analysis, 405–407
realistic models for, 401, 403–404
flow traffic models, 384
autoregressive models, 387
Markov modulated Poisson process,
386–387
modulated Poisson processes, 384–385
on–off model, 385–386
heavy-tailed distributions, 409
interarrival time traffic modeling with
arbitrary source distribution,
418–420
packet length statistics, 422–423
packet transmission error description,
423–425
Pareto traffic distribution, 409–411
extracting Pareto interarrival time
statistics, 412–414
flow description, 411
interarrival time description, 411–412
queuing analysis, 414–417
self-similarity and random processes,
408–409
self-similar traffic, 407–408
traffic data rate modeling with arbitrary
source distribution, 417–418
Modeling traffic flow control protocols, 269
leaky bucket algorithm, 269–271
modeling leaky bucket algorithm,
271–272
multiple arrival/single departure model
(M
m
/M/1/B), 276–278
performance (M/M/1/B case),
274–276
performance (M
m
/M/1/B case),
278–280
single arrival/single departure model
(M/M/1/B), 272–273
token bucket algorithm, 280–281
modeling, 282
multiple arrivals/single departures
model (M
m
/M/1/B), 288–291
single arrival/single departures model
(M/M/1/B), 282–285
token bucket performance (M/M/1/B
case), 285–288
token bucket performance (multiple
arrival/departure case), 291–295
virtual scheduling (VS) algorithm, 295–296
modeling, 296–297
protocol performance, 298–299
Multiplication principle, probability, 4–5
Multistage interconnection networks, 515–516,
517–518
classification, 516
factors determining MIN complexity, 516
N × N multistage interconnection
network, 516
Mutually exclusive events, 4
N
Network, delay of, 514
Network design parameters, 507
network hardware, 508
network performance, 507–508
scalability issues, 508–509