The asynchronous transfer mode: a tutorial

JY Le Boudec - Computer Networks and ISDN systems, 1992 - Elsevier
Abstract The Asynchronous Transfer Mode (ATM) is the switching and multiplexing
technique chosen by CCITT for the broadband access to the ISDN. The user-network …

Methodologies for bandwidth allocation, transmission scheduling, and congestion avoidance in broadband ATM networks

K Sriram - Computer Networks and ISDN Systems, 1993 - Elsevier
The call types supported in high-speed packet networks vary widely in their bandwidth
requirements and tolerance to message delay and loss. In this paper, we classify various …

A unified approach to bandwidth allocation and access control in fast packet-switched networks

R Guerin - [Proceedings] IEEE INFOCOM'92: The Conference …, 1992 - ieeexplore.ieee.org
The authors present an approach to computing access control parameters as a function of
both source characteristics and bandwidth allocation in the network. The technique relies on …

Xunet 2: A nationwide testbed in high-speed networking

AG Fraser, CR Kalmanek, AE Kaplan… - … ] IEEE INFOCOM'92 …, 1992 - ieeexplore.ieee.org
Xunet 2 is an experimental wide-area network that serves as a testbed for research on data
communications techniques. The authors provide an overview of the architecture of the …

Bandwidth management and congestion control framework of the broadband network architecture

L Gün, R Guérin - Computer Networks and ISDN Systems, 1993 - Elsevier
In this paper we describe an integrated set of procedures for bandwidth management and
congestion control in IBM's broadband network architecture for high speed networks. These …

On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes

K Sohraby, M Sidi - IEEE INFCOM'91. The conference on …, 1991 - ieeexplore.ieee.org
The analysis of a rate-based access control scheme in high speed environments that is
based on a buffered leaky bucket algorithm is presented. The analysis is carried out in …

On the performance of bursty and modulated sources subject to leaky bucket rate-based access control schemes

K Sohraby, M Sidi - IEEE Transactions on Communications, 1994 - ieeexplore.ieee.org
Provides an analysis of a rate-based access control scheme in high speed environments
based on a buffered leaky bucket algorithm. The analysis is carried out in discrete time …

Discrete time analysis of leaky-bucket congestion control

GL Wu, JW Mark - Computer Networks and ISDN systems, 1993 - Elsevier
Traffic control at an ATM multiplexer is of fundamental importance in B-ISDN. Due to the
presence of large propagation delay, effective traffic control tends to use only local …

Transient analysis of the leaky bucket rate control scheme under poisson and on-off sources

D Logothetis, K Trivedi - Proceedings of INFOCOM'94 …, 1994 - ieeexplore.ieee.org
Derives expressions for the time-dependent state probabilities and the time-averaged state-
probabilities for the leaky bucket rate control scheme. The model is based on the theory of …

Performance analysis of leaky-bucket bandwidth enforcement strategy for bursty traffics in an ATM network

YH Kim, BC Shin, CK Un - Computer Networks and ISDN Systems, 1992 - Elsevier
In this paper, we analyze the performance of the bandwidth enforcement strategy applied for
the bursty traffic. As a bandwidth enforcement strategy, we consider the leaky-bucket (LB) …