[PDF][PDF] Bandwidth management and congestion control in plaNET
ROCH GUÉRIN is a member of the IBM Thomas J. Watson Research Center. acket-switched
networkshave changcd considerably in recentyears. One fac-tor has been the dramatic …
networkshave changcd considerably in recentyears. One fac-tor has been the dramatic …
Analysis of the leaky bucket algorithm for on-off data sources
N Yin, MG Hluchyj - Journal of High Speed Networks, 1993 - content.iospress.com
The leaky bucket algorithm has been proposed as an important element in the rate-based
management of bandwidth in high-performance, integrated packet communication networks …
management of bandwidth in high-performance, integrated packet communication networks …
The AURORA gigabit testbed
AURORA is one of five US networking testbeds charged with exploring applications of, and
technologies necessary for, networks operating at gigabit per second or higher bandwidths …
technologies necessary for, networks operating at gigabit per second or higher bandwidths …
Effects of leaky bucket parameters on the average queueing delay: Worst case analysis
DC Lee - Proceedings of INFOCOM'94 Conference on …, 1994 - ieeexplore.ieee.org
Studies a single server queueing system with deterministic service time in which arrivals are
regulated by the leaky-bucket control. The worst traffic of arrivals passing the leaky-bucket …
regulated by the leaky-bucket control. The worst traffic of arrivals passing the leaky-bucket …
Systems approach to modeling the token bucket algorithm in computer networks
NU Ahmed, QUN Wang… - Mathematical problems in …, 2002 - Wiley Online Library
In this paper, we construct a new dynamic model for the Token Bucket (TB) algorithm used in
computer networks and use systems approach for its analysis. This model is then …
computer networks and use systems approach for its analysis. This model is then …
Usage parameter control and bandwidth allocation methods considering cell delay variation in ATM networks
N Yamanaka, Y Sato, K Sato - IEICE Transactions on …, 1993 - search.ieice.org
This paper proposes an ATM traffic management method that utilizes a deterministic source
traffic descriptor, a deterministic Usage Parameter Control (UPC) algorithm and a …
traffic descriptor, a deterministic Usage Parameter Control (UPC) algorithm and a …
Performance limitation of the leaky bucket algorithm for ATM networks
N Yamanaka, Y Sato, KI Sato - IEEE transactions on …, 1995 - ieeexplore.ieee.org
The performance limitation of the" leaky bucket algorithm" is analyzed for usage parameter
control and traffic management in asynchronous transfer mode (ATM) networks. Simulation …
control and traffic management in asynchronous transfer mode (ATM) networks. Simulation …
Traffic control in ATM networks
I Khan, VOK Li - Computer networks and ISDN systems, 1994 - Elsevier
This paper presents a framework to study the problem of traffic control in ATM networks.
Bursty traffic sources are modelled by Interrupted Bernoulli Processes. Probability of …
Bursty traffic sources are modelled by Interrupted Bernoulli Processes. Probability of …
A bibliography on performance issues ATM networks
I Nikloaidis, RO Onvural - ACM SIGCOMM Computer Communication …, 1992 - dl.acm.org
The Asynchronous Transfer Mode (ATM) is the transport mode of choice for B-ISDN. In order
for high speed networks to become a reality, a number of performance issues has to be …
for high speed networks to become a reality, a number of performance issues has to be …
Asynchronous traffic handling in time-sensitive in-vehicle network
An Ethernet-based in-vehicle network (IVN) gateway with IEEE 802.1 time-sensitive
networking (TSN) is advantageous to be used in a time-aware shaper (TAS), as defined in …
networking (TSN) is advantageous to be used in a time-aware shaper (TAS), as defined in …