A comparative study of some leaky bucket network access schemes

In order to regulate the traffic flow and achieve the best use of ATM network resources, appropriate access control is implemented to prevent the network from performance degradation due to congestion. The authors provide a comparative study of certain leaky bucket access schemes. The models include combinations of adaptive, selective cell marking and priority mechanisms. Comparisons and concluding remarks are based on simulations.<<ETX>>

[1]  Israel Cidon,et al.  Congestion control for high speed packet switched networks , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[2]  Arthur W. Berger,et al.  Performance analysis of a rate control throttle where tokens and jobs queue , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[3]  Moshe Sidi,et al.  On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes , 1991, IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings.

[4]  David M. Lucantoni,et al.  Meeting the challenge: congestion and flow control strategies for broadband information transport , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[5]  Israel Cidon,et al.  Paris: An approach to integrated high‐speed private networks , 1988 .

[6]  J. Turner,et al.  New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.