A unified congestion control strategy in ATM networks
暂无分享,去创建一个
[1] G. Gallassi,et al. Resource management and dimensioning in ATM networks , 1990, IEEE Network.
[2] A. Gravey,et al. Tagging versus strict rate enforcement in ATM networks , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.
[3] Alberto Tonietti,et al. Effectiveness of the "Leaky Bucket" Policing Mechanism in ATM Networks , 1991, IEEE J. Sel. Areas Commun..
[4] Kotikalapudi Sriram. Methodologies for Bandwidth Allocation, Transmission Scheduling, and Congestion Avoidance in Broadband ATM Networks , 1993, Comput. Networks ISDN Syst..
[5] Gerd Niestegge,et al. The ‘leaky bucket’ policing method in the ATM (asynchronous transfer mode) network , 1990 .
[6] Moshe Sidi,et al. On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes , 1991, IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings.
[7] S.E. Minzer,et al. Broadband ISDN and asynchronous transfer mode (ATM) , 1989, IEEE Communications Magazine.
[8] Erwin P. Rathgeb. Modeling and Performance Comparison of Policing Mechanisms for ATM Networks , 1991, IEEE J. Sel. Areas Commun..
[9] Vincent Egbert Bemmel. A unified end-to-end priority strategy for traffic control in an ATM-based broadband ISDN , 1993 .
[10] J. Turner,et al. New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.
[11] H. T. Mouftah,et al. Performance evaluation of congestion avoidance in broadband ISDNs , 1990, IEEE International Conference on Communications, Including Supercomm Technical Sessions.
[12] C. Anthony Cooper,et al. A reasonable solution to the broadband congestion control problem , 1990 .
[13] Tatsuya Suda,et al. Survey of traffic control schemes and protocols in ATM networks , 1991, Proc. IEEE.