Comparison of traffic management schemes for ATM networks
暂无分享,去创建一个
[1] Ken-ichi Sato,et al. Usage parameter control and bandwidth allocation methods for ATM-based B-ISDN , 1992, CCRV.
[2] Ken-ichi Sato,et al. Precise UPC Scheme Suitable for ATM Networks Characterized by Widely Ranging Traffic Parameter Values , 1992 .
[3] Ken-ichi Sato,et al. Performance Limitation of Leaky Bucket Algorithm for Usage Parameter Control and Bandwidth Allocation Methods , 1992 .
[4] W. C. Lindsey,et al. The Single Server Queue with Periodic Arrival Process'and Deterministic Service Times , 1979 .
[5] Ken-ichi Sato,et al. Broad-band ATM network architecture based on virtual paths , 1990, IEEE Trans. Commun..
[6] J. Turner,et al. New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.
[7] Jorma T. Virtamo,et al. The superposition of periodic cell arrival streams in an ATM multiplexer , 1991, IEEE Trans. Commun..
[8] Gerd Niestegge,et al. The ‘leaky bucket’ policing method in the ATM (asynchronous transfer mode) network , 1990 .
[9] Amit Bhargava,et al. Queueing analysis of continuous bit-stream transport in packet networks , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.
[10] G. Niestegge,et al. The leaky bucket policing method in the ATM network , 1990 .