ATM: bandwidth assignment and bandwidth enforcement policies
暂无分享,去创建一个
Two techniques are presented: the class-related rule and the virtual leaky bucket mechanism. It is shown that the former can effectively solve the bandwidth-assignment problem for ATM (asynchronous transfer mode) when different classes of services are multiplexed on the same network trunk. The virtual leaky bucket technique is used as a bandwidth-enforcement policy. It has the advantage of combining the policing function on each source with congestion control on the cell loss rate in the network. The implementation complexity is not cumbersome, and both techniques can be realized with existing technology at the B-ISDN (broadband integrated services digital network) transmission speed.<<ETX>>
[1] David M. Lucantoni,et al. A Markov Modulated Characterization of Packetized Voice and Data Traffic and Related Statistical Multiplexer Performance , 1986, IEEE J. Sel. Areas Commun..
[2] Ward Whitt,et al. Characterizing Superposition Arrival Processes in Packet Multiplexers for Voice and Data , 1986, IEEE J. Sel. Areas Commun..
[3] Jonathan S. Turner,et al. The Challenge of Multipoint Communication , 1987 .
[4] Jonathan S. Turner,et al. Design of an integrated services packet network , 1985, SIGCOMM '85.