In order to regulate the traffic flow and achieve the best use of ATM network resources, appropriate access control is implemented to prevent the network from performance degradation due to congestion. In this paper, we provide a comparative study of certain leaky bucket access schemes. Our models include combinations of adaptive, selective cell marking and priority mechanisms. Comparisons and concluding remarks are based on simulations.

Additional Metadata
Conference Proceedings of the 1994 IEEE International Conference on Communications
Wu, X. (X.), Lambadaris, I, Lee, H. (H.), & Kaye, A.R. (A. R.). (1994). Comparative study of some leaky bucket network access schemes. In Conference Record - International Conference on Communications (pp. 1586–1591).