Comparative study of some leaky bucket network access schemes
In order to regulate the traffic flow and achieve the best use of ATM network resources, appropriate access control is implemented to prevent the network from performance degradation due to congestion. In this paper, we provide a comparative study of certain leaky bucket access schemes. Our models include combinations of adaptive, selective cell marking and priority mechanisms. Comparisons and concluding remarks are based on simulations.
|Proceedings of the 1994 IEEE International Conference on Communications|
|Organisation||Department of Systems and Computer Engineering|
Wu, X. (X.), Lambadaris, I, Lee, H. (H.), & Kaye, A.R. (A. R.). (1994). Comparative study of some leaky bucket network access schemes. In Conference Record - International Conference on Communications (pp. 1586–1591).