{"title":"A comparative study of some leaky bucket network access schemes","authors":"X. Wu, I. Lambadaris, H. Lee, A. Kaye","doi":"10.1109/ICC.1994.368763","DOIUrl":null,"url":null,"abstract":"In order to regulate the traffic flow and achieve the best use of ATM network resources, appropriate access control is implemented to prevent the network from performance degradation due to congestion. The authors provide a comparative study of certain leaky bucket access schemes. The models include combinations of adaptive, selective cell marking and priority mechanisms. Comparisons and concluding remarks are based on simulations.<<ETX>>","PeriodicalId":112111,"journal":{"name":"Proceedings of ICC/SUPERCOMM'94 - 1994 International Conference on Communications","volume":"18 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1994-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of ICC/SUPERCOMM'94 - 1994 International Conference on Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICC.1994.368763","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
In order to regulate the traffic flow and achieve the best use of ATM network resources, appropriate access control is implemented to prevent the network from performance degradation due to congestion. The authors provide a comparative study of certain leaky bucket access schemes. The models include combinations of adaptive, selective cell marking and priority mechanisms. Comparisons and concluding remarks are based on simulations.<>