{"title":"The poucing function in atm networks","authors":"E. Rathgeb, T. Theimer","doi":"10.1109/ISS.1990.765819","DOIUrl":null,"url":null,"abstract":"ATM networks have been proposed by CCITT as the solution for future lntegrated Broadband Communication Networks. They provide a high flexibility with regard to varying bandwidth requirements for different services as well as the momentary bitrate within a connection (bitrale on demand). For the network operator this results in a need to control the individual connections in order to ensure an acceptable quality of service for all existing connections by means of a so called policing or source monitoring junction. In this paper, some basic aspects of this function including the dimensioning of its parameters are addressed using the 'Leaky Bucket' mechanism as an example.","PeriodicalId":277204,"journal":{"name":"International Symposium on Switching","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Symposium on Switching","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISS.1990.765819","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19
Abstract
ATM networks have been proposed by CCITT as the solution for future lntegrated Broadband Communication Networks. They provide a high flexibility with regard to varying bandwidth requirements for different services as well as the momentary bitrate within a connection (bitrale on demand). For the network operator this results in a need to control the individual connections in order to ensure an acceptable quality of service for all existing connections by means of a so called policing or source monitoring junction. In this paper, some basic aspects of this function including the dimensioning of its parameters are addressed using the 'Leaky Bucket' mechanism as an example.