{"title":"Generalized access control strategies for token passing systems","authors":"J. Pang, F. Tobagi","doi":"10.1109/INFCOM.1989.101472","DOIUrl":null,"url":null,"abstract":"A very large class of access control strategies is proposed and studied for token passing systems, generalized from the timer-based approach. The idea is to assign transmission quotas dependent on past service times to control the token cycles dynamically while utilizing the token channel efficiently. The dynamics inherent in the control scheme are identified as an important issue and, under heavy load and a few other assumptions, it is shown that the proposed strategies have stable dynamics. Furthermore, the ability of the proposed strategies to control the token cycles is demonstrated. Theoretical results are derived, followed by a thorough discussion on the crucial properties of the new strategies.<<ETX>>","PeriodicalId":275763,"journal":{"name":"IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFCOM.1989.101472","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
A very large class of access control strategies is proposed and studied for token passing systems, generalized from the timer-based approach. The idea is to assign transmission quotas dependent on past service times to control the token cycles dynamically while utilizing the token channel efficiently. The dynamics inherent in the control scheme are identified as an important issue and, under heavy load and a few other assumptions, it is shown that the proposed strategies have stable dynamics. Furthermore, the ability of the proposed strategies to control the token cycles is demonstrated. Theoretical results are derived, followed by a thorough discussion on the crucial properties of the new strategies.<>