{"title":"ATM: bandwidth assignment and bandwidth enforcement policies","authors":"G. Gallassi, G. Rigolio, L. Fratta","doi":"10.1109/GLOCOM.1989.64249","DOIUrl":null,"url":null,"abstract":"Two techniques are presented: the class-related rule and the virtual leaky bucket mechanism. It is shown that the former can effectively solve the bandwidth-assignment problem for ATM (asynchronous transfer mode) when different classes of services are multiplexed on the same network trunk. The virtual leaky bucket technique is used as a bandwidth-enforcement policy. It has the advantage of combining the policing function on each source with congestion control on the cell loss rate in the network. The implementation complexity is not cumbersome, and both techniques can be realized with existing technology at the B-ISDN (broadband integrated services digital network) transmission speed.<<ETX>>","PeriodicalId":256305,"journal":{"name":"IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"233","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOM.1989.64249","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 233
Abstract
Two techniques are presented: the class-related rule and the virtual leaky bucket mechanism. It is shown that the former can effectively solve the bandwidth-assignment problem for ATM (asynchronous transfer mode) when different classes of services are multiplexed on the same network trunk. The virtual leaky bucket technique is used as a bandwidth-enforcement policy. It has the advantage of combining the policing function on each source with congestion control on the cell loss rate in the network. The implementation complexity is not cumbersome, and both techniques can be realized with existing technology at the B-ISDN (broadband integrated services digital network) transmission speed.<>