{"title":"几种漏桶网络接入方案的比较研究","authors":"X. Wu, I. Lambadaris, H. Lee, A. Kaye","doi":"10.1109/ICC.1994.368763","DOIUrl":null,"url":null,"abstract":"In order to regulate the traffic flow and achieve the best use of ATM network resources, appropriate access control is implemented to prevent the network from performance degradation due to congestion. The authors provide a comparative study of certain leaky bucket access schemes. The models include combinations of adaptive, selective cell marking and priority mechanisms. Comparisons and concluding remarks are based on simulations.<<ETX>>","PeriodicalId":112111,"journal":{"name":"Proceedings of ICC/SUPERCOMM'94 - 1994 International Conference on Communications","volume":"18 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1994-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A comparative study of some leaky bucket network access schemes\",\"authors\":\"X. Wu, I. Lambadaris, H. Lee, A. Kaye\",\"doi\":\"10.1109/ICC.1994.368763\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to regulate the traffic flow and achieve the best use of ATM network resources, appropriate access control is implemented to prevent the network from performance degradation due to congestion. The authors provide a comparative study of certain leaky bucket access schemes. The models include combinations of adaptive, selective cell marking and priority mechanisms. Comparisons and concluding remarks are based on simulations.<<ETX>>\",\"PeriodicalId\":112111,\"journal\":{\"name\":\"Proceedings of ICC/SUPERCOMM'94 - 1994 International Conference on Communications\",\"volume\":\"18 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1994-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of ICC/SUPERCOMM'94 - 1994 International Conference on Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICC.1994.368763\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of ICC/SUPERCOMM'94 - 1994 International Conference on Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICC.1994.368763","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A comparative study of some leaky bucket network access schemes
In order to regulate the traffic flow and achieve the best use of ATM network resources, appropriate access control is implemented to prevent the network from performance degradation due to congestion. The authors provide a comparative study of certain leaky bucket access schemes. The models include combinations of adaptive, selective cell marking and priority mechanisms. Comparisons and concluding remarks are based on simulations.<>