{"title":"令牌传递系统的通用访问控制策略","authors":"J. Pang, F. Tobagi","doi":"10.1109/INFCOM.1989.101472","DOIUrl":null,"url":null,"abstract":"A very large class of access control strategies is proposed and studied for token passing systems, generalized from the timer-based approach. The idea is to assign transmission quotas dependent on past service times to control the token cycles dynamically while utilizing the token channel efficiently. The dynamics inherent in the control scheme are identified as an important issue and, under heavy load and a few other assumptions, it is shown that the proposed strategies have stable dynamics. Furthermore, the ability of the proposed strategies to control the token cycles is demonstrated. Theoretical results are derived, followed by a thorough discussion on the crucial properties of the new strategies.<<ETX>>","PeriodicalId":275763,"journal":{"name":"IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Generalized access control strategies for token passing systems\",\"authors\":\"J. Pang, F. Tobagi\",\"doi\":\"10.1109/INFCOM.1989.101472\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A very large class of access control strategies is proposed and studied for token passing systems, generalized from the timer-based approach. The idea is to assign transmission quotas dependent on past service times to control the token cycles dynamically while utilizing the token channel efficiently. The dynamics inherent in the control scheme are identified as an important issue and, under heavy load and a few other assumptions, it is shown that the proposed strategies have stable dynamics. Furthermore, the ability of the proposed strategies to control the token cycles is demonstrated. Theoretical results are derived, followed by a thorough discussion on the crucial properties of the new strategies.<<ETX>>\",\"PeriodicalId\":275763,\"journal\":{\"name\":\"IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-04-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFCOM.1989.101472\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFCOM.1989.101472","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Generalized access control strategies for token passing systems
A very large class of access control strategies is proposed and studied for token passing systems, generalized from the timer-based approach. The idea is to assign transmission quotas dependent on past service times to control the token cycles dynamically while utilizing the token channel efficiently. The dynamics inherent in the control scheme are identified as an important issue and, under heavy load and a few other assumptions, it is shown that the proposed strategies have stable dynamics. Furthermore, the ability of the proposed strategies to control the token cycles is demonstrated. Theoretical results are derived, followed by a thorough discussion on the crucial properties of the new strategies.<>