{"title":"包交换网络中一些端到端流量控制策略的比较","authors":"G. Pujolle","doi":"10.1109/MARK.1979.8817269","DOIUrl":null,"url":null,"abstract":"Various techniques may be considered when it comes to setting up a communications system between computers. The \"packet-switching\" technique described by Davies 1 seems to be one of the best of existing approaches. In the following we consider only such a technique—users of a computer network communicate with each other by the intermediate of a store-and-forward packet-switching network.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Comparison of some end-to-end flow control policies in a packet-switching network\",\"authors\":\"G. Pujolle\",\"doi\":\"10.1109/MARK.1979.8817269\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Various techniques may be considered when it comes to setting up a communications system between computers. The \\\"packet-switching\\\" technique described by Davies 1 seems to be one of the best of existing approaches. In the following we consider only such a technique—users of a computer network communicate with each other by the intermediate of a store-and-forward packet-switching network.\",\"PeriodicalId\":341008,\"journal\":{\"name\":\"1979 International Workshop on Managing Requirements Knowledge (MARK)\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1899-12-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1979 International Workshop on Managing Requirements Knowledge (MARK)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MARK.1979.8817269\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1979 International Workshop on Managing Requirements Knowledge (MARK)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MARK.1979.8817269","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparison of some end-to-end flow control policies in a packet-switching network
Various techniques may be considered when it comes to setting up a communications system between computers. The "packet-switching" technique described by Davies 1 seems to be one of the best of existing approaches. In the following we consider only such a technique—users of a computer network communicate with each other by the intermediate of a store-and-forward packet-switching network.