19
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Buffered Leaky Bucket Algorithm for Congestion Control in ATM Networks

, &
Pages 59-67 | Published online: 26 Mar 2015

REFERENCES

  • J S Turner, New directions in communications (or which way in the information age?), IEEE Communications Magazine, vol 24, no 10, pp 8–15, Oct 1986.
  • A E Eckberg, B T Doshi & R Zoccolino, Controlling congestion in BISDN/ATM: Issues and strategies, IEEE Communications Magazine, vol 29, no 9, pp 64–70, Sept 1991.
  • T H Lee, K C Lai & Sir Tyng Duann, Design of a Real time call admission controller for ATM networks, IEEE/ACM Transactions on Networking, vol 4, no 5, pp 758–766, 1996.
  • H Osnishi & T Okada, Flow control schemes and delay/loss trade off in ATM networks, IEEE Journal on Selected Areas in Communications, vol 6, no 9, pp 1609–1616, Dec 1988.
  • H Heeke, A Traffic control algorithm for ATM networks, IEEE Transactions on Circuits, Systems and Video Technology, vol 3, no 3, pp 182–189, June 1993.
  • S Abe & T Soumiya, A Traffic control method for service quality assurance in an ATM network, IEEE Journal on Selected Areas in Communications, vol 12, no 2, pp 322–331, Feb 1994.
  • E P Rathgeb, Modeling and performance comparison of policing Mechanisms for ATM networks, IEEE Journal on Selected Areas in Communications, vol 9, no 3, pp 325–334, April 1991.
  • F Guillemin & A Dupuis, A basic requirement for the policing function in ATM networks, Computer networks and ISDN systems, vol 24, 1992, pp 311–320.
  • L Dittmann, S B Jacobsen & K Moth, Flow enforcement Algorithms for ATM networks, IEEE Journal on Selected Areas in Communications, vol 9, no 3, pp 343–350, April 1991.
  • D Hong & T Suda, Congestion control and prevention in ATM networks, IEEE Network Magazine, pp 10–16, July 1991.
  • R J Gibbens, Frank P Kelly & Peter B Key, A decision theoretic approach to call admission control in ATM networks, IEEE Journal on Selected Areas in Communications, vol 13, no 6, pp 1101–1113, 1995.
  • M Butto, E Cavaliere & A Tonietti, Effectiveness of the ‘Leaky Bucket’ policing Mechanism in ATM networks, IEEE Journal on Selected Areas in Communications, vol 9, no 3, pp 335–342, April 1992.
  • H Yamada & S Sumita, A Traffic measurement method and its application for cell loss probability estimation in ATM networks, IEEE Journal on Selected Areas in Communications, vol 9, no 3, pp 315–323, April 1991.
  • K Bala, I Cidon & K Sohraby, Congestion control for High speed packet switched networks, IEEE INFOcom '90, pp 520–526.
  • M Sidi, W Z Liu, I Cidon & I Gopal, Congestion control through Input Rate Regulation, IEEE Transactions on Communications, vol 41, no 3, March 1993.
  • H Ahmadi, R Guerin & K Sohraby, Analysis of a Rate based Access control Mechanism for High-speed networks, IEEE Tranasactions on Communications, vol 41, no 6, pp 940–949, June 1993.
  • J Burgin & D Dorman, Broadband-ISDN Resource Management: The Role of Virtual Paths, IEEE Communications Magazine, pp 44–48. Sept 1991.
  • H Heffes & D M Lucantoni, A Markov modeled characterization of packetized voice and data traffic and related statistical multiplexer performance, IEEE Journal on Selected Areas in Communications, vol SAC-4, no 6, pp 856–868, 1986.
  • J L Boudec, An efficient solution method for Markov models of ATM links with loss priorities, IEEE Journal on Selected Areas in Communications, vol 9, no 7, pp 408–417, April 1991.
  • A Baiocchi, N B Mellazzi, M Listanti & R. Winkler, Loss performance analysis of an ATM multiplexer loaded with high speed on/off sources, IEEE Journal on Selected Areas in Communications, 1998.
  • K Sriram & W Whitt, Characterizing superposition arrival processes in packet multiplexer for voice and data, IEEE Journal on Selected Areas in Communications, vol SAC-4, no 6, pp 833–846, Sept 1986.
  • G M Woodruff & R Kositpaiboon, Multimedia traffic Management Principles for Guaranteed ATM network performance, IEEE Journal on Selected Areas in Communications, vol 9, no 3, pp 437–446, April 1990.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.