1995
DOI: 10.1007/978-1-4757-2418-9_21
|View full text |Cite
|
Sign up to set email alerts
|

Admission Control for ATM Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

1996
1996
2005
2005

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…An efficient approximate convolution algorithm is presented in [17]. We can also obtain an accurate approximation for the right-hand side of (15) The LD approximation is known to be very accurate [1], [4], [18], [9], [19] and is also computationally very efficient. We use the LD approximation for the numerical studies in this paper.…”
Section: Regulated Traffic and The Qos Requirementmentioning
confidence: 99%
See 1 more Smart Citation
“…An efficient approximate convolution algorithm is presented in [17]. We can also obtain an accurate approximation for the right-hand side of (15) The LD approximation is known to be very accurate [1], [4], [18], [9], [19] and is also computationally very efficient. We use the LD approximation for the numerical studies in this paper.…”
Section: Regulated Traffic and The Qos Requirementmentioning
confidence: 99%
“…The goal has been to develop traffic management schemes that allow for high link utilizations while simultaneously guaranteeing that the QoS requirements of the ongoing connections are met. It is generally agreed that high link utilizations can only be achieved by allowing traffic to be statistically multiplexed, i.e., by allowing each connection's traffic to have a small amount of loss and exploiting the statistical independence of the connections' traffic [1] [2][3] [4]. It is also the view of many researchers that QoS can only be guaranteed by requiring the traffic to be regulated (e.g., by leaky buckets) at the edges of the network [5][6] [7][8] [9][10] [11].…”
Section: Introductionmentioning
confidence: 99%
“…connection admission control algorithms) coupled with resource reservation protocols (e.g. RMD and RSVP) [2][3][4][5].…”
Section: Introductionmentioning
confidence: 99%
“…There has been much research in determining the equivalent or eective bandwidth (EBW) needs of multiplexed sources [9,14,16,19,22,36] for CAC purposes. They are based on some probabilistic representation of the trac sources so as to determine whether the QoS can be satis®ed for a set of sources and a given shared bandwidth.…”
Section: Introductionmentioning
confidence: 99%