1990
DOI: 10.1016/0169-7552(90)90052-t
|View full text |Cite
|
Sign up to set email alerts
|

Bandwidth management: A congestion control strategy for broadband packet networks — characterizing the throughput-burstiness filter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0
6

Year Published

1992
1992
2006
2006

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 51 publications
(16 citation statements)
references
References 9 publications
0
10
0
6
Order By: Relevance
“…Turner [1986] suggested a throttle based on the leaky bucket to monitor the admission of ATM cells. Motivated by the interest in BISDNs, many researchers have subsequently examined (single-class) rate-control throttles based on token banks or leaky buckets; e.g., see Eckberg, Luan, and Lucantoni [1989], Sidi et al [1989], Sohraby and Sidi [1990], Rathgeb [1990], Kroner, Theimer, and Briem [1990], Budka and Yao [1990], Budka [1990], and Elwalid and Mitra [1991]. The multiclass ratecontrol throttle investigated in Whitt [1990, 1991] is also applicable to BISDN/ATM, with the different classes representing different virtual channels that share a common virtual path.…”
Section: Introductionmentioning
confidence: 99%
“…Turner [1986] suggested a throttle based on the leaky bucket to monitor the admission of ATM cells. Motivated by the interest in BISDNs, many researchers have subsequently examined (single-class) rate-control throttles based on token banks or leaky buckets; e.g., see Eckberg, Luan, and Lucantoni [1989], Sidi et al [1989], Sohraby and Sidi [1990], Rathgeb [1990], Kroner, Theimer, and Briem [1990], Budka and Yao [1990], Budka [1990], and Elwalid and Mitra [1991]. The multiclass ratecontrol throttle investigated in Whitt [1990, 1991] is also applicable to BISDN/ATM, with the different classes representing different virtual channels that share a common virtual path.…”
Section: Introductionmentioning
confidence: 99%
“…There are two major differences between this work and the previous work of the rate-based flow control schemes such as [4], [Ill, [2], [3], [12], and [5]. First, packets are delayed in our setting not just due to the waiting for sufficient amount of credit, but also due to the service provided to other packets by the server (e.g., the access link).…”
Section: Introductionmentioning
confidence: 89%
“…Leaky Bucket [Tur86] and its variant schemes are described in [SLCG89,ELL90,Rat91]. In a generalized model of the leaky bucket shown in Figure 1, tokens are generated at a fixed rate as long as the token buffer of size b is not full.…”
Section: Leaky Bucket Schemementioning
confidence: 99%
“…This is due to the fact that the users may, inadvertently or otherwise, attempt to exceed the rates specified at the time of connection establishment. Many policing schemes viz., Leaky Bucket (LB), Jumping Window (JW), Moving Window (MW), Exponentially weighted moving average Window (EW) and associated variations have been proposed and analyzed [Thr86, SLCG89,ELL90,Rat91]. Studies on bursty sources have shown that burstiness promotes statistical multiplexing at the cost of possible congestion.…”
Section: Introductionmentioning
confidence: 99%