1988
DOI: 10.1109/49.12888
|View full text |Cite
|
Sign up to set email alerts
|

Flow control schemes and delay/loss tradeoff in ATM networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

1990
1990
2000
2000

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 110 publications
(17 citation statements)
references
References 2 publications
0
17
0
Order By: Relevance
“…When a flow requests real-time service, it must characterize its traffic so that the network can make its admission control decision. Typically, sources are described by either peak and average rates [FV90] or a filter like a token bucket [OON88]; these descriptions provide upper bounds on the traffic that can be generated by the source. The traditional real-time service provides a hard or absolute bound on the delay of every packet; in [FV90], [CSZ92], this service model is called guaranteed service.…”
mentioning
confidence: 99%
“…When a flow requests real-time service, it must characterize its traffic so that the network can make its admission control decision. Typically, sources are described by either peak and average rates [FV90] or a filter like a token bucket [OON88]; these descriptions provide upper bounds on the traffic that can be generated by the source. The traditional real-time service provides a hard or absolute bound on the delay of every packet; in [FV90], [CSZ92], this service model is called guaranteed service.…”
mentioning
confidence: 99%
“…In data transmission, the traffic profile of the source is usually expressed as some combination of peak and average rates, maximum burst length, token bucket filter rate, etc. [39,43]. Performance requirements, on the other hand, are usually specified in delay bounds, acceptable loss rates, etc.…”
Section: Service Specificationmentioning
confidence: 99%
“…These standards specify the different service classes and the service guarantees available to network applications. The realization of these schemes requires advances in traffic specification [39,43], resource reservation [44], resource mapping [45][46][47] and admission control [48,49], scheduling algorithms 4 [39,[51][52][53][54] and queue management [55], along with various other control and management mechanisms such as traffic policing. Pricing design for multi-service networks has also witnessed a flurry of research activity [56][57][58][59][60][61][62][63][64][65].…”
Section: Transmission-based Qosmentioning
confidence: 99%
“…As with Internet, the mechanism suggested for ATM is based upon end-to-end error detection and correction at the transport layer [14,26,27]. While this mode is certainly feasible, it is highly questionable whether it is capable of enabling the wide QOS range that users have come to expect in LAN systems.…”
Section: Error Controlmentioning
confidence: 99%
“…A recent paper [12J does consider an ATM -FDDI gateway but provides only minimal user support. Second, while BISDN networks are suppose to support a wide range of services, it is not clear that all services will be provided by the interconnecting network itself as no<ed for frame relays [7] and discussions of ATM systems [14]. Third, BISDN packet and protocol header size lead to considerable bandwidth inefficiency for connecting net\vorks which do not maintain its format but must incorporate its packets [12].…”
Section: Introductionmentioning
confidence: 99%