1999
DOI: 10.1109/49.748818
|View full text |Cite
|
Sign up to set email alerts
|

Resource allocation and connection admission control in satellite networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
15
0

Year Published

2000
2000
2005
2005

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 13 publications
0
15
0
Order By: Relevance
“…References [22,23,[36][37][38] and references therein). The satellite system is managed at the call level, looking for movable boundary access techniques through dynamic reactions performed by the resource management agent to face variable system conditions.…”
Section: Optimization Problems In Telecommunication Networkmentioning
confidence: 99%
“…References [22,23,[36][37][38] and references therein). The satellite system is managed at the call level, looking for movable boundary access techniques through dynamic reactions performed by the resource management agent to face variable system conditions.…”
Section: Optimization Problems In Telecommunication Networkmentioning
confidence: 99%
“…Recently, Koraitim et al propose another movable boundary scheme [12] for satellite networks. It divides a TDM frame into three compartments, where the extra compartment can be accessed by both voice and data according to a certain pre-defined resource sharing rule.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, since she only considers voice and data traffic in her research, a further study for the MAC protocol to also include video transmission needs to be carried on. All these aspects motivate us to extend the MAC protocol in TDMA-based voice and data integration systems [12] to hybrid TDMA/CDMA multimedia traffic (video/voice/data) systems, and to try out the proper mathematical methods to evaluate the protocol.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The QoS provided by the access network to the user requirements can be defined at the MAC layer as a set of Transfer Capabilities MTCs. Three MTCs can be defined: CBR, Bursty Data and Best Effort [20].…”
mentioning
confidence: 99%