This dissertation considers an important issue in high-speed networks - the understanding of the interaction between the network and the bursty traffic it handles. The first part of the dissertation analyzes the leaky bucket (LB), a proposed congestion control scheme for ATM networks. There are many preliminary results in the literature on the LB. Most of them, however, are numerical ones under some Markovian assumptions. In this dissertation, it is shown that under very mild assumptions, the LB is burst reducing. More importantly, this burst reduction property obeys some monotonicity properties in all the parameters of the LB. This property is then used to the design of the LB. Bounds and approximations for some other performance measures ...
textabstractThe first part of the paper is devoted to a transient analysis of traffic generated by b...
Preventive congestion control is more effective and widely used than reactive control. It is usually...
Due to a large number of bursty traffic sources that an ATM network is expected to support, controll...
This paper investigates a combined reactive/preventive congestion control mechanism. Emphasis is giv...
We propose a simple framework to study the trade-offs between bandwidth and buffer in an ATM network...
This paper presents a framework to study the problem of traffic control in ATM networks. Bursty traf...
The mechanisms deployable for congestion control in ATM networks depend on a variety of factors incl...
Several factors determine the mechanisms deployable for congestion control in ATM networks. The Leak...
The leaky bucket admission control scheme has been introduced as the congestion control mechanism of...
The leaky bucket controller has been proposed to shape traffic entering an ATM network. Cells arrive...
This paper discusses an ATM congestion control mechanism that introduces a leaky bucket control sche...
Maximizing bandwidth utilization and providing performance guarantees, in the context of multimedia ...
In Optical Burst Switched networks, each light path carry huge amount of traffic, path failures may ...
The cell loss rate of a statistical multiplexer fed by a number of leaky bucket controlled sources i...
Presents the statistical characterization analysis of the departure process in a Leaky Bucket scheme...
textabstractThe first part of the paper is devoted to a transient analysis of traffic generated by b...
Preventive congestion control is more effective and widely used than reactive control. It is usually...
Due to a large number of bursty traffic sources that an ATM network is expected to support, controll...
This paper investigates a combined reactive/preventive congestion control mechanism. Emphasis is giv...
We propose a simple framework to study the trade-offs between bandwidth and buffer in an ATM network...
This paper presents a framework to study the problem of traffic control in ATM networks. Bursty traf...
The mechanisms deployable for congestion control in ATM networks depend on a variety of factors incl...
Several factors determine the mechanisms deployable for congestion control in ATM networks. The Leak...
The leaky bucket admission control scheme has been introduced as the congestion control mechanism of...
The leaky bucket controller has been proposed to shape traffic entering an ATM network. Cells arrive...
This paper discusses an ATM congestion control mechanism that introduces a leaky bucket control sche...
Maximizing bandwidth utilization and providing performance guarantees, in the context of multimedia ...
In Optical Burst Switched networks, each light path carry huge amount of traffic, path failures may ...
The cell loss rate of a statistical multiplexer fed by a number of leaky bucket controlled sources i...
Presents the statistical characterization analysis of the departure process in a Leaky Bucket scheme...
textabstractThe first part of the paper is devoted to a transient analysis of traffic generated by b...
Preventive congestion control is more effective and widely used than reactive control. It is usually...
Due to a large number of bursty traffic sources that an ATM network is expected to support, controll...