Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

A unified approach to bandwidth allocation and access control in fast packet-switched networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
1 Author(s)
Guerin, R. ; IBM Thomas J. Watson Res. Center, Yorktown Heights, NY

The authors present an approach to computing access control parameters as a function of both source characteristics and bandwidth allocation in the network. The technique relies on a fluid-flow model for the source, the leaky bucket rate control system, and the bandwidth allocation process. The methodology is suitable for any high-speed packet switching architecture. The approach allows for the real-time setting of the access control at a connection setup. It ensures that the access control mechanism is near transparent as long as connections behave as expected, while protecting the network from most misbehaving connections. Although some extreme cases have the potential to affect the network, they are essentially due to limitations inherent in the leaky bucket itself

Published in:

INFOCOM '92. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE

Date of Conference:

4-8 May 1992