Bounds and approximations for the periodic on/off queue with applications to ATM traffic control
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 2)
Peak rate enforcement in ATM networks
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 2)
Dimensioning criteria for policing functions in ATM networks
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 2)
A generalization of some policing mechanisms
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 2)
A basic requirement for the policing function in ATM networks
Computer Networks and ISDN Systems - Special issue on the ATM—asynchronous transfer mode
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
New directions in communications (or which way to the information age?)
IEEE Communications Magazine
Modeling and performance comparison of policing mechanisms for ATM networks
IEEE Journal on Selected Areas in Communications
Effectiveness of the `leaky bucket' policing mechanism in ATM networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.24 |
The usage parameter control (UPC) function, which monitors and controls user traffic to protect network resources from both malicious and unintentional misbehaviour, is an important task for ATM networks in performing congestion control procedures. The scheme performing the UPC function is usually called a 'control scheme' or 'policing scheme'. No matter what scheme is employed, the cell delay variation (CDV) that comes before the scheme makes it difficult to police user traffic accurately as long as it is located at the edge node of the public network^1^-^1^0. In this paper, we propose an architecture where the network can perform the UPC function at a user's terminal equipment, in order to overcome the CDV problem. With this feature, the network can control user traffic more accurately. Applying cryptographic techniques, we also propose a signalling protocol to support this architecture.