Optimal reservation policy for two queues in tandem
Information Processing Letters
A Review of Call Admission Control Schemes in Wireless ATM Networks
ICN '01 Proceedings of the First International Conference on Networking-Part 1
Modeling techniques for VBR video: feasibility and limitations
Performance Evaluation
Optimal and heuristic algorithms for quality-of-service routing with multiple constraints
Performance Evaluation
A new model for video traffic originating from multiplexed MPEG-4 videoconference streams
Performance Evaluation
Bandwidth problems in high-speed networks
IBM Journal of Research and Development
Computer Networks: The International Journal of Computer and Telecommunications Networking
Erol gelenbe's career and contributions
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
An integrated admission control based on measurements in ATM networks
Computer Communications
Research: An estimation of traffic parameters for VBR services in ATM networks
Computer Communications
An adaptive call admission control in ATM networks using optimized measurements windows
Computer Communications
Hi-index | 0.25 |
The authors discuss the broad issue of bandwidth allocation and call admission control (CAC) in high-speed networks, focusing on asynchronous transfer mode technology. It is maintained that despite the considerable amount of high-quality work carried out in this area, the debate surrounding these issues is not yet resolved. The complexity of dealing with a wide variety of as yet unknown user traffic types, as well as the evolving architecture of networks, means that currently proposed solutions are only an intermediate step of the design process. The authors discuss the nature of user traffic and illustrate how it can impact the debate on the quality of service, concentrating on some “equivalent bandwidth” type CAC strategies. Also discussed is a method which uses diffusion approximations. Finally, the authors discuss the novel issue of evaluating the overload created by the CAC procedure itself on network nodes. The article is complemented by several numerical and simulation results which illustrate the discussion