ICC 91 International Conference on Communications Conference Record
DOI: 10.1109/icc.1991.162396
|View full text |Cite
|
Sign up to set email alerts
|

A call admission control scheme in ATM networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
7
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Several CAC methods calculate the CLR, use REM, and are traffic-descriptor-based [12][13][14][15][16][17][18][19]. Murase et a1.…”
Section: Brief Overview Of Proposed Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Several CAC methods calculate the CLR, use REM, and are traffic-descriptor-based [12][13][14][15][16][17][18][19]. Murase et a1.…”
Section: Brief Overview Of Proposed Methodsmentioning
confidence: 99%
“…pointed out that the CLRs observed for individual connections differ from the aggregate CLR [12]. Miyao developed a fast algorithm for calculating the aggregate CLR under heterogeneous traffic conditions by using the Chernoff bound [13]. Saito developed a CLR upper-bound formula [14], and Shioda and Saito gave the mathematical proof for it [14,19].…”
Section: Brief Overview Of Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…A number of other upper bounds can be found in literature ([71 [81 [91 [lo]). All of these bounds are based on a Chemoffqpe bound [6] which states that for any random variable Y: Instead of implementing the numerical method for solving a complex equation, we tried to compare our approximation method by using the same workload that was used in [7]. The workload consisted of a mix of two types of connections, one with a pi of 0.5 and a wi of 0.05, and the other one consisted of connections with a p i of 0.1 and a wi of 0.05.…”
Section: Comparison With Other Methodsmentioning
confidence: 99%
“…Then, in Section IV, we compare it to the approximation method proposed in [7], which obtains the best possible Chemoff bound that can be used. We will present the algorithms in the context of real-time communication, that is, evaluate the probability of overflow when some number of real-time connections are established at a node.…”
mentioning
confidence: 99%