Bandwidth Allocation By Pricing In ATM Networks

DC FieldValueLanguage
dc.contributor.authorMurphy, Liam, B.E.-
dc.contributor.authorMurphy, John- Elsevieren
dc.identifier.citationIFIP Transactions C: Communications Systemsen
dc.description.abstractAdmission control and bandwidth allocation are important issues in telecommunications networks, especially when there are random fluctuating demands for service and variations in the service rates. In the emerging broadband communications environment these services are likely to be offered via an ATM network. In order to make ATM future safe, methods for controlling the network should not be based on the characteristics of present services. We propose one bandwidth allocation method which has this property . Our proposed approach is based on pricing bandwidth to reflect network utilization, with users competing for resources according to their individual bandwidth valuations. The prices may be components of an actual tariff or they may be used as control signals, as in a private network. Simulation results show the improvement possible with our scheme versus a leaky bucket method in terms of cell loss probability, and confirm that a small queue with pricing can be efficient to multiplex heterogeneous sources.en
dc.rightsThis is the author’s version of a work that was accepted for publication in IFIP Transactions C: Communications Systems. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in IFIP Transactions C: Communications Systems (VOL -24, ISSUE 1994, (1994)) DOI:#.en
dc.subjectNetwork architecture and designen
dc.subjectDistributed systemsen
dc.titleBandwidth Allocation By Pricing In ATM Networksen
dc.typeJournal Articleen
dc.statusPeer revieweden
dc.neeo.contributorMurphy|Liam, B.E.|aut|-
item.fulltextWith Fulltext-
Appears in Collections:Computer Science Research Collection
Files in This Item:
File Description SizeFormat 
bb94.pdf215.23 kBAdobe PDFDownload
Show simple item record

Google ScholarTM



This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.