참고문헌
- J. S. Turner, 'New directions in communications (or which way to the information age?),' IEEE Commun. Mag., Oct. 1986
- E. P. Rathgeb, 'Modeling and performance comparison of policing mechanisms for ATM networks,' IEEE J. Select. Areas Commun., vol. 9, pp. 325-334, Apr. 1991 https://doi.org/10.1109/49.76630
- D. Bertsekas and R. Gallager, Data Networks. Englewood Cliffs, NJ: Prentice-Hall, 2nd ed., 1992
- S. Blake et al., An architecture for differentiated services. Internet Society, Dec. 1998. RFC 2475
- B. Erimli, J. Murphy, and J. Murphy, 'On worst case traffic in ATM networks,' in Twelfth UK lEE Teletraffic Symp., (Windsor, United Kingdom), Mar. 1995
- M. Bonatti and A. A. Gaivoronski, 'Worst case analysis of ATM sources with application to access engineering of broadband multiservice networks,' in The Fundamental Role of Teletraffic in the Evolution of Telecommunication Networks (J. Labetoulle and J. W. Roberts, eds.), pp. 559-569, Amsterdam: Elsevier Science, 1994
- R. L. Cruz, 'Calculus for network delay - part I: Network elements in isolation,' IEEE Trans. Infom. Theory, vol. 37, pp. 114-131, Jan. 1991 https://doi.org/10.1109/18.61109
- A. Parekh and R. Gallager, 'A generalized processor sharing approach to flow control in integrated service networks: The single-node case,' IEEE/ACM Trans. Networking, vol. 1, pp. 344-357, June 1993 https://doi.org/10.1109/90.234856
- R. L. Cruz, 'Calculus for network delay - part II: Network analysis,' IEEE Trans. Inform. Theory, vol. 37, pp. 132-141, Jan. 1991 https://doi.org/10.1109/18.61110
- A. Parekh and R. Gallager, 'A generalized processor sharing approach to flow control in integrated service networks: The multiple node case,' IEEE/ACM Trans. Networking, vol. 2, pp. 137-150, Apr. 1994 https://doi.org/10.1109/90.298432
- H. Ahmadi, R. Guerin, and K. Sohraby, 'Analysis of leaky bucket access control mechanism with batch arrival process,' in Proc. GLOBECOM'90, dec.1990,pp.344-349
- A. W. Berger and W. Whitt, 'The brownian approximation for rate-control throttles and the G/G/1/C queue,' Discrete Event Dynamic Systems: Theory and Applications, pp. 7-60, 1992 https://doi.org/10.1007/BF01797279
- A. W. Berger and W. Whitt, 'The pros and cons of a job buffer in a tokenbank rate-control throttle,' IEEE Trans. Commun., vol. 42, pp. 857-861, Feb./Mar./Apr. 1994 https://doi.org/10.1109/TCOMM.1994.580189
- R. Boorstyn et al., ,' in Proc. IEEE INFOCOM 2000, 2000, pp. 1223-1232
- G. de Veciana, 'Leaky buckets and optimal self-tuning rate control,' in Proc. GLOBECOM'94, 1994, pp. 1207-1211
- A. I. Elwalid and D. Mitra, 'Traffic shaping at a network node: Theory, optimum design, admission control,' in Proc. IEEE INFOCOM'97, 1997, pp. 444-454
- M. G. Hluchyj and N. Yin, 'A second-order leaky bucket algorithm to guarantee QoS in ATM networks,' in Proc.IEEE GLOBECOM'96, 1996, pp. 1090-1096
- J. S. M. Ho, H. Uzunalioglu, and I. Akyildiz, 'Cooperating leaky bucket for average rate enforcement of vbr video traffic in ATM networks,' in Proc. IEEE INFOCOM'95, 1995, pp. 1248-1255
- D. C. Lee, 'Effects of leaky bucket parameters on the average queueing delay: Worst case analysis,' in Proc. IEEE INFOCOM'94, 1994, pp. 482-489
- D. S. Holtsinger and H. G. Perros, 'Performance of the buffered leaky bucket policing mechanism,' in Proc. TriCom'92: High-Speed Communication Networks, 1992, pp. 47-69
- I. Khan and V.O. K. Li, 'A traffic control mechanism for ATM networks,' in Proc. IEEE GLOBECOM'93, (Houston, TX), 1993, pp. 1122-1126
- R. Krishnan and J. A. Silvester, 'The effect of variance reduction on the performance of the leaky bucket,' in Proc. ICC'95, (Seattle), 1995, pp. 1974-1980
- J. F. Kurose, ,' in Proc. ACM SIGMETRICS/IFIP Performance'92 Conf., (Newport, RI), June 1992, pp. 128-139
- S.-K. Kweon and K. G. Shin, 'Traffic-controlled rate monotonic priority scheduling of ATM cells,' in Proc. IEEE INFOCOM'96, (San Francisco, CA), Mar. 1996, pp. 655-662
- F. Lo Presti et al., 'Source time scale and optimal buffer/bandwidth tradeoff for heterogeneous regulated traffic in a network node,' IEEE/ACM Trans. Networking, vol. 7, pp. 490-501, Aug. 1999 https://doi.org/10.1109/90.793004
- S. Low and P. P. Varaiya, 'Burst reducing servers in ATM networks,' , vol. 20, pp. 61-84, Sept. 1995 https://doi.org/10.1007/BF01158432
- J. A. S. Monteiro, M. Gerla, and L. Fratta, 'Leaky bucket analysis for ATM networks,' in Proc. SBT/IEEE Int. Telecommun. Symp., 1990, pp. 498-502
- C.P. Su and G. de Veclana, 'On the overflow probability of deterministically constrained traffic,' in Proc. ICC'97, (Montreal), 1997, pp. 1704-1708
- M. K. Wong and P. P. Varaiya, 'A deterministic fluid model for cell loss in ATM networks,' in Proc. IEEE INFOCOM'93, 1993, pp. 395-400
- F. M. Guillemin et al., 'Extremal traffic and bounds for the mean delay of multiplexed traffic streams,' in Proc. IEEE INFOCOM 2002, 2002
- R. G. Gallager et al., IEEE J. Select. Areas Commun., vol. 13, Aug. 1995
- K. Sohraby et aI., IEEE J. Select. Areas Commun., vol. 9, Sept. 1991
- A. Atkinson, 'A traffic control scheme for virtual paths in an asynchronous transfer mode network,' in Proc. GLOBECOM'94, 1994, pp. 1768-1773
- K. C. Budka, 'Stochastic monotonicity and convexity properties of ratebased flow control mechanisms,' IEEE Trans. Automatic Control, vol. 39, pp. 544-548, Mar. 1994 https://doi.org/10.1109/9.280754
- P. Castelli, A. Forcina, and A. Tonietti, 'Dimensioning criteria for policing functions in ATM netwokrs,' in Proc. IEEE INFOCOM'92, 1992
- K. Shimokoshi, 'Resource management for multimedia broadband access networks,' in Proc. GLOBECOM'95, 1995, pp. 728-733
- S. Shioda and H. Saito, 'Satisfying QOS standard with combined strategy for CAC and UPC,' in Proc. ICC'95, (Seattle), 1995, pp. 965-969
- T. Tsuchya and H. Saito, 'The worst case cell arrival patterns in ATM networks,' IEICE Trans. Commun., vol. 81-B, pp. 996-1003, May 1998
- B. T. Doshi, 'Deterministic rule based traffic descriptors for broadband ISDN: Worst case behavior and connection acceptance control,' in The Fundamental Role of Teletraffic in the Evolution of Telecommunication Networks (J. Labetoulle and J. W. Roberts, eds.), Amsterdam: Elsevier Science, 1994, pp. 591-600
- T. Worster, 'Modelling deterministic queues: The leaky bucket as an arrival process,' in The Fundamental Role of Teletraffic in the Evolution of Telecommunication Networks (J. Labetoulle and J. W. Roberts, eds.), Amsterdam: Elsevier Science, 1994, pp. 581-590
- M. Reisslein, K. Ross, and S. Rajagopal, 'Guaranteeing statistical qos to regulated traffic: The single node case,' in Proc. IEEE INFOCOM'99, (New York), Mar. 1999, pp. 1061-1072
- D. C. Lee, 'Worst case fraction of CBR teletraffic unpunctual due to statistical multiplexing,' IEEE/ACM Trans. Networking, vol. 4, pp. 98-105, Feb. 1996 https://doi.org/10.1109/90.503765
- J. M. Barcelo, J. Garcia Vidal, and O. Casals, 'Worst case traffic in a tree network of ATM multiplexers,' IEEE/ACM Trans. Networking, vol. 8, pp. 507-516, Aug. 2000 https://doi.org/10.1109/90.865078
- N. Yamanaka, Y. Sato, and K. Sato, 'Performance limitation of leaky bucket algorithm for usage parameter control and bandwidth allocation methods,' IEICE Trans. Commun., vol. E75-B, pp. 82-86, Feb. 1992
- A. Skliros, 'Characterizing the worst traffic profile passing through an ATM-UNI,' in First UK Workshop on Performance Modeling and Evaluation of ATM Networks, IFIP, 1993, pp. 74-84