PROPOSAL OF NEW RING ACCESS-CONTROL AND CONNECTION ADMISSION CONTROL METHOD

被引:0
|
作者
KUBOTA, K
YOKOTA, H
TANAKA, T
机构
[1] Communication Systems Research Lab., Matsushita Electric Industrial Co., Ltd., Osaka 571, 1006 Kadoma, Kadoma-shi
关键词
COMMUNICATION PROTOCOLS; ASYNCHRONOUS TRANSFER MODE; DIGITAL COMMUNICATION SYSTEMS;
D O I
10.1049/el:19930460
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A new ring access control method is proposed for an ATM ring network. In this method, higher priority traffic which requires strict quality of service can be transmitted with no cell loss, by executing connection admission control. Lower priority traffic is transmitted using that part of the bandwidth not used for higher priority traffic. In this way, ring use is improved. A simulation is used to demonstrate these characteristics.
引用
收藏
页码:687 / 688
页数:2
相关论文
共 50 条
  • [31] ACCESS-CONTROL FOR COMPUTER-SYSTEMS
    FARQUHAR, W
    INFORMATION AGE, 1985, 7 (01): : 25 - 29
  • [32] ACCESS-CONTROL METHODS OF VAX/VMS
    REISINGER, DA
    INFORMATION AGE, 1988, 10 (03): : 162 - 168
  • [33] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04): : 706 - 734
  • [34] SMART CARD AND ACCESS-CONTROL SYSTEMS
    LEMARCHANT, P
    ACTA ELECTRONICA, 1983, 25 (01): : 93 - 98
  • [35] INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL
    HARN, L
    LIN, HY
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (02): : 139 - 143
  • [36] CLASSIFICATION OF OBJECTS FOR IMPROVED ACCESS-CONTROL
    BOOYSEN, HAS
    ELOFF, JHP
    COMPUTERS & SECURITY, 1995, 14 (03) : 251 - 265
  • [37] ACCESS-CONTROL LISTS IN CAPABILITY ENVIRONMENTS
    LOPRIORE, L
    TSI-TECHNIQUE ET SCIENCE INFORMATIQUES, 1984, 3 (03): : 179 - 191
  • [38] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 1 - 23
  • [39] ACCESS-CONTROL FOR PRIVATE DECLARATIONS IN ADA
    SHEN, J
    CORMACK, GV
    COMPUTER LANGUAGES, 1994, 20 (02): : 117 - 126
  • [40] A DEFINITION OF AN ACCESS-CONTROL SYSTEMS LANGUAGE
    EMMS, J
    COMPUTER STANDARDS & INTERFACES, 1987, 6 (04) : 443 - 454