scispace - formally typeset
Search or ask a question

Showing papers on "Packet loss published in 1980"


Journal ArticleDOI
TL;DR: Performance results obtained by simulation indicate several salient features of congestion control mechanisms with respect to their robustness and fairness.

7 citations


Journal ArticleDOI
TL;DR: A study of a congestion control mechanism in a packet-switched data network is presented and it is shown that the network throughput can be maintained at a constant level, while the average transit delay remains within acceptable bounds for offered loads beyond the congestion point.

1 citations



Book ChapterDOI
01 Jan 1980
TL;DR: An overview of the congestion control mechanisms designed for the GMD-Network and investigated by simulation is presented and a generalization of “congestion control by input buffer limits” is pointed out.
Abstract: An overview of the congestion control mechanisms designed for the GMD-Network and investigated by simulation is presented. In more details a generalization of “congestion control by input buffer limits” is pointed out. These investigations were performed at the institute for teleprocessing of the Gesellschaft fur Mathematik und Datenverarbeitung (GMD) in Darmstadt.

Book ChapterDOI
01 Jan 1980
TL;DR: The use of input buffer (IB) limits for network congestion control is introduced and the rationale for the effectiveness of IB limits is discussed.
Abstract: Congestion control mechanisms are needed for store-and-forward packet networks to maintain a high level of throughput. The basic requirements of network congestion control and some specific control techniques are examined. The use of input buffer (IB) limits for network congestion control is introduced. The rationale for the effectiveness of IB limits is discussed. Strategies for the design of IB limits have been investigated using both queueing analysis and simulation experiments. Some of our preliminary findings are presented.

Journal ArticleDOI
TL;DR: The paper considers a virtual call of the CCITT X.25 protocol to derive the basic flow in a network and several efficiency levels are derived at different time levels, and are used to relate network traffic to user traffic.