{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T07:40:02Z","timestamp":1698046802993},"reference-count":24,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2008,9,12]],"date-time":"2008-09-12T00:00:00Z","timestamp":1221177600000},"content-version":"vor","delay-in-days":6709,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[1990,5]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A new flow control rule for the network access level is introduced and its performance is investigated., The rule is based on measurements of the temporal changes of the traffic intensity. The admission of arriving local packets to a node is regulated dependent on the variations of local and transit traffic and the load in the neighbouring nodes. The objective of the new rule is to maximize the power (defined as the ratio of throughput and delay) for transit packets under consideration of a threshold value for local packets. This threshold serves to limit the unfairness for the local packets. A model for the node has been developed and evaluated by approximate analytical techniques. The performance results obtained enable the construction of a very efficient algorithm for the new flow control rule.<\/jats:p>","DOI":"10.1002\/ett.4460010304","type":"journal-article","created":{"date-parts":[[2008,9,12]],"date-time":"2008-09-12T13:02:15Z","timestamp":1221224535000},"page":"247-255","source":"Crossref","is-referenced-by-count":0,"title":["Performance analysis of a new network access flow control method in computer communication networks"],"prefix":"10.1002","volume":"1","author":[{"given":"Tadeusz","family":"Uhl","sequence":"first","affiliation":[]},{"given":"Bruno","family":"M\u00fcller\u2010Clostermann","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2008,9,12]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094691"},{"key":"e_1_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1978.1094076"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094756"},{"issue":"5","key":"e_1_2_1_5_2","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1109\/TCOM.1979.1094463","article-title":"An analysis of one direction of window mechanism","volume":"27","author":"Yu L.","year":"1978","journal-title":"IEEE Trans. on Comm."},{"issue":"8","key":"e_1_2_1_6_2","doi-asserted-by":"crossref","first-page":"1199","DOI":"10.1109\/TCOM.1979.1094531","article-title":"A queueing network analysis of computer communication networks with window flow control","volume":"27","author":"Reiser M.","year":"1978","journal-title":"IEEE Trans. on Comm."},{"key":"e_1_2_1_7_2","doi-asserted-by":"crossref","unstructured":"G.Pujolle:Comparison of some end\u2010to\u2010end flow control policies in a packet switching network. INRIA Raport de Recherche no. 1 January1980.","DOI":"10.1109\/MARK.1979.8817269"},{"key":"e_1_2_1_8_2","unstructured":"M. T.Hsiao A.Lazar:A game theoretic approach to decentralized flow control of Markovian queueing networks. Proc. Performance '88 1988 p.55\u201373."},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1983.1103166"},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/2422.322416"},{"key":"e_1_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/0140-3664(78)90164-0"},{"key":"e_1_2_1_12_2","unstructured":"M.Schwartz S.Saad:Analysis of congestion control techniques in computer communications networks. Proc. Int. Symposium Comput. Networks Versailles France Feb 1979 p.113\u2013130."},{"issue":"6","key":"e_1_2_1_13_2","first-page":"285","article-title":"Modelling and analysis of message\u2010switched computer communication networks with multilevel flow control","volume":"4","author":"Georganas N.","year":"1980","journal-title":"Computer Networks"},{"key":"e_1_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1979.1094280"},{"key":"e_1_2_1_15_2","unstructured":"J.Majithia:Experiments in congertion control techniques. Proc. Int. Symp. Flow Control Networks Versailles France Feb.1979."},{"key":"e_1_2_1_16_2","volume-title":"Protocols and Techniques for Data Communication Networks","author":"Sunshine A.","year":"1980"},{"issue":"4","key":"e_1_2_1_17_2","first-page":"222","article-title":"A model of transport level flow control","volume":"11","author":"Harbitter A.","year":"1982","journal-title":"JACM"},{"key":"e_1_2_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094690"},{"issue":"3","key":"e_1_2_1_19_2","first-page":"43","article-title":"Certain analytic results for buffering disciplines in nodes of teleprocessing networks","author":"Lacny J.","year":"1979","journal-title":"Bulletin d L'Academic Polonaise des Sciences"},{"key":"e_1_2_1_20_2","first-page":"226","article-title":"Handbuch der Bedienungstheorie","author":"Gnedenko B.","year":"1984","journal-title":"(Manual of Traffic Theory, in German)."},{"key":"e_1_2_1_21_2","first-page":"309","article-title":"Performance analysis of a link level protocol for packet switching networks combining two different retransmission strategies","author":"Wieber G.","journal-title":"Int. Seminar on Modelling and Performance Evaluation Methodology"},{"key":"e_1_2_1_22_2","volume-title":"CCITT Provisional Recommendations X.3, X.25, X.28 and X.29","year":"1978"},{"key":"e_1_2_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/0166-5316(81)90002-X"},{"key":"e_1_2_1_24_2","volume-title":"Queueing Theory","author":"Kleinrock L.","year":"1976"},{"key":"e_1_2_1_25_2","unstructured":"M.Sczittnick:Techniqies for the functional and quantitative analysis of Markovian computing system models (in German). Diploma Thesis Department of Computer Science University of Dortmund FRG 1987."}],"container-title":["European Transactions on Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.4460010304","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4460010304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T13:27:24Z","timestamp":1697981244000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.4460010304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,5]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1990,5]]}},"alternative-id":["10.1002\/ett.4460010304"],"URL":"https:\/\/doi.org\/10.1002\/ett.4460010304","archive":["Portico"],"relation":{},"ISSN":["1124-318X","1541-8251"],"issn-type":[{"value":"1124-318X","type":"print"},{"value":"1541-8251","type":"electronic"}],"subject":[],"published":{"date-parts":[[1990,5]]}}}