A packet-based leaky-bucket algorithm functions like the early packet discard (EPD), and accepts a newly arriving packet if the probability that all the cells of the packet are accepted is high. We derive some performance characteristics of the cell and packet arrival processes that are accepted by the leaky-bucket algorithm. From these analyses, a method to determine the values of the parameters of the leaky-bucket algorithm and certain relations between this leaky-bucket algorithm and the generic cell rate algorithm (GCRA) are obtained
Preventive congestion control is more effective and widely used than reactive control. It is usually...
Includes bibliographical references (p. 23).Supported by the NSF. ECS-8552419Daniel C. Lee
Abstract The worst-case performance of an ATM multiplexer, in which each multiplexed connection send...
Several factors determine the mechanisms deployable for congestion control in ATM networks. The Leak...
Presents the statistical characterization analysis of the departure process in a Leaky Bucket scheme...
This paper investigates a combined reactive/preventive congestion control mechanism. Emphasis is giv...
Pada makalah ini dibahas analisis kinerja leaky bucket terintegrasi pada jaringan ATM dengan kombina...
The leaky bucket controller has been proposed to shape traffic entering an ATM network. Cells arrive...
In order to regulate the traffic flow and achieve the best use of ATM network resources, appropriate...
The cell loss rate of a statistical multiplexer fed by a number of leaky bucket controlled sources i...
This dissertation considers an important issue in high-speed networks - the understanding of the int...
Data performance in ATM networks should be measured on packet level instead on cell level, since one...
grantor: University of TorontoA major part of the traffic in BISDN networks would be varia...
The leaky bucket admission control scheme has been introduced as the congestion control mechanism of...
The mechanisms deployable for congestion control in ATM networks depend on a variety of factors incl...
Preventive congestion control is more effective and widely used than reactive control. It is usually...
Includes bibliographical references (p. 23).Supported by the NSF. ECS-8552419Daniel C. Lee
Abstract The worst-case performance of an ATM multiplexer, in which each multiplexed connection send...
Several factors determine the mechanisms deployable for congestion control in ATM networks. The Leak...
Presents the statistical characterization analysis of the departure process in a Leaky Bucket scheme...
This paper investigates a combined reactive/preventive congestion control mechanism. Emphasis is giv...
Pada makalah ini dibahas analisis kinerja leaky bucket terintegrasi pada jaringan ATM dengan kombina...
The leaky bucket controller has been proposed to shape traffic entering an ATM network. Cells arrive...
In order to regulate the traffic flow and achieve the best use of ATM network resources, appropriate...
The cell loss rate of a statistical multiplexer fed by a number of leaky bucket controlled sources i...
This dissertation considers an important issue in high-speed networks - the understanding of the int...
Data performance in ATM networks should be measured on packet level instead on cell level, since one...
grantor: University of TorontoA major part of the traffic in BISDN networks would be varia...
The leaky bucket admission control scheme has been introduced as the congestion control mechanism of...
The mechanisms deployable for congestion control in ATM networks depend on a variety of factors incl...
Preventive congestion control is more effective and widely used than reactive control. It is usually...
Includes bibliographical references (p. 23).Supported by the NSF. ECS-8552419Daniel C. Lee
Abstract The worst-case performance of an ATM multiplexer, in which each multiplexed connection send...