In this paper, we present monotonicity properties of the Leaky Bucket (LB) input rate regulation scheme. We show that the asymptotic version of the inter-departure time decreases in the convex ordering as the size of the token pool decreases or as the token generation period increase. When measured by the coefficients of variations of the inter-departure times, the burstiness of the output traffic from the LB increases with the sizes of the token pool, and decreases with the token generation period. These results may prove useful in designing the LB
Recently, risk processes have been analyzed as fluid queues. That approach is adapted here to the an...
The Dual Leaky Bucket (DLB) has been standardized for both ATM and IP networks. A DLB jointly implem...
We consider Jackson queueing networks with finite buffer constraints (JQN) and analyze the efficienc...
In this paper, we formalize the intuition that the Leaky Bucket (LB) smooths traffic. By sample path...
This dissertation considers an important issue in high-speed networks - the understanding of the int...
ABSTRACT. We analyze the queueing model for leaky bucket (LB) scheme with dynamic ar-rivals and toke...
In this paper we study the departure processes of two rate-control throttles : the token bank and th...
This thesis investigates the worst possible behaviour of a source if the traffic emanating from it i...
The leaky bucket admission control scheme has been introduced as the congestion control mechanism of...
Includes bibliographical references (p. 23).Supported by the NSF. ECS-8552419Daniel C. Lee
Preventive congestion control is more effective and widely used than reactive control. It is usually...
The leaky bucket controller has been proposed to shape traffic entering an ATM network. Cells arrive...
Presents the statistical characterization analysis of the departure process in a Leaky Bucket scheme...
Using coupling and a sample path argument it is shown that the throughput of an open queueing networ...
Monotonicity of throughput is established in some non-Markovian queueing networks by means of path-w...
Recently, risk processes have been analyzed as fluid queues. That approach is adapted here to the an...
The Dual Leaky Bucket (DLB) has been standardized for both ATM and IP networks. A DLB jointly implem...
We consider Jackson queueing networks with finite buffer constraints (JQN) and analyze the efficienc...
In this paper, we formalize the intuition that the Leaky Bucket (LB) smooths traffic. By sample path...
This dissertation considers an important issue in high-speed networks - the understanding of the int...
ABSTRACT. We analyze the queueing model for leaky bucket (LB) scheme with dynamic ar-rivals and toke...
In this paper we study the departure processes of two rate-control throttles : the token bank and th...
This thesis investigates the worst possible behaviour of a source if the traffic emanating from it i...
The leaky bucket admission control scheme has been introduced as the congestion control mechanism of...
Includes bibliographical references (p. 23).Supported by the NSF. ECS-8552419Daniel C. Lee
Preventive congestion control is more effective and widely used than reactive control. It is usually...
The leaky bucket controller has been proposed to shape traffic entering an ATM network. Cells arrive...
Presents the statistical characterization analysis of the departure process in a Leaky Bucket scheme...
Using coupling and a sample path argument it is shown that the throughput of an open queueing networ...
Monotonicity of throughput is established in some non-Markovian queueing networks by means of path-w...
Recently, risk processes have been analyzed as fluid queues. That approach is adapted here to the an...
The Dual Leaky Bucket (DLB) has been standardized for both ATM and IP networks. A DLB jointly implem...
We consider Jackson queueing networks with finite buffer constraints (JQN) and analyze the efficienc...