A modified Leaky Bucket policing mechanism

被引:0
|
作者
Liang, ZH [1 ]
Ali, MM [1 ]
机构
[1] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes an unbuffered modified Leaky-Bucket (LB) algorithm to police the traffic of On-Off bursty sources. We assume the Leaky-Bucket has no token pool and cell buffer, and the token generation process has two states: On and Off. The tokens are generated at the same rate with the source's peak cell rate during the On period, and no tokens are generated during the Off period. With this algorithm we can police both the peak source rate (PCR) and the sustain cell rate (SCR) of bursty sources with simply one Leaky-Bucket.
引用
收藏
页码:345 / 348
页数:4
相关论文
共 50 条
  • [41] Dynamic programming method analyzing a variation of the leaky bucket scheme
    Lee, DC
    [J]. PROCEEDINGS OF 1999 SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 1999, : 355 - 362
  • [42] Leaky Bucket Model for Autonomic Control of Distributed, Collaborative Systems
    Solomon, Bogdan
    Ionescu, Dan
    Gadea, Cristian
    Veres, Stejarel
    Litoiu, Marin
    [J]. 2013 IEEE 8TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI 2013), 2013, : 483 - 488
  • [43] Performance analysis of a Leaky Bucket scheme with a threshold in the data buffer
    Korea Advanced Inst of Science and, Technology, Taejon, Korea, Republic of
    [J]. Comput Networks ISDN Syst, 7 (781-795):
  • [44] PERFORMANCE ANALYSIS OF A LEAKY-BUCKET CONTROLLED ATM MULTIPLEXER
    REN, JF
    MARK, JW
    WONG, JW
    [J]. PERFORMANCE EVALUATION, 1994, 19 (01) : 73 - 101
  • [45] SIR approach in modeling data packets forwarding at a leaky bucket
    Zhang, Yaming
    Koura, Yaya H.
    Su, Yanyuan
    [J]. INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2020, 11 (05)
  • [46] Buffered leaky bucket algorithm for congestion control in ATM networks
    Indumathi, P
    Shanmugavel, S
    Mahesh, HC
    [J]. IETE JOURNAL OF RESEARCH, 2002, 48 (01) : 59 - 67
  • [47] Dimensioning of dual leaky bucket parameters for regulating voice sources
    Daigle, J. N.
    Femminella, M.
    Reali, G.
    [J]. ELECTRONICS LETTERS, 2013, 49 (12) : 756 - 757
  • [48] Leaky Bucket based congestion control in Wireless Sensor Networks
    Srinivas, J.
    Gowtham, Y.
    Amith, Shagul S.
    Chaitanya, K.
    Archana, R.
    Raja, Gunasekaran
    [J]. 2018 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2018, : 172 - 174
  • [49] A MICROPROGRAM-BASED HARDWARE IMPLEMENTATION OF THE LEAKY BUCKET ALGORITHM
    MERAYO, LA
    SOLANA, JI
    MOLA, L
    [J]. MICROPROCESSING AND MICROPROGRAMMING, 1991, 33 (02): : 91 - 99
  • [50] Letter: Paying for a Dirty and Leaky Bucket: Further Comments on the Bailout
    Barbier, Edward B.
    [J]. ECONOMISTS VOICE, 2008, 5 (07):