19
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

An Analytic Model of the Leaky Bucket With General Distributions for Both Token and Cell Arrivals

, &
Pages 136-145 | Published online: 15 Jul 2015

References

  • J. Turner, New directions in communications (or Which way to the information age?), IEEE Comm. Magazine, 24, 1986, 8–15.
  • G. Woodruff, R. Rogers, & P. Richards, A congestion control framework for high-speed integrated padcetized transport, Proc. of the IEEE Conf. on Global Coram. (GLOBECOM), 1988, 7.1.1.–1.1.5.
  • H. Ahmadi, R. Guerin, & K. Sohraby, Analysis of a rate-based access control mechanism for high-speed networks, IEEE Trans. on Coram., 41, 1993, 940–950.
  • V. Anatharam & T. Konstantopoulos, Burst reduction properties of the leaky bucket flow control scheme in ATM networks, IEEE Trans. on Comm., 42, 1994, 3085–3089.
  • K. Budka, Stochastic monotonidty and concavity properties of rate-based flow control mechanisms, IEEE Trans. on Automatic Control, 39(1194), 544–548.
  • L. Gun, V. Kulkarni, & A. Narayanan, Bandwidth allocation and access control in high-speed networks, Annals of Operations Research, 49, 1994, 161–183.
  • A. Berger, Performance analysis ofa rate control throttle where tokens and jobs queue, IEEE J. on Selected Areas in Commun., 9, 1991, 165–170.
  • M. Bhutto, E. Cavallero, & A. Tonietti, Effectiveness of the leaky bucket policing mechanism in ATM networks, IEEE J. on Selected Areas in Communications, 9, 1991, 335–342.
  • M.G. Hluchyj & N. Yin, On the queueing behavior of multiplexed leaky bucket regulated sources, Proc. of ike Conf. on Computer Communications (IEEE Infocom), 2, 1993, 672–679.
  • D. Lee, Effects of leaky bucket parameters on the average queueing delay: Worst case analysis, Proc. of the Conf. on Computer Communications (IEEE Info.), 1994, 482–489.
  • K. Sohraby & M. Sidi, On the performance of bursty and modulated sources subject to leaky bucket rate-based access control schemes, IEEE Trans. on Comm., 42, 1994, 477–487.
  • Y.H. Kim, B.C. Shin, & C.K. Un, Performance analysis of leaky-bucket bandwidth enforcement strategy for bursty traffics in an ATM network, Computer Networks and ISDN Sys., 25, 1992, 295–303.
  • G. Wu & J. Mark, Discrete time analysis of leaky-bucket congestion control, Computer Networks and ISDN Sys., 26, 1993, 79–94.
  • D. Logothetis & K. Trivedi, Transient analysis of the leaky bucket rate control scheme under Poisson and on-off sources, Proc. of the Conf. on Computer Communications (IEEE Infocom), 1994, 490–497.
  • A. van de Liefvoort, The moment problem for continuous distributions, Tech. Report CM-1990-02, University of Missouri-Kansas City, 1990.
  • G. Golub & C. van Loan, Matrix computations (Baltimore: Johns Hopkins University Press, 1996).
  • L. Lipsky, Queueing theory: A linear algebraic approach (New York: Macmillan, 1992).
  • A. van de Liefvoort, A sum space characterization of G/G/1/N type queues, Tech. Report TR-87-5, University of Kansas, Lawrence, KS, 1987.
  • A. van de Liefvoort & L. Lipsky, A matrix algebraic solution to two km servers in a loop, J. of the ACM, 33, 1986, 207–233.
  • W. Hsin, Performance analysis of teletraffic models with renewal distributions, Ph.D. Thesis, University of Missiour-Kansas City, 1995.
  • K. Mitchell & A. van de Liefvoort, Approximating the deterministic distribution with the matrix exponential distribution, unpublished.
  • K. Mitchell, A. van de liefvoort, & J. Place, Correlation properties of the token leaky bucket departure process, Computer Communications (1998) (in press).
  • K. Mitchell, A. van de Liefvoort, & J. Place, Transient call blocking for a server with leaky bucket policing, Proc. 5th Inter. Conf. on Telecomm S Modeling and Analysis, 1997, 47–54.
  • K. Mitchell, A. van de Liefvoort, & J. Place, The impact of μ3 of the cell arrival distribution on μ1 of the cell departure distribution, unpublished.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.