Jiang Zhigang, Li Lemin. ANALYSIS OF THE LEAKY BUCKET ALGORITHM FOR PRIORITY SOURCES IN ATM NETWORKS[J]. Journal of Electronics & Information Technology, 1996, 18(2): 152-157.
Citation:
Jiang Zhigang, Li Lemin. ANALYSIS OF THE LEAKY BUCKET ALGORITHM FOR PRIORITY SOURCES IN ATM NETWORKS[J]. Journal of Electronics & Information Technology, 1996, 18(2): 152-157.
Jiang Zhigang, Li Lemin. ANALYSIS OF THE LEAKY BUCKET ALGORITHM FOR PRIORITY SOURCES IN ATM NETWORKS[J]. Journal of Electronics & Information Technology, 1996, 18(2): 152-157.
Citation:
Jiang Zhigang, Li Lemin. ANALYSIS OF THE LEAKY BUCKET ALGORITHM FOR PRIORITY SOURCES IN ATM NETWORKS[J]. Journal of Electronics & Information Technology, 1996, 18(2): 152-157.
The leaky bucket algorithm for priority sources in ATM network is derived and the analytical expressions of the relation among the leaky bucket performance, the leaky bucket parameters and the statistical parameters of input traffic are obtained. The adjustment factor of constant serving rate for lower priority service, , is introduced and its effect on the performance of the higher priority and the lower priority services are studied.
Chuch M C.[J].Cruz R L. Approximate analysis of average performance of (,) regulators, IEEE INFOCOM9.1990,:-Berger A W. Performance analysis of a rate control throttle where tokens and jobs queue.[J].IEEE INFOCOM9.1990,:-[2]Yin N.[J].Hluchyj M G. Analysis of the leaky bucket algorithm for on-off data sources, IEEE GLOBECOM9.1991,:-[3]9. 2. 7.[4]Tucker R C F. IEEE Trans. on COM,1988, COM-36(4): 479-483.[5][5][6]Anick D, Mitra D, Sondhi M M. Bell System Tech. J, 1982, 61(8): 1871-1894.