Performance analysis of leaky-bucket bandwidth enforcement strategy for bursty traffics in an ATM network

YH Kim, BC Shin, CK Un - Computer Networks and ISDN Systems, 1992 - Elsevier
In this paper, we analyze the performance of the bandwidth enforcement strategy applied for
the bursty traffic. As a bandwidth enforcement strategy, we consider the leaky-bucket (LB)
strategy which has been regarded as the most promising and easily implementable strategy.
In this analysis, we use an Markov-modulated Poisson process (MMPP) as a model for the
burst input traffic. With a token and a token pool as models for the transmission right and the
allowed burstiness of the input traffic, respectively, we analyze and obtain the performance …
以上显示的是最相近的搜索结果。 查看全部搜索结果