References
- H. Ahmadi, R. Guerin, and K. Sohraby, Analysis of leaky bucket access control mechanism with batch arrival process, IEEE Globecom'90 (1990), 344-349
- M. Butto, E. Cavallero, and A. Tonietti, Effectiveness of the leaky bucket policing mechanism in ATM networks, IEEE J. Sel. Areas Commun. 9 (1991), no. 3, 335-342 https://doi.org/10.1109/49.76631
- B. D. Choi and D. I. Choi, Discrete-time analysis of the leaky bucket scheme with threshold-based token generation intervals, IEE Proc. Commun. 143 (1996), 105-111
- B. D. Choi and D. I. Choi, The discrete-time analysis of the leaky bucket scheme with dynamic leacky rate control, Comm. Korean. Math. Soc. 13 (1998), no. 3, 603-627
- D. I. Choi, B. D. Choi, and D. K. Sung, Performance analysis of priority leaky bucket scheme with queue-length-threshold scheduling policy, IEE Proc. Commun. 145 (1998), no. 6, 395-401
- Y. H. Kim, B. C. Shin, and C. K. Un, Performance analysis of leaky bucket band-width enforcement strategy for bursty traffics in an ATM networks, Computer Networks ISDN Syst. 25(1992), 295-303 https://doi.org/10.1016/0169-7552(92)90096-9
- J. Y. Lee and C. K. Un, Performance of dynamic rate leaky bucket algorithm, IEE Electron. Lett. 29 (1993), no. 17, 1560-1561 https://doi.org/10.1049/el:19931040
- C. G. Park, B. D. Choi, and D. K. Sung, Performance analysis of leaky bucket scheme with a threshold in the data buffer, Computer Networks ISDN Syst. 29 (1997), 781-795 https://doi.org/10.1016/S0169-7552(96)00104-3
- M. Sidi, Z. Lin, I. Cidon, and I. Gopal, Congestion control through input rate regulation, Proceedings of IEEE Globecom'89 ( 1989)
- K. Sohraby and M. Sidi, On the performance of bursty and modulated sources subject to leaky bucket rate based access control schemes, IEEE Trans. on Commun. 42 (1994), 477-487 https://doi.org/10.1109/TCOMM.1994.577075
- J. Tunner, New directions in communications(or Which way to the information age), IEEE Communi. Mag. 24 (1986), 17-24
- G. L. Wu and J. W. Mark, Discrete time analysis of leaky bucket congestion control, Computer Networks ISDN Syst. 26 (1993), 79-94 https://doi.org/10.1016/0169-7552(93)90038-6
- J. Zeng and L. F. Merakos, Analysis of a priority leaky bucket regulator for virtual path traffic in ATM networks, Proceedings of IEEE Globecom'94. 1994, 606-611
Cited by
- QUEUEING ANALYSIS FOR TRAFFIC CONTROL WITH COMBINED CONTROL OF DYNAMIC MMPP ARRIVALS AND TOKEN RATES vol.17, pp.2, 2013, https://doi.org/10.12941/jksiam.2013.17.103