• Title/Summary/Keyword: leaky

Search Result 261, Processing Time 0.024 seconds

The Improved Dual Leaky Bucket Algorithm for Multimedia Synchronization (미디어동기화를 위한 개선된 Dual Leaky Bucket 알고리즘)

  • 최용길;이기영
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.50-53
    • /
    • 1998
  • In this paper, the modified Usage Parameter Control(UPC) method based on Dual Leaky Bucket algorithm is proposed to improve the perfor mance of multimedia synchronization and to control burst traffic. In the proposed algorithm, Synchronous cells are by passed to the 2nd stage Leaky Bucket (LB) of the DLB. for overloaded traffic condition, the violated cells are saved in a temporary buffer and they are retransmitted when the 2nd stage bucket is empty.

  • PDF

The Effect on the Quality of Service in ATM Network of Leaky Bucket Algorithm (ATM망의 서비스 품질에 Leaky Bucket 알고리즘이 미치는 영향)

  • 소경영;김영수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.1
    • /
    • pp.125-148
    • /
    • 1998
  • The use of shaping mechanism, realized by means of a leaky bucket based algorithm on input traffic of an ATM network allows to achieve higher utilization of network resources, and to guarantee the quality of service requested by the users. The functionalities of the shaping mechanism based on leaky bucket, are characterized by the token pool sire and by input queue size. In this paper we have analyzed, using simulations, the effect on the quality of service in ATM network of leaky bucket algorithm when shaper parameters described above are changed.

  • PDF

A Study of Leaky Bucket using Burst Tokens (버스트 토큰을 이용한 리키 버킷에 관한 연구)

  • Kim, Dong-Chul
    • Journal of Digital Contents Society
    • /
    • v.8 no.4
    • /
    • pp.573-579
    • /
    • 2007
  • The Leaky Bucket mechanism has been studied in many areas. There has been much interest in flow control in High Speed Networks using the Leaky Bucket. In this paper, We propose the Burst Tokens Fill method that performs well in Leaky Bucket to control the average rate, peak rate, and burst size. This scheme show the improvement of performance. However, This method does not apply all area of applications. Especially application of on-off shape is appropriate and the other area must need to care for appling this scheme.

  • PDF

LSAW Velocity Measurement by Using a PVDF Line-Focus Ultrasonic Transducer (PVDF 직선집속 초음파 트랜스듀서에 의한 누설탄성표면파 속도 측정)

  • 윤혁준;하강열;김무준;윤종락
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.1
    • /
    • pp.62-67
    • /
    • 2001
  • Velocities of leaky surface acoustic waves (LSAW/sub s/) were measured by using a line-focus polyvinylidene fluoride (PVDF) transducer and compared with theoretically calculated ones. Isotropic materials of Cu, Al, fused quartz, and anisotropic one of Z-cut α-quartz crystal were used as specimens. The velocities were obtained by the separation time between wave components reflected directly from the surface of specimen and LSAW components according to the defocusing distance. The measured velocities well agree with the theoretical results within 1% error, and it was shown that the leaky pseudo-surface acoustic wave (LPSAW) as well as the LSAW propagates with the typical 6-fold anisotropy on the (0,0,1) surface of α-quartz.

  • PDF

A Performance Study on The Advanced Peer-to-Peer Network for Broadband Communications (Advanced Peer-to-Peer Network에서의 초고속 통신망의 성능연구)

  • 황명상;류제영;주기호;박두영
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.12a
    • /
    • pp.9-12
    • /
    • 2000
  • In this paper, we carry out a performance study related to the Advanced Peer-to-Peer Network(APPN). For this particular network, it has been proposed to use the leaky bucket as a way of controlling congestion within the network. On the top of leaky bucket type rate based congestion control scheme for high speed networks, a user will typically operate an error control scheme for retransmitting lost and erroneous packets. We propose a Perform ance model in order to study the Interaction between a user's error control scheme and the leaky bucket congestion control scheme for high speed networks. Simulation results show that parameters such as the window size and the token generation rate in the leaky bucket are key factors affecting the end-to-end delay.

  • PDF

Parameters Estimation and Analysis for Leaky Aquifer System (누수대수층에 대한 수리상수 추정과 해석)

  • 김민환
    • Journal of the Korean Society of Groundwater Environment
    • /
    • v.5 no.3
    • /
    • pp.123-128
    • /
    • 1998
  • Leaky aquifer (two-aquifer) system in this study consist of an upper unconfined and a lower confined aquifer with a leaky layer between them. It is assumed that water is withdrawn from the confined aquifer of the aquifer system, the upper unconfined aquifer will be affected by the leaky aquifer separating the upper and lower aquifer. In order to analyze the leaky aquifer, the determination of hydraulic parameters is needed. In this paper, hydraulic parameters are suggested by improved SM (slope-matching) method. To know variation of groundwater head in leaky aquifer systems, an numerical scheme is made using the finite difference method. To verify the numerical scheme, its solution is compared to analytical one. The solution of them agrees well in one-dimensional system at steady-state condition. And heads of groundwader are computed upper and lower aquifer in two-dimensional system.

  • PDF

Leaky-Wave and DFB Characteristics of Optical Waveguide with Asymmetric Rectangular Grating Profile (비대칭 장방형 격자로 구성된 광 도파로의 누설 파와 DFB 특성)

  • Ho, Kwang-Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.151-156
    • /
    • 2021
  • Leakage and Bragg condition of optical waveguide with asymmetric rectangular grating profile are evaluated in detail by using novel and rigorous modal transmission-line theory (MTLT) based on eigenvalue problem. The optical waveguide composed by asymmetric rectangular grating occur leaky-wave stop-bands at Bragg conditions, and anomalies based on Rayleigh-Wood condition near Bragg conditions. Furthermore, DFB properties of the guiding structure at Bragg conditions are analyzed by applying longitudinal equivalent transmission-line with characteristic impedance of periodic grating. The numerical results show that filtering characteristics that maximize the reflected power of DFB waveguide are activated near Bragg conditions, in which leaky-wave stop-bands occur.

Fluid Flow Analysis of the Threshold based Leaky Bucket Scheme

  • Park, Chul-Geun
    • Journal of Electrical Engineering and information Science
    • /
    • v.3 no.2
    • /
    • pp.274-279
    • /
    • 1998
  • We investigate a Leaky Bucket(LB) scheme with a threshold in the data buffer, where leaky rate changes depending on the contents of data buffer. We use the fluid flow model for the analysis of the LB scheme with a threshold. We model the bursty input source as markov modulated fluid flow(MMFF) As performance measures we obtain loss probability and mean delay. We present some numerical results to show the effects of the level of a threshold, the rate of token generation, the size of token pool, and the size the data buffer on the performances of the LB scheme with a threshold.

  • PDF

Leaky-Wave Radiation from a Coaxial Waveguide with Periodic Circumferential Slots

  • Lee, Kyung-Bo;Lee, Chang-Won;Kim, Joong-Pyo;Son, Hyon
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.157-160
    • /
    • 1998
  • The analysis of a coaxial cable with periodic slots as a leaky-wave antenna is considered. The mode matching method and method of moments with Galerkin testing procedure is then used to obtain the determinantal equation for the unknown leaky-wave propagating constant. Both technigues allow the fields to be obtained in any region, and the radiation characteristics of the structure. By resorting to a suitable numerical techniques, it is possible to calculate the leaky-wave propagating constants and the radiation patterns. Numerical results demonstrate the validity of the technique.

  • PDF

Analysis of Leaky Modes on Circular Dielectric Rods using Davidenkos Method

  • Kim, Ki-Young;Tae, Heung-Sik;Lee, Jeong-Hae
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2002.11a
    • /
    • pp.356-360
    • /
    • 2002
  • Leaky modes on a circular dielectric rod are investigated from the precisely determined normalized complex propagation constants using Davidenko's complex root finding technique. Below the cutoff frequency of the guided mode, distinct frequency regions that have unique properties are observed, such as nonphysical region, antenna mode region, reactive mode region, and spectral gap region. The effects of tro design parameters, dielectric constants and the radius of the rod, to the leaky mode characteristics are also considered.

  • PDF