Performance analysis of a Leaky Bucket scheme with a threshold in the data buffer
暂无分享,去创建一个
[1] Ward Whitt,et al. Characterizing Superposition Arrival Processes in Packet Multiplexers for Voice and Data , 1986, IEEE J. Sel. Areas Commun..
[2] Younghan Kim,et al. Performance analysis of statistical multiplexing for heterogeneous bursty traffic in an ATM network , 1994, IEEE Trans. Commun..
[3] Erwin P. Rathgeb. Modeling and Performance Comparison of Policing Mechanisms for ATM Networks , 1991, IEEE J. Sel. Areas Commun..
[4] Thomas E. Stern,et al. Analysis of separable Markov-modulated rate models for information-handling systems , 1991, Advances in Applied Probability.
[5] Wolfgang Fischer,et al. The Markov-Modulated Poisson Process (MMPP) Cookbook , 1993, Perform. Evaluation.
[6] Moshe Sidi,et al. On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes , 1991, IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings.
[7] Debasis Mitra,et al. Analysis and design of rate-based congestion control of high speed networks, I: stochastic fluid models, access regulation , 1991, Queueing Syst. Theory Appl..
[8] Chong Kwan Un,et al. Performance Analysis of Leaky-Bucket Bandwidth Enforcement Strategy for Bursty Traffics in an ATM Network , 1992, Comput. Networks ISDN Syst..
[9] Jon W. Mark,et al. Discrete time analysis of leaky-bucket congestion control , 1992, [Conference Record] SUPERCOMM/ICC '92 Discovering a New World of Communications.
[10] Anwar Elwalid,et al. Fluid models for the analysis and design of statistical multiplexing with loss priorities on multiple classes of bursty traffic , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.
[11] B. D. Choi,et al. Discrete-time analysis of the leaky bucket scheme with threshold-based token generation intervals , 1996 .
[12] David M. Lucantoni,et al. A Markov Modulated Characterization of Packetized Voice and Data Traffic and Related Statistical Multiplexer Performance , 1986, IEEE J. Sel. Areas Commun..
[13] Alberto Tonietti,et al. Effectiveness of the "Leaky Bucket" Policing Mechanism in ATM Networks , 1991, IEEE J. Sel. Areas Commun..