Worst Case Arrivals of Leaky Bucket Constrained Sources: The Myth of the On-Off source
暂无分享,去创建一个
[1] Ken-ichi Sato,et al. Performance Limitation of Leaky Bucket Algorithm for Usage Parameter Control and Bandwidth Allocation Methods , 1992 .
[2] Rene L. Cruz,et al. A calculus for network delay, Part I: Network elements in isolation , 1991, IEEE Trans. Inf. Theory.
[3] Julio A. Garceran. A New Approach for Allocating Buffers and Bandwidth to Heterogeneous , Regulated Traffic in an ATM Node ” , 2022 .
[4] Ken-ichi Sato,et al. Usage parameter control and bandwidth allocation methods for ATM-based B-ISDN , 1992, CCRV.
[5] Daniel Chonghwan Lee. Effects of leaky bucket parameters on the average queueing delay: worst case analysis , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[6] Debasis Mitra,et al. A New Approach for Allocating Buffers and Bandwidth to Heterogeneous Regulated Traffic in an ATM Node , 1995, IEEE J. Sel. Areas Commun..
[7] Erwin P. Rathgeb. Modeling and Performance Comparison of Policing Mechanisms for ATM Networks , 1991, IEEE J. Sel. Areas Commun..
[8] Donald F. Towsley,et al. Source time scale and optimal buffer/bandwidth trade-off for regulated traffic in an ATM node , 1997, Proceedings of INFOCOM '97.
[9] Pravin K. Johri,et al. Estimating cell loss rates in high-speed networks with leaky bucket controlled sources , 1995 .
[10] K. Kvols,et al. Bounds and approximations for the periodic on/off queue with applications to ATM traffic control , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.
[11] Tom Worster,et al. Modelling Deterministic Queues: The Leaky Bucket as an Arrival Process , 1994 .
[12] J. Boudec. Network Calculus Made Easy , 1996 .
[13] Harry G. Perros,et al. Call admission control schemes: a review , 1996, IEEE Commun. Mag..