Performance analysis of a Leaky Bucket scheme with a threshold in the data buffer

Cited 5 time in webofscience Cited 0 time in scopus
  • Hit : 339
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorChoi, BDko
dc.contributor.authorPark, CGko
dc.contributor.authorSung, Dan Keunko
dc.date.accessioned2013-03-02T21:47:50Z-
dc.date.available2013-03-02T21:47:50Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued1997-08-
dc.identifier.citationCOMPUTER NETWORKS AND ISDN SYSTEMS, v.29, no.7, pp.781 - 795-
dc.identifier.issn0169-7552-
dc.identifier.urihttp://hdl.handle.net/10203/75698-
dc.description.abstractWe investigate Leaky Bucket (LB) schemes with a threshold in the data buffer, where the leak rate changes depending on the contents of the data buffer. We use a Markov modulated Poisson process (MMPP) as a bursty input traffic. We obtain the limiting distributions of the system state at an embedded point and at an arbitrary time. As performance measures we obtain cell loss probability and mean cell delay. We present some numerical results to show the effects of the threshold value, the rate of token generation, the size of the token pool and the size of the data buffer on the performances of the LB scheme with a threshold. Numerical examples show that the LB scheme with a threshold improves the system performance in comparison with the LB scheme without a threshold. (C) 1997 Published by Elsevier Science B.V.-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE BV-
dc.subjectATM NETWORKS-
dc.subjectVOICE-
dc.titlePerformance analysis of a Leaky Bucket scheme with a threshold in the data buffer-
dc.typeArticle-
dc.identifier.wosidA1997YD90500005-
dc.identifier.scopusid2-s2.0-0031198616-
dc.type.rimsART-
dc.citation.volume29-
dc.citation.issue7-
dc.citation.beginningpage781-
dc.citation.endingpage795-
dc.citation.publicationnameCOMPUTER NETWORKS AND ISDN SYSTEMS-
dc.contributor.localauthorSung, Dan Keun-
dc.contributor.nonIdAuthorChoi, BD-
dc.contributor.nonIdAuthorPark, CG-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorLeaky Bucket-
dc.subject.keywordAuthorthreshold-
dc.subject.keywordAuthorMMPP-
dc.subject.keywordAuthorQoS-
dc.subject.keywordAuthorperformance analysis-
dc.subject.keywordPlusATM NETWORKS-
dc.subject.keywordPlusVOICE-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 5 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0