Abstract
The leaky bucket algorithm with loss priorities is studied in this paper. The analytical expression of the relation among leaky bucket performance, statistical parameters of input traffic and leaky bucket parameters for various priority services is obtained, and the effect of adjustment factor on leaky bucket performance of higher-priority service and lower-priority service is studied with two priority classes.
Similar content being viewed by others
References
J. J. Bae, T. Suda,Proc. IEEE,79(1991)2, 170–189.
A. E. Eckberg, D. T. Luan, D. M. Lucantoni, Meeting the Challenge: Congestion and Flow Control Strategies for Broadband Information Transport, Proc. IEEE GLOBECOM’89, 1989, 49.3.1–49.3.5.
N. Yin, MG. Hiuchyj, Analysis of the Leaky Bucket Algorithm for On-Off Data Sources, Proc. IEEE GLOBECOM’91, 1991, 9.2.1–9.2.7.
D. Anick, D. Mitra, M. M. Sondhi,Bell Syst. Tech. J.,61(1982)8, 1871–1894.
Jiang Zhigang, Li Lemin, Analysis of the Leaky Algorithm for Bursty Sources in ATM Networks,Acta Electronica Sinica,23(1995)1, 8–14, (in Chinese).
Author information
Authors and Affiliations
About this article
Cite this article
Zhigang, J., Lemin, L. Analysis of the leaky bucket algorithm for priority services. J. of Electron.(China) 13, 333–338 (1996). https://doi.org/10.1007/BF02734906
Issue Date:
DOI: https://doi.org/10.1007/BF02734906