Skip to main content
Log in

Analysis of the leaky bucket algorithm for priority services

  • Published:
Journal of Electronics (China)

Abstract

The leaky bucket algorithm with loss priorities is studied in this paper. The analytical expression of the relation among leaky bucket performance, statistical parameters of input traffic and leaky bucket parameters for various priority services is obtained, and the effect of adjustment factor on leaky bucket performance of higher-priority service and lower-priority service is studied with two priority classes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. J. J. Bae, T. Suda,Proc. IEEE,79(1991)2, 170–189.

    Article  Google Scholar 

  2. A. E. Eckberg, D. T. Luan, D. M. Lucantoni, Meeting the Challenge: Congestion and Flow Control Strategies for Broadband Information Transport, Proc. IEEE GLOBECOM’89, 1989, 49.3.1–49.3.5.

  3. N. Yin, MG. Hiuchyj, Analysis of the Leaky Bucket Algorithm for On-Off Data Sources, Proc. IEEE GLOBECOM’91, 1991, 9.2.1–9.2.7.

  4. D. Anick, D. Mitra, M. M. Sondhi,Bell Syst. Tech. J.,61(1982)8, 1871–1894.

    MathSciNet  Google Scholar 

  5. Jiang Zhigang, Li Lemin, Analysis of the Leaky Algorithm for Bursty Sources in ATM Networks,Acta Electronica Sinica,23(1995)1, 8–14, (in Chinese).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

About this article

Cite this article

Zhigang, J., Lemin, L. Analysis of the leaky bucket algorithm for priority services. J. of Electron.(China) 13, 333–338 (1996). https://doi.org/10.1007/BF02734906

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02734906

Key words

Navigation