Journal of Electronics (China)

, Volume 13, Issue 4, pp 333–338 | Cite as

Analysis of the leaky bucket algorithm for priority services

  • Jiang Zhigang
  • Li Lemin


The leaky bucket algorithm with loss priorities is studied in this paper. The analytical expression of the relation among leaky bucket performance, statistical parameters of input traffic and leaky bucket parameters for various priority services is obtained, and the effect of adjustment factor on leaky bucket performance of higher-priority service and lower-priority service is studied with two priority classes.

Key words

ATM network Priority sources Leaky bucket algorithm 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    J. J. Bae, T. Suda,Proc. IEEE,79(1991)2, 170–189.CrossRefGoogle Scholar
  2. [2]
    A. E. Eckberg, D. T. Luan, D. M. Lucantoni, Meeting the Challenge: Congestion and Flow Control Strategies for Broadband Information Transport, Proc. IEEE GLOBECOM’89, 1989, 49.3.1–49.3.5.Google Scholar
  3. [3]
    N. Yin, MG. Hiuchyj, Analysis of the Leaky Bucket Algorithm for On-Off Data Sources, Proc. IEEE GLOBECOM’91, 1991, 9.2.1–9.2.7.Google Scholar
  4. [4]
    D. Anick, D. Mitra, M. M. Sondhi,Bell Syst. Tech. J.,61(1982)8, 1871–1894.MathSciNetGoogle Scholar
  5. [5]
    Jiang Zhigang, Li Lemin, Analysis of the Leaky Algorithm for Bursty Sources in ATM Networks,Acta Electronica Sinica,23(1995)1, 8–14, (in Chinese).Google Scholar

Copyright information

© Science Press 1996

Authors and Affiliations

  • Jiang Zhigang
    • 1
  • Li Lemin
    • 1
  1. 1.National Key LabUniversity of Electronic Science and Technology of ChinaChengdu

Personalised recommendations