National Bureau of Economic Research (NBER)
Robert Satchwell, David Johannsen, Khurram Dastgir-Khan, Jack Cheng, Gordon Bridger, John Pointon, Roger Woolfe, Ian Petrie, Guenther Grunert,
... budget Brutal elves in the woods Ecoterrorism The leaky bucket Energy shortage The north-west salmon gets squeezed ...
2001 - Gale Group | The Economist
Dirk Abendroth, Martin E. Eckel, Ulrich Killat,
... scheduling algorithms leaned on the well-known token bucket and leaky bucket shaping/policing algorithms. The performance of the presented ...
Tópico(s): Advanced Queuing Theory Analysis
2005 - Elsevier BV | AEU - International Journal of Electronics and Communications
Abhay Parekh, Robert G. Gallager,
... bounds on delay and backlog are derived for leaky bucket constrained sessions in arbitrary topology networks of generalized ... When only a subset of the sessions are leaky bucket constrained, we give succinct per-session bounds that ... that exceeds the token arrival rate of its leaky bucket. A much broader class of networks, called consistent ... case in which all of the sessions are leaky bucket constrained. First, an algorithm is presented that characterizes ...
Tópico(s): Software-Defined Networks and 5G
1994 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking
B. Patel, Chatschik Bisdikian,
... prominent congestion control solution in ATM networks. The "leaky bucket" with a "cell spacer" is a very popular traffic-shaping approach. By sizing the leaky bucket and spacer parameters, an end station shapes its ... a "good behaviour" contract with the network. The leaky bucket delays the transmission of a selected number of ... we study, through simulations, the contribution of the leaky bucket plus cell spacer subsystem to the delay and ...
Tópico(s): Advanced Optical Network Technologies
1996 - Institute of Electrical and Electronics Engineers | IEEE Network
S. Radhakrishnan, S. V. Raghavan, Ashok K. Agrawala,
... of their effectiveness in smoothing the burstiness. The Leaky Bucket (LB) scheme, to cite an example, is a ...
Tópico(s): Advanced Queuing Theory Analysis
1996 - Elsevier BV | Computer Networks and ISDN Systems
Young Han Kim, Byung Chul Shin, C.K. Un,
Tópico(s): Advanced Wireless Network Optimization
1992 - Elsevier BV | Computer Networks and ISDN Systems
Chi-Tung Chang, Chia-Mu Yu, Chia‐Wei Chang, Li-Feng Lin,
In this paper, we propose two intelligent leaky bucket algorithms for sustainable-cell-rate usage parameter control of multimedia transmission in asynchronous transfer mode networks. One is the fuzzy leaky bucket algorithm, in which a fuzzy increment controller (FIC) is incorporated with the conventional leaky bucket algorithm; the other is the neural fuzzy leaky bucket algorithm, where a neural fuzzy increment controller (NFIC) is added with the conventional leaky bucket algorithm. Both the FIC and the NFIC properly ...
Tópico(s): Advanced Queuing Theory Analysis
2004 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Multimedia
In the ATM network, the leaky bucket scheme is a promising method that regulates input traffics for preventive congestion control. In order to satisfy the loss probability constraint ... bursty input traffic, it is known that the leaky bucket scheme with static token generation interval requires larger ... waiting time for input traffic to pass the leaky bucket scheme, which would be inappropriate for real time ... as voice and video. The authors present the leaky bucket scheme with threshold-based token generation intervals in ...
Tópico(s): Wireless Communication Networks Research
1996 - Institution of Engineering and Technology | IEE Proceedings - Communications
... is bandwidth enforcement or policing. The so‐called ‘leaky bucket’ algorithm can be used to monitor and enforce ... bit rate (CBR) connection. The parameters of the ‘leaky bucket’ algorithm depend on the bit rate of the ... jitter. Sugestions for setting the parameters of the ‘leaky bucket’ algorithm are provided in this paper. Furthermore, a ‘dual leaky bucket’ algorithm is proposed to police the traffic parameters ... a variable bit rate (VBR) connection. The ‘dual leaky bucket’ approach could also be used to define a ...
Tópico(s): Advanced Optical Network Technologies
1990 - Wiley | International Journal of Digital & Analog Communication Systems
M. Butto, Elisa Cavallero, A. Tonietti,
The performance of the leaky bucket, a device for controlling the source traffic parameters of an ATM network is analyzed. The most critical situation, i.e., ... the customer premises network is not considered. The leaky bucket can be analyzed as a G/D/1/ ... the aim of assessing the effectiveness of the leaky bucket mechanism. It is concluded that while the leaky bucket can easily control the peak rate, difficulties arise ...
Tópico(s): Advanced Wireless Network Optimization
1991 - Institute of Electrical and Electronics Engineers | IEEE Journal on Selected Areas in Communications
... traffic control tends to use only local information. Leaky bucket has been introduced as a rate control method. ... present paper studies the system performance of a leaky bucket controller with the arrivals being Poisson processes or ... is sufficient to attain the capability of a leaky bucket controller; increasing the size of the controller will ... performance. Controlling MMPP type of arrivals with a leaky bucket device may incur low performance especially when the ...
Tópico(s): Wireless Communication Networks Research
1993 - Elsevier BV | Computer Networks and ISDN Systems
Jing-Fei Ren, J.W. Mark, J.W. Wong,
... number of input sources, each controlled by a leaky-bucket mechanism. The outputs from the leaky-buckets are fed to a statistical multiplexer. The cell level loss occurs at the individual leaky-buckets and the burst level loss occurs at the ... use a unified state space representation for the leaky-buckets-multiplexer system and a spectral expansion method to ...
Tópico(s): Advanced Optical Network Technologies
1994 - Elsevier BV | Performance Evaluation
... in high speed environments based on a buffered leaky bucket algorithm. The analysis is carried out in discrete ... ATM environment. For the cell arrivals to the leaky bucket the authors consider a general discrete Markovian arrival ... source, and increasing the bucket size of the leaky bucket does not improve substantially the performance at the ...
Tópico(s): Distributed systems and fault tolerance
1994 - IEEE Communications Society | IEEE Transactions on Communications
Naoaki Yamanaka, Y. Sato, Kazunobu Sato,
The performance limitation of the "leaky bucket algorithm" is analyzed for usage parameter control and traffic management in asynchronous transfer mode (ATM) networks. Simulation results show that the ... the cell interarrival time moments" permitted by the leaky bucket algorithm, can not guarantee the quality of service ( ... VC/VP bandwidth allocation method based on the leaky bucket algorithm is unsatisfactory. >
Tópico(s): Petri Nets in System Modeling
1995 - IEEE Communications Society | IEEE Transactions on Communications
D.I. Choi, Bo‐Ran Choi, Dan Keun Sung,
The leaky bucket scheme is a promising method that regulates input traffic for preventive congestion control in ATM networks. One ... real-time traffics. The authors propose a priority leaky bucket scheme with queue-length-threshold scheduling policy. The motivation of this proposed leaky bucket scheme is to meet the quality of service ...
Tópico(s): Advanced Wireless Network Optimization
1998 - Institution of Engineering and Technology | IEE Proceedings - Communications
Kenneth Mitchell, Appie van de Liefvoort, J. Place,
... paper we focus on the behavior of the leaky bucket mechanism with respect to second-order statistics of ... correlation of the inter-departure times for the leaky bucket cell departure stream and we produce numerical examples for the lag-k auto-correlation of the leaky bucket inter-departure times for several different cell arrival ...
Tópico(s): Statistical Distribution Estimation and Applications
1998 - Elsevier BV | Computer Communications
Yen‐Chieh Ouyang, Ching‐Wen Yang, Wei Shi Lian,
... a novel feedback rate regulator using the multiple leaky bucket (MLB) for variable bit rate (VBR) self-similar ... the leak rate and buffer capacity of each leaky bucket (LB) can be dynamically adjusted based on the ... can be significantly reduced compare to the conventional leaky bucket method.
Tópico(s): Software-Defined Networks and 5G
2006 - IOS Press | Journal of High Speed Networks
Hakem Beitollahi, Geert Deconinck,
... upstream routers close to traffic sources to install leaky-buckets for its IP address. The negotiation continues until ... through a feedback-control process adjusts size of leaky-buckets until inbound traffic locates in a desired range ( ... subsequently asks corresponding defense routers to remove the leaky-bucket limitations for those port interfaces. Additionally, the server amends size of leaky-buckets for the defense routers proportional to amount of ...
Tópico(s): Advanced Malware Detection Techniques
2012 - Elsevier BV | Procedia Computer Science
... channel rate control algorithm for ATM networks with leaky buckets as open-loop source flow control models. The ... imposed by the encoder and decoder buffers, the leaky bucket control, traffic smoothing, and rate control. The encoder ... rate control. It can improve the problem of leaky bucket saturation exhibited in previous works. Experimental results with ...
Tópico(s): Advanced Wireless Network Optimization
1997 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems for Video Technology
Chi-Yuan Hsu, Antonio Ortega, Amy R. Reibman,
... of constraints, including such popular ones as the leaky bucket, we introduce an algorithm to find the optimal ... end delay. Finally, we show that for the leaky-bucket channel, the channel constraints can be combined with ... infrequently imposed constraint. Therefore, video quality with a leaky-bucket channel can achieve the same quality of a ...
Tópico(s): Advanced Wireless Network Optimization
1997 - Institute of Electrical and Electronics Engineers | IEEE Journal on Selected Areas in Communications
The leaky-bucket regulator has several potential roles in the operation of future transport networks; among them, the bounding of ... such cases, a recursive algorithm for setting the leaky-bucket parameters may prove useful. We devise such an algorithm here. The leaky-bucket parameters are computed recursively over a limited period ...
Tópico(s): Advanced Optical Network Technologies
2001 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking
Tzu-Chieh Tsai, Chi-Hong Jiang, Chuang-Yin Wang,
The IEEE 802.16 standard was designed for Wireless Metropolitan Area Network (WMAN). The coverage of this new technology is expanded up to 50 km. IEEE 802.16 also has inherent QoS mechanism while the transmission rate can be up to 70Mbps. However, the main part of 802.16 - packet scheduling, was not defined and left as an open issue. In this paper, we present an uplink packet scheduling with call admission control (CAC) mechanism that is token bucket based. Also, a mathematical model of characterizing ...
Tópico(s): Advanced MIMO Systems Optimization
2006 - International Communication Association | Journal of Communications
Masrure Alam, Mohammed Atiquzzaman, Mohammad A. Karim,
The Internet Engineering Task Force (IETF) has proposed the Guaranteed Service (GS) in the Integrated Services model with firm delay and bandwidth guarantees. In this paper, we study the effects of a token bucket traffic shaper at the source on the transmission characteristics of Motion Picture Experts Group (MPEG) compressed video streams over the GS. We develop an analytical model of the traffic shaper, and also carry out numerical simulation of the transmission performance using MPEG trace data ...
Tópico(s): Peer-to-Peer Network Technologies
2000 - Elsevier BV | Computer Communications
Sambit Sahu, Philippe Nain, Christophe Diot, Victor Firoiu, Don Towsley,
The Differentiated services (diffserv) architecture has been proposed as a scalable solution for providing service differentiation among flows without any per-flow buffer management inside the core of the network. It has been advocated that it is feasible to provide service differentiation among a set of flows by choosing an appropriate “marking profile” for each flow. In this paper, we examine (i) whether it is possible to provide service differentiation among a set of TCP flows by choosing appropriate ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2000 - Association for Computing Machinery | ACM SIGMETRICS Performance Evaluation Review
... class of time varying shapers called time varying leaky bucket shapers; such shapers are defined by a fixed numbers of leaky buckets, whose parameters (rate and bucket size) are changed ...
Tópico(s): Advanced Optical Network Technologies
2000 - IOS Press | Journal of High Speed Networks
N.R. Figueira, Joseph Pasquale,
... servers provides an upper bound on delay for leaky bucket constrained sessions, i.e., sessions conforming to a ... given by PGPS. The authors also prove that leaky bucket constrained sessions are the only type of sessions ...
Tópico(s): Interconnection Networks and Systems
1995 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking
Venkat Anantharam, Takis Konstantopoulos,
The leaky bucket is a simple flow control scheme for ATM networks. An arriving cell can be transmitted only if ...
Tópico(s): Advanced Wireless Network Optimization
1994 - IEEE Communications Society | IEEE Transactions on Communications
... to demonstrate the equivalence of implementing a buffered leaky bucket controller based on either virtual finish times or ... is a fundamental difference between constraints based on leaky buckets and constraints based on general arrival curves, such ...
Tópico(s): Software-Defined Networks and 5G
2002 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking
Jennifer Rexford, Flavio Bonomi, Albert Greenberg, A. Wong,
... travel through the network. This paper presents a leaky-bucket shaper architecture that scales to a large number ... between connections with conforming cells by carefully integrating leaky-bucket traffic shaping with rate-based scheduling algorithms. Through ...
Tópico(s): Advanced Optical Network Technologies
1997 - Institute of Electrical and Electronics Engineers | IEEE Journal on Selected Areas in Communications