作者
Young Han Kim, Byung Chul Shin, Chong Kwan Un
发表日期
1992/9/1
期刊
Computer Networks and ISDN Systems
卷号
25
期号
3
页码范围
295-303
出版商
Elsevier
简介
In this paper, we analyze the performance of the bandwidth enforcement strategy applied for the bursty traffic. As a bandwidth enforcement strategy, we consider the leaky-bucket (LB) strategy which has been regarded as the most promising and easily implementable strategy. In this analysis, we use an Markov-modulated Poisson process (MMPP) as a model for the burst input traffic. With a token and a token pool as models for the transmission right and the allowed burstiness of the input traffic, respectively, we analyze and obtain the performance of the traffic under the LB bandwidth enforcement strategy. We also present some numerical results to show the effects of the system parameters on the performance of the traffic measured by the cell delay and the cell blocking probability.
引用总数
19931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201623410741411211112121