By Topic

On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Sohraby, K. ; IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA ; Sidi, M.

The analysis of a rate-based access control scheme in high speed environments that is based on a buffered leaky bucket algorithm is presented. The analysis is carried out in discrete time, which is representative of asynchronous transfer mode environments. For the cell arrivals to the leaky bucket, a general discrete Markovian arrival process is considered which models bursty and correlated sources. The introduction of the deficit function allows the reduction of the original problem to a more standard discrete time queuing system with the same arrival process. As an important special case, the detailed analysis of the binary Markov source throttled by such rate-based access control schemes is presented. Along with explicit recursions for computation of state probabilities and simple characterization of the asymptotic behavior of the queue buildup, some guidelines for the parameter selection of these schemes is provided

Published in:

INFOCOM '91. Proceedings. Tenth Annual Joint Conference of the IEEE Computer and Communications Societies. Networking in the 90s., IEEE

Date of Conference:

7-11 Apr 1991