메뉴 건너뛰기




Volumn 145, Issue 6, 1999, Pages 395-400

Performance analysis of priority leaky bucket scheme with queue-length-threshold scheduling policy

Author keywords

Performance analysis; Priority leaky bucket scheme; Queiie lenglh threshold sclieihiling policy

Indexed keywords

LEAKY BUCKET SCHEME; NONREAL TIME TRAFFIC; QUEUE LENGTH THRESHOLD SCHEDULING POLICY;

EID: 0032270314     PISSN: 13502425     EISSN: None     Source Type: Journal    
DOI: 10.1049/ip-com:19982287     Document Type: Article
Times cited : (14)

References (14)
  • 1
    • 0026138937 scopus 로고
    • Modeling and performance comparison of policing mechanisms for ATM networks
    • RATHGEB, E.P.: 'Modeling and performance comparison of policing mechanisms for ATM networks', IEEE J. Select. Areas Commun., 1991, 9, (3), pp. 325-334
    • (1991) IEEE J. Select. Areas Commun. , vol.9 , Issue.3 , pp. 325-334
    • Rathgeb, E.P.1
  • 2
    • 0022796415 scopus 로고
    • New directions in communications (or which way to the information ase)
    • TURNER, J.: 'New directions in communications (or which way to the information ase)', IEEE Commun. Mag.. 1986, 24, pp. IT24
    • (1986) IEEE Commun. Mag.. , vol.24
    • Turner, J.1
  • 3
    • 0023997481 scopus 로고
    • PARIS: An approach to integrated hiah speed networks
    • CIDON, I., and GOPAL, I.S.: 'PARIS: an approach to integrated hiah speed networks', Int. J. Digital Analog Cabled Syst., 1988, 1, pp. 77-85
    • (1988) Int. J. Digital Analog Cabled Syst. , vol.1 , pp. 77-85
    • Cidon, I.1    Gopal, I.S.2
  • 4
    • 0030121449 scopus 로고    scopus 로고
    • Discrete time analysis of the leaky bucket scheme with threshold-based token eeneration intervals
    • CHOI, B.D., and CHOI, D.I.: 'Discrete time analysis of the leaky bucket scheme with threshold-based token eeneration intervals', IEE Proc. Commun., 1996, 143, (2), pp. 105-111
    • (1996) IEE Proc. Commun. , vol.143 , Issue.2 , pp. 105-111
    • Choi, B.D.1    Choi, D.I.2
  • 6
    • 0026923612 scopus 로고
    • Performance analysis of leaky bucket band-width enforcement strateey for bursty traffics in an ATM networks
    • KIM, Y.H., SHIN, B.C., and UN, C.K.: 'Performance analysis of leaky bucket band-width enforcement strateey for bursty traffics in an ATM networks', Computer Netn-orks~ISDN Syst., 1992, 25, pp. 295-303
    • (1992) Computer Netn-orks~ISDN Syst. , vol.25 , pp. 295-303
    • Kim, Y.H.1    Shin, B.C.2    C.k, U.N.3
  • 7
    • 0026139273 scopus 로고
    • Effectiveness of the leaky bucket policing mechanism in ATM networks
    • BUTTO, M., CAVALLERO, E., and TONIETTI, A.: 'Effectiveness of the leaky bucket policing mechanism in ATM networks', IEEEJ. Sel. Areas Commun., 1991, 9, (3), pp. 335-342
    • (1991) IEEEJ. Sel. Areas Commun. , vol.9 , Issue.3 , pp. 335-342
    • Butto, M.1    Cavallero, E.2    Tonietti, A.3
  • 8
    • 0028017070 scopus 로고
    • Performance analysis of a leaky-bucket controlled ATM multiplexer
    • REN, J.F., MARK, J.W., and WONG, J.W.: 'Performance analysis of a leaky-bucket controlled ATM multiplexer', Performance E\-ai, 1994, 19, pp. 73-101
    • (1994) Performance E\-ai , vol.19 , pp. 73-101
    • Ren, J.F.1    Mark, J.W.2    Wong, J.W.3
  • 9
    • 0025795668 scopus 로고
    • On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes
    • Bal Harbour, FL, USA
    • SOHRABY, K., and SIDI, M.: 'On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes'. Proceedings of IEEE INFOCOM'9I, Bal Harbour, FL, USA, 1991, pp. 426-434
    • (1991) Proceedings of IEEE INFOCOM'9I , pp. 426-434
    • Sohraby, K.1    Sidi, M.2
  • 11
    • 0029357689 scopus 로고
    • Performance limitation of the leaky bucket algorithm for ATM networks
    • YAMANAKA, N., SATO, Y., and SATO, K.: 'Performance limitation of the leaky bucket algorithm for ATM networks', IEEE Trans. Commun., 1995, 43, (8), pp. 2298-2300
    • (1995) IEEE Trans. Commun. , vol.43 , Issue.8 , pp. 2298-2300
    • Yamanaka, N.1    Sato, Y.2    Sato, K.3
  • 12
    • 33745984160 scopus 로고
    • Analysis of a priority leaky bucket regulator for virtual path traffic in ATM networks
    • ZENG, J., and MERAKOS, L.F.: 'Analysis of a priority leaky bucket regulator for virtual path traffic in ATM networks'. Proceedings of IEEE Globecom'94, 1994, pp. 606-611
    • (1994) Proceedings of IEEE Globecom'94 , pp. 606-611
    • Zeng, J.1    Merakos, L.F.2
  • 13
    • 0024868542 scopus 로고
    • Scheduling policies for real-time and nonreal-time traffic in a statistical multiplexer
    • CHIPALKATTI, R., KUROSE, J.F., and TOWSLEY, D.: 'Scheduling policies for real-time and nonreal-time traffic in a statistical multiplexer'. Proceedings of IEEE INFOCOM'89, 1989, pp. 774-783
    • (1989) Proceedings of IEEE INFOCOM'89 , pp. 774-783
    • Chipalkatti, R.1    Kurose, J.F.2    Towsley, D.3
  • 14
    • 0031678966 scopus 로고    scopus 로고
    • An analysis of M, MMPP/G/1 queues with QLT scheduling policy and Bernoulli schedule
    • CHOI, B.D., and CHOI, D.I.: 'An analysis of M, MMPP/G/1 queues with QLT scheduling policy and Bernoulli schedule', IEICE Trans. Commun., 1998, E81-B, pp. 13-22
    • (1998) IEICE Trans. Commun. , vol.E81-B , pp. 13-22
    • Choi, B.D.1    Choi, D.I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.