Academic literature on the topic 'Leaky Bucket Algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Leaky Bucket Algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Leaky Bucket Algorithm"

1

Lee, J. Y., and C. K. Un. "Performance of dynamic rate leaky bucket algorithm." Electronics Letters 29, no. 17 (1993): 1560. http://dx.doi.org/10.1049/el:19931040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lekcharoen, Somchai. "An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network." ECTI Transactions on Electrical Engineering, Electronics, and Communications 6, no. 2 (2007): 107–16. http://dx.doi.org/10.37936/ecti-eec.200862.171771.

Full text
Abstract:
When congestion occurs in VDSL networks, it will drop incoming frames because the buffer fills up frames until it over°ows. In backpressure algorithm suitable for low traffic [1], it prevents buffer overflows. In backo® time in leaky bucket over traffic policing mechanism suitable for high traffic [2], Backoff time computations are wildly used in order to avoid the impact on the network performance. In this paper, we propose a fuzzy control double leaky bucket using backpressure and backoff time detects violations in parameter negotiation. We evaluate and compare the performance of a fuzzy control backpressure and backo® time in double-leaky bucket as a policing mechanism (FBBD), a leaky bucket (LB), a jumping window (JW), a triggered jumping window (TJW) and a double-leaky bucket (DLB). The performance of fuzzy control backpressure and backo® time in double-leaky bucket was investigated through fluctuations in telecommunications traffic streams (burst/silent type). Simulation results show that in VDSL frames, the fuzzy logic control system helps improve the performance of our fuzzy control double-leaky bucket using backpressure and backoff time schemes as a policing mechanism much better than conventional policing mechanism by about 25 % in terms of conforming and non-conforming frames once various types of burst/silence traffic are generated.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhigang, Jiang, and Li Lemin. "Analysis of the leaky bucket algorithm for priority services." Journal of Electronics (China) 13, no. 4 (1996): 333–38. http://dx.doi.org/10.1007/bf02734906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yamanaka, N., Y. Sato, and K. Sato. "Performance limitation of the leaky bucket algorithm for ATM networks." IEEE Transactions on Communications 43, no. 8 (1995): 2298–300. http://dx.doi.org/10.1109/26.403760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Indumathi, P., S. Shanmugavel, and HC Mahesh. "Buffered Leaky Bucket Algorithm for Congestion Control in ATM Networks." IETE Journal of Research 48, no. 1 (2002): 59–67. http://dx.doi.org/10.1080/03772063.2002.11416256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bai, Junfeng, Qingmin Liao, and Xinggang Lin. "Leaky-bucket based rate control algorithm for C_VBR video encoding." Electronics Letters 35, no. 18 (1999): 1529. http://dx.doi.org/10.1049/el:19991064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Merayo, Luis A., Juan I. Solana, and Luisa Mola. "A microprogram-based hardware implementation of the Leaky Bucket algorithm." Microprocessing and Microprogramming 33, no. 2 (1991): 91–99. http://dx.doi.org/10.1016/0165-6074(91)90020-t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yin, Nanying, and Michael G. Hluchyj. "Analysis of the Leaky Bucket Algorithm for ON-OFF Data Sources." Journal of High Speed Networks 2, no. 1 (1993): 81–98. http://dx.doi.org/10.3233/jhs-1993-2104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hairong, Sun, and Li Lemin. "Performance analysis of leaky bucket algorithm with bursty traffic input in ATM networks." Journal of Electronics (China) 12, no. 2 (1995): 105–12. http://dx.doi.org/10.1007/bf02778434.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Adjaidoo, Theresa-Samuelle, and Emmanuel Kofi Akowuah. "A proposed Ghanaian intercity public transport departure scheduling model based on the dynamic rate leaky bucket algorithm." Scientific African 12 (July 2021): e00749. http://dx.doi.org/10.1016/j.sciaf.2021.e00749.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Leaky Bucket Algorithm"

1

Pereira, Michelle Miranda. "Simulação e análise comparativa dos métodos do mecanismo de policiamento dual leaky bucket em chaves ATM para classe de serviço VBR para tráfegos de vídeo." Universidade de São Paulo, 2002. http://www.teses.usp.br/teses/disponiveis/76/76132/tde-07042015-170053/.

Full text
Abstract:
A garantia de qualidade de serviço (QoS) tem-se demonstrado muito importante em aplicações em tempo real. Este trabalho apresenta um estudo sobre Mecanismos de Policiamento na tecnologia A TM, mais especificamente, sobre o funcionamento do Mecanismo Dual Leaky Bucket, utilizado pela classe de serviço VBR em rede ATM. Para este estudo foi implementado um simulador por software do mecanismo Dual Leaky Bucket. Foram analisados dois tipos de tráfegos de vídeo com compressão MPEG-2, com pouca e muita movimentação. A partir da simulação pôde-se analisar como o erro na definição de parâmetros do contrato de QoS definidos pelo usuário no estabelecimento da conexão pode levar ao aumento na taxa de perda de informações e, conseqüentemente, a degradação da qualidade necessária pela aplicação<br>The guarantee of quality of service (QoS) has been demonstrating very important in real time applications. This work presents a study on Policing Mechanisms in the ATM technology, more specifically, on the operation of the Dual Leaky Bucket Mechanism, used by the class of service VBR in ATM networks. For this study a Dual Leaky Bucket mechanism simulator by software was implemented. Two kinds of MPEG-2 video traffics were analyzed with a little and a lot of movement. The simulation shows how a mistake in the definition of parameters in the QoS contract, defined by user, during of the connection establishment can leads to increase of information loss rate and, consequently, the degradation of the necessary quality for the application
APA, Harvard, Vancouver, ISO, and other styles
2

Lin, Fang-Ting, and 林芳廷. "Design of Leaky Bucket Based Admission Control and Dynamic Bandwidth Allocation Algorithm for WiMAX MAC." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/61078800825321815913.

Full text
Abstract:
碩士<br>國立暨南國際大學<br>通訊工程研究所<br>96<br>The IEEE 802.16d claims to support high bandwidth for the wireless metropolitan area network. However, the standard does not propose including the method for bandwidth management. Therefore, a feasible bandwidth allocation algorithm will be very important. The thesis proposes a Leaky Bucket based admission control algorithm and dynamic bandwidth algorithm for a WiMAX BS. For a new services flow, the admission control algorithm (CAC) will calculate the required bandwidth according to the Leaky Bucket parameters of the flow. Only if the total required bandwidth of all flows is smaller than the system capacity, the new flow can admitted. In the run time, the BS needs to allocate symbols to DL/UL subframes for every frame. In addition to the queue length, we also use the required bandwidth calculated by CAC as a parameter to allocate the bandwidth dynamically. The proposed algorithm are implemented in the NS-2 simulator and verified by simulation. Compared to the fixed allocation scheme, our algorithm can provide quality of service and uses the bandwidth efficiency.
APA, Harvard, Vancouver, ISO, and other styles
3

Dube, Parijat. "Measurement Based Optimal Source Shaping In Integrated Services Packet Networks." Thesis, 1999. https://etd.iisc.ac.in/handle/2005/1675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dube, Parijat. "Measurement Based Optimal Source Shaping In Integrated Services Packet Networks." Thesis, 1999. http://etd.iisc.ernet.in/handle/2005/1675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Cheng-Lun, and 孫正倫. "On Self-similar Traffic Regulation in ATM Networks: Using Multiple Leaky Buckets Algorithm." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/01347172325596857631.

Full text
Abstract:
碩士<br>國立中興大學<br>電機工程學系<br>86<br>In this thesis we proposed a feedback rate regulator for self- similar VBR traffic in ATM networks, based on multiple leaky buckets (MLB) mechanism.A basic assumption was made that the multiplexing gain does exist for aggregated self-similar VBR traffic. Therefore, unlike the conventional leaky bucket (LB), the leaky rate and buffer capacity oa all LBs are shared in the smae virtual path, in order to use network resouces more effectively. In our mechanisms, the leaky rate and buffer capacity of ecah LB are dynamically adjusted base on the buffer occupancy. To validata the performance of our mechanisms, ten real world MPEG1 traffic traces and synthesizeself-similar data series are used in our experiment. The simulation results show that the cell loss rate has three or more than ten thousand times improvement comparing to the conventional leaky bucket method. Moreover, when the protection policy intregrated with feedback rate regulator is added to the MLB, it can totally prevent the malicious sources from degrading the quality of services of all established conncetions.
APA, Harvard, Vancouver, ISO, and other styles
6

Sun, Cheng Lun, and 孫正倫. "On Self-similar Traffic Regulation in ATM Networks: Using Multiple Leaky Buckets Algorithm." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/91311026809378714826.

Full text
Abstract:
碩士<br>國立中興大學<br>電機工程學系<br>87<br>Congestion control lies on the heart of the general problem of traffic management for ATM networks. The primary function of congestion control is to maximizing network performance in throughput and delay while maintaining a fair allocation of network resources to the users. Feedback flow control is one of the solutions which has been extensively studied. Before designing an appropriate traffic rate regulator, understanding the characteristics of traffic sources is the most essential work. Recent traffic measurement studies have demonstrated that the variable bit rate (VBR) video over ATM networks exhibits self-similarity. If the self-similarity is ignored, it will result in overly optimistic performance predictions and inadequate network resources allocation. In other words, the self-similarity has practical impact on analysis, design and control of ATM networks. In this thesis we proposed a feedback rate regulator for self-similar VBR traffic in ATM networks, based on multiple leaky buckets (MLB) mechanism. A basic assumption was made that the multiplexing gain does exist for aggregated self-similar VBR traffic. Therefore, unlike the conventional leaky bucket (LB), the leaky rate and buffer capacity of all LBs are shared in the same virtual path, in order to use network resources more effectively. In our mechanisms, the leaky rate and buffer capacity of each LB are dynamically adjusted base on the buffer occupancy. To validate the performance of our mechanisms, ten real world MPEG1 traffic traces and synthesized self-similar data series are used in our experiment. The simulation results show that the cell loss rate has three to more than ten thousand times improvement comparing to the conventional leaky bucket method. Moreover, when the protection policy integrated with feedback rate regulator is added to the MLB, it can totally prevent the malicious sources from degrading the quality of services of all established connections. Key words: ATM, self-similar, multiple leaky buckets, congestion control.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Leaky Bucket Algorithm"

1

Dunn, Michael, and Tony Hope. "3. A toolbox of reasoning." In Medical Ethics: A Very Short Introduction. Oxford University Press, 2018. http://dx.doi.org/10.1093/actrade/9780198815600.003.0003.

Full text
Abstract:
‘A toolbox of reasoning’ discusses a further four tools of ethical reasoning: distinguishing facts from values; reasoning from principles; thought experiments; and spotting and avoiding fallacies in reasoning. Five fallacies are discussed: the no-true Scotsman move; the ten-leaky-buckets tactic; the argument from nature; the argument from playing God; and the slippery slope argument. It also explains how the analysis of medical ethics is organized around four principles—respect for patient autonomy, beneficence, non-maleficence, and justice—and their scope of application. Ethical reasoning cannot be reduced to algorithms. Situations are complex and doing the right thing will often require flexibility. Humane medicine, in addition to rationality, requires wisdom, imagination, and creativity.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Leaky Bucket Algorithm"

1

Chen, Xiangyu, Ka-Cheong Leung, and Albert Y. S. Lam. "Leaky bucket-inspired power output smoothing with load-adaptive algorithm." In ICC 2017 - 2017 IEEE International Conference on Communications. IEEE, 2017. http://dx.doi.org/10.1109/icc.2017.7996944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Chundong, Qing Chang, Quancai Deng, and Huaibin Wang. "Network-worm-control technology based on the front buffer two-stage leaky bucket algorithm." In 2010 International Conference on Intelligent Control and Information Processing (ICICIP). IEEE, 2010. http://dx.doi.org/10.1109/icicip.2010.5564161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography