๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Analysis of the leaky bucket output processes for bursty sources in ATM networks

โœ Scribed by Liao Jianxin; Li Lemin; Sun Hairong


Book ID
107504225
Publisher
SP Science Press
Year
1997
Tongue
English
Weight
422 KB
Volume
14
Category
Article
ISSN
0217-9822

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


BOUNDS FOR MULTIPLEXING LEAKY-BUCKET ENF
โœ JUNG-SHYR WU; FANG-JANG KUO ๐Ÿ“‚ Article ๐Ÿ“… 1996 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 769 KB

Leaky-bucket (LB) based traffic parameters are widely used for traffic declaration and monitoring (enforcing) in asynchronous transfer mode ( A m ) networks. For such a system, every traffic source is policed by an LB enforcer before entering the access node at the edge of the network. In this artic