Buffered and unbuffered leaky bucket policing: Guaranteeing QoS, design and admission control

Research output: Contribution to journalArticlepeer-review

5 Scopus citations


Traffic shaping and smoothing using buffers or leaky buckets does not necessarily improve Quality of Service (QoS). In fact there is a trade-off between controlling user traffic and guaranteeing QoS to the users. We consider the first two stages (source node and border node before entering a network cloud) of an end-to-end QoS problem and assume that the QoS requirements across each of the two stages are given. We formulate and solve a mathematical programming problem to select optimal leaky bucket parameters that would enable high-speed telecommunication network providers to optimize traffic policing subject to guaranteeing a negotiated Quality of Service requirement across the first stage namely the source end. We address both the buffered and unbuffered leaky bucket cases where using fluid models we characterize the output process from the leaky buckets for general traffic sources. Using the optimal leaky bucket parameters and output characteristics (effective bandwidths in particular), we solve design and connection admission control problems given QoS requirements at the second stage, namely the border node.

Original languageEnglish (US)
Pages (from-to)35-63
Number of pages29
JournalTelecommunication Systems
Issue number1
StatePublished - 2002
Externally publishedYes


  • Admission control
  • Leaky bucket policing
  • Quality of service
  • Traffic regulation

ASJC Scopus subject areas

  • Electrical and Electronic Engineering


Dive into the research topics of 'Buffered and unbuffered leaky bucket policing: Guaranteeing QoS, design and admission control'. Together they form a unique fingerprint.

Cite this