@inbook{499ad036882f4e7da4d493a0a80fea63,
title = "Leaky buckets: sizing and admission control",
abstract = "In this paper we propose a new unified approach to address simultaneously the issues of traffic policing (using leaky buckets), admission control and network dimensioning. First we compute the effective bandwidth of the output of the leaky bucket. We find a surprising result that effective bandwidth of the output of a leaky bucket is independent of the token pool size. Furthermore, the output effective bandwidth exhibits discontinuous behavior as the token pool size approaches infinity. We use these results in an optimization model to find the 'optimal' leaky bucket parameters. We explain how this optimization program can be used to do network dimensioning if the input traffic characteristics are known, or to do connection admission control if the network parameters are fixed.",
author = "Kulkarni, {Vidyadhar G.} and Natarajan Gautam",
year = "1996",
language = "English (US)",
series = "Proceedings of the IEEE Conference on Decision and Control",
editor = "Anon",
booktitle = "Proceedings of the IEEE Conference on Decision and Control",
note = "Proceedings of the 1996 35th IEEE Conference on Decision and Control. Part 3 (of 4) ; Conference date: 11-12-1996 Through 13-12-1996",
}