Leaky buckets: sizing and admission control

Vidyadhar G. Kulkarni, Natarajan Gautam

Research output: Chapter in Book/Entry/PoemChapter

4 Scopus citations

Abstract

In this paper we propose a new unified approach to address simultaneously the issues of traffic policing (using leaky buckets), admission control and network dimensioning. First we compute the effective bandwidth of the output of the leaky bucket. We find a surprising result that effective bandwidth of the output of a leaky bucket is independent of the token pool size. Furthermore, the output effective bandwidth exhibits discontinuous behavior as the token pool size approaches infinity. We use these results in an optimization model to find the 'optimal' leaky bucket parameters. We explain how this optimization program can be used to do network dimensioning if the input traffic characteristics are known, or to do connection admission control if the network parameters are fixed.

Original languageEnglish (US)
Title of host publicationProceedings of the IEEE Conference on Decision and Control
Editors Anon
StatePublished - 1996
Externally publishedYes
EventProceedings of the 1996 35th IEEE Conference on Decision and Control. Part 3 (of 4) - Kobe, Jpn
Duration: Dec 11 1996Dec 13 1996

Publication series

NameProceedings of the IEEE Conference on Decision and Control
Volume1
ISSN (Print)0191-2216

Conference

ConferenceProceedings of the 1996 35th IEEE Conference on Decision and Control. Part 3 (of 4)
CityKobe, Jpn
Period12/11/9612/13/96

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Modeling and Simulation
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Leaky buckets: sizing and admission control'. Together they form a unique fingerprint.

Cite this