z-logo
open-access-imgOpen Access
Systems approach to modeling the Token Bucket algorithm incomputer networks
Author(s) -
N. U. Ahmed,
Qun Wang,
Luis OrozcoBarbosa
Publication year - 2002
Publication title -
mathematical problems in engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.262
H-Index - 62
eISSN - 1026-7077
pISSN - 1024-123X
DOI - 10.1080/10241230215282
Subject(s) - dimensioning , computer science , token bucket , quality of service , security token , multiplexer , leaky bucket , computer network , construct (python library) , algorithm , multiplexing , node (physics) , traffic policing , real time computing , distributed computing , traffic shaping , network traffic control , engineering , network packet , telecommunications , structural engineering , aerospace engineering
In this paper, we construct a new dynamic model for the Token Bucket (TB) algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service) QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom