Premium
Performance of adaptive token allocation in the leaky bucket
Author(s) -
Yang Oliver W. W.,
Mouftah H. T.,
Ko C. P.
Publication year - 1995
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.4500080306
Subject(s) - computer science , leaky bucket , token bucket , computer network , security token , scheme (mathematics) , simple (philosophy) , broadband , token passing , class (philosophy) , telecommunications , quality of service , mathematical analysis , philosophy , mathematics , epistemology , artificial intelligence
The leaky bucket is a popular method that can regulate traffic into an ATM broadband network. This paper examines a simple but innovative modification that would also provide priority to access the network. This is done by requiring cells of different classes to obtain different numbers of tokens before receiving their services. As a step further, a dynamic scheme can be used in which the tokens allocated to each class are changed according to the traffic load. Performance evaluations of mean cell delays and cell loss probabilities are obtained to provide insight into the behaviour of the system and to provide guideline for furture design.