It is interesting to note that the Token Bucket (TB) algorithm as a control mechanism has been employed popularly in them.; In this thesis, we construct a new dynamic model for the TB control mechanism and apply a system approach to its analysis. This model is then augmented by adding a...
Systems approach to modeling the Token Bucket algorithm in computer networks pIn this paper, we construct a new dynamic model for the Token Bucket (TB) algorithm used in computer networks and use systems approach for its analysis. T... NU Ahmed,Q Wang,LO Barbosa - 《Mathematical Problems in...
The performance of IEEE 802.11 wireless local area networks in combination with a hierarchical token bucket traffic shaper is assessed. The analysis allows... JL Valenzuela,A Monleon,I San Esteban,... - IEEE Vehicular Technology Conference 被引量: 45发表: 2004年 Performance analysis of IEEE 802.1...
The invention discloses a realization method for a token bucket algorithm. According to the method, the token number of token buckets of a queue is updated only before a data packet is sent out in the queue; Token_Num (Now) is the new token number and Token_Num (LastUpdate) is the to...
timing and a packet switch for sending an output to the interface unit as the destination of the received packet; and the traffic shaper uses a token bucket algorithm when transmitting a packet to guarantee the minimum frame rate, and uses a leaky bucket algorithm when limiting the peak frame...
The Effect of ISP Traffic Shaping on User-Perceived Performances in Broadband Shared Access Networks with multiple subscribers even in the presence of non-conformant subscribers; with a much larger token bucket, however, the negative effect of non-... KS Kim - College of Engineering Swansea Univer...
A Token-Managed Admission Control (TMAC) mechanism is introduced in order to pro-vide efficient Quality-of-Service (QoS) support for different types of app... C Fuentealba,G Sievers - 《Fundamenta Informaticae》 被引量: 14发表: 2009年 A Token-Bucket Based Rate Control Algorithm with Maximum...
token bucket parametershave no influ- ence. We find that it isnot easy to regulate the service level achievedby a TCP flow by solely setting theprofileparameters. Inaddition, wederiveconditionsthat determinewhenthebucket sizeinfluences the achievedrate, and ratesthat can be achieved...
(computer science) A distinguishable unit in a sequence of characters. A single byte that is used to represent a keyword in a programming language in order to conserve storage space. A physical object, such as a badge or identity card, issued to authorized users of a computing system, buildi...
The bandwidth allocation mechanism integrates the leaky bucket structure with priority handling to address th... William,K.,Wong,... - 《International Journal of Communication Systems》 被引量: 42发表: 2004年 T-MAH: A Token Passing MAC protocol for Ad Hoc Networks The Token Passing MAC ...