Title
Using token allocations in a leaky bucket scheme
Date Issued
01 December 1994
Resource Type
Conference Proceeding
Author(s)
Ko C.
Yang O.
Mouftah H.
Abstract
This paper investigates a simple modification of the leaky bucket method that can provide priority access to users by requiring different classes of cells to get different number of tokens before receiving services. The complexity of control is simplified since all classes share a common buffer pool. Cell delays and cell loss ratios performance are studied.
Start page
82
End page
86
Volume
1
Scopus EID
2-s2.0-0028728872
Source
IEEE MILCOM
Resource of which it is part
IEEE MILCOM
Sources of information: Directorio de Producción Científica Scopus