{"title":"改进的漏桶监管机制","authors":"Z. Liang, M.M. Ali","doi":"10.1109/CCECE.1998.682755","DOIUrl":null,"url":null,"abstract":"This paper proposes an unbuffered modified leaky-bucket algorithm to police the traffic of on-off bursty sources. We assume the leaky-bucket has no token pool and cell buffer, and the token generation process has two states: on and off. The tokens are generated at the same rate with the source's peak cell rate during the on period, and no tokens are generated during the off period. With this algorithm we can police both the peak source rate and the sustain cell rate of bursty sources with simply one leaky-bucket.","PeriodicalId":177613,"journal":{"name":"Conference Proceedings. IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.98TH8341)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A modified leaky bucket policing mechanism\",\"authors\":\"Z. Liang, M.M. Ali\",\"doi\":\"10.1109/CCECE.1998.682755\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes an unbuffered modified leaky-bucket algorithm to police the traffic of on-off bursty sources. We assume the leaky-bucket has no token pool and cell buffer, and the token generation process has two states: on and off. The tokens are generated at the same rate with the source's peak cell rate during the on period, and no tokens are generated during the off period. With this algorithm we can police both the peak source rate and the sustain cell rate of bursty sources with simply one leaky-bucket.\",\"PeriodicalId\":177613,\"journal\":{\"name\":\"Conference Proceedings. IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.98TH8341)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-05-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Conference Proceedings. IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.98TH8341)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCECE.1998.682755\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Conference Proceedings. IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.98TH8341)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCECE.1998.682755","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper proposes an unbuffered modified leaky-bucket algorithm to police the traffic of on-off bursty sources. We assume the leaky-bucket has no token pool and cell buffer, and the token generation process has two states: on and off. The tokens are generated at the same rate with the source's peak cell rate during the on period, and no tokens are generated during the off period. With this algorithm we can police both the peak source rate and the sustain cell rate of bursty sources with simply one leaky-bucket.