[e2e] Determining leaky bucket paramteres

Julije Ozegovic julije at fesb.hr
Fri Feb 1 13:10:51 PST 2002


maybe this could be of interest:

Julije Ozegovic, Lada Sartori: "A SIMPLE TCP TRAFFIC SHAPER", 
Proceedings SOFTCOM'99, Split 1999, pp. 371-380.

http://www.fesb.hr/~julije/papers/sc9902.html

regards, julije


Bhuvan Urgaonkar wrote:

> Hi there,
> 
> I am looking for work that has been done on the following problem: We are
> given information about the traffic a source sends over a link (in the
> form of the number of bytes sent plotted against time). We would like to
> come up with a leaky bucket description that this source adheres to.
> Specifically, of the several (rate, burst) pairs that the given traffic
> confirms to, which is better than others and why.
> 
> It would be a big help if someone could point me to papers that
> address either this exact problem or any related problems.
> 
> regards,
> -Bhuvan
> ---------------------------------
> Bhuvan Urgaonkar,
> http://lass.cs.umass.edu/~bhuvan
> ---------------------------------
> 
> 
> 
> 





More information about the end2end-interest mailing list