[e2e] Determining leaky bucket paramteres

Constantinos Dovrolis dovrolis at mail.eecis.udel.edu
Tue Feb 5 05:25:57 PST 2002


Bhuvan,

you may also want to look at:
http://www.cis.udel.edu/~dovrolis/Papers/tokbuck.ps

The main objective was, given a pre-recorded stream
and for a certain end-to-end delay bound, to determine
the token bucket parameters that minimize the required
reserved rate.

Constantinos

Computer and Information Sciences - University of Delaware

http://www.cis.udel.edu/~dovrolis/

On Fri, 1 Feb 2002, Bhuvan Urgaonkar wrote:

> Hi there,
>
> I am looking for work that has been done on the following problem: We are
> given information about the traffic a source sends over a link (in the
> form of the number of bytes sent plotted against time). We would like to
> come up with a leaky bucket description that this source adheres to.
> Specifically, of the several (rate, burst) pairs that the given traffic
> confirms to, which is better than others and why.
>
> It would be a big help if someone could point me to papers that
> address either this exact problem or any related problems.
>
> regards,
> -Bhuvan
> ---------------------------------
> Bhuvan Urgaonkar,
> http://lass.cs.umass.edu/~bhuvan
> ---------------------------------
>
>




More information about the end2end-interest mailing list