[e2e] Determining leaky bucket paramteres
Julije Ozegovic
julije at fesb.hr
Fri Feb 1 13:10:51 PST 2002
maybe this could be of interest:
Julije Ozegovic, Lada Sartori: "A SIMPLE TCP TRAFFIC SHAPER",
Proceedings SOFTCOM'99, Split 1999, pp. 371-380.
http://www.fesb.hr/~julije/papers/sc9902.html
regards, julije
Bhuvan Urgaonkar wrote:
> Hi there,
>
> I am looking for work that has been done on the following problem: We are
> given information about the traffic a source sends over a link (in the
> form of the number of bytes sent plotted against time). We would like to
> come up with a leaky bucket description that this source adheres to.
> Specifically, of the several (rate, burst) pairs that the given traffic
> confirms to, which is better than others and why.
>
> It would be a big help if someone could point me to papers that
> address either this exact problem or any related problems.
>
> regards,
> -Bhuvan
> ---------------------------------
> Bhuvan Urgaonkar,
> http://lass.cs.umass.edu/~bhuvan
> ---------------------------------
>
>
>
>
More information about the end2end-interest
mailing list