On the self-similar nature of Ethernet traffic (extended version)
IEEE/ACM Transactions on Networking (TON)
Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Self-similarity in World Wide Web traffic: evidence and possible causes
Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
An engineering approach to computer networking: ATM networks, the Internet, and the telephone network
Proof of a fundamental result in self-similar traffic modeling
ACM SIGCOMM Computer Communication Review
Heavy Tails and Long Range Dependence in On/Off Processes and Associated Fluid Models
Mathematics of Operations Research
On the departure process of a leaky bucket system with long-range dependent input traffic
Queueing Systems: Theory and Applications
On the autocorrelation structure of TCP traffic
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Advances in modeling and engineering of Longe-Range dependent traffic
On the autocorrelation structure of TCP traffic
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Advances in modeling and engineering of Longe-Range dependent traffic
State-dependent M/G/1 type queueing analysis for congestion control in data networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Characteristics of WWW Client-based Traces
Characteristics of WWW Client-based Traces
Invited Fluid queues with long-tailed activity period distributions
Computer Communications
Characterization of long-range dependent traffic regulated by leaky-bucket policers and shapers
Computer Communications
Hi-index | 0.01 |
The leaky bucket is a flow control mechanism that is designed to reduce the effect of the inevitable variability in the input stream into a node of a communication network. In this paper we study what happens when an input stream with heavy tailed work sessions arrives to a server protected by such a leaky bucket. Heavy tailed sessions produce long-range dependence in the input stream. Previous studies of the systems suggested that such long-range dependence can have dramatic effect on the system performance. By concentrating on the time until overflow of large finite buffers, we characterize the distribution of the time until buffer overflow, and we show that the leaky bucket flow control does make the system overflow less often, but long-range dependence still makes its presence felt.