Burst Reduction Properties of Rate-Control Throttles: Departure Process
نویسنده
چکیده
In this paper we study the departure processes of two rate-control throttles: the token bank and the leaky bucket. Using sample path methods and the notion of majorization, we analyze the eeect that parameters such as the token buuer capacity and token generation period have on the vector of interdeparture times. In the transient case, we establish the monotonicity of the burst reduction in the sense of the majorization. In the case that the departure process is asymptotically mean stationary and ergodic, the transient comparison results allow us to establish the monotonicity of the stationary interdeparture times in the sense of the convex ordering. Comparisons between the two ow control schemes are also established when appropriate.
منابع مشابه
Performance Bounds for Flow Control Protocols 1
In this paper, we discuss a simple conceptual framework for analyzing the ow of data in integrated services networks. The framework allows us to easily model and analyze the behavior of open loop, rate based ow control protocols, as well as closed loop, window based ow control protocols. Central to the framework is the concept of a service curve element, whose departure process is bounded betwe...
متن کاملOn the departure process of burst aggregation algorithms in optical burst switching
We characterize analytically the departure process from the following three burst aggregation algorithms: the time based aggregation algorithm, the burst-length based aggregation algorithm and the time and burst-length based aggregation algorithm. The arrival process of packets is assumed to be Poisson or bursty modeled by an Interrupted Poisson Process (IPP). The analytic results are approxima...
متن کاملCongestion control through input rate regulation
Traditional packet switching networks have employed typically employed window-based congestion control schemes in order to regulate traffic flow. In broadband networks, the high speed of the communication links and the varied nature of the carried traffic makes such schemes inappropriate. Therefore, simpler and more efficient schemes have to be proposed to fully exploit the large available band...
متن کاملThe Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor
Rate limits, i. e., throttling network bandwidth, are considered to be means of protection; and guarantee fair bandwidth distribution among virtual machines that reside on the same Xen hypervisor. In the absence of rate limits, a single virtual machine would be able to (unintentionally or maliciously) exhaust all resources, and cause a denial-of-service for its neighbors. In this paper, we show...
متن کاملArtificial neural networking and fuzzy logic exergy controlling model of combined heat and power system in thermal power plant
This paper presents entropy generation minimisation model of combined heat and power system. The turbine control valves and heater throttle valves were analysed. The high-pressure control valves regulate the mass flow rate of steam into the turbine, whereas the intermediate-pressure and lowpressure control valves the steam pressure of the turbine extracts 3 and 5. The steam of the turbine extra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007