2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333)
DOI: 10.1109/icc.2002.997302
|View full text |Cite
|
Sign up to set email alerts
|

Policing aggregates of voice traffic with the token bucket algorithm

Abstract: Abstract-Estimating correct traffic descriptors is an important issue when deploying IP telephony with quality of service guarantees. Usually, a token bucket is used to police a traffic flow. Such a policer checks (and ensures) that the traffic flow fits inside a traffic envelope. For variable bit rate (VBR) sources normally two traffic envelopes are specified: one dealing with the peak rate and one dealing with the sustainable rate with an associated burst size. These parameters have to be specified when maki… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…For the second method, we assume the number of sources is relatively large. In this case, the VoIP aggregate can also be modeled as a M/D/1 flow [24], [25]. A large number of results are available for the M/D/1 queue, and thus can be…”
Section: A Single Nodementioning
confidence: 99%
“…For the second method, we assume the number of sources is relatively large. In this case, the VoIP aggregate can also be modeled as a M/D/1 flow [24], [25]. A large number of results are available for the M/D/1 queue, and thus can be…”
Section: A Single Nodementioning
confidence: 99%
“…Descriptions -Traffic descriptions can be applied to single sources or aggregates [51] of traffic. Analytic models of traffic sources include such things as rate limited sources, or leaky bucket limited sources.…”
Section: Models For Trafficmentioning
confidence: 99%