{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:34:02Z","timestamp":1740159242233,"version":"3.37.3"},"reference-count":35,"publisher":"World Scientific Pub Co Pte Ltd","issue":"05","funder":[{"name":"National Social Science Foundation of China","award":["18BXW118"],"award-info":[{"award-number":["18BXW118"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Model. Simul. Sci. Comput."],"published-print":{"date-parts":[[2020,10]]},"abstract":"<jats:p> When network users are intensively interacting during rush hour, avoiding data loss and latency is a concern in guaranteeing segment reliability. Implementing a leaky bucket could be needed to achieve flows effective monitoring by generating network of queues at given output link. Packets associated with different sessions and originated from different hosts may be mixed up and queuing delay may become longer, depending on network segment state, buffering strategy, users\u2019 behavior among other factors. It is interesting to assimilate these stages of packets traveling through network segment to the concept of epidemic control. This paper proposes a SIR (Susceptible\u2013Infected\u2013Recovered) approach in modeling data packets transmission at a leaky bucket at peak hour. We focused our analysis on packets buffering and recovery strategy impact on segment forwarding performance in heavy load situation. Numerical results suggested adapting buffering strategy and packets recovery to enhance transmission and network overall performance. <\/jats:p>","DOI":"10.1142\/s1793962320500439","type":"journal-article","created":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T01:52:42Z","timestamp":1596851562000},"page":"2050043","source":"Crossref","is-referenced-by-count":0,"title":["SIR approach in modeling data packets forwarding at a leaky bucket"],"prefix":"10.1142","volume":"11","author":[{"given":"Yaming","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Economics and Management, Yanshan University, Qinhuangdao 066004, P. R. China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0456-3826","authenticated-orcid":false,"given":"Yaya H.","family":"Koura","sequence":"additional","affiliation":[{"name":"School of Economics and Management, Yanshan University, Qinhuangdao 066004, P. R. China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yanyuan","family":"Su","sequence":"additional","affiliation":[{"name":"School of Economics and Management, Yanshan University, Qinhuangdao 066004, P. R. China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"219","published-online":{"date-parts":[[2020,8,7]]},"reference":[{"key":"S1793962320500439BIB001","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S0166-5316(02)00028-7","volume":"48","author":"Courcoubetis C.","year":"2002","journal-title":"Perform. Eval."},{"key":"S1793962320500439BIB002","first-page":"3","volume-title":"IEEE Int. Global Information Infrastructure Symp. \u2014 GIIS","author":"Houaidia C.","year":"2013"},{"key":"S1793962320500439BIB004","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1109\/TCOM.1987.1096782","volume":"35","author":"Nagle J.","year":"1987","journal-title":"IEEE Trans. Commun."},{"first-page":"1742","volume-title":"Proc. IEEE INFOCOM","author":"Cardwell N.","key":"S1793962320500439BIB005"},{"key":"S1793962320500439BIB006","unstructured":"White C.,  Data Communications and Computer Networks. Thomson Course Technology,  Boston, MA,  pp. 140\u2013143, 2007."},{"issue":"2","key":"S1793962320500439BIB007","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/90.842137","volume":"8","author":"Padhye J.","year":"2000","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"S1793962320500439BIB008","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2208917.2209336","volume":"10","author":"Nichols K.","year":"2012","journal-title":"Queue"},{"issue":"11","key":"S1793962320500439BIB009","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1016\/j.peva.2006.05.011","volume":"63","author":"\u00d6zdemira M.","year":"2006","journal-title":"Perform. Eval."},{"key":"S1793962320500439BIB010","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/49.76631","volume":"9","author":"Butto M.","year":"1991","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"S1793962320500439BIB011","first-page":"46","volume-title":"Proc. Tricomm\u201992","author":"Holtsinger D.","year":"1992"},{"volume-title":"Signal Processing Symp.","year":"2006","author":"Vadakital V. K. M.","key":"S1793962320500439BIB012"},{"key":"S1793962320500439BIB013","unstructured":"Garcia, E.,  IP Packet Fragmentation Tutorial,  MTU and MSS Tutorial,  pp. 1\u20138,  Nov. 2009,  http:\/\/www.miislita.com\/."},{"issue":"3","key":"S1793962320500439BIB014","volume":"70","author":"Hassnawi L. A.","year":"2014","journal-title":"J. Theor. Appl. Inf. Tech."},{"key":"S1793962320500439BIB015","volume":"2016","author":"Xu J.","year":"2016","journal-title":"Mobile Inf. Syst."},{"issue":"3","key":"S1793962320500439BIB016","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/JCN.2015.000046","volume":"17","author":"Alvi N.","year":"2015","journal-title":"J. Commun. Netw."},{"issue":"1","key":"S1793962320500439BIB017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-017-1011-3","volume":"2018","author":"Wu M.","year":"2018","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"S1793962320500439BIB024","first-page":"221","volume":"305","author":"Cai Y.","year":"2017","journal-title":"Appl. Math. Comput."},{"issue":"3","key":"S1793962320500439BIB025","first-page":"421","volume":"8","author":"Koufi A.","year":"2018","journal-title":"J. Math. Comput. Sci."},{"key":"S1793962320500439BIB026","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.physa.2017.10.038","volume":"493","author":"Khan M. A.","year":"2018","journal-title":"Phys. A"},{"key":"S1793962320500439BIB027","first-page":"1","volume":"2018","author":"El Koufi A.","year":"2018","journal-title":"Commun. Math. Biol. Neurosci."},{"issue":"1","key":"S1793962320500439BIB028","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/0169-7552(93)90038-6","volume":"26","author":"Wu G.-L.","year":"1993","journal-title":"Comput. Netw. ISDN Syst."},{"volume-title":"Mathematical Epidemiology of Infectious Diseases: Model Building, Analysis and Interpretation","year":"2000","author":"Diekmann O.","key":"S1793962320500439BIB029"},{"key":"S1793962320500439BIB030","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-642-61317-3_5","volume":"18","author":"Hethcote H. W.","year":"1989","journal-title":"Appl. Math. Ecol."},{"key":"S1793962320500439BIB031","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/S0022-247X(03)00539-0","volume":"287","author":"Mao X.","year":"2003","journal-title":"J. Math. Anal. Appl."},{"issue":"3","key":"S1793962320500439BIB032","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1016\/j.nonrwa.2004.10.001","volume":"6","author":"Kyrychkoa Y. N.","year":"2005","journal-title":"Nonlinear Anal."},{"key":"S1793962320500439BIB033","first-page":"5835","volume":"2008","author":"Zhang J.-Z.","year":"2008","journal-title":"Discr. Dyn. Nat. Soc."},{"issue":"3","key":"S1793962320500439BIB034","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.chaos.2006.05.045","volume":"35","author":"Jiang Z.","year":"2008","journal-title":"Chaos Solitons Fractals"},{"key":"S1793962320500439BIB035","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/BF00169563","volume":"33","author":"Beretta E.","year":"1995","journal-title":"J. Math. Biol."},{"key":"S1793962320500439BIB036","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/BF00276956","volume":"23","author":"Liu W.","year":"1986","journal-title":"J. Math. Biol."},{"key":"S1793962320500439BIB037","first-page":"285","volume":"199","author":"Zhang F.","year":"2008","journal-title":"Appl. Math. Comput."},{"key":"S1793962320500439BIB038","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/S0895-7177(03)90088-4","volume":"38","author":"Zhou Y.","year":"2003","journal-title":"Math. Comput. Model."},{"key":"S1793962320500439BIB041","first-page":"1","volume-title":"Proc. 2012 ACM SIGCOMM Workshop on Cellular Networks: Operations, Challenges, and Future Design","author":"Jiang H.","year":"2012"},{"issue":"7","key":"S1793962320500439BIB042","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/2209249.2209264","volume":"55","author":"Nichols K.","year":"2012","journal-title":"Commun. ACM"},{"key":"S1793962320500439BIB043","doi-asserted-by":"crossref","first-page":"6750","DOI":"10.1109\/CDC.2005.1583247","volume-title":"Proc. IEEE Conf. Decision and Control","author":"Mascolo S.","year":"2005"},{"issue":"10","key":"S1793962320500439BIB044","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1016\/j.peva.2008.03.002","volume":"65","author":"Mann C. R.","year":"2008","journal-title":"Perform. Eval."}],"container-title":["International Journal of Modeling, Simulation, and Scientific Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S1793962320500439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T05:00:53Z","timestamp":1605070853000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S1793962320500439"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,7]]},"references-count":35,"journal-issue":{"issue":"05","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["10.1142\/S1793962320500439"],"URL":"https:\/\/doi.org\/10.1142\/s1793962320500439","relation":{},"ISSN":["1793-9623","1793-9615"],"issn-type":[{"type":"print","value":"1793-9623"},{"type":"electronic","value":"1793-9615"}],"subject":[],"published":{"date-parts":[[2020,8,7]]}}}