EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Question
Book Icon
Chapter 9, Problem P17P

a)

Program Plan Intro

Leaky Bucket:

The request that are available at the wide range are stored and organized such that the rate of the output packet is set  for the transfer that happens to the network is called as leaky bucket algorithm.

Working of leaky bucket:

  • Leaky bucket consists of a bucket that can hold up to b tokens.
  • Tokens are being added to the bucket.
  • The tokens are generated at the rate r token per second.
  • The bucket gets filled when it contains b less than tokens
  • The new tokens are added into the bucket.
  • If the bucket is full newly generated tokens are being ignored.
  • The token bucket remains full with b tokens.

Policing the packet flow:

  • Consider a packet is transmitted into the network, a token needs to be removed from the token bucket.
  • If the token bucket is empty, the packets are required to wait for the token.

b)

Program Plan Intro

Leaky Bucket:

The request that are available at the wide range are stored and organized such that the rate of the output packet is set  for the transfer that happens to the network is called as leaky bucket algorithm.

Working of leaky bucket:

  • Leaky bucket consists of a bucket that can hold up to b tokens.
  • Tokens are being added to the bucket.
  • The tokens are generated at the rate r token per second.
  • The bucket gets filled when it contains b less than tokens
  • The new tokens are added into the bucket.
  • If the bucket is full newly generated tokens are being ignored.
  • The token bucket remains full with b tokens.

Policing the packet flow:

  • Consider a packet is transmitted into the network, a token needs to be removed from the token bucket.
  • If the token bucket is empty, the packets are required to wait for the token.

Blurred answer
Students have asked these similar questions
Write a program to simulate the behavior of the CSMA/CD protocol over Ethernet when ther are N stations ready to transmit while a frame is being transmitted. Your program should report the times when each station successfully starts sending its frame. Assume that a clock tick occurs every slot time (51.2 microsec) and a collison detection and sending of a jamming sequence takes one slot time. All frames are the maximum length allowed.
We observed that (n-1)D is the maximal delay in queuing if the fabric of switching is n times faster than the input line rate. Suppose all packets have the same duration, n packets are sent to n entry ports at the same time, and all n packets are sent to separate exit ports. What is the maximum delay for a memory packet?
(a) Suppose a server S and client C are connected over the Internet. The one-way prop- agation delay from S to C is 50 ms. The maximum throughput between S and C is R = 200 Mbps. A browser on client C makes an HTTP request for a webpage on server S. The base HTML file is of size 500 KB and it references five objects, each of size 5 MB. Find the total response time for the client to receive the entire webpage using nonpersistent HTTP with up to two parallel connections. Assume that when two par- allel connections are active, the throughput for each connection is 40% of the maximum throughput R. (b) Suppose an application running on host ece.gmu.edu needs to resolve the domain name cs.vtech.edu. Draw a diagram (with labels) showing the sequence of queries/responses in a recursive DNS query to find the answer in a scenario where all levels of the DNS hierarchy are involved.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education