EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Question
Book Icon
Chapter 9, Problem P20P
Program Plan Intro

Leaky Bucket:

The request that are available at the wide range are stored and organized such that the rate of the output packet is set  for the transfer that happens to the network is called as leaky bucket algorithm.

Working of leaky bucket:

  • Leaky bucket consists of a bucket that can hold up to b tokens.
  • Tokens are being added to the bucket.
  • The tokens are generated at the rate r token per second.
  • The bucket gets filled when it contains b less than tokens
  • The new tokens are added into the bucket.
  • If the bucket is full newly generated tokens are being ignored.
  • The token bucket remains full with b tokens.

Policing the packet flow:

  • Consider a packet is transmitted into the network, a token needs to be removed from the token bucket.
  • If the token bucket is empty, the packets are required to wait for the token.

Blurred answer
Students have asked these similar questions
In the scenario shown in Figure below, A is sending a frame to A' and after receiving that frame, A' sends a frame back to A. Explain the steps that are carried out by A, A', and the switch to populate its table such that packets from A can be switched to A' and vice versa. A C' B 3 B' A' 5.
We consider a noisy communication link in which the message is encoded into binary digits (0,1) (bits)before being transmitted. We will denote the length of the encoded message by n. Since the channel isnoisy, the bits can get flipped; a 0 to 1 or a 1 to 0. We will assume that each bit is flipped independently withprobability p. In order to be able to detect that the received message is in error, a simple method is to add aparity bit at the transmitter. There can two types of parity - even parity and odd parity. If even (odd) parityis used , the parity bit is set such that total number of 1s in the encoded message is even (odd). For the sakeof this problem, we will only consider even parity. Here are a few examples1) message: 0001 + parity bit: 1 --> encoded message: 000112) message: 0101 + parity bit: 0 --> encoded message: 010103) message: 0111 + parity bit: 1 --> encoded message: 01111At the receiver, the parity bit is computed from the message bits. If the received parity…
When Bob wants to send Alice a message M on the Internet, he breaks M into n data packets, numbers the packets consecutively, and injects them into the network. When the packets arrive at Alice’s computer, they may be out of order, so Alice must assemble the sequence of n packets in order before she can be sure she has the entire message. Describe an efficient scheme for Alice to do this. What is the running time of this algorithm?   From Data Structures and Algorithms C-7.56
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education