EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 9, Problem P21P

Explanation of Solution

Need for the Leaky bucket specification (r, b) to wait:

No”, the packet flow that conform the leaky bucket specification need not have to wait at the leaky bucket policer with the parameters r and b.

Reason:

  • Consider the packet that is transmitted into the network.one packet requires one token for being transmitted.
  • The flow that is conforms the leaky bucket will never need to wait...

Blurred answer
Students have asked these similar questions
8. Consider the leaky bucket policer that polices the average rate and burst size of a packet flow. We now want to police the peak rate, p, as well. Show how the output of this leaky bucket policer can be fed into a second leaky bucket policer so that the two leaky buckets in series police the average rate, peak rate, and burst size. Be sure to give the bucket size and token generation rate for the second policer.
MCQ 1.Suppose 4 packets are received in a burst at a token bucket shaper, which has 1 token in the bucket at the time of arrival (t=0).   Tokens are refilled at the rate of 1 token per 5 time units, with the first of the (new) tokens arriving at time t=2.   Assume that the shaping buffer is very large.   At what times are the packets eventually transmitted?   Choose the most appropriate response. The choices list the scheduling times of the packets in order (packet 1, packet 2, packet 3, packet 4).   A:2, 7, 12, 17 B:5, 10, 15, 20 C:0, 2, 7, 12 D: 0, 5, 10, 15
In the generic SR protocol, the sender transmits a message as soon as it is available (if it is in the window) without waiting for an acknowledgment. Suppose now that we want an SR protocol that sends messages two at a time. That is, the sender will send a pair of messages and will send the next pair of messages only when it knows that both messages in the first pair have been received correctly.Supposethat the channel may lose messages but will not corrupt or reorder messages. i) Outline an error-control protocol for the unidirectional rdt of messages. ii) Give an FSM description of the sender and receiver. iii) Describe the format of the packets sent between sender and receiver and vice versa. iv) If you use any procedure calls other than those in SR protocol (for example, udt_send(), start_timer(), rdt_rcv(), and so on),clearly state their actions. v) Give an example (a timeline trace of sender and receiver) showing how your protocol recovers from a lost packet
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education