When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Leaky bucket - Wikipedia

    en.wikipedia.org/wiki/Leaky_bucket

    The leaky bucket is an algorithm based on an analogy of how a bucket with a constant leak will overflow if either the average rate at which water is poured in exceeds the rate at which the bucket leaks or if more water than the capacity of the bucket is poured in all at once.

  3. Token bucket - Wikipedia

    en.wikipedia.org/wiki/Token_bucket

    The leaky bucket as a queue is therefore applicable only to traffic shaping, and does not, in general, allow the output packet stream to be bursty, i.e. it is jitter free. It is therefore significantly different from the token bucket algorithm. These two versions of the leaky bucket algorithm have both been described in the literature under the ...

  4. Generic cell rate algorithm - Wikipedia

    en.wikipedia.org/wiki/Generic_cell_rate_algorithm

    The generic cell rate algorithm (GCRA) is a leaky bucket-type scheduling algorithm for the network scheduler that is used in Asynchronous Transfer Mode (ATM) networks. [1] [2] It is used to measure the timing of cells on virtual channels (VCs) and or Virtual Paths (VPs) against bandwidth and jitter limits contained in a traffic contract for the VC or VP to which the cells belong.

  5. Traffic shaping - Wikipedia

    en.wikipedia.org/wiki/Traffic_shaping

    Metering may be implemented with, for example, the leaky bucket or token bucket algorithms (the former typically in ATM and the latter in IP networks). Metered packets or cells are then stored in a FIFO buffer , one for each separately shaped class, until they can be transmitted in compliance with the associated traffic contract.

  6. Talk:Leaky bucket - Wikipedia

    en.wikipedia.org/wiki/Talk:Leaky_bucket

    Careful analysis of the Turner/ITU-T and Tanenbaum’s algorithms shows that Tanenbaum’s description is a special case of the Turner/ ITU-T algorithm applied only to shaping, and the Turner/ ITU-T algorithm is in fact an exact mirror image of the Token Bucket Algorithm: it adds content to the bucket where the TBA removes it, and leaks it away ...

  7. Fluid queue - Wikipedia

    en.wikipedia.org/wiki/Fluid_queue

    The model applies the leaky bucket algorithm to a stochastic source. The model was first introduced by Pat Moran in 1954 where a discrete-time model was considered. [7] [8] [9] Fluid queues allow arrivals to be continuous rather than discrete, as in models like the M/M/1 and M/G/1 queues.

  8. Packet switching - Wikipedia

    en.wikipedia.org/wiki/Packet_switching

    Packets are normally forwarded by intermediate network nodes asynchronously using first-in, first-out buffering, but may be forwarded according to some scheduling discipline for fair queuing, traffic shaping, or for differentiated or guaranteed quality of service, such as weighted fair queuing or leaky bucket. Packet-based communication may be ...

  9. Talk:Token bucket - Wikipedia

    en.wikipedia.org/wiki/Talk:Token_bucket

    Its discussion of the leaky bucket algorithm makes it clear that it refers only to the leaky bucket as a queue rather than the more general leaky bucket as a meter. This, presumably, follows Tanenbaum's description of the leaky bucket as a queue in Computer Networks , which is given therein as though this queue form were the only one there is.