When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Leaky bucket - Wikipedia

    en.wikipedia.org/wiki/Leaky_bucket

    The leaky bucket is an algorithm based on an analogy of how a bucket with a constant leak will overflow if either the average rate at which water is poured in exceeds the rate at which the bucket leaks or if more water than the capacity of the bucket is poured in all at once.

  3. Generic cell rate algorithm - Wikipedia

    en.wikipedia.org/wiki/Generic_cell_rate_algorithm

    The generic cell rate algorithm (GCRA) is a leaky bucket-type scheduling algorithm for the network scheduler that is used in Asynchronous Transfer Mode (ATM) networks. [1] [2] It is used to measure the timing of cells on virtual channels (VCs) and or Virtual Paths (VPs) against bandwidth and jitter limits contained in a traffic contract for the VC or VP to which the cells belong.

  4. Token bucket - Wikipedia

    en.wikipedia.org/wiki/Token_bucket

    The leaky bucket as a queue is therefore applicable only to traffic shaping, and does not, in general, allow the output packet stream to be bursty, i.e. it is jitter free. It is therefore significantly different from the token bucket algorithm. These two versions of the leaky bucket algorithm have both been described in the literature under the ...

  5. Traffic shaping - Wikipedia

    en.wikipedia.org/wiki/Traffic_shaping

    Metering may be implemented with, for example, the leaky bucket or token bucket algorithms (the former typically in ATM and the latter in IP networks). Metered packets or cells are then stored in a FIFO buffer , one for each separately shaped class, until they can be transmitted in compliance with the associated traffic contract.

  6. Talk:Leaky bucket - Wikipedia

    en.wikipedia.org/wiki/Talk:Leaky_bucket

    Careful analysis of the Turner/ITU-T and Tanenbaum’s algorithms shows that Tanenbaum’s description is a special case of the Turner/ ITU-T algorithm applied only to shaping, and the Turner/ ITU-T algorithm is in fact an exact mirror image of the Token Bucket Algorithm: it adds content to the bucket where the TBA removes it, and leaks it away ...

  7. Fluid queue - Wikipedia

    en.wikipedia.org/wiki/Fluid_queue

    The model applies the leaky bucket algorithm to a stochastic source. The model was first introduced by Pat Moran in 1954 where a discrete-time model was considered. [7] [8] [9] Fluid queues allow arrivals to be continuous rather than discrete, as in models like the M/M/1 and M/G/1 queues.

  8. Weighted fair queueing - Wikipedia

    en.wikipedia.org/wiki/Weighted_fair_queueing

    Weighted fair queueing (WFQ) is a network scheduling algorithm. WFQ is both a packet-based implementation of the generalized processor sharing (GPS) policy, and a natural extension of fair queuing (FQ). Whereas FQ shares the link's capacity in equal subparts, WFQ allows schedulers to specify, for each flow, which fraction of the capacity will ...

  9. Time-Sensitive Networking - Wikipedia

    en.wikipedia.org/wiki/Time-Sensitive_Networking

    IEEE 802.1Qav Forwarding and Queuing Enhancements for Time-Sensitive Streams defines traffic shaping using priority classes, which is based on a simple form of "leaky bucket" credit-based fair queuing. 802.1Qav is designed to reduce buffering in receiving bridges and endpoints.