When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Leaky bucket - Wikipedia

    en.wikipedia.org/wiki/Leaky_bucket

    The leaky bucket algorithm is sometimes contrasted with the token bucket algorithm. However, the above concept of operation for the leaky bucket as a meter may be directly compared with the token bucket algorithm, the description of which is given as the following: A token is added to the bucket every 1/r seconds.

  3. Token bucket - Wikipedia

    en.wikipedia.org/wiki/Token_bucket

    The leaky bucket as a queue is therefore applicable only to traffic shaping, and does not, in general, allow the output packet stream to be bursty, i.e. it is jitter free. It is therefore significantly different from the token bucket algorithm. These two versions of the leaky bucket algorithm have both been described in the literature under the ...

  4. UPC and NPC - Wikipedia

    en.wikipedia.org/wiki/UPC_and_NPC

    These provide a conformance definition, using a form of the leaky bucket algorithm called the Generic Cell Rate Algorithm (GCRA), which specifies how cells are checked for conformance with a cell rate, or its reciprocal emission interval, and jitter tolerance: either a Cell Delay Variation tolerance (CDVt) for testing conformance to the Peak ...

  5. Traffic shaping - Wikipedia

    en.wikipedia.org/wiki/Traffic_shaping

    Metering may be implemented with, for example, the leaky bucket or token bucket algorithms (the former typically in ATM and the latter in IP networks). Metered packets or cells are then stored in a FIFO buffer, one for each separately shaped class, until they can be transmitted in compliance with the associated traffic contract.

  6. Traffic policing (communications) - Wikipedia

    en.wikipedia.org/wiki/Traffic_policing...

    However, comparison of the leaky bucket and token bucket algorithms shows that they are simply mirror images of one another, one adding bucket content where the other takes it away and taking away bucket content where the other adds it. Hence, given equivalent parameters, implementations of both algorithms will see exactly the same traffic as ...

  7. Generic cell rate algorithm - Wikipedia

    en.wikipedia.org/wiki/Generic_cell_rate_algorithm

    The generic cell rate algorithm (GCRA) is a leaky bucket-type scheduling algorithm for the network scheduler that is used in Asynchronous Transfer Mode (ATM) networks. [1] [2] It is used to measure the timing of cells on virtual channels (VCs) and or Virtual Paths (VPs) against bandwidth and jitter limits contained in a traffic contract for the VC or VP to which the cells belong.

  8. Category:Network scheduling algorithms - Wikipedia

    en.wikipedia.org/wiki/Category:Network...

    Generic cell rate algorithm; H. ... Leaky bucket; M. Max-min fairness; ... Token bucket; Traffic shaping; W. Weighted fair queueing; Weighted round robin

  9. Talk:Leaky bucket - Wikipedia

    en.wikipedia.org/wiki/Talk:Leaky_bucket

    A leaky bucket IS equivalent to a token bucket in the sense that it would find exactly the same packets conforming and non conforming of a traffic stream. This case is met when the filling rate of the token bucket is equal to the draining rate of the leaky bucket; when their burst tolerances are the same; and when at time zero the leaky bucket ...