When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Leaky bucket - Wikipedia

    en.wikipedia.org/wiki/Leaky_bucket

    The leaky bucket algorithm is sometimes contrasted with the token bucket algorithm. However, the above concept of operation for the leaky bucket as a meter may be directly compared with the token bucket algorithm, the description of which is given as the following: A token is added to the bucket every 1/r seconds.

  3. Token bucket - Wikipedia

    en.wikipedia.org/wiki/Token_bucket

    The leaky bucket as a queue is therefore applicable only to traffic shaping, and does not, in general, allow the output packet stream to be bursty, i.e. it is jitter free. It is therefore significantly different from the token bucket algorithm. These two versions of the leaky bucket algorithm have both been described in the literature under the ...

  4. Talk:Leaky bucket - Wikipedia

    en.wikipedia.org/wiki/Talk:Leaky_bucket

    A leaky bucket IS equivalent to a token bucket in the sense that it would find exactly the same packets conforming and non conforming of a traffic stream. This case is met when the filling rate of the token bucket is equal to the draining rate of the leaky bucket; when their burst tolerances are the same; and when at time zero the leaky bucket ...

  5. Traffic shaping - Wikipedia

    en.wikipedia.org/wiki/Traffic_shaping

    Metering may be implemented with, for example, the leaky bucket or token bucket algorithms (the former typically in ATM and the latter in IP networks). Metered packets or cells are then stored in a FIFO buffer , one for each separately shaped class, until they can be transmitted in compliance with the associated traffic contract.

  6. Talk:Token bucket - Wikipedia

    en.wikipedia.org/wiki/Talk:Token_bucket

    The section titled Traffic shaping algorithms (leaky bucket versus token bucket) needs to be addressed. Its discussion of the leaky bucket algorithm makes it clear that it refers only to the leaky bucket as a queue rather than the more general leaky bucket as a meter.

  7. Asynchronous Transfer Mode - Wikipedia

    en.wikipedia.org/wiki/Asynchronous_Transfer_Mode

    The reference model given by the ITU-T and ATM Forum for UPC and NPC is the generic cell rate algorithm (GCRA), [17] [18] which is a version of the leaky bucket algorithm. CBR traffic will normally be policed to a PCR and CDVT alone, whereas VBR traffic will normally be policed using a dual leaky bucket controller to a PCR and CDVT and an SCR ...

  8. McDonald's Boo Buckets vs. Dunkin Munchkin Bucket ... - AOL

    www.aol.com/mcdonalds-boo-buckets-vs-dunkin...

    The Munchkin Bucket holds the sweet treat of Dunkin's doughnut holes. The assortment of up to 50 munchkins comes in a purple bucket with some classic Halloween characters and designs on the side.

  9. Generic cell rate algorithm - Wikipedia

    en.wikipedia.org/wiki/Generic_cell_rate_algorithm

    The generic cell rate algorithm (GCRA) is a leaky bucket-type scheduling algorithm for the network scheduler that is used in Asynchronous Transfer Mode (ATM) networks. [1] [2] It is used to measure the timing of cells on virtual channels (VCs) and or Virtual Paths (VPs) against bandwidth and jitter limits contained in a traffic contract for the VC or VP to which the cells belong.