CITS3002 Computer Networks |
← prev | CITS3002 | help3002 | CITS3002 schedule | ||||
Traffic Shaping - Token Bucket AlgorithmThe leaky bucket algorithm enforces a strict maximum traffic generation. It is often better to permit short bursts, but thereafter to constrain the traffic to some maximum. The token bucket algorithm provides a bucket of permit tokens - before any packet may be transmitted, a token must be consumed. Tokens 'drip' into the bucket at a fixed rate; if the bucket overflows with tokens they are simply discarded (the host does not have enough traffic to transmit).
Packets are placed in an 'infinite' queue. Packets may enter the subnet whenever a token is available, else they must wait.
The token bucket algorithm enables an application to generate and
transmit 'bursty' traffic
(high volume, for a short period).
It avoids saturating the network by only permitting a burst of traffic to
continue for a limited time (until the tokens run out).
CITS3002 Computer Networks, Lecture 5, The Network Layer, p21, 25th March 2024.
|