Literature Assignment-Iv: Submitted By: Prof - Hitesh Mohapatra
Literature Assignment-Iv: Submitted By: Prof - Hitesh Mohapatra
ASSIGNMENT-IV
SUBMITTED BY: PROF.HITESH MOHAPATRA
CONTENTS
Leaky Bucket Algorithm
Token Bucket Algorithm
(a)
(b)
Figure 1.(a) Leaky bucket (b) Leaky bucket implementation
If there is a ready packet, a token is removed from the bucket, and the
packet is send.
Figure 2.1(a) Token bucket holding two tokens, before packets are send out, (b) Token
bucket after two packets are send, one packet still remains as no token is left