Hello
Hello
This algorithm allows bursts for short after that constant rate.
transmission while making sure that no data is It saves token to send large bursts.
lost. In contrast to the Leaky Bucket algorithm, Leaky Bucket Algorithm
not the data that is to be send but tokens are Token independent
queued in a time-depended queue. One token is *If bucket is full packet or data is discarded.
needed to send a single portion of data *Packets are transmitted continuously.
Implementations contain a token counter thatis *It sends the packet at constant rate.
incremented on every time interval, so that the It does not save token.
counter grows over time up until a maximum QUALITY OF SERVICE
counter value is reached. The token counter is is defined as something fiow seeks to attain
decremented by one for every data portion A Stream of packets from a source to
sent. When the token counter is zero no data destination is called flow. In a connection
can be transmitted. oriented network all packets belonging to a flow
For many applications it is better to allow the follow the same route, in a connection-less
output to speed up somewhat when a larger service they may follow different routes
burst arrives than to lose the data. Token The needs of each flow can be characterised by
Bucket algorithm provides such a solution.
destroy o
must capture and
primary parameters vi, reliability, delay, jitter
it
be transmitled, and bandwidth. together these determine the
Hosl Copuc Qos(Quality of Service) the flow requires
Cos hc Ducke
QoS defines a set of attributes related to the
One token O
added O the h o d s iakcns
performance of the connection for each
burkel<ven connection the user can request a particular
attributes.
flow Characteristics
1: Reliability: Reliability is a characteristic that
Networds
( flow needs. lack of reliability means losing a
Main steps of this algorithm can be described as packet or acknowledgment which entails
retransmission. However, the sensitivity of
follows:
In regular intervals tokens are thrown into the application programs to reliability is not the
same
bucket.
The bucket has a maximum capacity. 2: Delay: Source-to-destination delay is another
If there is a ready packet, a token is removed characteristic Againi plication can tolerate
from the bucket, and the packet is send. delay in different degree. In this case,
I fthere is no token in the bucket, the packet telephony, audio conferencing, video
cannot be send. conferencing and remote login need minimum
delay, while delay in file transfer or e-mail is less
One token abled per lich
important
3: Jitter: Jitter is the variation in delay for
packets belonging to thee same flow. For
One itken remove
example, if four packets depart at times 0,1,2
and dicardeu
ell rartnificd and 3 and arrive at 20,21,22 and 23, all have the
same delay, 20 units of time. Jitter is defined as
IILIIFProcesor Departure
ArrivalK Full the variation in the packet delay. High jitter
Quewe
means the difference between delays is large;
DhcandY low jitter means the variation is small
Token Bucket Algorithm 4: Bandwidth: Different applications need
Token dependent different bandwidths. In video conferencing one
If bucket is full token are discarded, but not need to send millions of bits per second to
the packet.
refresh a colour screen while the total number
*Packets can only transmitted when there are of bits in an e-mail may not reach even a million.
enough token.
cONGESTION of packets from the user process in an even flow
ocur in a computer network when the resource of packers onto the network. Conceptually. each
demands exceed the capacity Packets may be host is connected to the network by an interface
lost due to too much queuing in the network. Containing a leaky bucket, that is, a finite
During Congestion the network throughput may internal queue. If a packet arrives at the queue
drop and the path delay may become very high when itis full, the packet is discarded
Congestion in a network may occur if users send
bcl algoridhm
data into the network at a rate greater than Remoe pacaa
a o s a n rae
allowed by network resources. for example,
Congestion may occur because the switched in a
ATival
network have a limited buffer size to store Procesr PDepaur
arrived packets before processing
Causes of Congestion Discard
1: Unpredictable statistical fluctuation of traffic In other word, if one or more processes within
flows the host try to send a packet when the
2: faults conditions within the network maximum number is already queued, the new
3: Slow processor speed. if the router's CPU packet is unceremoniously discarded. This
speed is very low and performing tasks like arrangement can be built into the hardware
queuing buffer, tables updating etc. queries are interface or simulated by the host operating
built up, even though the line capacity is not system. It was first proposed by Turner (1986)
fully utilized and is called the leaky bucket algorithm. In fact
4: Inefficient control policies it is nothingg other thana single-server queuing8
5: Bandwidth of the links is important in system with constant service time. This
Congestion. The links to be used must be of high mechanism turns an uneven flow of packets
Bandwidth to avoid Congestion from the user processes inside the host into an
Mid Congestion even flow of packets onto the network.
No Congetinn Severe Congestion
Smoothing out bursts and greatly reducing the
/Controlled Tralfic chances of congestion
Network
tidral cave) Fause
Throughp
packets Uncontrolled
Packet
delivered) Traffic
Uneegulated
Plo
Beciet hol
Offered Ln Packcts
packets e n Leaky w Centanng
Leky Hecke
Bucket
EMecd ef Cengestion
Fleure 41:
Ndtwur
Layer
GMP|Licur ARIr ARr
DataLi
yer
Phy uical
Underly nmg LAN w WAN Tohrdagy