Why traffic shaping?. In packet networks that implement resource sharing admission control and scheduling alone are insufficient users may attempt to exceed the rates specified at the time of connection establishment (possibly inadvertently)
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Each flow has its own leaky bucket.
Data
- size of bucket
- rate - cells drain out at the bottom of bucket and
are sent
Regulator enforces the rate at the bottom
Regulator
Each flow has its own leaky bucket.
- rate at which tokens are placed in bucket
Token
bucket
- capacity of bucket
Data Buffer
Regulator enforces the rate at the bottom
peak
avg
Regulator
Stability and bandwidth utilization
> >
peak
avg
Token
bucket
Leaky bucket
Data Buffer
Regulator