Leaky Bucket and Token Bucket

Differences between Leaky Bucket and Token Bucket algorithms in terms of:
1. Bucket content;
2. Loss packets (or bytes)
3. Burst handling n(state the burst size and duration);
4. Output traffic shape Leaky Bucket and Token Bucket algorithms in terms of:
alyamamaAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

deibelCommented:
Token Bucket:
the tokens flow with rate r INTO a bucket. the bucket has a capacity of c. are there more tokens than the number of c, packet will be lost. so the "size" c of the bucket limits the bursts. and r limits the long-term-datarate.

to send a packet of the size s, there have to s tokens in the bucket. if there are less, the packet will be delayed.

Leaky Bucket:
in difference to token bucket, the OUTPUT of the bucket is limited to a rate r. it also has a capacity c. bursts at the output of the bucket are not possible. bursts at the input are smoothed due to the caching in the bucket. the max burst is c


refer to this, but it is in german and needs java6:
http://www.nt.fh-koeln.de/fachgebiete/inf/vogt/mm/buckets/Applet.html

hope this helps. its a bit difficult for me to explain it in english
0
deibelCommented:
i found that on wikipedia:

Two predominant methods for shaping traffic exist: a leaky bucket implementation and a token bucket implementation. Sometimes they are mistakenly lumped together under the same name. Both these schemes have distinct properties and are used for distinct purposes [1]. They differ principally in that the leaky bucket imposes a hard limit on the data transmission rate, whereas the token bucket allows a certain amount of burstiness while imposing a limit on the average data transmission rate.


http://en.wikipedia.org/wiki/Token_bucket#Traffic_shaping_algorithms_.28leaky_bucket_versus_token_bucket.29
0
alyamamaAuthor Commented:
Thank You,
0
How do you know if your security is working?

Protecting your business doesn’t have to mean sifting through endless alerts and notifications. With WatchGuard Total Security Suite, you can feel confident that your business is secure, meaning you can get back to the things that have been sitting on your to-do list.

deibelCommented:
my pleasure,
0
deibelCommented:
do you need further explanation?
0
deibelCommented:
tomorrow, i will be on haloday for two weeks,

if you have any more questions.....last order now :-)
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Software

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.