Question

In: Computer Science

what is the concept of token bucket for traffic shaping , computer network, could anyone explain...

what is the concept of token bucket for traffic shaping , computer network, could anyone explain in detail, thanks

Solutions

Expert Solution

Answer:-

Token bucket is usually used in the packet switching networks where data packets arrive incessantly without having any congestion control or flow control machanism in the network , so Queuing concept is used to regulate the flow of data in the network. Token bucket algorithm is one of such mechanisms used in the packet swithched networks. A token bucket is a formal definition of a rate of transfer. It has three components: a burst size, a mean rate, and a time interval (Tc). Although the mean rate is generally represented as bits per second, any two values may be derived from the third by the relation shown as follows:

mean rate = burst size / time interval. 
  

Here are some definitions of these terms:

Mean rate—Also called the committed information rate (CIR), it specifies how much data can be sent or forwarded per unit time on average.

Burst size—Also called the Committed Burst (Bc) size, it specifies in bits (or bytes) per burst, how much traffic can be sent within a given unit of time to not create scheduling concerns.

Time interval—Also called the measurement interval, it specifies the time quantum in seconds per burst.

By definition, over any integral multiple of the interval, the bit rate of the interface will not exceed the mean rate. The bit rate, however, may be arbitrarily fast within the interval.

A token bucket is used to manage a device that regulates the data in a flow.

In the token bucket metaphor, tokens are put into the bucket at a certain rate. The bucket itself has a specified capacity. If the bucket fills to capacity, newly arriving tokens are discarded. Each token is permission for the source to send a certain number of bits into the network. To send a packet, the regulator must remove from the bucket a number of tokens equal in representation to the packet size.

If not enough tokens are in the bucket to send a packet, the packet either waits until the bucket has enough tokens or the packet is discarded or marked down . If the bucket is already full of tokens, incoming tokens overflow and are not available to future packets. Thus, at any time, the largest burst a source can send into the network is roughly proportional to the size of the bucket.

Note that the token bucket mechanism used for traffic shaping has both a token bucket and a data buffer, or queue; if it did not have a data buffer, it would be a policer. For traffic shaping, packets that arrive that cannot be sent immediately are delayed in the data buffer.

For traffic shaping, a token bucket permits burstiness but bounds it. It guarantees that the burstiness is bounded so that the flow will never send faster than the token bucket's capacity, divided by the time interval, plus the established rate at which tokens are placed in the token bucket. See the following formula:

 (token bucket capacity in bits / time interval in seconds) + established rate in bps = maximum flow speed in bps(bits per second). This method of bounding burstiness also guarantees that the long-term transmission rate will not exceed the established rate at which tokens are placed in the bucket.

Related Solutions

What is shaping? Explain how you could use shaping to get one of your friends to...
What is shaping? Explain how you could use shaping to get one of your friends to say kind things to you while you are walking to class. Must be at least 150 words, please. (cannot use food of any kind)
- What is meant by term “inelastic traffic” on a network? - Explain the primary difference...
- What is meant by term “inelastic traffic” on a network? - Explain the primary difference between network applications that use client-server architecture and applications that use peer-to-peer architecture. - What is meant by the term “peer-churn” with respect to peer-to-peer application architectures? - Describe in one sentence what is represented by a “port” number to the protocol operating in the transport layer in layered protocol architecture. Please don't copy and paste from the internet. Thank you
Briefly explain the concept of policing with emphasis on the “leaky bucket” mechanism.
Briefly explain the concept of policing with emphasis on the “leaky bucket” mechanism.
Research and summarize the concept of the Qauntum Computer and explain the concept of the Qubit...
Research and summarize the concept of the Qauntum Computer and explain the concept of the Qubit as opposed to the traditional bit. Assess the viability of actually building one of these contraptions and identify some of the main physical/engineering barriers that exist to actually building one of these devices.
Wireless Medical Sensor Network (WMSN) What a computer network is and what is the importance of...
Wireless Medical Sensor Network (WMSN) What a computer network is and what is the importance of the computer network to this topic (Wireless Medical Sensor Network)?.   Explain how a Wireless Medical Sensor Network (WMSN) differs from a Wireless Sensor Network (WSN). What kind of devices does it consist of? What kind of data do the devices collect? Please include information about authentication, user friendliness and user anonymity.
Explain the concept of Virtual Network Structure and provide examples.
Explain the concept of Virtual Network Structure and provide examples.
Could anyone explain me in simple words what is being said in this topic from Feynman...
Could anyone explain me in simple words what is being said in this topic from Feynman Lectures Vol.1 Chapter 4 topic 4-2 Gravitational Potential Energy (great book and author btw)...please refer to the book (pdf on net or a copy) to get what i'm asking. i don't understand after it starts talking about perpetual motion and lifting and lowering of weights.please explain in simple words. so i got confused at this point- "Consider weight-lifting machines—machines which have the property that...
Explain the concept of a Remediation Server and traffic separation as it relates to remote access....
Explain the concept of a Remediation Server and traffic separation as it relates to remote access. What is a VPN? Distinguish between VPN server, VPN client, VPN router, and Secure Sockets Layer (SSL) VPNs. What is the difference between a tunnel-mode VPN and a split-tunneling VPN? According to the Remote Access Policy STIG, what personally owned devices are considered acceptable to perform privileged (administrative) tasks on a DoD network? When connected to a public network or shared public Internet access...
Explain what is meant by computer network and describe the various types of networks. Your response...
Explain what is meant by computer network and describe the various types of networks. Your response should be at least 200 words in length.
What is connectivity? What is a computer network? What are the Internet and the Web?
What is connectivity? What is a computer network? What are the Internet and the Web? What is cloud computing, the wireless revolution, and IoT?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT