Question

In: Computer Science

what is the concept of token bucket for traffic shaping , computer network, could anyone explain...

what is the concept of token bucket for traffic shaping , computer network, could anyone explain in detail, thanks

Solutions

Expert Solution

Answer:-

Token bucket is usually used in the packet switching networks where data packets arrive incessantly without having any congestion control or flow control machanism in the network , so Queuing concept is used to regulate the flow of data in the network. Token bucket algorithm is one of such mechanisms used in the packet swithched networks. A token bucket is a formal definition of a rate of transfer. It has three components: a burst size, a mean rate, and a time interval (Tc). Although the mean rate is generally represented as bits per second, any two values may be derived from the third by the relation shown as follows:

mean rate = burst size / time interval. 
  

Here are some definitions of these terms:

Mean rate—Also called the committed information rate (CIR), it specifies how much data can be sent or forwarded per unit time on average.

Burst size—Also called the Committed Burst (Bc) size, it specifies in bits (or bytes) per burst, how much traffic can be sent within a given unit of time to not create scheduling concerns.

Time interval—Also called the measurement interval, it specifies the time quantum in seconds per burst.

By definition, over any integral multiple of the interval, the bit rate of the interface will not exceed the mean rate. The bit rate, however, may be arbitrarily fast within the interval.

A token bucket is used to manage a device that regulates the data in a flow.

In the token bucket metaphor, tokens are put into the bucket at a certain rate. The bucket itself has a specified capacity. If the bucket fills to capacity, newly arriving tokens are discarded. Each token is permission for the source to send a certain number of bits into the network. To send a packet, the regulator must remove from the bucket a number of tokens equal in representation to the packet size.

If not enough tokens are in the bucket to send a packet, the packet either waits until the bucket has enough tokens or the packet is discarded or marked down . If the bucket is already full of tokens, incoming tokens overflow and are not available to future packets. Thus, at any time, the largest burst a source can send into the network is roughly proportional to the size of the bucket.

Note that the token bucket mechanism used for traffic shaping has both a token bucket and a data buffer, or queue; if it did not have a data buffer, it would be a policer. For traffic shaping, packets that arrive that cannot be sent immediately are delayed in the data buffer.

For traffic shaping, a token bucket permits burstiness but bounds it. It guarantees that the burstiness is bounded so that the flow will never send faster than the token bucket's capacity, divided by the time interval, plus the established rate at which tokens are placed in the token bucket. See the following formula:

 (token bucket capacity in bits / time interval in seconds) + established rate in bps = maximum flow speed in bps(bits per second). This method of bounding burstiness also guarantees that the long-term transmission rate will not exceed the established rate at which tokens are placed in the bucket.

Related Solutions

What is shaping? Explain how you could use shaping to get one of your friends to...
What is shaping? Explain how you could use shaping to get one of your friends to say kind things to you while you are walking to class. Must be at least 150 words, please. (cannot use food of any kind)
Explain the concept of Virtual Network Structure and provide examples.
Explain the concept of Virtual Network Structure and provide examples.
Could anyone explain me in simple words what is being said in this topic from Feynman...
Could anyone explain me in simple words what is being said in this topic from Feynman Lectures Vol.1 Chapter 4 topic 4-2 Gravitational Potential Energy (great book and author btw)...please refer to the book (pdf on net or a copy) to get what i'm asking. i don't understand after it starts talking about perpetual motion and lifting and lowering of weights.please explain in simple words. so i got confused at this point- "Consider weight-lifting machines—machines which have the property that...
Explain what is meant by computer network and describe the various types of networks. Your response...
Explain what is meant by computer network and describe the various types of networks. Your response should be at least 200 words in length.
What is connectivity? What is a computer network? What are the Internet and the Web?
What is connectivity? What is a computer network? What are the Internet and the Web? What is cloud computing, the wireless revolution, and IoT?
Hi, I was wondering if anyone could explain what capital asset pricing is? My homework suggests...
Hi, I was wondering if anyone could explain what capital asset pricing is? My homework suggests that the capital asset pricing model considers the relationship between the fluctuations in a security’s returns versus the markets. When explaining, please provide an example as that would help me understand better! Thank you!
Hi Could anyone please explain to me the principle behind the RNA isolation experiment.
Hi Could anyone please explain to me the principle behind the RNA isolation experiment.
Could anyone please explain how to do this? I would appreciate it! The judges of County...
Could anyone please explain how to do this? I would appreciate it! The judges of County X try thousands of cases per year. Although in a big majority of the cases disposed the verdict stands as rendered, some cases are appealed. Of those appealed, some are reversed. Because appeals are often made as a result of mistakes by the judges, you want to determine which judges are doing a good job and which ones are making too many mistakes. The...
Can anyone please explain Rings concept of abstract algebra? (including polynomials, it would be great if...
Can anyone please explain Rings concept of abstract algebra? (including polynomials, it would be great if you attach examples)
Network Security: Explain in detail how a hash function could be used for each of the...
Network Security: Explain in detail how a hash function could be used for each of the following applications. Indicate which property or properties of the hash function are being used (one-way property, fixed length output, collision resistance, etc...). 1. to detect unauthorized modification of software program code 2. to identify the same files with different names on a peer-to-peer sharing network
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT