Question

In: Computer Science

Briefly explain the concept of policing with emphasis on the “leaky bucket” mechanism.

Briefly explain the concept of policing with emphasis on the “leaky bucket” mechanism.

Solutions

Expert Solution

The Leaky Bucket :

we also identified policing, the regulation of the rate at which a flow is allowed to inject packets into the network, as one of the cornerstones of any QoS architecture. But what aspects of a flow's packet rate should be policed? We can identify three important policing criteria, each differing from the other according to the time scale over which the packet flow is policed:

  • Average rate. The network may wish to limit the long-term average rate (packets per time interval) at which a flow's packets can be sent into the network. A crucial issue here is the interval of time over which the average rate will be policed. A flow whose average rate is limited to 100 packets per second is more constrained than a source that is limited to 6000 packets per minute, even though both have the same average rate over a long enough interval of time. For example, the latter constraint would allow a flow to send 1000 packets in a given second-long interval of time (subject to the constraint that the rate be less that 6000 packets over a minute-long interval containing these 1000 packets), while the former constraint would disallow this sending behavior.
  • Peak rate. While the average rate constraint limits the amount of traffic that can be sent into the network over a relatively long period of time, a peak rate constraint limits the maximum number of packets that can be sent over a shorter period of time. Using our example above, the network may police a flow at an average rate of 6000 packets per minute, while limiting the flow's peak rate to 1500 packets per second.
  • Burst size. The network may also wish to limit the maximum number of packets (the "burst" of packets) that can be sent into the network over a extremely short interval of time. In the limit as the interval length approaches zero, the burst size limits the number of packets that can be instantaneously sent into the network. While it is physically impossible to instantaneously send multiple packets into the network (after all, every link has a physical transmission rate that can not be exceeded!), the abstraction of a maximum burst size is a useful one.

The leaky bucket (also call a token bucket) mechanism is an abstraction that can be used to characterize these policing limits. a leaky bucket consists of a bucket that can hold up to b tokens. Tokens are added to this bucket as follows. New tokens, which may potentially be added to the bucket, are always being generated at a rate of r tokens per second. (We assume here for simplicity that the unit of time is a second.) If the bucket is filled with less that b tokens when a token is generated, the newly generated token is added to the bucket; otherwise the newly generated token is ignored, and the token bucket remains full with b tokens.

Let us now consider how is the leaky bucket can be used to police a packet flow. Suppose before a packet is transmitted into the network, it must first remove a token from the token bucket. If the token bucket is empty, the packet must wait for a token. (An alternative is for the packet to be dropped, although we will not consider that option here.) Let us now consider how this behavior polices a traffic flow. Because there can be at most b tokens in the bucket, the maximum burst size for a leaky-bucket-policed flow is b packets. Furthermore, because the token generation rate is r, the maximum number of packets that can enter the network of any interval of time of length t is rt+b. Thus, the token generation rate, r, serves to limit the long term average rate at which packet can enter the network. It is also possible to use leaky buckets (specifically, two leaky buckets in series) to police a flow's peak rate in addition to the long-term average rate;

Leaky bucket mechanism diagram shown below :


Related Solutions

A leaky 10-kg bucket is lifted from the ground to a height of 12 m at...
A leaky 10-kg bucket is lifted from the ground to a height of 12 m at a constant speed with a rope that weighs 0.5 kg/m. Initially the bucket contains 36 kg of water, but the water leaks at a constant rate and finishes draining just as the bucket reaches the 12-m level. Find the work done. (Use 9.8 m/s2 for g.) Show how to approximate the required work by a Riemann sum. (Let x be the height in meters...
Problem 10: Water is drawn from a well using a leaky bucket. Assume the following: •...
Problem 10: Water is drawn from a well using a leaky bucket. Assume the following: • The well is 23 ft deep and requires 23 ft of rope to pull the bucket to the top. • The rope weighs a total of 12 lbs. • The bucket weighs 3 lbs when empty. • The bucket holds 16 lbs of water. It is full at the bottom of the well and loses half of its water by the time it reaches...
Briefly explain the concept "monetary policy transmission mechanism" and then illustrate how changes in interest rates...
Briefly explain the concept "monetary policy transmission mechanism" and then illustrate how changes in interest rates impact on your business organisation. Substantiate your answer fully.
Briefly explain the mechanism in Franklin's bells
Briefly explain the mechanism in Franklin's bells
1. Explain the basic mechanism of separation in an HPLC column with emphasis on mobile phase,...
1. Explain the basic mechanism of separation in an HPLC column with emphasis on mobile phase, solid phase, retention time, normal phase, reverse phase and selectivity.
what is the concept of token bucket for traffic shaping , computer network, could anyone explain...
what is the concept of token bucket for traffic shaping , computer network, could anyone explain in detail, thanks
Briefly explain the concept of "Credible Commitment"
Briefly explain the concept of "Credible Commitment"
Describe the concept of flow control and briefly describe the mechanism/s implemented by the TCP protocol...
Describe the concept of flow control and briefly describe the mechanism/s implemented by the TCP protocol for this purpose.
1) Explain how this cellular mechanism affects variation: Crossing over Briefly explain how the mechanism (crossing...
1) Explain how this cellular mechanism affects variation: Crossing over Briefly explain how the mechanism (crossing over) could contribute to genetic variation in offspring. Be specific how this mechanism gives this result, when it occurs during the cell cycle, and be specific as to the type of genetic variation produced (from base-pair sequences to whole genomes).
Explain in detail the mechanism of breathing.Discuss briefly about respiration and acid base balance. Discuss briefly...
Explain in detail the mechanism of breathing.Discuss briefly about respiration and acid base balance. Discuss briefly about the structural layers of alimentary tube.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT