It's UWAweek 47

help3002

This forum is provided to promote discussion amongst students enrolled in CITS3002 Computer Networks.

Please consider offering answers and suggestions to help other students! And if you fix a problem by following a suggestion here, it would be great if other interested students could see a short "Great, fixed it!"  followup message. How do I ask a good question?

Displaying selected article
Showing 1 of 503 articles.
Currently 38 other people reading this forum.


 UWA week 14 (1st semester, non-teaching week) ↓
SVG not supported

Login to reply

👍?
helpful
4:06pm Sun 7th Apr, ANONYMOUS

I think the statement is pointing out that even though an application (a node) is generating bursty traffic. Because this traffic is being fed into the leaky bucket algorithm, it doesn't saturate the network as the leaky bucket only permits a specified number of packets to enter the subnet at a given time. Thus, giving the application the ability to generate bursty traffic, as it can generate bursty traffic but the leaky bucket algorithm slows it down when entering the network.

The University of Western Australia

Computer Science and Software Engineering

CRICOS Code: 00126G
Written by [email protected]
Powered by history
Feedback always welcome - it makes our software better!
Last modified  8:08AM Aug 25 2024
Privacy policy