It's UWAweek 18 (1st semester, week 9)

help3002

This forum is provided to promote discussion amongst students enrolled in CITS3002 Computer Networks.

Please consider offering answers and suggestions to help other students! And if you fix a problem by following a suggestion here, it would be great if other interested students could see a short "Great, fixed it!"  followup message. How do I ask a good question?

Displaying selected article
Showing 1 of 299 articles.
Currently 4 other people reading this forum.


 UWA week 14 (1st semester, non-teaching week) ↓
SVG not supported

Login to reply

👍?
helpful
12:00pm Sat 6th Apr, ANONYMOUS

Hi, i am hoping to get some clarification on this statement from pg. 20 of Wk. 5 lecture "The leaky bucket algorithm enables an application to generate bursty traffic (high volume, for a short period) without saturating the network". I would've though the leaky bucket algo would generate a smoother, more consistent type of traffic because the data is drained from the bucket at a fixed rate, regardless of whether there has been a burst of traffic / bucket is full or not. And the token bucket algo would generate bursty traffic, as you save up tokens?

The University of Western Australia

Computer Science and Software Engineering

CRICOS Code: 00126G
Written by [email protected]
Powered by history
Feedback always welcome - it makes our software better!
Last modified  5:07AM Sep 06 2023
Privacy policy