It's UWAweek 16 (1st semester, week 7)

help3002

This forum is provided to promote discussion amongst students enrolled in CITS3002 Computer Networks.

Please consider offering answers and suggestions to help other students! And if you fix a problem by following a suggestion here, it would be great if other interested students could see a short "Great, fixed it!"  followup message. How do I ask a good question?

Displaying selected article
Showing 1 of 199 articles.
Currently 4 other people reading this forum.


 UWA week 15 (1st semester, week 6) ↓
SVG not supported

Login to reply

👍?
helpful
12:17pm Mon 8th Apr, Christopher M.

ANONYMOUS wrote:

For the leaky bucket algorithm, if transmitting variable-sized packets results in a fixed number of bytes being transmitted, would there be potential memory wastage if the packets are sent in order based on the queue, and there are no optimal combinations of packets to fully utilize the fixed byte capacity?

I'm not sure what point you're wishing to make here. In the leaky-bucket algorithm, one frame is transmitted for each 'drip' from the bucket (i.e. one frame is transmitted each time interval). This would occur regardless of whether the physical layer demanded fixed-sized frames, or if they could be of a variable size (but still up to some maximum size).

For the token bucket algorithm, can we assume that the size of the packet is irrelevant as long as it has a token, meaning transmission is not constrained to a fixed packet size or fixed number of bytes?

Similarly, one token permits one frame to be transmitted, independent of whether they are all fixed-sized, or variable-sized frames.

The University of Western Australia

Computer Science and Software Engineering

CRICOS Code: 00126G
Written by [email protected]
Powered by history
Feedback always welcome - it makes our software better!
Last modified  5:07AM Sep 06 2023
Privacy policy