Design a token bucket system

Assignment Help Basic Computer Science
Reference no: EM131514134

Assume we have a user that will pay to transmit an average of 3 Mb/s and occasional bursts of 20 Mbps that last for 15 msec.

a. The network has a maximum data rate of 20 Mb/s. Design a token bucket system for this user by specifying the token rate and the bucket size. How long does it take the data in the 15 msec. burst to actually be sent onto the network?

b. Design a leaky bucket system for this user by specifying the data rate and bucket size. How long does it take the data in the 15 msec burst to actually be sent onto the network?

Reference no: EM131514134

Questions Cloud

Assumptions that frames arrive : Make the assumptions that frames arrive in the order transmitted, if they arrive at all, and that there are no undetected errors in decoded frames.
How cultural and economic environments influence terrorism : Please write an essay on how religion influences terrorism or how socio-cultural and economic environments influence terrorism.
Design a traffic policer : Use leaky bucket to design a traffic policer which can satisfy the following requirements
Describe first three step of implementing your ideal process : The ideal secondary assessment process. Write a 350- to 700-word description of the first three steps of implementing your ideal assessment process.
Design a token bucket system : Design a token bucket system for this user by specifying the token rate and the bucket size. How long does it take the data in the 15 msec.
Develop a visual aid/graphic organizer of best practices : Develop a visual aid/graphic organizer of best practices for creating a positive Create a best case and worst case scenario for each of the given items.
Derive the probability of error detection : Derive the probability of error detection of an arbitrary m-bit message using 1 bit parity, where m is even.
Pros and cons to approach the project as adaptive sdlc : Write brief description of Pros and Cons to approaching the project using the Predictive SDLC, then the Pros and Cons to approach the project as Adaptive SDLC
What the appropriate behavior for the situation you chose : Explain which norm you broke and why you chose it. Discuss what the appropriate behavior for the situation you chose would typically require.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd