Consider the figure below, which shows a leaky bucket policer being fed by a stream of packets.

Question:

Consider the figure below, which shows a leaky bucket policer being fed by a stream of packets. The token buffer can hold at most two tokens, and is initially full at t =O. New tokens (uTive at a rate of one token per slot. The output link speed is such that if two packets obtain tokens at the beginning of a time slot, they can both go to the output link in the same slot. The timing details of the system are as follows :
Consider the figure below, which shows a leaky bucket policer

I. Packets (if any) arrive at the beginning of the slot. Thus in the figure, packets I, 2 and 3 arrive in slot O. If there are already packets in the queue, then the arriving packets join the end of the queue. Packets proceed towards the front of the queue in a FIFO manner.
2. After the arri vals have been added to the queue, if there are any queued packets, one or two of those packets (depending on the number of available tokens) will each remove a token from the token buffer and go to the output link during that slot. Thus, packets I and 2 each remove a token from the buffer (since there are initially two tokens) and go to the output link during slot O.
3. A new token is added to the token buffer if it is not full, since the token generation rate is r = I token/slot.
4.Time then advances to the next time slot, and these steps repeat.
Answer the following questions:
a. For each time slot, identify the packets that are in the queue and the number of tokens in the bucket, immediately after the an·ivals have been processed (step I above) but before any of the packets have passed through the queue ancl removed a token. Thus, for the t = 0 time slot in the example above, packets I, 2 and 3 are in the queue, and there are two tokens in the buffer.
b. For each time slot indicate which packets appear on the output after the token(s) have been removed from the queue. Thus, for the t = 0 time slot in the example above, packets 1 and 2 appear on the output link from the leaky buffer during slot O.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Computer Networking A Top-Down Approach

ISBN: 978-0136079675

5th edition

Authors: James F. Kurose, Keith W. Ross

Question Posted: