Content deleted Content added
No edit summary |
m Signing comment by 91.110.29.36 - "" |
||
Line 18:
[[Special:Contributions/130.83.244.131|130.83.244.131]] ([[User talk:130.83.244.131|talk]]) 13:23, 18 June 2008 (UTC)
No, the leak bucket and the token bucket are symmetrical and will see the same packets as conforming or nonconforming, if given the same parameters. The only real differences are that the leaky bucket description is about adding water when packet conformance is tested and taking it out at regular intervals; whereas the token bucket is about taking out tokens when conformance testing and adding them in regularly. Functionally they are identical. Yes I have read Tanenbaums description in his book computer networks. However, I've also read Turner, who Tanenbaum credits as the first to describe it, and the ITU-T/ATM Forum description in I.371 and the Forum's UNI. Sorry for this, but Tanenbaum is wrong; or at least his description is simplified to the point where it is, in general, wrong, and applies only to a single specific case, where the bucket depth is exactly equal to the water added by a packet or cell. Only in this special case does the leaky bucket, and the token bucket, not alow for any jitter or burstiness. Sorry, I'm getting stressed by the repatition of this particular falacy, can you tell? <span style="font-size: smaller;" class="autosigned">—Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/91.110.29.36|91.110.29.36]] ([[User talk:91.110.29.36|talk]]) 11:02, 9 May 2010 (UTC)</span><!-- Template:UnsignedIP --> <!--Autosigned by SineBot-->
|