Content deleted Content added
No edit summary |
mNo edit summary |
||
Line 6:
(3) most traffic is "bursty" -- there are gaps between packets of information that can be filled with other user traffic
Different network protocols implement DBA in different ways. These methods are typically defined in [
== See also ==
|