Monday, September 2, 2013
In this article we discuss about the applications of the leaky bucket algorithm and the token bucket algorithm.
Applications of Leaky Bucket Algorithm
- The leaky bucket algorithm is implemented in different versions.
- For example, the generic cell rate algorithm is a version of this algorithm which is often implemented in the networks using ATM (asynchronous transfer mode).
- The algorithm is applied at the user interfaces in the usage/network parameter control in order to provide protection to the network from the problems of congestive collapse or excess traffic.
- An algorithm equivalent to the generic cell rate algorithm might be used in shaping the transmissions made by the network interface card to a network using ATM.
There are two major applications of the leaky bucket algorithm.
- The first is using it as a counter only for checking whether the events or the traffics confirm to the defined limits or not.
- Whenever a packet arrives at the check point, the counter is incremented.
- This is same as adding water to the bucket in an intermittent way.
- In the same way, the counter is decremented as the water leaks out at a constant rate.
- Because of this, the conformance of the packet to the burstiness and bandwidth limits is indicated by the value of this counter whenever a packet arrives.
- Or if an event occurs, the counter checks whether it confirms to the peak and average rate limits.
- So, when the packets arrive or an event occurs, water is added to the bucket and then leaks out. We call this version of the leaky bucket algorithm as a meter.
- Another application of the leaky bucket algorithm involves its use as queue implemented for controlling the flow of traffic.
- This queue maintains a direct control over the flow.
- When the packets arrive, they are put in to the queue.
- This is same as adding water to the bucket.
- The packets are then removed in the order they arrived at a constant rate.
- This is same as water leaking out.
- As a result of this, there is no jitter or burstiness in the traffic flow.
Applications of Token Bucket Algorithm
- The token bucket algorithm finds its application in the telecommunications and packet switched computer networks.
- This algorithm is implemented for checking whether the data transmissions confirm to the burstiness and bandwidth predefined limits.
- The token bucket algorithm used in traffic policing and traffic shaping.
- In the former, the packets that are non-conformant are discarded or assigned low priorities.
- This is done for the management of the downstream traffic.
- On the other hand, the packets are kept in delay unless they are conformed in traffic shaping.
- Both of these are used in protecting the network against the burstiness of the traffic.
- Bursty traffic gives rise to congestion problems.
- These algorithms help in managing the bandwidth as well congestion of the network.
- Network interfaces commonly use the traffic shaping process for preventing the discarding of the transmissions by the network’s traffic management functions.
- This algorithm is based up on the analogy of a bucket with fixed capacity.
- Tokens are added to this bucket at a fixed rate and represent a single packet of a fixed size.
- When the packet has to be checked whether it confirms to the predefined limits or not, first the bucket is checked if it contains sufficient tokens.
- If sufficient tokens are there, tokens equal to the number of bytes in the packet are removed and the packet is transmitted.
- If sufficient tokens are not there, the packet is said to be non-conformant and the number of tokens in the bucket remain unchanged.