Figures index

From

Modeling Traffic Shaping and Traffic Policing in Packet-Switched Networks

Wlodek M. Zuberek, Dariusz Strzeciwilk

Journal of Computer Sciences and Applications. 2018, 6(2), 75-81 doi:10.12691/jcsa-6-2-4
  • Figure 1. Leaky bucket model
  • Figure 2. Petri net model of the leaky bucket scheme
  • Figure 3. Petri net model of leaky bucket with infinite capacity
  • Figure 4. Queueing example
  • Figure 5. Petri net model of a bursty source
  • Figure 6. Queueing example with leaky bucket
  • Figure 7. Petri net model of token bucket
  • Figure 8. Channel utilization as a function of α
  • Figure 9. Petri net model for token bucket with packet length control
  • Figure 10. Priority queueing
  • Figure 11. Petri net model of a priority queueing
  • Figure 12. Channel utilization for (strict) priority queueing
  • Figure 13. Priority queueing with leaky bucket
  • Figure 14. Channel utilization for priority queueing with leaky bucket
  • Figure 15. The fraction of packets dropped as a function of traffic intensity