Science and Education Publishing
From Scientific Research to Knowledge
Submission
Browse by Subjects
Search
Journal Home
For Authors
Online Submission
Current Issue
Archive
About Us
Figures index
From
Modeling Traffic Shaping and Traffic Policing in Packet-Switched Networks
Wlodek M. Zuberek, Dariusz Strzeciwilk
Journal of Computer Sciences and Applications
.
2018
, 6(2), 75-81 doi:10.12691/jcsa-6-2-4
Figure 1.
Leaky bucket model
Full size figure and legend
Figure 2.
Petri net model of the leaky bucket scheme
Full size figure and legend
Figure 3.
Petri net model of leaky bucket with infinite capacity
Full size figure and legend
Figure 4.
Queueing example
Full size figure and legend
Figure 5.
Petri net model of a bursty source
Full size figure and legend
Figure 6.
Queueing example with leaky bucket
Full size figure and legend
Figure 7.
Petri net model of token bucket
Full size figure and legend
Figure
8.
Channel utilization as a function of
α
Full size figure and legend
Figure 9.
Petri net model for token bucket with packet length control
Full size figure and legend
Figure 10.
Priority queueing
Full size figure and legend
Figure 11.
Petri net model of a priority queueing
Full size figure and legend
Figure 12.
Channel utilization for (strict) priority queueing
Full size figure and legend
Figure 13.
Priority queueing with leaky bucket
Full size figure and legend
Figure 14.
Channel utilization for priority queueing with leaky bucket
Full size figure and legend
Figure 15.
The fraction of packets dropped as a function of traffic intensity
Full size figure and legend