Figure 2. Petri net model of the leaky bucket scheme

From

Modeling Traffic Shaping and Traffic Policing in Packet-Switched Networks

Wlodek M. Zuberek, Dariusz Strzeciwilk

Journal of Computer Sciences and Applications. 2018, 6(2), 75-81 doi:10.12691/jcsa-6-2-4