Leaky Bucket Algorithm
Problem Statement Consider a host A connected to a network. Host A produces bursty traffic (explained below) in the form of variable-length packets that must be transmitted to the receiver through a network. Suppose Host A sends : This traffic nature is called bursty traffic, coming from a source into the network. Bursty traffic is ...