Talk:Token bucket

Latest comment: 8 years ago by Smalljim in topic Merged in content

Unnamed section

edit

HTB link at the bottom seem to point to same article...

212.143.17.66

The Hierarchical Token Bucket section of this page really does not belong here. This page discusses the Token Bucket algorithm, not some specific operating system's implementation of it. —Preceding unsigned comment added by 65.57.245.11 (talk) 00:41, 18 September 2008 (UTC)Reply

I concur, this section needs to be removed to a separate cross referenced entry. Graham Fountain 14:27, 19 October 2010 (UTC) —Preceding unsigned comment added by Graham.Fountain (talkcontribs)
I agree too. HTB as a qdisc implementation should be moved to another more relevant article. Also, the article is lacking information with regards to the burstiness equation presented. There is no clear indication on what symbols b,M and r are. --Ltsampros (talk) 09:20, 23 December 2010 (UTC)Reply

Comparison with the Leaky Bucket Algorithm

edit

The section titled Traffic shaping algorithms (leaky bucket versus token bucket) needs to be addressed. Its discussion of the leaky bucket algorithm makes it clear that it refers only to the leaky bucket as a queue rather than the more general leaky bucket as a meter. This, presumably, follows Tanenbaum's description of the leaky bucket as a queue in Computer Networks, which is given therein as though this queue form were the only one there is. However, comparison of Tanenbaum's peculiar description with Turner's original (which is quoted in the section leaky bucket#The Leaky Bucket Algorithm as a Meter) shows that they are quite dissimilar and that, by Turner's description, burstiness in the output is not necessarily eliminated unless Turner's threshold is set to the increment for one packet (the bucket depth is set to one packets worth of water/fluid). Any greater thershold or deeper bucket can then result in a busty output.

In fact, as the page on the leaky bucket attests, the token bucket and leaky bucket as a meter are actually mirror images of one another and thus exactly equivalent: the token bucket adds tokens at a fixed rate and takes them out for each conforming packet, frame, or cell (Layer 2 PDU = frame); the leaky bucket loses fluid/water at a fixed rate and adds it in for each conforming packet. So, as is asked on that page, is an implementation that removes tokens regularly and adds tokens for a conforming packet an implementation of the leaky bucket or of the token bucket? In fact it is both, as they are equivalent and, given the same parameters, will see exactly the same packets as conforming and nonconforming.

Also this entry clearly confuses the token bucket with one of its applications, namely traffic shaping. Whereas, as a method for testing the conformance of a packet to a rate and jitter (bandwidth and burstiness), it is applicable to both traffic shaping and traffic policing, and probably to event counting, etc. As a result, the section High level view needs to be re-written in consideration of all possible uses, e.g. in the context of a conformance test.

Graham Fountain 16:22, 19 October 2010 (UTC) —Preceding unsigned comment added by Graham.Fountain (talkcontribs)

Merged in content

edit

I've merged in the content from incorrectly-named article Ngbit. It was moved by a new editor from their talk page without renaming, possibly because Hierarchical token bucket already exists as a redirect here. There were several references, the value of which I'm not qualified to assess, so I'm listing them here:

 —SMALLJIM  23:46, 2 March 2016 (UTC)Reply

need korean translation

edit

need korean translation

- evanhwang, 2021