Unformatted text preview: same time. (b) Discuss the effect of RED on network throughput. (c) Discuss the implementation complexity of the RED algorithm. (d) Discuss what would happen if instantaneous queue length were used instead of average queue length. 59. Explain the difference between the leaky bucket traffic shaper and the token bucket traffic shaper....
View Full Document
- Three '09
- Transmission Control Protocol, Token bucket, Traffic shaping, Bucket Traffic Shaper