Matches in DBpedia 2014 for { <http://dbpedia.org/resource/Leaky_bucket> ?p ?o. }
Showing items 1 to 36 of
36
with 100 items per page.
- Leaky_bucket abstract "The leaky bucket algorithm is an algorithm used in packet switched computer networks and telecommunications networks. It can be used to check that data transmissions, in the form of packets, conform to defined limits on bandwidth and burstiness (a measure of the unevenness or variations in the traffic flow). It can also be used as a scheduling algorithm to determine the timing of transmissions that will comply with the limits set for the bandwidth and burstiness: see network scheduler. The leaky bucket algorithm is also used in leaky bucket counters, e.g. to detect when the average or peak rate of random or stochastic events or stochastic processes exceed defined limits.A version of the leaky bucket, the Generic Cell Rate Algorithm, is recommended for Asynchronous Transfer Mode (ATM) networks in Usage/Network Parameter Control at User–Network Interfaces or Inter-Network Interfaces or Network-Network Interfaces to protect a network from excessive traffic levels on connections routed through it. The Generic Cell Rate Algorithm, or an equivalent, may also be used to shape transmissions by a Network Interface Card onto an ATM network (i.e. on the user side of the User-Network Interface), e.g. to levels below the levels set for Usage/Network Parameter Control in the network to prevent it taking action to further limit that connection.".
- Leaky_bucket thumbnail Leaky_bucket_analogy.JPG?width=300.
- Leaky_bucket wikiPageID "1056496".
- Leaky_bucket wikiPageRevisionID "602537957".
- Leaky_bucket group "note".
- Leaky_bucket hasPhotoCollection Leaky_bucket.
- Leaky_bucket subject Category:Networking_algorithms.
- Leaky_bucket type Abstraction100002137.
- Leaky_bucket type Act100030358.
- Leaky_bucket type Activity100407535.
- Leaky_bucket type Algorithm105847438.
- Leaky_bucket type Event100029378.
- Leaky_bucket type NetworkingAlgorithms.
- Leaky_bucket type Procedure101023820.
- Leaky_bucket type PsychologicalFeature100023100.
- Leaky_bucket type Rule105846932.
- Leaky_bucket type YagoPermanentlyLocatedEntity.
- Leaky_bucket comment "The leaky bucket algorithm is an algorithm used in packet switched computer networks and telecommunications networks. It can be used to check that data transmissions, in the form of packets, conform to defined limits on bandwidth and burstiness (a measure of the unevenness or variations in the traffic flow). It can also be used as a scheduling algorithm to determine the timing of transmissions that will comply with the limits set for the bandwidth and burstiness: see network scheduler.".
- Leaky_bucket label "Leaky Bucket".
- Leaky_bucket label "Leaky Bucket".
- Leaky_bucket label "Leaky bucket".
- Leaky_bucket label "Leaky-Bucket-Algorithmus".
- Leaky_bucket label "Seau percé".
- Leaky_bucket label "リーキーバケット".
- Leaky_bucket sameAs Leaky-Bucket-Algorithmus.
- Leaky_bucket sameAs Seau_percé.
- Leaky_bucket sameAs リーキーバケット.
- Leaky_bucket sameAs Leaky_Bucket.
- Leaky_bucket sameAs Leaky_Bucket.
- Leaky_bucket sameAs m.0425t7.
- Leaky_bucket sameAs Q1378386.
- Leaky_bucket sameAs Q1378386.
- Leaky_bucket sameAs Leaky_bucket.
- Leaky_bucket wasDerivedFrom Leaky_bucket?oldid=602537957.
- Leaky_bucket depiction Leaky_bucket_analogy.JPG.
- Leaky_bucket isPrimaryTopicOf Leaky_bucket.