Explain leaky bucket algorithm and compare it with token bucket algorithm.


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Networking AllOther Interview Questions

What do you understand by the term ‘structured cabling’. State the main rules that should be used when installing a cable. 31. Show that maximum cabling area for LAN for horizontal cabling runs is approximately 200m.

0 Answers  


When you look at a Cisco switch like Cisco 2950, why are the ports labeled with an 'X' behind the number? Like 1x, 2x.....23x, 24x, and what does it mean when there is no 'X'?

0 Answers  


Does Ethernet 10Gbps support multiple access

0 Answers  


a node has the ip address 138.50.10.7 and 138.50.10.9. But it is transmitting data from node1 to node2 only. The reason may be a)a node cannot have more than one address b)class A should have second octet different c)classB " " " " " d)a,b,c

1 Answers  


What is Brouter? and what is the advantages and dis advantages of Brouters?

2 Answers  






in linux what is the last ver to use of bootloader lilo,after lilo not use in linux and only use upper ver grub?

0 Answers   HCL,


what is frame realy

4 Answers  


CSMA/Cd protocol used in

6 Answers   Hughes, Motorola,


Why networks are layered ? What is the advantage of that ?

2 Answers   Wipro,


which one protocol used to get ip address ?

4 Answers   KPIT,


What are the advantages and disadvantages of modem

16 Answers   Cisco, Jain Group,


If we have a firewall in our network then how to connect a VPN server through internet and therefore which port to open in the firewal?

2 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)