MODELING PACKET TRAFFIC USING AN INVERSE LEAKY BUCKET
First Claim
Patent Images
1. A method of modeling packet traffic in terms of Leaky Bucket parameters, the method comprising:
- testing the Leaky Bucket parameters based on conformance of packet traffic;
modifying, if a result of the testing is nonconformance of the packet traffic, one or more of the Leaky Bucket parameters such that the packet traffic is conforming; and
storing the one or more modified Leaky Bucket parameters in a computer-readable storage medium.
4 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, method, and computer program of modeling packet traffic in terms of Leaky Bucket parameters. The Leaky Bucket parameters are tested based on conformance of packet traffic. If a result of the testing is nonconformance of the packet traffic, one or more of the Leaky Bucket parameters is modified such that the packet traffic is conforming. The one or more modified Leaky Bucket parameters is stored in a computer-readable storage medium.
18 Citations
23 Claims
-
1. A method of modeling packet traffic in terms of Leaky Bucket parameters, the method comprising:
-
testing the Leaky Bucket parameters based on conformance of packet traffic; modifying, if a result of the testing is nonconformance of the packet traffic, one or more of the Leaky Bucket parameters such that the packet traffic is conforming; and storing the one or more modified Leaky Bucket parameters in a computer-readable storage medium. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus for modeling packet traffic in terms of Leaky Bucket parameters, the apparatus comprising:
-
a tester that tests the Leaky Bucket parameters based on conformance of packet traffic; a modifier that modifies, if a result of the testing is nonconformance of the packet traffic, one or more of the Leaky Bucket parameters such that the packet traffic is conforming; and a storage unit that stores the one or more modified Leaky Bucket parameters. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. Computer-executable program instructions, stored on a computer storage medium, for modeling packet traffic in terms of Leaky Bucket parameters, the program instructions comprising:
-
code to test the Leaky Bucket parameters based on conformance of packet traffic; code to modify, if a result of the testing is nonconformance of the packet traffic, one or more of the Leaky Bucket parameters such that the packet traffic is conforming; and code to store the one or more modified Leaky Bucket parameters in a computer-readable storage medium. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification