- bursty traffic
- (Daten-)strom mit stark unterschiedlichen, teilweise sehr intensivem Datenaufkommen
Acronyms. 2013.
Acronyms. 2013.
bursty traffic — (Daten )strom mit stark unterschiedlichen, teilweise sehr intensivem Datenaufkommen … Acronyms von A bis Z
bursty — adjective Occurring in abrupt bursts, especially of information The router needs to handle bursty traffic … Wiktionary
Traffic generation — Traffic is a flow of data in a communication channel. For example, web traffic is the data that is sent or received by a user s web browser. During the development of telecommunication systems it is very important to precisely simulate various… … Wikipedia
Traffic contract — If a service (or application) wishes to use a broadband network (an ATM network in particular) to transport a particular kind of traffic, it must first inform the network about what kind of traffic is to be transported, and the performance… … Wikipedia
Traffic generation model — A traffic generation model is a stochastic model of the traffic flows or data sources in a communication network, for example a cellular network or a computer network. A packet generation model is a traffic generation model of the packet flows or … Wikipedia
Long-tail traffic — This article covers a range of tools from different disciplines that may be used in the important science of determining the probability of rare events. The terms long range dependent , self similar and heavy tailed are very close in meaning.… … Wikipedia
Cellular traffic — This article discusses the mobile cellular network aspect of teletraffic measurements. Mobile radio networks have traffic issues that do not arise in connection with the fixed line PSTN. Important aspects of cellular traffic include: quality of… … Wikipedia
Asynchronous Transfer Mode — In electronic digital data transmission systems, the network protocol Asynchronous Transfer Mode (ATM) encodes data traffic into small fixed sized cells. The standards for ATM were first developed in the mid 1980s. The goal was to design a single … Wikipedia
Leaky bucket — Although the leaky bucket algorithm has several uses, it is best understood in the context of network traffic shaping or rate limiting. Typically, the algorithm is used to control the rate at which data is injected into a network, smoothing out… … Wikipedia
Code division multiple access — This article is about a channel access method. For the mobile phone technology referred to as CDMA, see IS 95 and CDMA2000. Multiplex techniques Circuit mode (constant bandwidth) TDM · FDM … Wikipedia