Integrated Services
Two service models
use leaky bucket source specification - rate+depth (+packet size)
use end2end signaling and hop-by-hop enforcement
Guaranteed
Controlled Load
...
Previous slide
Next slide
Back to first slide
View graphic version