Author : Neha Jain 1
Date of Publication :27th January 2018
Abstract: Leaky Bucket algorithm is used in packet-switched networks for traffic shaping of data transmissions. In this paper, we gather the profiling data of software implementation of the algorithm. Memory consumption of software algorithm is very high. Also, the software implementation is not optimized. To implement the code we use hardware description language like VHDL. Hardware implementation of the algorithm is taking only 197520 kilobytes of memory. Only 2138 Slice registers are used out of 12490. Only 4129 Slice LUTs are used out of 12490. Only 25 bonded IOBs are used out of 172. Thus the devise utilization is 17%, 33%, 14% respectively.
Reference :