Concluding remarks
We simulated two commonly used packet data network technologies: FDDI and ATM.
Two FDDI and two ATM network scenarios were implemented.
We used simulations to compare the performance of various service categories in ATM networks.
Our major contribution is a process model for the leaky bucket policing mechanism in ATM networks.
The model named “leaky bucket” is available from the OPNET Contributed Model Depot.
We employed this leaky bucket model to analyze its performance in a source-destination network scenario.