Nobody downloaded yet

Optimising Network Services - Essay Example

Comments (0) Cite this document
Network services have been broadly classified into data and real-time services, where the first are sensitive to packet loss and the second are sensitive to delay and delay variation (jitter). Packet loss is an occasional must in any data network and is handled by application layer retransmissions as necessary…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Optimising Network Services
Read TextPreview

Extract of sample
"Optimising Network Services"

Download file to see previous pages Depending on scale and services involved, there is a choice between ignoring QoS and just over dimensioning resources and implementing QoS at one or more layers, using one of two architectures, through protocols of different robustness and complexity.
Second, layer 3 QoS may be considered for two classes of IP networks: 1) IP WANs, where virtual channels between sites are realized using Frame Relay or ATM; and 2) IP VPNs, where Multi-Protocol Label Switching (MPLS), also known as layer 3 switching, is used for defining layer 3 flows though coloring corresponding IP packets
Resource ReSerVation Protocol (RSVP) is the end-to-end signaling protocol used in the Intserv architecture, which requires guaranteed per-flow QoS over the IP network. RSVP incurs a scalability issue since the amount of state information that needs to be tracked about individual flows would become intractable as the number of flows increase in a realistic scenario.
In an RSVP implementation, receiving nodes send bandwidth reservation messages to each router en-route back to the service source. This technique allows RSVP-enabled routers to take note of receiving nodes reserving resources for the same flows, inferring a multicast service and aggregating traffic for bandwidth efficiency (Oram 2002). The reservation components consist of a traffic receiver (RSVP sender), an RSVP receiver, and a number of RSVP-enabled routers. An RSVP-enabled router is equipped with two local decision modules:
1. Admission control, which determines the sufficiency of required resources to support the reservation; and
2. Policy control, which determines whether the user had administrative permission to make that reservation.
Call admission control (CAC) determines the admissibility of real-time traffic to the network when there are not sufficient resources to accommodate such traffic, which cannot be simply dropped as could data traffic. A voice/video call that is being attempted when there are not enough bandwidth and delay guarantees would need to be attempted at a later time or possibly re-routed through PSTN or ISDN. Extensions are defined for policy control as well.
If the reservation passes the two fore-mentioned controls, RSVP sets packet classification and packet scheduling parameters to achieve the desired QoS. RSVP runs directly over IP, with two main message types to note: PATH and RESV, which respectively describe flow parameters and corresponding needed resource guarantees (Vegesna ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Optimising Network Services Essay Example | Topics and Well Written Essays - 1750 words”, n.d.)
Retrieved from
(Optimising Network Services Essay Example | Topics and Well Written Essays - 1750 Words)
“Optimising Network Services Essay Example | Topics and Well Written Essays - 1750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Optimising health and well-being in diabetes
...?Optimising Health and Well-being in Diabetes Health Improvement Plan Frame of reference The purpose of this is to establish a context for diabetes, assessing its specific causes, impact, including its prevalence within certain affected individuals. Its purpose is to also establish the different interventions and remedies which can be promoted and planned for a specific population of affected individuals. Ultimately, the goal of this submission is to conceptualize a plan of action for diabetes, focusing on specific details related to its efficient management. Diabetes mellitus is a metabolic disease wherein the patient affected would have high blood sugar. The cause for such high blood sugar is to either the pancreas not producing... . Decide...
21 Pages(5250 words)Essay
Network Security
...are inventing one after another. Internet has become a powerful and interactive delivery service providing extensive activities and web services. Organisations expand their resources with the help of Internet. Websites are created, for informational purposes, advertisement, online shopping etc. In the modernized countries, Internet is utilized for business: Education purposes Online shopping (Comet, EBay, etc) Blogs (Bloggers, Word Press, etc) Social-Networking (Facebook, Myspace, etc) Information (Advertising) Even today, where every technology interrelated to Information technology involves the ‘.com’ phenomenon; Internet is relatively an evolving field, which is constantly changing....
24 Pages(6000 words)Essay
Social network
...?Dangers in Social Networking Sites Social networking sites paved way in connecting individual with one another via the internet, making the collective connections a virtual community – thus the term “social network” indeed. The interesting nature of the social networking site is that it is able to provide the users the freedom to express themselves and this makes social network sites very addicting. Facebook, My Space, Friendster, Twitter are among of the popular social networking sites to date, with Facebook as the most famous with the list and followed by Twitter – also known as micro-blogging site. A report stated that there are some...
3 Pages(750 words)Research Paper
Link Layer Protocol Services to the Network Layer
...?Homework Assignment al Affiliation Link layer protocol services to the network layer In the OSI model (layered architecture) the protocol in one layer provides services to the protocol in the next layer while receiving services from the protocol in the lower layer of the architecture. The data link layer (layer 2) majorly deals with the transformation of the logical communication channel provided by the physical layer (layer 1) into a more reliable mode of communication by splitting the data into frames allowing error and flow control. (Keith 2008) The services offered by the link layer to the network layer are usually hidden from the...
3 Pages(750 words)Assignment
Network Technology and Network Administration
...--------------------------- --------------------------- --------------------------- --------------------------- Network Technology and Network Administration Introduction Computers and the Internet are a wonderful addition to our lives. In today's computer world almost every person is connected to computer and internet in a way or other. A person spends a large portion of his life, interacting and collaborating with people all over the world, through the use of and Internet. But that does not mean that every user know every thing about computer and internet. It can be generalized that about 80% of the knowledge is concentrated in about 20% of the people, while the other 80% of the people possess only...
5 Pages(1250 words)Essay
...ETHERNET/ 802.3 Table of Contents Introduction 2.Basic Design Issues of an Ethernet network 1 Using Hubs/Repeaters 1.2. Hubs/Repeaters Limitations 1 1.3. Using Bridges/Switches 3 1.4. Basic Bridges/Switches Operations 4 1.5. Using Routers 6 3. References 7 Technick n.d. Ethernet Tutorial Part I: Networking Basics, viewed 23 May 2011, 7 List of Figures Figure 1 Repeater and Hub with different topologies 2 Figure 2 Basic Switch Setup 3 Figure 3 Loop Removal Through STP 6 Figure 4 Typical Router Configuration 7 List of Tables Table 1 Node Limitation in Hubs 5 Till present, Ethernet maintains its position of being the most...
4 Pages(1000 words)Essay
Taha Computer Network Security Services
...Taha Computer Network Security Services Executive Summary This is a business plan for a computer network security company known as Taha. The plan gives a description of the business, the services offered, the company’s competitive advantage, mission, business goals, management, marketing plan, and financial plan. Business Description Taha Computer security services business is a new organization that will offer computer security services to its clients since the world is in the midst of a global technological revolution, which will bring change in all proportions of the world. This business is scheduled to start its operations very...
3 Pages(750 words)Essay
Problems with Social Network Services
...of abuse, sexually inappropriate or explicit posts, and cyberbullying. However, if no one uses the option then Facebook remains ignorant to what is being posted or said ( Social media needs to take some responsibility for the way it service is used. When it is used to cause harm, embarrassment, and harassment then there should be stronger repercussions, dependent of the nature of the offense, that can tangibly discourage and deter the users from even considering bullying. Social media should take an administrative stand and develop ways to safely and respectfully monitor and patrol for cyberbullying that may be occurring. Additionally, it would be incredibly beneficial for the government to establish...
7 Pages(1750 words)Research Paper
...Network International Company profile Network international is an independent card solution involved in payment services and providing solutions in the Gulf and Middle East region. It has pledged to fulfill the needs of institutions dealing with finance, corporate business and retailers (Network International). Network international gives a variety of services such as credit and debit card payment. According to Jim Randel, credit cards are used to borrow money from banks, which is a loan without collateral. A debit card is used to access a customer’s own money, which is backed by his or her own account. Outsourcing is important to keep up...
2 Pages(500 words)Essay
Optimising Exercise Technique
...OPTIMISING EXERCISE TECHNIQUE (SQUATS) By Optimising Exercise Technique (Squats) Introduction Squat is a common mode of exercise that is practiced by entirely all athletes since it is a comprehensive full body exercise. Squatting is achieved by an individual bending the knees and hips with a weight on their upper back. The knees will move slowly in a downward motion until they come lower than the knees in a position known as breaking the parallel. In this position, the hips will be lower than the knees thus achieving the squat. Squats are ideal since they involve all body muscles entirely in doing the exercise (Komi, 2010). Some of the advantages of squats as a mode of exercise are as follows. Squats...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Optimising Network Services for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us