Explain about traffic shaping, Computer Networking

Assignment Help:

Q. Explain about Traffic shaping ?

Traffic shaping

-Method to control the amount and the rate of the traffic sent to the network.?

Leaky bucket

398_Explain about Traffic shaping.png

Token bucket - to speed up transmission when large bursts arrive

- future credits accumulated in the form of tokens

662_Explain about Traffic shaping1.png


Related Discussions:- Explain about traffic shaping

What is session layer in osi model, Q. What is Session Layer in osi model? ...

Q. What is Session Layer in osi model? Session Layer : Allows two applications to establish, utilize and disconnect a connection  between them known as a session. Gives for na

Line layer - sonet sdh , Line Layer The line layer provides the synchr...

Line Layer The line layer provides the synchronization multiplexer, multiplexing and automatic  protection switching for the layer . primary  concerned with the  reliable trans

Flash-nvram-system buffer-interface buffer, Flash It is also permanent...

Flash It is also permanent storage device. It stores the compressed form of Cisco IOS software image and the NVRAM data. Device structure One flash socket Support 80

What is passive topology , When the computers on the network basically list...

When the computers on the network basically listen and receive the signal, they are referred to as passive due to they don't amplify the signal in any way.

Explain the network allocation vector, Network Allocation Vector Timer ...

Network Allocation Vector Timer which shows how much time must pass before a station is allowed to check the channel

Ajax, Ajax is a relatively new set of techniques that, in a sense, implemen...

Ajax is a relatively new set of techniques that, in a sense, implement some of the functionalities originally provided by RPC. Ajax is primarily used to build web applications with

What are the two functions of the data link mac layer, a) Manages protocol ...

a) Manages protocol access to the physical network medium b) Permits multiple devices to uniquely signify one another on the data link layer

How xor operations can implement key stream attacks, Question: a) In a...

Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla

Define the microcells- routing and switching, Microcells As cells becom...

Microcells As cells become smaller, antennas move from the tops of tall buildings or hills, to the tops of small buildings or the sides of large buildings, and finally to lamp

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd