1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
11

Explain the purpose of QoS on a TCP/IP network. Define the basic purpose of IP prece- dence, Type of Service, Diffserv, and Expl

icit Congestion Notification functionality. Give examples of how you might use QoS characteristics on your network.
Computers and Technology
1 answer:
Alja [10]3 years ago
7 0

Answer:

Explanation:

1.The purpose of Quality of Service (QoS) is to scrutinize and control the data traffic on a network (LAN or WAN). It is an IP concept and uses tools that have existed since the early days of IP plus newer tools and protocols that are designed to aid the provision of defined predictable data transfer characteristics.

2.It defined a mechanism for assigning a priority to each IP packet as well as a mechanism to request specific treatment such as high throughput, high reliability or low latency. In practice, only the IP Precedence part of the field was ever used.IP Precedence. When the IP Precedence type of service is enabled and a device or application upstream of the switch sets the precedence bits in the ToS byte of IPv4 packet headers, the switch uses these precedence bits to determine the outbound port queue to which the packet is sent.

3.Differentiated services. ... Differentiated services or DiffServ is a computer networking architecture that specifies a simple and scalable mechanism for classifying and managing network traffic and providing quality of service (QoS) on modern IP networks.

4.The DiffServ framework is more scalable than IntServ because it handles flow aggregates and minimizes signaling, thus avoiding the complexity of per-flow soft states at each node.

5. DiffServ can, for example, be used to provide low-latency to critical network traffic such as voice or streaming media while providing simple best-effort service to non-critical services such as web traffic or file transfers.

DiffServ uses a 6-bit differentiated services code point (DSCP) in the 8-bit differentiated services field (DS field) in the IP header for packet classification purposes. The DS field replaces the outdated IPv4 TOS field.[1]

You might be interested in
Let PALINDROME_DFA= | M is a DFA, and for all s ∈ L(M), s is a palindrome}. Show that PALINDROME_DFA ∈ P by providing an algorit
denis-greek [22]

Answer:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.

Explanation:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.

8 0
3 years ago
g Suppose the vertex data is stored in an array named verts and each vertex uses a list to store the coordinates. Write the code
kodGreya [7K]

Answer:

function createAndFillBufferObject(gl, data) {

 var buffer_id;

 // Create a buffer object

 buffer_id = gl.createBuffer();

 if (!buffer_id) {

   out.displayError('Failed to create the buffer object for ' + model_name);

   return null;

 }

 // Make the buffer object the active buffer.

 gl.bindBuffer(gl.ARRAY_BUFFER, buffer_id);

 // Upload the data for this buffer object to the GPU.

 gl.bufferData(gl.ARRAY_BUFFER, data, gl.STATIC_DRAW);

 return buffer_id;

}

3 0
3 years ago
What is the output of the following code segment?
Aliun [14]

Answer:

o

Explanation:

8 0
2 years ago
To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
ioda

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

5 0
3 years ago
Read 2 more answers
Generally, what is the term for storage locations in a processor?
oksano4ka [1.4K]

Answer: Registers

Explanation:

Registers are small storage locations identified by different types of registers. The function of the register is to provide data for immediate processing to the CPU. These registers hold data temporarily and provide easy access of data to the processor.

6 0
3 years ago
Other questions:
  • What are the five types of alignment in word?
    8·2 answers
  • Which type of network cover a large geographical area and usually consists of several smaller networks, which might use differen
    5·1 answer
  • What are the benefits of organizing your thoughts before you begin your speech
    14·1 answer
  • Access Control can be defined as putting controls (or countermeasures) in place to help achieve information security goals. Whic
    13·2 answers
  • How can rows be added to a table? Check all that apply.
    15·2 answers
  • Which behavior of the application should the user expect? A user profile has login hour restrictions set to Monday through Frida
    12·1 answer
  • Which of the selections below represents a recursive query?
    12·1 answer
  • 1) which of the following is not a characteristic of valuable information?
    8·1 answer
  • Can someone be my friend,don't friend me until i ask you Questions
    14·1 answer
  • In 1972, earlier designers built the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!