1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
3 years ago
8

There are four types of characteristics attributed to a flow: reliability, delay, jitter, and bandwidth. Explain how each of the

se is related to Quality of Service.
Computers and Technology
1 answer:
sergeinik [125]3 years ago
4 0

Answer and Explanation:

Reliability is important because if the service lacks  lacks reliability this could mean losing a packet or acknowledgement which then requires retransmission.

Delay can be tolerable in different degrees by applications, for example online chatting or conferences need to have the minimum delay possible.

Jitter is the variation in delay for packets belonging to the same flow.

High Jitter: difference between delays is large

Low jitter: difference between delays is small.

Bandwidth depends on the application. In video conferences, for example, there is a need to send million of bits per second to refresh a colour screen while sending a email may not reach even a million.

You might be interested in
Graphic images can be stored in a variety of formats including ____.
Marrrta [24]
Graphic images can be stored in a variety of formats including JPEG and GIF. Hope this helped!
5 0
3 years ago
g Assume that this program is run on a processor with data cache of size big enough that the entire array arr can fit in the cac
Dimas [21]

Answer:

A. 2

Explanation:

The food function in the C source code uses two for loop statements to fill and array of size 100 with 100 values ranging from 1 to 100 and the second to get the total sum to the values in the array. With this, two program paths are created.

7 0
2 years ago
Help pls put them in order for me??
Natalija [7]

Answer: i can't see the hole thing?

Explanation:

3 0
3 years ago
Read 2 more answers
Arrange the steps in the process of manually installing software.
Ahat [919]

The correct sequence is: 5,3,1,4,2

When you are installing software on your computer you need to first open the CD-ROM and then insert the installation CD into the CD-ROM. If the contents of the CD opens, click on the executable file to start the wizard, and then follow the prompts in the wizard. Finally, you often need to reboot your computer after installing a new program.

5 0
3 years ago
When you ask the database more complex questions using comparison operators, you are conducting a _____. sort questionnaire quer
Mice21 [21]
The correct answer is known as a "query".

When you ask a lot of complex questions , which uses comparison operators, that is called a query. A query refers to the <span>exact request for </span>data retrieval<span> with the use of database and information systems. </span>
8 0
3 years ago
Other questions:
  • On what dates did the 2016 Olympics take place( list all)
    9·2 answers
  • Write an expression to print each price in stock_prices. sample output for the given program: $ 34.62 $ 76.30 $ 85.05
    6·1 answer
  • Which task might be suitable for moving into a separate function so you can re-use it from multiple places in your code?
    11·1 answer
  • Write a Java application that uses the Math class to determine the answers for each of the following: a. The square root of 37 b
    10·1 answer
  • Next, Leah wants to add a content slide that allows her to insert a table.
    8·2 answers
  • A program is run line by line to determine the source of a logic error. Which best describes the specific tool being used?
    11·2 answers
  • All of the following are helpful test taking strategies EXCEPT_______________.
    5·2 answers
  • Un producto tecnológico puede ser tangible o intangible?
    6·1 answer
  • (Java) Write a program that accepts a number of minutes and converts it both to hours and days. For example, 6000 minutes is 100
    10·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!