Enumerate about the traffic policing, Computer Networking

Assignment Help:

Enumerate about the Traffic policing

Traffic policing happens when a flow of data is regulated so that cells (or frames or packets) that exceed a performance level are discarded or tagged. It might be desirable to supplement a traffic-policing policy with a traffic-shaping policy. Traffic shaping is used to smooth out a traffic flow and decrease cell clumping. This can result in a fairer allocation of resources and a decreased average delay time.

 


Related Discussions:- Enumerate about the traffic policing

Standard ip access-list use as test criteria, What does a Standard IP Acces...

What does a Standard IP Access-list use as test criteria Ans) Standard IP access list use only source address.

What is redirector, What is redirector? Redirector is software that int...

What is redirector? Redirector is software that intercepts file or prints I/O requests and changes them into network requests. This comes under presentation layer.

SAN, Case study on SAN Providers and Products available in the market.

Case study on SAN Providers and Products available in the market.

Network layer of the osi responsible for, What is the Network Layer of the ...

What is the Network Layer of the OSI responsible for? Ans) The Network Layer routes data from single node to another sends data from the source network to the destination networ

Electronic cheques, Electronic Cheques   Another mechanism for Internet p...

Electronic Cheques   Another mechanism for Internet payment is electronic cheques. With electronic cheques, the payer (either an individual consumer or a business) instructs his

What are the features of intranet, What are the features of Intranet In...

What are the features of Intranet Intranets provide access to electronic databases, documents, electronic training manuals, office circulars, internal job vacancies, etc. Any t

Explain the types of security service, Q. Explain the Types of Security Ser...

Q. Explain the Types of Security Service? Security Services fall into one of the subsequent categories - Confidentiality: Confirms that the info in a system and transm

Describe transport and tunnel mode in detail, Can you describe transport an...

Can you describe transport and tunnel mode in detail with datagram packets?

Achieving universal services, The purpose of internetworking is universal s...

The purpose of internetworking is universal service across heterogeneous networks. To give this service all computers, and routers have to agree to forward information from a sourc

Explain how a cdma system works, (a) Explain how a CDMA system works? (b...

(a) Explain how a CDMA system works? (b) Explain howWelsh-Hadamard codes are generated. Explain why orthogonality between different spreading codes is important. (c) Consider

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd