Education

What is Jitter Control?

jitter control

Jitter Control in Networking Definition Jitter is defined as the variation in the packet arrival times. This is usually measured as standard deviation. High jitter is uneven quality of sound or video. Jitter can be controlled by the following technique. Calculate the expected transmission time for each hop in the path, check whether a packet…

FacebookTwitterGoogle+PinterestTumblrStumbleUponShare

What is Random Early Detection (RED)?

random early detection

RED (Random Early Detection) Definition This is a congestion control technique in which the router doubts the forth coming congestion and start discarding packet right before it is too late. Routers maintain an average of their queue lengths. When the queue length exceeds that value, it starts discarding forth coming packets. When the source does…

FacebookTwitterGoogle+PinterestTumblrStumbleUponShare

What is Load Shedding?

load shedding

Load Shedding – A Simple Explanation Load Shedding is applied when none of the techniques solve the congestion in the network. The main technique is that the congested router drops incoming packets. Which packet is to be dropped depends on the type of the data being transmitted and their importance. One way is to select…

FacebookTwitterGoogle+PinterestTumblrStumbleUponShare

What is Flow Specification?

flow specification

Flow Specification and its Functionality Traffic Shaping can be made more effective by making the sender, receiver and the network to agree on one specific pattern of transmission. Such specific pattern or specific transmission is called ‘Flow Specification’. Traffic Flow specification is a data structure which describes about the services desired and the quality of…

FacebookTwitterGoogle+PinterestTumblrStumbleUponShare

What is Token Bucket Algorithm?

token bucket algorithm

Token Bucket Algorithm – How it Works? Leaky bucket algorithm gives a strict constant output rate. There will be some applications which need speed output when the input load increases. For such kind of applications, Token bucket algorithm can be used. Token bucket algorithm is similar to a leaky bucket algorithm but can release bursts…

FacebookTwitterGoogle+PinterestTumblrStumbleUponShare

What is Leaky Bucket Algorithm?

leaky bucket algorithm

Leaky Bucket Algorithm – A Brief Explanation Consider a bucket with a hole at its bottom. Whatever may be the inflow rate of water into the bucket, the outflow rate through that hole is constant. To be clearer, if the bucket has any water, the outflow rate is constant. If there is no water, outflow rate…

FacebookTwitterGoogle+PinterestTumblrStumbleUponShare

What is Traffic Shaping?

traffic shaping

Explain Briefly About Traffic Shaping If the data can be transmitted at a more uniform rate, congestion can be decreased. An open loop method which can manage the congestion by forcing the packets to be transmitted at uniform rate is called as Traffic Shaping. Traffic shaping is about regulating the average rate of data transmission.…

FacebookTwitterGoogle+PinterestTumblrStumbleUponShare

What is Mobile IP? How it Works

mobile ip

Mobile IP allows portable devices called Mobile Hosts (MHs) to roam from one area to another while maintaining the communication sessions. One requirement in mobile IP is that a legacy host communicating with a MH and the intermediate routers should not be modified. This requirement implies that a MH must continuously use its permanent IP…

FacebookTwitterGoogle+PinterestTumblrStumbleUponShare

What is a Subnet in Networking?

subnet

Explain about Subnet – The Meaning and Definition The design of classful IP addressing has lead to several problems like each host in a network must have same network number, and single class A,B, or C Address refers to one network on the whole not to a collection of LANs. It is common to have…

FacebookTwitterGoogle+PinterestTumblrStumbleUponShare

What is Proxy Server? How it Works

proxy server

Proxy Server Meaning and Definition Proxy server is a device or system that works among an application and the client, such as a server and a web browser. It receives all requests sent to the server and checks whether it can execute the requests by itself or not and then it directs the request to…

FacebookTwitterGoogle+PinterestTumblrStumbleUponShare