Preview

Nt1330 Unit 5 Algorithm

Good Essays
Open Document
Open Document
454 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 5 Algorithm
3.1 Basic Concept
The need for computers of networks with guaranteed quality of service is widely recognized today. Unlike todays best effort networks like the Internet, where the user has no guarantee on the performing it may expect from the network, Quality of service networks guarantee the end user application a certain level of performance. Jitter measures the fluctuating of delay of packets in the given stream for packets, which is an important property for much application. Ideally, packets should be delivered in a completely periodic fashion; however, even if the source establish an evenly spaced stream, unavoidable jitter is displayed by the network due to the different queuing and propagation delays, and packets reach the destination with a wide range of inter-arrival times[36]. We need to achievement the QoS with the best performance thus the suggestion to combine two algorithms, the first algorithm simple switching spanning tree, and second algorithm multipath and must be using the Queue to set in switching. The first method design to learning the all switches about the location of the host in switch and then avoid any loop by using some codes, and second method design to send the packets to all path to decrease the
…show more content…
Also, applying the original function that is preventing the loop, it is used as a means to secure redundancy of network to automatically switch the path in case of a network failure. There is various kind of spanning tree, including STP, RSTP, PVST, and MSTP. In this section, we will take a look at an implementation of the most basic of STP. Spanning Tree Protocol (STP: IEEE 802.1D) handles a network as a logical tree and by setting all ports for each switch (sometimes called a bridge in this section) to transfer frame or not it suppresses occurrence of broadcast streams packets in a network having a loop structure, figure

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8.1 Summary

    • 346 Words
    • 2 Pages

    The final device is an Arduino-based ball sorter that uses a two-stage approach to sorting the balls. The device starts by isolating a single ball and measuring its weight. Afterwards, the device categorizes the ball based on the measured weight and deposits it in the appropriate receptacle.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 4

    • 775 Words
    • 4 Pages

    Part III PHYSICS HSE II Time:2Hours Max:60 Scores 1. Three identical charges each +q are placed at the corners of an equilateral triangle of side d cm. Calculate the force on a +ive charge +2q at the centroid of the triangle. 2 2.If the earth is supposed to be a metallic sphere,its capacity will be nearly (a) 700pf (b) 700 microfarad (c) 700f (d) 6.4 X10^6 f 1score 3. write the relation between dielectric constant and electric susceptibility. 1score 4. A box encloses an electric dipole consisting of charge 5micro C and -5micro C and of length 10cm. What is the total electric flux through the box? 2scores 5. Find the ratio of the p.d that must be applied across the (1)parallel (2) series combination of two identical capacitors so that the energy stored in the two cases becomes the same. 2 scores 6.(a)…

    • 775 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    We present the ALTP(Avoid loops with test packet) scheme to avoid that loops and packet drops in the whole network of SDN. We used the Test packets to check the status of the links between the two domains by using STP. It will select the optimal link among two domains before sending the data from Source to destination. We will discuss below that at which condition the test packet working is useful.…

    • 694 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Summary

    • 734 Words
    • 3 Pages

    Although Zigbee implements a wide assortment of security measures, there are still a variety of vulnerabilities and attack methods that can be used. These attacks and how they can be carried out will be described in this Section.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 5

    • 368 Words
    • 2 Pages

    the ratio of resistors on one side of the bridge is one while the ratio of resistors on the other side is infinity…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 3

    • 472 Words
    • 2 Pages

    Fill in the blanks in the following table. Then use the table to answer the questions:…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This paper will discuss the three types of network topologies discussed in Chapter 3. They are, hierarchical star, bus, and ring network topologies. Each has its advantages and disadvantages as will be discussed…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This mesh type application of switches provides multiple paths for network traffic to flow. What this means is that if one link in the traffic flow or a switch goes down, traffic can continue to flow using an alternate path. This type of mesh interlinked switches uses Spanning Tree Protocol (STP) to detect and prevent loops. A loop occurs when there are multiple active paths to the same switch and this causes the system to crash.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 659 Words
    • 3 Pages

    Program description: I calculated the usable area in square feet of a house. Assume that the house has a maximum of four rooms, and that each room is rectangular. I wrote pseudo code statements to declare 4 Integers and labeled them homesqft, room1, room2, room3, and room4. Each room will have its length and width to calculate its area.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 9

    • 386 Words
    • 2 Pages

    Which part of the sine-wave expression cannot be varied in accordance with the low-frequency intelligence to create a modulated signal?…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given $U$ as the set all the devices located at the edge of the network with physical proximity of the device that wants to request computational resources $D$. Therefore, the PAR problem can be modeled as a graph $G$, where the vertexes of this graph are elements of the set U, and the edges of G are the communication link between them. In our approach, the vertexes are classified according to into the following types:…

    • 232 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    For this you need to edit the /etc /network/interfaces file and you need to add the…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 3

    • 606 Words
    • 3 Pages

    What is the primary information system in this area? How is it effective in performing its role? With what systems does it interrelate in receiving data or sending data?…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    2) Which view needs to be queried to find out how many database objects a user has created?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3

    • 2062 Words
    • 9 Pages

    This depends on whether they have a wireless router or wired, if they have a wireless router then some internet ready televisions have wireless ability. Either way would work though running an Ethernet cable from the router into the back of the television would give the internet connect that is needed. Looking at the VoIP (Voice over IP) I would suggest Vonage as the service carrier for phone. The phone adapter and software needed for the VoIP is normally included with the purchase of Vonage phone service. The question is rather vague so not sure what other devices they would want to share between the computers that are networked in this scenario.…

    • 2062 Words
    • 9 Pages
    Good Essays