StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Choose a method of implementing QoS - Research Paper Example

Cite this document
Summary
Running head: INTEGRATED SERVICES MODEL 1 Implementing Quality of Service: Integrated Services Model (Name) (University) INTEGRATED SERVICES MODEL 2 Implementing Quality of Service by Integrated Services Model Even though many usual applications and protocols are present with enterprise networks, in every network, the amounts and measurements of those traffic forms differ…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Choose a method of implementing QoS
Read Text Preview

Extract of sample "Choose a method of implementing QoS"

Download file to see previous pages

If two, three, or more traffic forms have equal value and requisites, it is needless to classify that numerous traffic types. Traffic sorting, which is the second step in implementing quality of service, will label a small number of traffic types, not hundreds. The applications that end up in various traffic types have separate requisites; thus, the network have to supply them with varied service classes (Hall, 2002). The classification of how every traffic form is serviced is called the network policy (Flannagan, 2001 & Hall, 2002).

Determining traffic forms and their requisites, the first stage of implementing quality of service, involves the following components or sub-stages: 1) completing a network audit, 2) completing a business audit and identifying the significance of every application, and; 3) identifying the proper service levels for every traffic type. The second stage of implementing quality of service is categorizing traffic based on the requisites determined. The meaning of traffic types does not have to be universal; it must contain the traffic (application) forms that were detected during the network audit stage.

You can categorize tens or even hundreds of traffic variants into a small number of types. The classified traffic types should be in accordance with business goals. The traffic or application forms in the same type should have similar INTEGRATED SERVICES MODEL 3 requisites and business requisites. The exceptions to this policy are the scavenger-type traffic or applications that have not been determined. Classifying policies for every traffic type is the third stage of implementing quality of service.

Following the traffic types have been produced based on the network audit and business goals, the final stage of implementing quality of service in an enterprise is to supply a network-wide classification for the quality of service service-level that will be allocated to every traffic type. This is called determining a quality of service policy, and it may consist of having to finish the following: 1) establishing the highest bandwidth limit for each type, 2) establishing the lowest bandwidth guarantee for each type, 3) allocating a relative priority level to a type, 4) using congestion avoidance, congestion management, and several other highly developed quality of service technologies to a type (Fgee, Philips, Robertson, & Sivakumar, 2003).

In the mid 1990s, IntServ or the Integrated Services model was developed and was the initial serious effort to supply eng-to-end quality of service (Fgee et. al., 2003). It was necessary for simultaneous applications. Integrated Services is based on clear caching/administering and signaling network resources for the applications that warrant it. Integrated Services is usually referred to as hard quality of service, since hard quality of service ensures attributes such as packet loss, delay, and bandwidth, thus supplying a forseeable service level (Hall, 2002).

Integrated Services uses RSVP or Resource Reservation Protocol as the signaling protocol (Fgee et. al., 2003). Any application having a particular bandwidth requisite have to wait for RSVP to run along the course --- source to destination --- step by step, and request bandwidth reservation for the application path. An application can start to operate after a successful effort INTEGRATED SERVIC

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Choose a method of implementing QoS Research Paper”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1405601-choose-a-method-of-implementing-qos
(Choose a Method of Implementing QoS Research Paper)
https://studentshare.org/family-consumer-science/1405601-choose-a-method-of-implementing-qos.
“Choose a Method of Implementing QoS Research Paper”, n.d. https://studentshare.org/family-consumer-science/1405601-choose-a-method-of-implementing-qos.
  • Cited: 0 times

CHECK THESE SAMPLES OF Choose a method of implementing QoS

People tend to eat fast food more than healty food

186/1476-072X-10-37 method Research methods proposed should be both quantitative and qualitative.... Since the 1970's, the number of obese Americans has doubled.... It has been suggested by some studies that the exponential growth rate of Americans who are obese has stabilized; despite this, obesity is still one of the major health concerns within the United States … While this problem may have leveled out for the time being, it has in no way dissipated, and dietary choices and conscious meal selections are more important than ever....
6 Pages (1500 words) Research Paper

Intrusion Detection and Prevention Systems

This report "Intrusion Detection and Prevention Systems" presents the various functions of Switches, routers, firewalls, and IDPs and would look over the security risks that are associated with these components.... The paper would also state the methods to mitigate the effects of the threats.... hellip; The results of the research have proven a few things....
8 Pages (2000 words) Report

Personal and Professional Development in Nursing

hellip; Professional nurses must understand the method by which the governing body adopts rules and regulations in their state of licensure so that they can be active participants in the development of such regulations.... Introduction: Nursing is a profession with responsibility....
4 Pages (1000 words) Essay

Implementing a Kiosk at POS

A company needs to adopt an organized approach for implementing a kiosk system at its POS sites.... The main theme behind introducing the concept of Kiosk technology was to initiate the theme of 'self service'; in an attractive, well organized way that could spur the sales and customer satisfaction ratio. Kiosk point-of-sale systems provide 24 x 7 availability to the customers where they can make transactions in an easy, user-friendly manner (Silicon Landmark, n....
9 Pages (2250 words) Essay

Teaching Methods Implementing Digital Humanities

Technology remains a profound method that does guarantee success by way of sufficiency.... The term ‘learn' is advisedly applied as it is beneficial to the student while developing the entire learning process.... This… Generally, for the disciplines of arts and humanities, there is minimal evidence for technology in saving academic staff hours in terms of teaching as well as preparation time applied in learning and teaching....
9 Pages (2250 words) Assignment

POS System Providers in the Region which are that of Micros, Aloha and Aldelo

Since the significance of implementing a comprehensive POS system has been recognized and acknowledged across the restaurant and hospitality industry, the execution of this framework cannot be ignored by the organization if it intends to establish itself as a competitive force within the industry....
8 Pages (2000 words) Research Paper

Voice Over Internet Protocol

… The paper "Voice Over Internet Protocol " is a great example of a term paper on logic and programming.... Voice Over Internet Protocol (VoIP) has for some time now grown to be a very popular mode of phone communication and has started to outpace the traditional means like the public switched telephone networks due to the flexibility and the low-cost nature of VOIP....
81 Pages (20250 words) Term Paper

Analysis of Voice over Internet Protocol - Security Issues and Solutions

Keywords-VoIP; IP; qos; DoS; P2P, firewallsVoice over Internet Protocol (VoIP) is a well-known buzzword nowadays.... … The paper “Analysis of Voice over Internet Protocol  - Security Issues and Solutions” is a  spectacular variant of term paper on information technology....
19 Pages (4750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us