1 / 4

Group members

Group members . Aldossari Mohammed SN086245 RANJEN NAIDU SW085811 ARVEN SW085794 ANAND KUMAR SW085792

niyati
Download Presentation

Group members

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Group members • Aldossari Mohammed SN086245 • RANJEN NAIDU SW085811 • ARVEN SW085794 • ANAND KUMAR SW085792 • SADEESH KUMAR SW085813

  2. Packets Delay variation (PDV) is the difference end to end one way delay between selected packets in a flow with any lost packets being ignored. The effect is sometimes referred to as jitter, although the definition is an imprecise(inexact) fit. jitter is  a metric (a system or standard of measurement) that describes the level of disturbance of packet arrival times with respect to an "ideal“ pattern. Such disturbances can be caused by competing traffic, or by contention on processing resources in the network.

  3. E.x of packets delay variation • Jitter might be part of calculating the quality of service. This is not limited to VOIP (technology that allows telephone calls to be made over computer networks like the Internet.) but also for streaming video/audio for instance. • One of the examples that you could basically use jitter (and of course other parameters) to get an early warning of worsening service quality. If you compare the measured jitter with the current server load, it might be possible to indicate even DDOS attacks(multiple compromised systems usually infected with a Trojan are used to target a single system causing a Denial of Service (DoS) attack)or other developing problems.

  4. Packets delay diagram (jittered)

More Related