internet and its challenges [II]

Increasing bandwidth:
Adding more capacity this line of reasoning implies that overcapacity is the only effective congestion control mechanism. This philosophy not only wastes money but has limited effectiveness in bursty, high speed environments. Also, it is well known that carriers make more money and users save more money when network resources are effectively used. This may be effective when the numbers of users is not expected to exceed a certain value.

Prioritizing of activity:
Also, for each job, users choose a subpriority level (e.g.) in an organization.
Users are given priority number, with the highest going first. For users with
the same priority number, higher subpriority levels go first. The priority numbers are
determined by the value of contributions to an organization’s priority, divided by the
bandwidth of the organization’s line to the network. Anyone in the world may make a
contribution to an organization’s priority, including the administration of the organization,
the individuals within the organization, and even users outside the organization. An
outside user might wish, for instance, to make a contribution to a public archive if he wants
to increase the priority of files he will download from that archive.

Upgrading of hardware:
Delays are caused not by software but by the hardware and by a lack of CPU processing power or are due to the inadequate amount of bandwidth rented by ISPs, thus causing bottlenecks. Hardware plays an important role when users need to process information when request are sent via the internet. The higher the configuration the quicker tins are got done. A CPU with the great processing power functions more effectively.

Scheduling:
Scheduling of the various departments file upload and download to free the systems resources to have a hitch free access for all.
Unnecessary occupation of the internet byway of browsing sending of mail chatting sending
of mails which consumes bandwidth should be restricted during work hours . A schedule can be drawn to how each member is given access.

Share
Tagged with