In requirements analysis, refers to the user requirement for quality of the presentation to the user.
Also known as QoS; determining, setting, and acting on priority levels for traffic flows.
Applications that require a predictable, bounded, or high degree of capacity.
Setting and monitoring of thresholds or boundaries for end-to-end, per-link, or per-element characteristics for short-term or immediate notification of events and transients.
Applications that have a strict timing relationship between source and destination, with one or more timers set for the receipt of information at the destination.
A description of the complete architecture, considering all of its components. It is a compilation of the relationships developed during the network architecture process.
(1) A statistical indicator of the frequency of failure of the network and its components and represents the unscheduled outages of service. (2) In requirements analysis, reliability is a user requirement for consistently available service.
Network access based on traditional dial-in, point-to-point sessions, and virtual private network connections.
Descriptions of network functions and performance that are needed for the network to successfully support its users, applications, and devices.
Gathering and deriving requirements in order to understand system and network behaviors.
A diagram that shows the location dependencies between applications and devices, which will be used for flow analysis.
A document that lists and prioritizes the requirements gathered for your architecture and design.
Mechanisms that will allocate, control, and manage network resources for traffic.
IGPs that are based on a distance-vector routing algorithm.
The technique exchanging of routing information between ASs, usually between service providers with transit networks, and between large customer networks.
A statement, configured in one or more routers, that identifies one or more IP parameters (e.g., an IP source or destination address) and an action (e.g., drop or forward) to be taken when traffic matches these parameters.
The technique of applying filters to hide networks from the rest of an AS or to add, delete, or modify routes in the routing table.
Learning about the connectivity within and between networks and applying this connectivity information to forward IP packets toward their destinations.
Physical or logical separations of a network based on requirements for or administration of that network.
Flows of routing information, passed between functional areas and between ASs.