Network Delays and Acceptable Time Delays in Various Scenarios
VerifiedAdded on 2020/05/04
|7
|1203
|36
Report
AI Summary
This report examines acceptable time delays in network systems, focusing on scenarios such as system logins, synchronous group editing, asynchronous critiquing, and voting on serious issues. The report provides rationale for the estimated delays, supported by examples like Logon Banner, SharePoint for document management, and asynchronous editing. The study explores the impact of latency, propagation delays, transmission delays, and processing delays on the end-user experience, while also considering the bandwidth. It highlights the importance of managing network delays to ensure efficient and satisfactory system performance.

Running head: NETWORK DELAYS
Network delays
Name of the student:
Name of the university:
Author Note
Network delays
Name of the student:
Name of the university:
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1NETWORK DELAYS
Executive summary
The report demonstrates the longest acceptable time delay that could last for some particular
scenarios. Here, the rationale for all the estimates is delivered including discussions and examples.
The instances of system confirming users’ passwords, synchronous group editing, asynchronous
critiquing and voting on essential scenarios are highlighted in this study.
Executive summary
The report demonstrates the longest acceptable time delay that could last for some particular
scenarios. Here, the rationale for all the estimates is delivered including discussions and examples.
The instances of system confirming users’ passwords, synchronous group editing, asynchronous
critiquing and voting on essential scenarios are highlighted in this study.

2NETWORK DELAYS
Table of Contents
Introduction:..........................................................................................................................................3
1. System confirming the user's password during log-in:......................................................................3
2. Synchronous group editing of document:..........................................................................................3
3. Asynchronous critiquing of other participants' work:.......................................................................4
4. Voting on serious issues:...................................................................................................................4
Conclusion:............................................................................................................................................5
References:............................................................................................................................................6
Table of Contents
Introduction:..........................................................................................................................................3
1. System confirming the user's password during log-in:......................................................................3
2. Synchronous group editing of document:..........................................................................................3
3. Asynchronous critiquing of other participants' work:.......................................................................4
4. Voting on serious issues:...................................................................................................................4
Conclusion:............................................................................................................................................5
References:............................................................................................................................................6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3NETWORK DELAYS
Introduction:
There has been a rising lag of time turning inherent to the network. As a result of this, the
network is experiencing delays. The following study is made on the decision systems built over a
network.
A longest acceptable time delay could which last for some particular cases are discussed
here. A rationale for every estimate is provided including researches and examples. The study
includes the instances of system confirming users’ passwords, synchronous group editing,
asynchronous critiquing and voting on essential scenarios.
1. System confirming the user's password during log-in:
This must take place 0.5 seconds after the password gets entered. The present users have
been expecting a reasonably instantaneous password. This is done by prompting or confirming as the
password is improper. This also happens over any network (Elahi & Alfi, 2017).
One example of the system login is the Logon Banner. It is the verbiage seen by the end-
users during the access to any system setting proper expectations for the users. This is about the
acceptable and authorized use of the network access capabilities.
2. Synchronous group editing of document:
There are rising concerns about group editing of the activities that are done synchronously. A
user is needed to be under the control of the papers. The others, on the other side, must supply the
inputs. As there take place a collaborative activity in the departments, the control process of the
document version should be placed in the proper area and then followed. There must be the
Introduction:
There has been a rising lag of time turning inherent to the network. As a result of this, the
network is experiencing delays. The following study is made on the decision systems built over a
network.
A longest acceptable time delay could which last for some particular cases are discussed
here. A rationale for every estimate is provided including researches and examples. The study
includes the instances of system confirming users’ passwords, synchronous group editing,
asynchronous critiquing and voting on essential scenarios.
1. System confirming the user's password during log-in:
This must take place 0.5 seconds after the password gets entered. The present users have
been expecting a reasonably instantaneous password. This is done by prompting or confirming as the
password is improper. This also happens over any network (Elahi & Alfi, 2017).
One example of the system login is the Logon Banner. It is the verbiage seen by the end-
users during the access to any system setting proper expectations for the users. This is about the
acceptable and authorized use of the network access capabilities.
2. Synchronous group editing of document:
There are rising concerns about group editing of the activities that are done synchronously. A
user is needed to be under the control of the papers. The others, on the other side, must supply the
inputs. As there take place a collaborative activity in the departments, the control process of the
document version should be placed in the proper area and then followed. There must be the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4NETWORK DELAYS
assuming that the task is done (Mu, Stokking & Den Hartog, 2017). Then the author who is in
control of that document must have any opinion regarding the delays of a network. The person must
expect a response promptly to the data entry. This should be similar to the documents that are
created locally. The vital lag to see the alterations entered as typed highlights the frustration.
Example of this could include the usage of SharePoint for managing the Word documents
along with the version control. This is helpful for those forced to the corporate Windows
environments (Liu, Pan & Xue, 2014). Here the SharePoint installation is paid for the task.
3. Asynchronous critiquing of other participants' work:
The critiques could be batched and then to the individual who has been controlling the
document. It is a practical solution preserving concerns regarding version control (Olariu, Zuber &
Thorpe, 2017). Hence, few delays in time are tolerable here. This is because the proposed
modifications are uploaded. This is same like uploading various attachments to any email message
and little time is taken and often in seconds.
Examples of asynchronous editing could be any code running on the client. This indicates the
web browser. The creation of a client script could typically be done. It sends the parameters to
servers. This then performs the task of processing. Thus, in this case, the client never waits for the
outcomes. Here a callback function could be utilized for returning the result.
4. Voting on serious issues:
The systems can collect the votes in an asynchronous manner as they come. Short delays are
tolerable after the vote is entered and then submitted. Results of voting need to be tabulated. Then it
assuming that the task is done (Mu, Stokking & Den Hartog, 2017). Then the author who is in
control of that document must have any opinion regarding the delays of a network. The person must
expect a response promptly to the data entry. This should be similar to the documents that are
created locally. The vital lag to see the alterations entered as typed highlights the frustration.
Example of this could include the usage of SharePoint for managing the Word documents
along with the version control. This is helpful for those forced to the corporate Windows
environments (Liu, Pan & Xue, 2014). Here the SharePoint installation is paid for the task.
3. Asynchronous critiquing of other participants' work:
The critiques could be batched and then to the individual who has been controlling the
document. It is a practical solution preserving concerns regarding version control (Olariu, Zuber &
Thorpe, 2017). Hence, few delays in time are tolerable here. This is because the proposed
modifications are uploaded. This is same like uploading various attachments to any email message
and little time is taken and often in seconds.
Examples of asynchronous editing could be any code running on the client. This indicates the
web browser. The creation of a client script could typically be done. It sends the parameters to
servers. This then performs the task of processing. Thus, in this case, the client never waits for the
outcomes. Here a callback function could be utilized for returning the result.
4. Voting on serious issues:
The systems can collect the votes in an asynchronous manner as they come. Short delays are
tolerable after the vote is entered and then submitted. Results of voting need to be tabulated. Then it

5NETWORK DELAYS
is broadcasted synchronously. As it is not done, the outcomes vary because of the delay in time. This
proves exasperating if not chaotic (Pagadrai, Yilmaz & Valluri, 2016).
For example, the word-voters could be considered. Here the cost-effective designs by the
augmented or modified sorting networks have been feasible. Thus in both the cases, the rich theory
developed regarding the synthesis and analysis of the pipelined or parallel sorting networks benefits
the design process directly (Boem et al., 2013).
Conclusion:
It must be understood from the report that apart from the delays of propagation, the latency
has also been involving the transmission delays and processing delays. With the view-point of the
performance and speed of the network, the performance is understood through the bandwidth. The
idea of bandwidth is the one that is advertised by the manufacturers of equipment of systems. The
above report shows that since most of the people are familiar with the idea of bandwidth, the latency
has been mattering equally to the experience of the end-users.
is broadcasted synchronously. As it is not done, the outcomes vary because of the delay in time. This
proves exasperating if not chaotic (Pagadrai, Yilmaz & Valluri, 2016).
For example, the word-voters could be considered. Here the cost-effective designs by the
augmented or modified sorting networks have been feasible. Thus in both the cases, the rich theory
developed regarding the synthesis and analysis of the pipelined or parallel sorting networks benefits
the design process directly (Boem et al., 2013).
Conclusion:
It must be understood from the report that apart from the delays of propagation, the latency
has also been involving the transmission delays and processing delays. With the view-point of the
performance and speed of the network, the performance is understood through the bandwidth. The
idea of bandwidth is the one that is advertised by the manufacturers of equipment of systems. The
above report shows that since most of the people are familiar with the idea of bandwidth, the latency
has been mattering equally to the experience of the end-users.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6NETWORK DELAYS
References:
Boem, F., Ferrari, R. M., Parisini, T., & Polycarpou, M. M. (2013, June). Distributed fault detection
for uncertain nonlinear systems: A network delay compensation strategy. In American
Control Conference (ACC), 2013 (pp. 3549-3554). IEEE.
Elahi, A., & Alfi, A. (2017). Finite-time $ ${{H} _ {\infty}} $ $ H∞ stability analysis of uncertain
network-based control systems under random packet dropout and varying network
delay. Nonlinear Dynamics, 1-19.
Liu, L., Pan, F., & Xue, D. (2014). Fractional-order optimal fuzzy control for network delay. Optik-
International Journal for Light and Electron Optics, 125(23), 7020-7024.
Mu, M., Stokking, H., & Den Hartog, F. (2017). Network delay and bandwidth estimation for cross-
device synchronized media.
Olariu, C., Zuber, M., & Thorpe, C. (2017, May). Delay-based priority queueing for VoIP over
Software Defined Networks. In Integrated Network and Service Management (IM), 2017
IFIP/IEEE Symposium on (pp. 652-655). IEEE.
Pagadrai, S., Yilmaz, M., & Valluri, P. (2016). Smart-grid backbone network real-time delay
reduction via integer programming. IEEE transactions on neural networks and learning
systems, 27(8), 1787-1792.
References:
Boem, F., Ferrari, R. M., Parisini, T., & Polycarpou, M. M. (2013, June). Distributed fault detection
for uncertain nonlinear systems: A network delay compensation strategy. In American
Control Conference (ACC), 2013 (pp. 3549-3554). IEEE.
Elahi, A., & Alfi, A. (2017). Finite-time $ ${{H} _ {\infty}} $ $ H∞ stability analysis of uncertain
network-based control systems under random packet dropout and varying network
delay. Nonlinear Dynamics, 1-19.
Liu, L., Pan, F., & Xue, D. (2014). Fractional-order optimal fuzzy control for network delay. Optik-
International Journal for Light and Electron Optics, 125(23), 7020-7024.
Mu, M., Stokking, H., & Den Hartog, F. (2017). Network delay and bandwidth estimation for cross-
device synchronized media.
Olariu, C., Zuber, M., & Thorpe, C. (2017, May). Delay-based priority queueing for VoIP over
Software Defined Networks. In Integrated Network and Service Management (IM), 2017
IFIP/IEEE Symposium on (pp. 652-655). IEEE.
Pagadrai, S., Yilmaz, M., & Valluri, P. (2016). Smart-grid backbone network real-time delay
reduction via integer programming. IEEE transactions on neural networks and learning
systems, 27(8), 1787-1792.
1 out of 7
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.