Академический Документы
Профессиональный Документы
Культура Документы
INSTITUTE OF
TECHNOLOGY
USN
Computer Networks II
Sub:
Date:
15/ 03/ 16
Duration:
90 mins
Max Marks:
50
Sem:
VI Sem
Code:
Branch:
10CS64
ISE
Explain the internal network operation of the network with a neat diagram
Essential function of network:
The essential function of network is to transfer information among the users that are
attached to the network.
Transfer of information may be single block of information or sequence of blocks as
shown in below figure. 1.
It is also possible for a network layer to provide a choice of services to the user of
network like:
The fig 1.b. above shows the relation between the service offered by the network and the
internal network operation
The internal operation of the network is connectionless if packets are transferred within
the network as datagrams
Each packets are routed independently
Packets follow different paths from end to end and arrive out of order
The internal operation of the network is connection-oriented if packets follow a virtual
circuit along a path that has been established from source to destination.
Virtual circuit setup is done once, then packets are simply forwarded
If resources are reserved then bandwidth, delay and loss guarantees are provided.
Network layer essentials
The Functions that need to be carried out at every node in the Network Layer are: Routing: mechanisms for determining the set of best paths for routing packets requires
the collaboration of network elements
Forwarding: transfer of packets from NE inputs to outputs
Priority & Scheduling: determining order of packet transmission in each NE
Optional: congestion control, segmentation & reassembly, security
2
a) Use the Dijkstras algorithm to find the set of shortest paths from node 1 to other nodes.
b) Find the set of associated routing table entries.
Suppose that ATM cells arrive at the leaky bucket policing device at time slots
t=2,3,6,9,11,16,23,24 ,25. Assume I=4 and L=6. Plot the bucket content and identify any
non confirming cells.
Ans : 11 is non confirming cell
Explain the leaky bucket algorithm for policing the traffic at flow level
Traffic Management at the Flow Level
Management of individual traffic flows & resource allocation to ensure delivery of QoS (e.g.
Delay, jitter, loss)
Traffic management at flow level operates on the order of milliseconds to seconds.
It is concerned with managing the individual traffic flow to ensure the QoS (e.g. delay,
jitter, loss) requested by user is satisfied.
The purpose of Traffic Management at the Flow Level is to control the flows of traffic
and maintain performance even in presence of traffic overload.
The process of managing the traffic flow in order to control congestion is called
congestion control.
Congestion occurs when a surge of traffic overloads network resources
Open-loop control and closed-loop control are the two logical approaches of congestion
control.
Open-Loop Control
Admission Control
Policing
o Traffic Shaping
o
o
Policing
Network monitors traffic flows continuously to ensure they meet their traffic contract.
The process of monitoring and enforcing the traffic flow is called policing.
When a packet violates the contract, network can discard or tag the packet giving it
lower priority
If congestion occurs, tagged packets are discarded first.
Leaky Bucket Algorithm is the most commonly used policing mechanism
Leaky Bucket algorithm can be used to police arrival rate of a packet stream
Fig. 4. a. Leaky Bucket
Here the value I is four packet times, and the value of L is 6 packet times.
The arrival of the first packet increases the bucket content by four (packet times).
At the second arrival the content has decreased to three, but four more are added to
the bucket resulting in total of seven.
The fifth packet is declared as nonconforming since it would increase the content to
11, which would exceed L+I (10).
Packets 7, 8, 9 and 10 arrive back to back after the bucket becomes empty. Packets
7, 8 and 9 are conforming, and the last one is nonconforming.
Non-conforming packets not allowed into bucket & hence not included in
calculations.
The original TCP/IP protocol suite has four layers: host-to-network, internet, transport,
and application. However, when TCP/IP is compared to OSI, we can say that the host-tonetwork layer is equivalent to the combination of the physical and data link layers. The
internet layer is equivalent to the network layer, and the application layer is roughly
doing the job of the session, presentation, and application layers with the transport layer
in TCP/IP taking care of part of the duties of the session layer.
UDP. IP is a host-to-host protocol, meaning that it can deliver a packet from one physical
device to another. UDP and TCP are transport level protocols responsible for delivery of a
message from a process (running program) to another process. A new transport layer
protocol, SCTP, has been devised to meet the needs of some newer applications.
User Datagram Protocol : The User Datagram Protocol (UDP) is the simpler of the two
standard TCPIIP transport protocols. It is a process-to-process protocol that adds only
port addresses, checksum error control, and length information to the data from the upper
layer.
Transmission Control Protocol
The Transmission Control Protocol (TCP) provides full transport-layer services to
applications. TCP is a reliable stream transport protocol. The term stream, in this context,
means connection-oriented: A connection must be established between both ends of a
transmission before either can transmit data.
At the sending end of each transmission, TCP divides a stream of data into smaller units
called segments. Each segment includes a sequence number for reordering after receipt,
together with an acknowledgment number for the segments received. Segments are
carried across the internet inside of IP datagrams. At the receiving end, TCP collects each
datagram as it comes in and reorders the transmission based on sequence numbers.
Stream Control Transmission Protocol
The Stream Control Transmission Protocol (SCTP) provides support for newer
applications such as voice over the Internet. It is a transport layer protocol that combines
the best features of UDP and TCP.
Application Layer
The application layer in TCPIIP is equivalent to the combined session, presentation, and
application layers in the OSI model. It contains all the higher-level protocols. The early
ones included virtual terminal (TELNET), file transfer (FTP), and electronic mail (SMTP),
as shown in Fig.1. The virtual terminal protocol allows a user on one machine to log onto
a distant machine and work there. The file transfer protocol provides a way to move data
efficiently from one machine to another. Electronic mail was originally just a kind of file
transfer, but later a specialized protocol (SMTP) was developed for it. Many other
protocols have been added to these over the years: the Domain Name System (DNS) for
mapping host names onto their network addresses, NNTP, the protocol for moving
USENET news articles around, and HTTP, the protocol for fetching pages on the World
Wide Web, and many others.
6
What is the need of hierarchical routing? Explain the advantages of hierarchical routing
with an example
The hierarchical approach reduces the size of the routing tables at the routers in assigning
the addresses.
Hosts that are near each other (i.e. a group) should have addresses that have common
prefixes. The routers examine only part of the address (i.e.. the prefix) to decide
how a packet should be routed.
Figure 6. gives an example of hierarchical address assignment and a flat address
assignment.
In figure (a) the hosts at each of the four sites have the same prefix. Thus the two routers
need only maintain tables with four entries as shown.
On the other hand, if the addresses are not hierarchical (Figure 6), then the routers
need to maintain 16 entries in their routing tables.
7.a.
Explain traffic management at packet level. Consider packet-by-packet fair queuing with 3
logical buffers and with a service rate of 1 unit/second. Show the sequence of
transmissions for this system for the following packet arrival pattern.
Buffer1: Arrival at time t=0, Length=2, arrival at t=4, length=1
Buffer2: Arrival at time t=1, Length=3, arrival at t=2, length=1
Buffer 3: Arrival time t=3, Length=5
Solution: The packet-by-packet fair queueing system selects the order of packet
transmission according to the finish times in an emulated fluid flow system. The
first figure below shows the times at which the various packets arrive and the
length of the packets. The red triangles indicate packet arrivals at buffer 1; blue at
buffer 2; and green at buffer 3. The rate at which packets are serviced is the
reciprocal of the number of active buffers at the time. The second figure below
shows how the round number R(t) grows as a function of time. The slope of R(t) is
the reciprocal of the number of active stations. A given packet finishes service in
the fluid flow system when the round number reaches the finish time computed for
the given packet.
7.b
Explain fair queuing at the packet level. show the transmission sequences for field flow
and packet by packet system considering the two logical buffers(buffer1, buffer2).Assume
each has a single L bit packet to transmit at t=0 and no sub sequent packets arrive, assume
C=L bits/second =1packet/second
8.a.
8.b