Академический Документы
Профессиональный Документы
Культура Документы
Question bank
UNIT –I
Call control signalling is carried on a separate logical connection from user data.
Thus, intermediate nodes need not maintain state tables or process messages relating
to call control on an individual per-connection basis
Multiplexing and switching of logical connections takes place at layer2
instead of layer3, eliminating one entire layer of processing
There is no hop-by-hop flow control and error control. End-to-end flow
control and error control are the responsibility of a higher layer, if they are employed
at all
4. What are the two types of sub layer used in ATM adaptation layer?
1. Convergence sub layer
2. Segmentation and Reassembly sub layer.
7 Define DTE?
DTEs generally are considered to be terminating equipment for a specific network and
typically are located on the premises of a customer. In fact, they may be owned by the
customer.
Examples of DTE devices are terminals, personal computers, routers, and bridges.
8. Define DCE?
DCEs are carrier-owned internetworking devices. The purpose of DCE equipment is to
provide clocking and switching services in a network, which are the devices that actually
transmit data through the WAN. In most cases, these are packet switches. Figure 10-1 shows
the relationship between the two categories of devices.
9. What is Virtual channel?
A Virtual Channel (VC) denotes the transport of ATM cells which have the same unique
identifier, called the Virtual Channel Identifier (VCI). This identifier is encoded in the cell
header. A virtual channel represents the basic means of communication between two
endpoints and is analogous to an X.25 virtual circuit.
The packets between a given source and destination may vary in length, may take different
routes, may be subject to varying delays in the switches they encounter, the overall packet
delay can vary substantially. This phenomenon, called JITTER may not be desirable for some
application; for example in real-time applications including telephone voice and real-time
video.
In ATM, the information flow on each logical connection is organized into fixed size packets
called cells
User plane
Control plane
Management plane
1. Switched topology
2. Point-to-point topology
3. Arbitrated loop topology
The Virtual path identifier constitutes a routing field for the network. It is 8 bits at the user-
network interface and 12 bits at the network-network interface. The latter allows support for
an expanded number of VPCs internal to the network, to include those supporting subscribers
and those required for network management
The cell loss priority bit is used to provide guidance to the network in the event of
congestion. A value of 0 indicates a cell of relatively higher priority, which should not be
discarded unless no other alternative is available. A value of 1 indicates that this cell is
subject to discard within the network
23. What are the services of ATM?
The ATM services are:
i. Real time services:
i. Constant Bit Rate (CBR)
ii. Real Time Variable Bit Rate (rt-VBR)
ii. Non Real time services:
i. Non Real Time Variable Bit Rate (nrt-VBR)
ii. Available Bit Rate (ABR)
iii. Unspecified Bit Rate (UBR)
iv. Guaranteed Frame Rate (GFR)
24. What is Frame Relay Network?
A form of packet switching based on the variable length link layer frames. There is no
network layer. Many of the basic functions have been streamlined and eliminated to provide
great throughput.
25. What is the message types needed for Frame relay call control?
SETUP
CONNECT
RELEASE
RELEASE COMPLETE
26. What are the AAL SERVICES?
Circuit emulation
VBR voice and video
General data services
IP over ATM
Multi protocol encapsulation over ATM LAN emulation
The sequence Number Protection field is an error code for detection and possibly correction
on the sequence number field. It consists of a 3 bit cyclic redundancy check, calculated over
the 4 bit SN field, and a parity bit. The parity bit is set so that the parity of the 8 bit SAR
header is even.
29. Differentiate bridge and layer2 switch
Bridge Layer2Switch
Frame handling Frame handling in hardware
alone in software
Analyze & forward Multiple data paths & can handle
one frame at a time multiple frames at a time
Store and forward Can do cut through
Fibre channel is designed to combine the best features of both technologies the simplicity and
speed of channel communication with the flexibility and interconnectivity that characterize
protocol based network communication.
Association
Reassociation
Disassociation
Authentication
Privacy
Direct sequence spread spectrum operating in the 2.4 GHz ISM band, at data rates of
1 Mbps and 2 Mbps
Frequency hopping spread spectrum (FHSS) operating in the 2.4GHz ISM band at
data rates of 1Mbps and 2Mbps
Infrared at 1 Mbps and 2 Mbps operating at a wavelength between 850 and 950nm
41. What is the purpose of pay load type field in ATM cell format?
It is 3 bit information. It indicates type of data in the information field. The first bit indicates
whether it is user data or network management data, second bit indicate whether it experience
congestion or not, third bit indicate SDU type.
42. What is the purpose of cell loss priority bit in ATM cell format?
It provides guidance to the network in the event of congestion. A value of 0 indicates a cell of
relatively higher priority which should not be discarded unless no other alternatives is
available. A value of 1 indicates that this cell is subject to discard with in the network.
44. What are the two types of sub layer used in ATM adaptation layer?
Convergence layer and Segmentation layer.
45. Compare packet switching (X.25) and frame relay network (AU:Nov/Dec. 2007)
50. What is the difference between class A and class B service offered by ATM?
(AU:may/june 2009)
Class A Class B
Constant bit rate. Variable bit rate
ATM adaptation layer. ATM adaptation layer protocol
used in AAL2
57. What do you mean by common channel signalling and in channel signalling?
Common channel signalling: The dates and control signals of a user are transmitted on
separate channel. The control signals of all the users are passed through a signal common
channel. In channel signalling:
The data and control signals of a user are transmitted on same channel. There are two types
Inband signalling.
Out of band signalling.
Part-B
1. Explain in detail about Frame relay architecture and Frame Call Control?
2. Explain in detail about the ATM architecture?
3. What is a ATM cell? Explain about the ATM cell format?
4. Write in detail about Generic Flow control?
5. What are the ATM service categories? Explain?
6. Explain about the different AAL protocols?
7. Explain in detail about the Fibre channel?
8. What are the various IEEE 802.11 requirements?
9. Explain in detail about IEEE 802.11 architecture and services?
10. Explain about the IEEE 802.11 protocol architecture?
11. Explains the Frame relay architecture & compare it with x.25.
12. a. Explain the ATM cell with a suitable diagram and explain Generic Flow
Control and Header error control.
b. Explain varies ATM services.
13. a. Discuss and compare the CPCS-PDU & SAR-PDU of AAL ¾ & AAL 5
b. Explain the architecture of AAL 1
14. Explain the architecture of 802.11
15. Explain the following:
a. Classical Ethernet
b.IEEE 802.3 medium options at 10 Mbps
16 a. Fast Ethernet
b. gigabit Ethernet
c.Explain Fiber channel Protocol architecture.
17. i) Explain about frame relay networks in detail with suitable diagram. (AU June 2012)
ii) Explain in detail about fibre channel networks.
18.i).Describe in detail about Wifi and WiMax network application and requirements.
( AU June 2012)
(ii) Explain about Gigabit Ethernet in detail with neat diagram.
19. i) Explain the operation to AAL 1 and AAL ¾ with an example. (AU Nov 2012)
ii) Explain the working of an ATM error control algorithm.
20. i) Illustrate why CSMA/CD is not suitable for wireless LANs. (AU Nov 2012)
ii) Draw the 802.11 protocol stack and discuss the functions of PCF and DCF.
21. i) Explain the call control procedure in frame relay networks.
(AU Nov 2013)
ii) Explain the various ATM service categories in detail.
22.Explain the IEEE802.11 architecture in detail. Illustrate the functions and combined
operation of various protocol in MAC sub layer. (AU Nov 2013)
23. i)Describe ATM Cell delineation state with diagram. (AU June 2014)
ii) Explain in details about Fibre channel
24.i) Describe the ATM architecture. (AU June 2014)
ii) What is Wi – Fi ? Explain the applications and requirements of Wi-Fi.
25.i) What are the strength of Fibre channel.(AU Nov 2007)
ii)Compare Gigabit and Fast Ethernet
iii) Give ATM cell format. Explain how ATM cells are transmitted.
UNIT II
CONGESTION AND TRAFFIC MANAGEMENT
• Congestion occurs when the packets being transmitted through a network begins to
approach packet-handling capacity of the network.
• For each node (data network switch and router), there is a queue for each outgoing
channel.
• As a rule of thumb, when a channel for which packets are queuing becomes more than
80% utilised, it is an alarming rate of threshold.
2. When queue will be formed in a network?
Queue will be formed if the current demand for a particular service exceeds the capacity of
service provider.
A convenient notation called kendall’s notation, have been developed for summarizing the
principle assumption that are made in developing a queuing model.
The notation is given as ( a / b / c) : (d / e)
Here
a – distribution of inter arrival time
b- distribution of service time.
c – number of server
d – maximum number allowed items in system
e – queuing discipline used.
13. What are the Considerations for Traffic Management in Congested Network?
Fairness
Quality of Service
Reservations
Committed information rate is a rate, in bits per second that the network agrees to support for
a particular frame-mode connection. It is vulnerable to discard in the event of congestion.
30. Write the Little’s formula and explain its uses. (AU:Nov/Dec 2007) (AU:may/june 2008)
47. List the mechanisms used for congestion control in packet switching network.
Mechanisms used are:
Congestion node sends a control packet called choke packet to source nodes. As a
result, it will limit the transmission.
Depending on routing algorithm, routing decision may influence the rate at which
new packets are produced.
Timestamp is added in header of packet and it measures the delay between two
particular points.
Congestion notification information is added to packet, to inform about congestion to
source and destination.
48. What is meant by traffic intensity in queuing analysis?
Traffic intensity ρ=λ/μ
=Arrival rate/Service rate
49. Write Little’s formula in terms of traffic intensity, resident time and waiting time in a
queue.
ρ = λ Ts
r = λ Tr
w = λ Tw
PART – B
13.i) Explain the effects of congestion in packet switching networks. (AU Nov 2013)
ii) Explain how congestion avoidance is done in a frame relay networks.
14. I. Describe the four regions of Single – Server queue with neat sketches (AU June 2014)
ii. Describe in detail about the Traffic Management.
15.i)What is Kendall’s Notation ? State the equations Single Server that follows the M/G/1
model.(AU Nov 2007)
ii)Explain congestion control in packet switching network.
16.i.What are Open loop and Closed loop congestion control? (AU Nov 2008)
ii) Explain the congestion control technique used in Frame relay and in TCP.
17. Explain M/M/1 and M/D/1 queuing model and derive the expression for (AU Nov 2008)
i)Waiting time in the queue
ii)Waiting time in the system
iii) No. of customers in the queue.
UNIT-III
TCP & ATM Congestion Control
1. State the condition that must be met for a cell to conform. (AU: Nov/Dec 2007)
In case of ATM, the information flow on each logical connection is organized into
fixed size packets called cells. Cells should arrive within theoretical arrival time but with in
CDVT.
2. List the various retransmission strategies in the implementation of TCP. (AU: Nov/Dec
2007)
The various retransmission strategies are as follows:
i. First-only
ii. Batch
iii. Individual
4. What is self-clocking?
TCP automatically senses the network bottleneck and regulates its flow accordingly. This has
been referred to as TCP’s self-clocking behavior.
The characteristics of an ATM flow over an ATM connection are captured in a connection
traffic descriptor, which includes the following:
i. Source traffic descriptor
ii. Cell delay variation tolerance(CVDT)
iii. Conformance definition
9. What are the mechanisms used in ATM traffic control to avoid congestion condition?
1.Resource management
2.Connection admission control
3.Usage parameter control
4.Traffic shaping
The peak cell rate defines an upper bound on the traffic that can be submitted by a source on
an ATM connection. The PCR is defined in terms of the variable T, the minimum spacing
between cells, so that the PCR=1/T.The PCR descriptor is mandatory for CBR and VBR
services.
The maximum burst size is the maximum number of cells that can be sent continuously at the
peak cell rate. If the cells are presented to the network in clumps equal to the MBS, then the
idle gap between clumps must be sufficient so that the overall rate does not exceed the SCR.
The sustainable cell rate defines an upper bound on the average rate of an ATM connection,
calculated over a time scale that is large relative to T. SCR is needed to specify a VBR
source. It enables the network to allocate resources efficiently among a number of VBR
sources without dedicating the resources required to support a constant PCR rate.
The maximum frame size is the maximum size of a frame in cells that can be carried over a
GFR connection. This parameter is only relevant for that GFR service.
The minimum cell rate, used with ABR and GFR, defines the minimum commitment
requested of the network; a value of zero can be used. The goal of both ABR and GFR
service is to provide rapid access to unused network capacity at up to PCR, whenever the
capacity is available.
The cell delay variation tolerance is a measure of the amount of variation in cell delay that is
introduced by the network interface (e.g : SDH) and at the UNI. CDVT represents a bound on
the delay variability due to the slotted nature of ATM, the physical layer overhead, and ATM
layer function such as cell multiplexing.
The GCRA algorithm is referred to as a form of traffic policing. Traffic policing occurs when
a flow of data is regulated so that cells ( or frames or packets) that exceed a certain
performance level are discarded or tagged.
The cell loss ratio is simply the ratio of lost cells to total transmitted cells on a connection.
Open loop control is an approach where there is no feedback to the source concerning to the
congestion once the connection is established, UPC may discard or tag as lower priority any
cell that exceeds parameters of the traffic contract.
Traffic shaping is used to smooth out a traffic flow and reduce cell clumping. This can result
in a fairer allocation of resources and a reduced average delay time.
The way that allow a number of sources to share the capacity not used by CBR and VBR but
to provide feedback to sources to adjust the load dynamically and thus avoid cell loss and
share the capacity fairly. This is referred to as closed-loop control because of its use of
feedback.
26. Why congestion control is difficult to implement in TCP? (AU: April/may 2008)
The end system is expected to exercise flow control upon the source and system at a higher
layer. Thus it is difficult to implement in TCP.
27. Define sustainable cell rate. What is the use of SCR? (AU: April/may 2008)
The SCR is the average cell rate over a long time interval. the actual cell rate may be lower or
higher than this value, but the average should be equal to or less than SCR.
30. What are the mechanisms used in ATM traffic control to avoid congestion condition?
Resource management
Connection admission control
Usage parameter control
Traffic shaping.
33. What is the difference between flow control and congestion control?
Flow control: The transmitter should not overwhelm the receiver so flow control is
performed.
Congestion control: Its aim is to limit the total amount of data entering the network; to
amount of data that network can carry.
40. What are the requirements for ATM Traffic and Congestion Control?
Most packet switched and frame relay networks carry non-real-time bursty data
– No need to replicate timing at exit node
– Simple statistical multiplexing
– User Network Interface capacity slightly greater than average of channels
– Congestion control tools from these technologies do not work in ATM
41. Why congestion control is difficult to implement in TCP?
The end system is expected to exercise flow control upon the source end system at a higher
layer. Thus it is difficult to implement congestion control in TCP.
m to allocate capacity
among the VCs traversing the switch.
PART – B
5. What are the functions that are provided by ISA to manage congestion and QoS transport?
The functions that are provided by ISA to manage congestion and QoS transport are
i. Admission control.
ii. Routing algorithm.
iii. Queuing discipline.
iv. Discard policy.
6. Define: RED
RED is an approach to congestion management in internets is proactive packet discard. In
this technique , a router discards one or more incoming packets before the output buffer is
completely full, in order to improve the performance of the network.
24. What are the key elements of controlled load service? (AU: Nov/Dec2007)
The key elements of the controlled load services are:
The service approximates tightly the behavior visible to applications receiving best-effort
service under unloaded conditions.
A very high percentage of transmitted packets will be successfully delivered.
27. What is an inelastic traffic? What are the requirements for inelastic traffic?
(AU:April/May2008)
It does not easily adapt, if at all, to changes in delay and throughput across the internet.
Example: Real time traffic, its requirements are, throughput, delay, jitter and packet loss.
The Is provider –
• Views the total of current traffic demand.
• Limits the demand with respect to the current capacity handled by the network.
• Reserve resources with in the domain to provide a particular QOS guaranteed.
PART – B
1. Explain the block diagram for Integrated Services Architecture. and give details about
Components.
2.a. Explain the services offered by ISA
b.Define Differentiated services.
3. Explain the various queering disciplines in ISA.
4. Explain the RED algorithm.
5. Explain the various types of Traffic.
6. Explain in detail about queuing disciplines: BRFQ, WFQ, GPS, and PS. (AU May 2012)
7. Explain about integrated service architecture and differentiated services in detail with neat
diagram. (AU May 2012)
8. i. Explain the way in which ISA manages congestion and provides QOS transport.
(AU Nov 2012)
ii) Explain hit round fair queuing technique in detail.
9. Explain the differentiated services operation and the traffic conditioning functions in detail.
(AU Nov 2012)
10. i) Draw the Integrated service architecture and explain it in detail. (AU Nov 2013)
ii) Explain the fair queuing in detail.
11. i. Explain in detail the way in which RED techniques overcomes congestion.
(AU Nov 2013)
ii) Write a note on the DS per hop behaviour.
12. i) Describe the components of Integrated service architectures.(AU May 2014)
ii) Explain the differentiated services with the architecture.
13.i)Explain the approaches Integrated service architectures. (AU May 2014)
ii) What is GPS? Explain the triple - differences solution algorithm.
14.i) Explain the various the queuing disciplines used in ISA implementation.
(AU Nov 2007).
ii) Explain the different types of PHB.
15.i)What are the design goals of RED ? Explain in detail about RED algorithm (AU Nov
2007).
ii) What are components of ISA.
16. Write short notes on the following queuing discipline (AU Nov 2008).
i)Fair queuing
ii) Bit round Fair queuing(BRFQ)
iii) Weighted Fair queuing (WFQ)
17. Explain how Random early detection is used to control congestion in networks.
(AU Nov 2008).
UNIT-V
PROTOCOLS FOR QoS SUPPORT
Enabling the receiver to select one source from among multiple sources transmitting to a
multicast group is known as channel-changing capability.
-initiated reservation
n styles
-RSVP routers
6. Define: A session.
A session is a data flow identified by its destination; it reflects the soft state nature of RSVP
operation. A session is defined by destination IP address, IP protocol identifier, destination
port.
A reservation request issued by a destination end system is called a flow descriptor and
consists of a flowspec and a filter spec.
8.Define flow specification in RSVP.
The flow specification of RSVP specifies a desired QOS and is used to set parameters in
a node’s packet scheduler. Flow spec is defined by
Flow spec: Service class
R spec
T spec
R spec is Reserve Specification
T spec is Traffic Specification
A receiver may specify a resource reservation that is to be shared among a number of senders
(shared) or may specify a resource reservation that is to be allocated to each sender (distinct).
A receiver may either provide a list of source (explicit) or implicitly select all sources by
providing no filter spec (wild card).
The wild-card-filter (WF) style specifies a single resource reservation to be shared by all
senders to this address. Symbolically, this style is represented in the form WF(*{Q}), where
the asterisk represents wild-card sender selection and Q is the flowspec.
The shared-explicit (SE) style specifies a single resource reservation to be shared among an
explicit list of senders. Symbolically, this style is represented in the form SE(S1,S2, . . .{Q}).
14. What is traffic engineering?
The ability to define routes dynamically, plan resource commitments on the basis of known
demand, and optimize network utilization is referred to as traffic engineering.
conference.
, or
traffic contracts.
16.. Define: Label switched routers.
An MPLS network or internet consisting of a set of nodes, called label switched router
(LSRs), capable of switching and routing packets on the basis of which a label has been
appended to each packet.
A routing algorithm that takes into account the traffic requirements of various flows and that
takes into account the resources available along various hops and through various nodes is
referred to as a constraint-based routing algorithm.
The translator is a simpler device that produces one or more outgoing RTP packets for each
incoming RTP packet. The translator may change the format of the data in the packet or use a
different lower-level protocol suite to transfer from one domain to another.
33. What is meant by ingress edge and egress edge in MPLS domain?
Ingress edge: Label switched router through which packets from internet router enters into
MPLS domain is called ingress edge.
Egress edge LSR: LSR through which packets leaves the MPLS domain is called egress edge.
38. What is the function of RTP relays and give its types?
A relay operating at a given protocol layer is an intermediate system that acts as both a
destination and a source in a data transfer.
42. Mention the protocol used for congestion control. (AU: May/June 2009)
RSVP (Resource reservation protocol.
TCP (transfer control protocol.