SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
1. How can you define contention network?
Contention network describe the situation where two or more nodes attempt to transmit a message
across the same wire at the same time.
 In contention networks, any node that has a packet to send, merely sends the packet
 It is clear that this type of network frequently experiences collisions
 The more nodes trying to communicate, the higher the chance of collisions
 Thus, contention networks are severely limited in the number of hosts possible
2. What is carrier sense multiple access? Define carrier sensing hardware with diagram?
Carrier Sense Multiple Access (CSMA) is a network protocol that listens to or senses network signals on
the carrier/medium before transmitting any data. CSMA is implemented in Ethernet network and is a
part of the Media Access Control (MAC) protocol.
 To reduce the number of collisions, the medium is tested for a signal before each transmission
 If a signal exists, the node waits
 Signal testing can be anything from detection of an electrical signal, to testing for photons
 Collisions can still occur (although less often)
 If a node tests for a signal before a transmission from another node, and transmits after, a
collision occurs
3. Define the components of a router with diagram?
Hardware components of a router:
 Network interfaces
 Interconnection network
 Processor with a memory and CPU
Commercial routers:
 Interconnection network and interface cards are sophisticated
 Processor is only responsible for control functions (route processor)
 Almost all forwarding is done on interface cards
Functional Components:
4. “Router has modularized network interfaces” Explain?
Often, routers have modularized network interfaces
a. One can add/remove/replace network interfaces as needs change
b. Some routers can accept network interface modules of different types (e.g. Ethernet,
Token Ring)
c. Each network interface would have its own:
i. Input buffer
ii. Output buffer
iii. Routing processor (in high-end routers)
5. What are the differences between hub, layer2 and layer3 switches? Explain with necessary
diagram?
Interface Card
Interconnection Network
Interface Card Interface Card
Processor
CPUMemory
Hub:
 Transmission from a station received by central hub and retransmitted on all outgoing lines
 Only one transmission at a time
Layer 2 Switch:
 Incoming frame switched to one outgoing line
 Many transmissions at same time
 Flat address space
 Broadcast storm
 Only one path between any 2 devices
 Solution 1: sub networks connected by routers
 Solution 2: layer 3 switching, packet-forwarding logic in hardware
Layer 3 Switch:
 Uses layer 3 routing to determine a path for packets
 Once a path is found, subsequent packets are switched
 This switching typically occurs on layer 2
6. Define packet tunneling in Internet with necessary diagram?
Tunneling is the transmission of data in such a way that the routing nodes in the network are unaware
that the transmission is from a different network.
Working principle:
 Source sends packets to an intermediate gateway
 Intermediate gateways put the whole packet into the payload field (don't interpret it).
 The destination will understand the packet
Tunneling a packet from Paris to London
7. What is shortest path routing? Find the shortest path from a source node to destination node?
Shortest Path Routing is a static routing algorithm that just finds the shortest path.
A graph is used to represent the network.
a. Each node of the graph represents a router.
b. Each arc of the graph represents a communication link.
c. To choose the route between a given pair of routers, the algorithm just finds the shortest
path between them on the graph.
Metric used in the shortest path.
a. Number of hops
b. Geographic distance in miles/kilometers
c. Transmission delay  fastest path
The first 5 steps used in computing the shortest path from A to D. The arrows indicate the working
node.
8. Explain different types of packet fragmentation with diagram? Suppose a 19 byte packet to be
transmitted along with 3 byte maximum segment length network. Show the segment numbering
systems of the packet. The packet number is 15.
Transparent Fragmentation
With transparent fragmentation, end hosts (sender and receiver) are unaware that fragmentation has
taken place.
A router fragments a packet, and the next-hop router on the same network reassembles the fragments
back into the original packet.
Non-Transparent Fragmentation:
As before, routers fragment packets when needed. Routers along the path do not reassemble.
Destination hosts perform re-assembly (if needed).
(a) Transparent fragmentation. (b) Nontransparent fragmentation.
9. Explain briefly the functions of routing processor.
• Routing processors have two functions:
1. Maintain and exchange routing data with other routers in the network
Often this involves computing the forwarding table from data received by other routers
2. Use the forwarding table data to configure the switching fabric to forward the packet to the
correct output port
10. Describe briefly the construction of routers of different generation with necessary diagram.
1st
Generation
• This architecture is still used in low end routers
• Arriving packets are copied to main memory via direct memory access (DMA)
• Interconnection network is shared bus
• All IP forwarding functions are performed in the central processor.
• Routing cache at processor can accelerate the routing table lookup.
2nd
Generation
• Keeps shared bus architecture, but offloads most IP forwarding to interface cards
• Interface cards have local route cache and processing elements
Fast path: If routing entry is found in local cache, forward packet directly to outgoing interface
Slow path: If routing table entry is not in cache, packet must be handled by central CPU
3rd
Generation
• Interconnection network is a switch fabric (e.g., a crossbar switch)
• Distributed architecture:
Memory
Shared Bus
DMA
MAC
DMA
MAC
Interface
Card
DMA
MAC
Route Processor
Interface
Card
Interface
Card
CacheCPU
Shared Bus
Interface
Cards
DMA
MAC
DMA
MAC
DMA
MAC
Route Cache
Memory
Route Cache
Memory
Route Cache
Memory
Route Processor
slow path
fast path
MemoryCacheCPU
slow path
fast path
– Interface cards operate independently of each other
– No centralized processing for IP forwarding
• These routers can be scaled to many hundred interface cards and to aggregate capacity of > 1
Terabit per second
11. Find the minimum spanning tree for the weighted graph in figure.
https://www.youtube.com/watch?v=3isltkMwxEs
12. Describe the routing protocol for mobile host with necessary diagram.
All hosts are assumed to have a permanent home location (home address) that never changes.
Each area has one or more foreign agents (FA), keeping track of all mobile hosts (MH) visiting the area.
Each area has a home agent (HA), which keep track of hosts whose home is in the area but are
currently visiting another area.
A WAN to which LANs, MANs, and wireless cells are attached
• When a new host enters an area, it registers with the FA.
– Each FA periodically announces its existence and address. The newly-arrived mobile host
(MH) waits for one of these messages. If no message is received, it broadcasts a message
and asks for FAs.
– The MH sends its home address, link layer address, and some security info to the FA.
Interface
Cards CPU
Memory
Route
Processor
Memory
Route
Processing
MAC
Switch
Fabric
Interface
Switch
Fabric
Memory
Route
Processing
MAC
Switch
Fabric
Interface
– The FA contracts the HA.
– The HA examines the security info and records the temporary location of the MH.
– The FA gets ACK from HA, and informs MH that it has been registered.
Packet routing for mobile users
13. How can you define TCP/IP tunneling over ATM? Explain the categories of services that ATM
provides.
 TCP/IP tunneling allows transmission of TCP/IP packets over ATM (and other non-TCP/IP) networks
 The use of TCP/IP over these networks allows applications which normally only run on TCP/IP
networks to operate on all networks
 ATM provides 4 service categories:
o CBR (Constant Bit Rate): A constant bandwidth is reserved and guaranteed by the
network
o UBR (Unspecified Bit Rate): Data is transmitted when bandwidth is available, and not
when bandwidth is not available
o ABR (Available Bit Rate): The network will provide feedback about network
congestion, under the assumption the node will adjust its transmission to meet the
current availability of network bandwidth
o VBR (Variable Bit Rate): A minimum bandwidth is reserved and guaranteed by the
network, although available bandwidth may increase/peak above this value
 RT (Real Time): Fluctuation of bandwidth is minimized
 Used for non-guaranteed streaming audio/video
 NRT (Non Real Time): Any bandwidth available is used
 Used for downloads
14. What is distance vector routing? Explain with example.
Distance Vector Routing algorithm – Dynamic routing
a. Each router maintains a table (vector), giving the best known distance to each destination
and the outgoing line to get there.
b. These tables are updated by exchanging information with the neighbors.
c. The metric used might be the number of hops, the time delay, or the number of queued
packets.
d. The router is assumed to know the “distance” to each of its neighbors.
(a) A subnet. (b) Input from A, I, H, K, and the new routing table for J.
15. Explain the link state routing construction routing packets for a subnet.
Link State Routing is a dynamic routing.
Each router must do the following:
a. Discover its neighbors, learn their network address.
b. Measure the delay or cost to each of its neighbors.
c. Construct a packet telling all it has just learned.
d. Send this packet to all other routers.
e. Compute the shortest path to every other router.
(a) A subnet. (b) The link state packets for this subnet
16. Explain the hierarchical routing with necessary diagram.
With the increase of network/routers, it is infeasible to have an entry for each router. The
hierarchical routing is required.
a. Divide the routers into regions.
b. The router only knows details to route packets to the destination within the same region.
c. But may not be optimal (e.g., the best route from 1A to 5C is via region 2, but since the
route via region 3 is better for most nodes in region 5.
Hierarchical routing
17. Name and define the hardware components of a router. Show the routers functional components
with diagram.
Check number 3 answer.
18. What is ATM network? Define the logical connections used in ATM networks.
ATM networks are packet-switched, but still create a (virtual) circuit through the network
a. Before transfer can occur, the network must create a path (called a virtual circuit) between
the two machines
b. Once the virtual circuit (VC) has been established, packets can be transferred between the
machines
Use optical fiber similar to that used for FDDI networks
- ATM runs on network hardware called SONET
ATM cells (packets) are 53 octets long
- 5 bytes of header information
- 48 bytes of data
Logical Connections:
- VCC (Virtual Channel Connection): a logical connection analogous to virtual circuit in X.25
- VPC (Virtual Path Connection): a
bundle of VCCs with same
endpoints
19. Explain ATM protocol architecture. Define ATM cell format.
Fixed-size packets called cells
Streamlined: minimal error and flow control
2 protocol layers relate to ATM functions:
a. Common layer providing packet transfers
b. Service dependent ATM adaptation layer (AAL)
AAL maps other protocols to ATM
Protocol model has three planes:
• User
• Control
• management
ATM Cell Format: Data Cells
• Generic flow control: Control traffic flow.
• Virtual path identifier: An identifier for the virtual path/circuit
• Virtual channel identifier: An identifier to identify which channel within the specified virtual
path/circuit
• Payload Type: 3 flag bits
• Cell loss priority: Should the cell be discarded in the event of a congested switch?
• Header error check: Cyclical redundancy check for the cell header
20. Explain the way of creating ATM virtual circuits
Creating a virtual circuit has been compared to making a telephone call
A network node sends a request to the ATM switch specifying the destination
The switch interacts with any other switches necessary to align themselves to form a complete path
When communication is complete, the node sends a disconnect message to the switch
The switch will then notify all switches involved to release the connection
21. What do you mean by segmentation & reassembly in ATM network? Define ATM switching with
necessary diagram.
Segmentation:
• Segmentation is the process of turning a chunk of data into a group of ATM cells
– For example, the chunk of data might be a packet from another type of network
• e.g. An Ethernet frame
• Since ATM cells travel on the same virtual circuit, they do not arrive out of order
– Thus sequencing information is not necessary
• Each sequence of 48 octets is sent in its own cell
Reassembly:
• Reassembly is the process of recombining ATM cells into the original data chunk
• As the destination node receives cells, it removes the 48 octets and appends it to the end of a
buffer
• One of the configuration parameters, called ‘Payload Type’ is used to indicate the final cell
ATM Switching:
• As can be seen in the diagram, ATM switches exist entirely in the hardware layer
• As a result, they are much faster than routers, which require software execution
– Routers must read packets from electronic signals into a memory buffer (which is slow)
– Routers then convert packets back into electronic signals onto a new network connection
22. Write the drawbacks of ATM network.
Small, finite sized cells provide faster transmission speeds
- However, 53 octet cells are incompatible with other technologies which are in widespread use
ATM addressing also differs significantly from other forms of addressing
- For example the TCP/IP protocol suite is the most common network protocol system
- Most Internet applications are based on TCP/IP
ATM networks are not broadcast networks
- Each cell only arrives at its intended destination
- Broadcasting & multicasting are not directly supported
23. Show the internetworking using concatenated virtual circuits and connectionless internetworking.
Concatenated Virtual Circuits:
a. A connection to a remote host is set up by concatenating virtual circuits in all networks it
passes by.
b. Gateways response for converting packet format and maintaining VC.
c. Work best when all network have the same properties.
i. All reliable or all unreliable.
Can also be done on transport layer
Internetworking using concatenated virtual circuits
Connectionless internetworking:
– inject datagram’s into subnets and hope for the best
– packets may not follow the same route
– Also works on VC subnet.
A connectionless internet
24. Name and define the network properties.
Scope: A network should provide services to several applications
Scalability: A network should operate efficiently when deployed on a small-scale as well as on a large-
scale
Robustness: A network should operate in spite of failures or lost data
Self-Stabilization: A network, after a failure or other problem, should return to normal (or near
normal) without human intervention
Auto configurability: A network should optimize its own parameters in order to achieve better
performance
Safety: A network should prevent failures as well as prevent failures from affecting other areas of the
network
Configurability: A network’s parameters should be configurable to improve performance
Determinism: Two networks with identical conditions should yield identical results
Migration: It should be possible to add new features to a network without disruption of network
service
25. Explain the TCP/IP protocol in action using a simplified network route.
The TCP/IP Protocol in Action
 Consider the following simplified network
route
 The source (S) and destination (D) are
separated by two routers (R1, R2)
S DR1 R2
51
The TCP/IP Protocol in Action
 Let’s consider a web browser, using HTTP
 The web browser on S sends a packet to the web
server on D
 The application layer (i.e. the browser) provides the
logical (IP) addresses for S (IPS) and D (IPD)
 The application layer also provides the port numbers
for the source (PortS) and destination (PortD)
S DR1 R2
HTTP Req
52
The TCP/IP Protocol in Action
 The Transport layer (TCP) uses the port
numbers (e.g. 2765 and 80) to create a TCP
packet (sometimes called a segment):
S DR1 R2
Source Port: 2765
Destination Port: 80
HTTP Req 53
Source IP: 137.207.140.71
Dest IP: 24.87.204.16
The TCP/IP Protocol in Action
 The Internet (i.e. IP) layer uses the IP
addresses specified by the application layer
to create an IP datagram
 e.g. 137.207.140.71, 24.87.204.16
 Next, a route is determined for the packet,
using S’s routing table
 S only needs one router’s address (R1)
S DR1 R2
TCP Segment
HTTP Req 54
Source MAC: MACS
Dest MAC: MACR1
IP Datagram
The TCP/IP Protocol in Action
 The MAC addresses of S and R1 (MACS and
MACR1) are used to create a network frame
 If the MAC address of R1 is not known, ARP
(address resolution protocol) is used
S DR1 R2
TCP Segment
HTTP Req
55
Source MAC: MACS
Dest MAC: MACR1
IP Datagram
The TCP/IP Protocol in Action
 Let’s simplify the picture (for clarity)
 In subsequent steps the IP datagram and its
contents will not change very much
S DR1 R2
56
Source MAC: MACS
Dest MAC: MACR1
IP Datagram
The TCP/IP Protocol in Action
 The network frame is transmitted on the
network to R1
 This is possible since S and R1 are both
members of the same network
S DR1 R2
57
IP Datagram
The TCP/IP Protocol in Action
 R1 will extract the IP datagram from the
payload of the network frame
 R1 looks up the destination IP address (IPD) in
it’s routing table, to determine which router
should get the datagram next (R2)
S DR1 R2
58
Source MAC: MACR1
Dest MAC: MACR2
IP Datagram
The TCP/IP Protocol in Action
 R1 uses its own MAC address (MACR1) and
R2’s MAC address (MACR2) to create another
network frame
S DR1 R2
59
Source MAC: MACR1
Dest MAC: MACR2
IP Datagram
The TCP/IP Protocol in Action
 The network frame is received by R2, and the
IP datagram is extracted from it’s payload
 R2 uses its routing table to lookup IPD
 In this case, R2 is directly connected to D
 This is called direct routing
S DR1 R2
60
ARP Request
IP: 24.87.204.16
MAC: ?
IP Datagram
The TCP/IP Protocol in Action
 Most likely, R2 does not have the MAC
address of D (MACD)
 The address resolution protocol (ARP) is used
to determine the MAC address:
S DR1 R2
61
ARP Response
IP: 24.87.204.16
MAC: 08-7F-3C-90-0C-DF
IP Datagram
The TCP/IP Protocol in Action
 D recognizes it’s IP address and responds
with its MAC address (MACD)
 e.g. 08-7F-3C-90-0C-DF
S DR1 R2
62
Source MAC: MACR2
Dest MAC: MACD
IP Datagram
The TCP/IP Protocol in Action
 A network frame is created by R2 now that
the MAC address is known
 The frame is sent directly to D
S DR1 R2
63
Source MAC: MACR2
Dest MAC: MACD
IP Datagram
The TCP/IP Protocol in Action
 D extracts the IP datagram from the network
frame (which is discarded)
 The IP datagram’s payload is passed to the
transport layer
S DR1 R2
64
The TCP/IP Protocol in Action
 The Transport layer (within D’s operating
system), will use the port numbers specified
in the TCP segment to determine to which
application it should send the segment
 In this case, to the application bound to port
80 (the web server)
S DR1 R2
Source Port: 2765
Destination Port: 80
HTTP Req65
The TCP/IP Protocol in Action
 Now, the web server on D has the HTTP
request, and it processes it
 An HTTP response is sent back using the
same process
 The web server uses the same IP addresses
and logical addresses as the last message
S DR1 R2
HTTP Req
66
26. Name & define different types of network bridges.
There are four types of network bridges:
1. Transparent basic bridge
2. Source routing bridge
3. Transparent learning bridge
4. Transparent spanning bridge
The Transparent Basic Bridge
The simplest type of bridge is the transparent basic bridge. It stores the traffic until it can transmit it to
the next network. The amount of time the data is stored is very brief. Traffic is sent to all ports except the
port from which the bridge received the data. No conversion of traffic is performed by a bridge. In this
regard, the bridge is similar to a repeater.
Source Routing Bridge
The route through the LAN internet is determined by the source (originator) of the traffic hence this bridge
is called as source routing bridge. The routing information field (RIF) in the LAN frame header, contains the
information of route followed by the LAN network.
The Transparent Learning Bridge
The transparent bridge finds the location of user using the source and destination address. When the
frame is received at the bridge it checks its source address and the destination address. The destination
address is stored if it was not found in a routing table. Then the frame sent to all LAN excluding the LAN
from which it came. The source address is also stored in the routing table. If another frame is arrived in
which the previous source address is now its destination address then it is forwarded to that port.
The Transparent Spanning Tree Bridge
These bridges use a subnet of the full topology to create a loop free operation.
27. Short notes on routers input buffer, output buffer, processor, switching fabric.
Input Buffer:
The incoming packets of a network interface are placed in input buffers
 These are banks of very high speed memory for packet queuing prior to processing
 The packet is stored here until the routing processor is available
The network interface may have a routing processor, which would:
a. have a copy of the forwarding table (to prevent concurrent access)
b. lookup the destination address in this forwarding table, to determine the correct output port
c. configure the switching fabric to forward the packet to the correct output buffer
Low-end routers would share one routing processor
Output Buffer:
The switching fabric gets the packet to the right output port
 However, that port’s network may not be immediately available
 The packets are stored in the output buffer until the network is available
Routing Processor:
• A routing processor is software which executes on a CPU:
– Off-the-shelf CPU
• These are very inexpensive
• However, the performance of these CPUs is low since they are not optimized for
the types of operations a router typically needs to perform
– Application-Specific Integrated Circuit (ASIC)
• These are expensive to design (time and money)
• They are optimized for typical routing operations
• High-end routers use these to achieve higher performance levels
Switching Fabric:
• Switching fabric’s job is to move packets from the input buffer into the correct output buffer
– The routing processor determines the correct output port, using the forwarding table
• Switching fabric comes in 3 major types:
– In-memory switching fabric:
• The packets are input into the routing processor’s memory, and output into the
correct output buffer
– Bus-based switching fabric:
• The packets move along a shared bus (similar to a network bus) to the correct
output buffer
– Crossbar switching fabric:
• The packets move along a grid of redundant buses
• If any bus fails, alternate paths exist so that forwarding can continue
28. What is switching? Write the reasons for switching in communication.
The establishing, on-demand, of an individual connection from a desired inlet to a desired outlet within
a set of inlets and outlets for as long as is required for the transfer of information.
 Switching implies directing of information flows in communications networks based on known
rules
 Switching takes place in specialized network nodes
 Data switched on bit, octet, frame or packet level
 Size of a switched data unit is variable or fixed
Reasons for switching in communication:
 Switches allow reduction in overall network cost by reducing number and/or cost of transmission
links required to enable a given user population to communicate
 Limited number of physical connections implies need for sharing of transport resources, which
means
 better utilization of transport capacity
 use of switching
 Switching systems are central components in communications networks
29. Describe the main building block of a switch. Define basic type of switching networks.
30. Explain different types of switching modes. Define label switching.
Types of switching modes:
• Circuit switching
• Cell switching
• Packet switching
– Routing
– Layer 3 - 7 switching
– Label switching
Circuit Switching:
 End-to-end circuit established for a connection
 Signaling used to set-up, maintain and release circuits
 Circuit offers constant bit rate and constant transport delay
 Equal quality offered to all connections
 Transport capacity of a circuit cannot be shared
 Applied in conventional telecommunications networks (e.g.
PDH/PCM and N-ISDN)
Cell switching:
• Virtual circuit (VC) established for a connection
• Data transported in fixed length frames (cells), which carry information needed for routing cells along
established VCs
• Forwarding tables in network nodes
• Signaling used to set-up, maintain and release VCs as well as update forwarding tables
• VCs offer constant or variable bit rates and transport delay
• Transport capacity of links shared by a number of connections (statistical multiplexing)
• Different quality classes supported
• Applied, e.g. in ATM networks
Packet switching:
 No special transport path established for a connection
 Variable length data packets carry information used by network nodes in making forwarding
decisions
 No signaling needed for connection setup
 Forwarding tables in network nodes are updated by routing protocols
 No guarantees for bit rate or transport delay
 Best effort service for all connections in conventional packet switched networks
 Transport capacity of links shared effectively
 Applied in IP (Internet Protocol) based networks

Label Switching:
 Evolved from the need to speed up connectionless packet switching and utilize L2-switching in
packet forwarding
 A label switched path (LSP) established for a connection
 Forwarding tables in network nodes
 Signaling used to set-up, maintain and release LSPs
 A label is inserted in front of a L3 packet (behind L2 frame header)
 Packets forwarded along established LSPs by using labels in L2 frames
 Quality of service supported
 Applied, e.g. in ATM, Ethernet and PPP
 Generalized label switching scheme (GMPLS) extends MPLS to be applied also in optical networks,
i.e., enables light waves to be used as LSPs

Más contenido relacionado

La actualidad más candente

Documentation project of college management [1]
Documentation project of college management [1]Documentation project of college management [1]
Documentation project of college management [1]Priyaranjan Verma
 
Campus Management System
Campus Management SystemCampus Management System
Campus Management SystemAsif Hussain
 
Synopsis on railway reservation system
Synopsis on railway reservation systemSynopsis on railway reservation system
Synopsis on railway reservation systemAnkit Verma
 
Course registration system dfd
Course registration system dfdCourse registration system dfd
Course registration system dfdUtsav mistry
 
Online Railway Reservation System
Online Railway Reservation SystemOnline Railway Reservation System
Online Railway Reservation SystemSanjay Saluth
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceNitesh Dubey
 
Bus management system
Bus management systemBus management system
Bus management systemShamim Ahmed
 
Payroll management system_synopsis
Payroll management system_synopsisPayroll management system_synopsis
Payroll management system_synopsisSameer Bhatt
 
Documentation of railway reservation system
Documentation of railway reservation systemDocumentation of railway reservation system
Documentation of railway reservation systemSandip Murari
 
College Management System
College Management SystemCollege Management System
College Management SystemAsfaque Khalid
 
Online Bus Ticket Reservation System
Online Bus Ticket Reservation SystemOnline Bus Ticket Reservation System
Online Bus Ticket Reservation SystemTuvshinbayar Davaa
 
Presentation of database management system
Presentation of database management systemPresentation of database management system
Presentation of database management systemMd. Touhidur Rahman
 
Online Railway Reservation System
Online Railway Reservation SystemOnline Railway Reservation System
Online Railway Reservation SystemPrince Kumar
 
Hard copy of proj doc
Hard copy of proj docHard copy of proj doc
Hard copy of proj docnawaldiatm
 
A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementsvrohith 9
 
Online Shopping project report
Online Shopping project report Online Shopping project report
Online Shopping project report Surjeet Art
 
Online courseregistration tolstoy
Online courseregistration   tolstoyOnline courseregistration   tolstoy
Online courseregistration tolstoyyirgalem ameshe
 

La actualidad más candente (20)

Documentation project of college management [1]
Documentation project of college management [1]Documentation project of college management [1]
Documentation project of college management [1]
 
Campus Management System
Campus Management SystemCampus Management System
Campus Management System
 
Mobile based Bus Ticketing System
Mobile based Bus Ticketing SystemMobile based Bus Ticketing System
Mobile based Bus Ticketing System
 
Online final report
Online final reportOnline final report
Online final report
 
Synopsis on railway reservation system
Synopsis on railway reservation systemSynopsis on railway reservation system
Synopsis on railway reservation system
 
Course registration system dfd
Course registration system dfdCourse registration system dfd
Course registration system dfd
 
Online Railway Reservation System
Online Railway Reservation SystemOnline Railway Reservation System
Online Railway Reservation System
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
 
Bus management system
Bus management systemBus management system
Bus management system
 
Payroll management system_synopsis
Payroll management system_synopsisPayroll management system_synopsis
Payroll management system_synopsis
 
Documentation of railway reservation system
Documentation of railway reservation systemDocumentation of railway reservation system
Documentation of railway reservation system
 
College Management System
College Management SystemCollege Management System
College Management System
 
Online Bus Ticket Reservation System
Online Bus Ticket Reservation SystemOnline Bus Ticket Reservation System
Online Bus Ticket Reservation System
 
Presentation of database management system
Presentation of database management systemPresentation of database management system
Presentation of database management system
 
Hostel management system
Hostel  management systemHostel  management system
Hostel management system
 
Online Railway Reservation System
Online Railway Reservation SystemOnline Railway Reservation System
Online Railway Reservation System
 
Hard copy of proj doc
Hard copy of proj docHard copy of proj doc
Hard copy of proj doc
 
A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe management
 
Online Shopping project report
Online Shopping project report Online Shopping project report
Online Shopping project report
 
Online courseregistration tolstoy
Online courseregistration   tolstoyOnline courseregistration   tolstoy
Online courseregistration tolstoy
 

Similar a Answer sheet of switching & routing

Similar a Answer sheet of switching & routing (20)

Mac
MacMac
Mac
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
Switches androuters
Switches androutersSwitches androuters
Switches androuters
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxChapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptx
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Networks notes
Networks notesNetworks notes
Networks notes
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
CCNA DUMPS 640-802
CCNA DUMPS 640-802CCNA DUMPS 640-802
CCNA DUMPS 640-802
 

Más de Md. Mashiur Rahman (20)

Rule for creating power point slide
Rule for creating power point slideRule for creating power point slide
Rule for creating power point slide
 
Advance DBMS
Advance DBMSAdvance DBMS
Advance DBMS
 
Final exam in advance dbms
Final exam in advance dbmsFinal exam in advance dbms
Final exam in advance dbms
 
Routing and switching question1
Routing and switching question1Routing and switching question1
Routing and switching question1
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworking
 
Lec 7 query processing
Lec 7 query processingLec 7 query processing
Lec 7 query processing
 
Lec 1 indexing and hashing
Lec 1 indexing and hashing Lec 1 indexing and hashing
Lec 1 indexing and hashing
 
Cloud computing lecture 7
Cloud computing lecture 7Cloud computing lecture 7
Cloud computing lecture 7
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
parallel Questions & answers
parallel Questions & answersparallel Questions & answers
parallel Questions & answers
 
Mis 8
Mis 8Mis 8
Mis 8
 
Mis 3
Mis 3Mis 3
Mis 3
 
Mis 1
Mis 1Mis 1
Mis 1
 
Mis 5
Mis 5Mis 5
Mis 5
 
Mis 2
Mis 2Mis 2
Mis 2
 
Mis 9
Mis 9Mis 9
Mis 9
 
Mis 6
Mis 6Mis 6
Mis 6
 
Mis 7
Mis 7Mis 7
Mis 7
 
Mis 4
Mis 4Mis 4
Mis 4
 
Computer network solution
Computer network solutionComputer network solution
Computer network solution
 

Último

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Último (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Answer sheet of switching & routing

  • 1. 1. How can you define contention network? Contention network describe the situation where two or more nodes attempt to transmit a message across the same wire at the same time.  In contention networks, any node that has a packet to send, merely sends the packet  It is clear that this type of network frequently experiences collisions  The more nodes trying to communicate, the higher the chance of collisions  Thus, contention networks are severely limited in the number of hosts possible 2. What is carrier sense multiple access? Define carrier sensing hardware with diagram? Carrier Sense Multiple Access (CSMA) is a network protocol that listens to or senses network signals on the carrier/medium before transmitting any data. CSMA is implemented in Ethernet network and is a part of the Media Access Control (MAC) protocol.  To reduce the number of collisions, the medium is tested for a signal before each transmission  If a signal exists, the node waits  Signal testing can be anything from detection of an electrical signal, to testing for photons  Collisions can still occur (although less often)  If a node tests for a signal before a transmission from another node, and transmits after, a collision occurs 3. Define the components of a router with diagram? Hardware components of a router:  Network interfaces  Interconnection network  Processor with a memory and CPU Commercial routers:  Interconnection network and interface cards are sophisticated  Processor is only responsible for control functions (route processor)  Almost all forwarding is done on interface cards
  • 2. Functional Components: 4. “Router has modularized network interfaces” Explain? Often, routers have modularized network interfaces a. One can add/remove/replace network interfaces as needs change b. Some routers can accept network interface modules of different types (e.g. Ethernet, Token Ring) c. Each network interface would have its own: i. Input buffer ii. Output buffer iii. Routing processor (in high-end routers) 5. What are the differences between hub, layer2 and layer3 switches? Explain with necessary diagram? Interface Card Interconnection Network Interface Card Interface Card Processor CPUMemory
  • 3. Hub:  Transmission from a station received by central hub and retransmitted on all outgoing lines  Only one transmission at a time Layer 2 Switch:  Incoming frame switched to one outgoing line  Many transmissions at same time  Flat address space  Broadcast storm  Only one path between any 2 devices  Solution 1: sub networks connected by routers  Solution 2: layer 3 switching, packet-forwarding logic in hardware Layer 3 Switch:  Uses layer 3 routing to determine a path for packets  Once a path is found, subsequent packets are switched  This switching typically occurs on layer 2 6. Define packet tunneling in Internet with necessary diagram? Tunneling is the transmission of data in such a way that the routing nodes in the network are unaware that the transmission is from a different network. Working principle:  Source sends packets to an intermediate gateway  Intermediate gateways put the whole packet into the payload field (don't interpret it).  The destination will understand the packet
  • 4. Tunneling a packet from Paris to London 7. What is shortest path routing? Find the shortest path from a source node to destination node? Shortest Path Routing is a static routing algorithm that just finds the shortest path. A graph is used to represent the network. a. Each node of the graph represents a router. b. Each arc of the graph represents a communication link. c. To choose the route between a given pair of routers, the algorithm just finds the shortest path between them on the graph. Metric used in the shortest path. a. Number of hops b. Geographic distance in miles/kilometers c. Transmission delay  fastest path
  • 5. The first 5 steps used in computing the shortest path from A to D. The arrows indicate the working node. 8. Explain different types of packet fragmentation with diagram? Suppose a 19 byte packet to be transmitted along with 3 byte maximum segment length network. Show the segment numbering systems of the packet. The packet number is 15. Transparent Fragmentation With transparent fragmentation, end hosts (sender and receiver) are unaware that fragmentation has taken place. A router fragments a packet, and the next-hop router on the same network reassembles the fragments back into the original packet. Non-Transparent Fragmentation: As before, routers fragment packets when needed. Routers along the path do not reassemble. Destination hosts perform re-assembly (if needed). (a) Transparent fragmentation. (b) Nontransparent fragmentation. 9. Explain briefly the functions of routing processor. • Routing processors have two functions: 1. Maintain and exchange routing data with other routers in the network Often this involves computing the forwarding table from data received by other routers 2. Use the forwarding table data to configure the switching fabric to forward the packet to the correct output port
  • 6. 10. Describe briefly the construction of routers of different generation with necessary diagram. 1st Generation • This architecture is still used in low end routers • Arriving packets are copied to main memory via direct memory access (DMA) • Interconnection network is shared bus • All IP forwarding functions are performed in the central processor. • Routing cache at processor can accelerate the routing table lookup. 2nd Generation • Keeps shared bus architecture, but offloads most IP forwarding to interface cards • Interface cards have local route cache and processing elements Fast path: If routing entry is found in local cache, forward packet directly to outgoing interface Slow path: If routing table entry is not in cache, packet must be handled by central CPU 3rd Generation • Interconnection network is a switch fabric (e.g., a crossbar switch) • Distributed architecture: Memory Shared Bus DMA MAC DMA MAC Interface Card DMA MAC Route Processor Interface Card Interface Card CacheCPU Shared Bus Interface Cards DMA MAC DMA MAC DMA MAC Route Cache Memory Route Cache Memory Route Cache Memory Route Processor slow path fast path MemoryCacheCPU slow path fast path
  • 7. – Interface cards operate independently of each other – No centralized processing for IP forwarding • These routers can be scaled to many hundred interface cards and to aggregate capacity of > 1 Terabit per second 11. Find the minimum spanning tree for the weighted graph in figure. https://www.youtube.com/watch?v=3isltkMwxEs 12. Describe the routing protocol for mobile host with necessary diagram. All hosts are assumed to have a permanent home location (home address) that never changes. Each area has one or more foreign agents (FA), keeping track of all mobile hosts (MH) visiting the area. Each area has a home agent (HA), which keep track of hosts whose home is in the area but are currently visiting another area. A WAN to which LANs, MANs, and wireless cells are attached • When a new host enters an area, it registers with the FA. – Each FA periodically announces its existence and address. The newly-arrived mobile host (MH) waits for one of these messages. If no message is received, it broadcasts a message and asks for FAs. – The MH sends its home address, link layer address, and some security info to the FA. Interface Cards CPU Memory Route Processor Memory Route Processing MAC Switch Fabric Interface Switch Fabric Memory Route Processing MAC Switch Fabric Interface
  • 8. – The FA contracts the HA. – The HA examines the security info and records the temporary location of the MH. – The FA gets ACK from HA, and informs MH that it has been registered. Packet routing for mobile users 13. How can you define TCP/IP tunneling over ATM? Explain the categories of services that ATM provides.  TCP/IP tunneling allows transmission of TCP/IP packets over ATM (and other non-TCP/IP) networks  The use of TCP/IP over these networks allows applications which normally only run on TCP/IP networks to operate on all networks  ATM provides 4 service categories: o CBR (Constant Bit Rate): A constant bandwidth is reserved and guaranteed by the network o UBR (Unspecified Bit Rate): Data is transmitted when bandwidth is available, and not when bandwidth is not available o ABR (Available Bit Rate): The network will provide feedback about network congestion, under the assumption the node will adjust its transmission to meet the current availability of network bandwidth o VBR (Variable Bit Rate): A minimum bandwidth is reserved and guaranteed by the network, although available bandwidth may increase/peak above this value  RT (Real Time): Fluctuation of bandwidth is minimized  Used for non-guaranteed streaming audio/video  NRT (Non Real Time): Any bandwidth available is used  Used for downloads 14. What is distance vector routing? Explain with example. Distance Vector Routing algorithm – Dynamic routing a. Each router maintains a table (vector), giving the best known distance to each destination and the outgoing line to get there. b. These tables are updated by exchanging information with the neighbors. c. The metric used might be the number of hops, the time delay, or the number of queued packets.
  • 9. d. The router is assumed to know the “distance” to each of its neighbors. (a) A subnet. (b) Input from A, I, H, K, and the new routing table for J. 15. Explain the link state routing construction routing packets for a subnet. Link State Routing is a dynamic routing. Each router must do the following: a. Discover its neighbors, learn their network address. b. Measure the delay or cost to each of its neighbors. c. Construct a packet telling all it has just learned. d. Send this packet to all other routers. e. Compute the shortest path to every other router. (a) A subnet. (b) The link state packets for this subnet 16. Explain the hierarchical routing with necessary diagram. With the increase of network/routers, it is infeasible to have an entry for each router. The hierarchical routing is required. a. Divide the routers into regions. b. The router only knows details to route packets to the destination within the same region.
  • 10. c. But may not be optimal (e.g., the best route from 1A to 5C is via region 2, but since the route via region 3 is better for most nodes in region 5. Hierarchical routing 17. Name and define the hardware components of a router. Show the routers functional components with diagram. Check number 3 answer. 18. What is ATM network? Define the logical connections used in ATM networks. ATM networks are packet-switched, but still create a (virtual) circuit through the network a. Before transfer can occur, the network must create a path (called a virtual circuit) between the two machines b. Once the virtual circuit (VC) has been established, packets can be transferred between the machines Use optical fiber similar to that used for FDDI networks - ATM runs on network hardware called SONET ATM cells (packets) are 53 octets long - 5 bytes of header information - 48 bytes of data Logical Connections: - VCC (Virtual Channel Connection): a logical connection analogous to virtual circuit in X.25 - VPC (Virtual Path Connection): a bundle of VCCs with same endpoints
  • 11. 19. Explain ATM protocol architecture. Define ATM cell format. Fixed-size packets called cells Streamlined: minimal error and flow control 2 protocol layers relate to ATM functions: a. Common layer providing packet transfers b. Service dependent ATM adaptation layer (AAL) AAL maps other protocols to ATM Protocol model has three planes: • User • Control • management ATM Cell Format: Data Cells • Generic flow control: Control traffic flow. • Virtual path identifier: An identifier for the virtual path/circuit • Virtual channel identifier: An identifier to identify which channel within the specified virtual path/circuit • Payload Type: 3 flag bits • Cell loss priority: Should the cell be discarded in the event of a congested switch? • Header error check: Cyclical redundancy check for the cell header 20. Explain the way of creating ATM virtual circuits Creating a virtual circuit has been compared to making a telephone call A network node sends a request to the ATM switch specifying the destination
  • 12. The switch interacts with any other switches necessary to align themselves to form a complete path When communication is complete, the node sends a disconnect message to the switch The switch will then notify all switches involved to release the connection 21. What do you mean by segmentation & reassembly in ATM network? Define ATM switching with necessary diagram. Segmentation: • Segmentation is the process of turning a chunk of data into a group of ATM cells – For example, the chunk of data might be a packet from another type of network • e.g. An Ethernet frame • Since ATM cells travel on the same virtual circuit, they do not arrive out of order – Thus sequencing information is not necessary • Each sequence of 48 octets is sent in its own cell Reassembly: • Reassembly is the process of recombining ATM cells into the original data chunk • As the destination node receives cells, it removes the 48 octets and appends it to the end of a buffer • One of the configuration parameters, called ‘Payload Type’ is used to indicate the final cell ATM Switching: • As can be seen in the diagram, ATM switches exist entirely in the hardware layer • As a result, they are much faster than routers, which require software execution – Routers must read packets from electronic signals into a memory buffer (which is slow) – Routers then convert packets back into electronic signals onto a new network connection 22. Write the drawbacks of ATM network. Small, finite sized cells provide faster transmission speeds - However, 53 octet cells are incompatible with other technologies which are in widespread use
  • 13. ATM addressing also differs significantly from other forms of addressing - For example the TCP/IP protocol suite is the most common network protocol system - Most Internet applications are based on TCP/IP ATM networks are not broadcast networks - Each cell only arrives at its intended destination - Broadcasting & multicasting are not directly supported 23. Show the internetworking using concatenated virtual circuits and connectionless internetworking. Concatenated Virtual Circuits: a. A connection to a remote host is set up by concatenating virtual circuits in all networks it passes by. b. Gateways response for converting packet format and maintaining VC. c. Work best when all network have the same properties. i. All reliable or all unreliable. Can also be done on transport layer Internetworking using concatenated virtual circuits Connectionless internetworking: – inject datagram’s into subnets and hope for the best – packets may not follow the same route – Also works on VC subnet. A connectionless internet
  • 14. 24. Name and define the network properties. Scope: A network should provide services to several applications Scalability: A network should operate efficiently when deployed on a small-scale as well as on a large- scale Robustness: A network should operate in spite of failures or lost data Self-Stabilization: A network, after a failure or other problem, should return to normal (or near normal) without human intervention Auto configurability: A network should optimize its own parameters in order to achieve better performance Safety: A network should prevent failures as well as prevent failures from affecting other areas of the network Configurability: A network’s parameters should be configurable to improve performance Determinism: Two networks with identical conditions should yield identical results Migration: It should be possible to add new features to a network without disruption of network service 25. Explain the TCP/IP protocol in action using a simplified network route. The TCP/IP Protocol in Action  Consider the following simplified network route  The source (S) and destination (D) are separated by two routers (R1, R2) S DR1 R2 51 The TCP/IP Protocol in Action  Let’s consider a web browser, using HTTP  The web browser on S sends a packet to the web server on D  The application layer (i.e. the browser) provides the logical (IP) addresses for S (IPS) and D (IPD)  The application layer also provides the port numbers for the source (PortS) and destination (PortD) S DR1 R2 HTTP Req 52 The TCP/IP Protocol in Action  The Transport layer (TCP) uses the port numbers (e.g. 2765 and 80) to create a TCP packet (sometimes called a segment): S DR1 R2 Source Port: 2765 Destination Port: 80 HTTP Req 53 Source IP: 137.207.140.71 Dest IP: 24.87.204.16 The TCP/IP Protocol in Action  The Internet (i.e. IP) layer uses the IP addresses specified by the application layer to create an IP datagram  e.g. 137.207.140.71, 24.87.204.16  Next, a route is determined for the packet, using S’s routing table  S only needs one router’s address (R1) S DR1 R2 TCP Segment HTTP Req 54
  • 15. Source MAC: MACS Dest MAC: MACR1 IP Datagram The TCP/IP Protocol in Action  The MAC addresses of S and R1 (MACS and MACR1) are used to create a network frame  If the MAC address of R1 is not known, ARP (address resolution protocol) is used S DR1 R2 TCP Segment HTTP Req 55 Source MAC: MACS Dest MAC: MACR1 IP Datagram The TCP/IP Protocol in Action  Let’s simplify the picture (for clarity)  In subsequent steps the IP datagram and its contents will not change very much S DR1 R2 56 Source MAC: MACS Dest MAC: MACR1 IP Datagram The TCP/IP Protocol in Action  The network frame is transmitted on the network to R1  This is possible since S and R1 are both members of the same network S DR1 R2 57 IP Datagram The TCP/IP Protocol in Action  R1 will extract the IP datagram from the payload of the network frame  R1 looks up the destination IP address (IPD) in it’s routing table, to determine which router should get the datagram next (R2) S DR1 R2 58 Source MAC: MACR1 Dest MAC: MACR2 IP Datagram The TCP/IP Protocol in Action  R1 uses its own MAC address (MACR1) and R2’s MAC address (MACR2) to create another network frame S DR1 R2 59 Source MAC: MACR1 Dest MAC: MACR2 IP Datagram The TCP/IP Protocol in Action  The network frame is received by R2, and the IP datagram is extracted from it’s payload  R2 uses its routing table to lookup IPD  In this case, R2 is directly connected to D  This is called direct routing S DR1 R2 60 ARP Request IP: 24.87.204.16 MAC: ? IP Datagram The TCP/IP Protocol in Action  Most likely, R2 does not have the MAC address of D (MACD)  The address resolution protocol (ARP) is used to determine the MAC address: S DR1 R2 61 ARP Response IP: 24.87.204.16 MAC: 08-7F-3C-90-0C-DF IP Datagram The TCP/IP Protocol in Action  D recognizes it’s IP address and responds with its MAC address (MACD)  e.g. 08-7F-3C-90-0C-DF S DR1 R2 62
  • 16. Source MAC: MACR2 Dest MAC: MACD IP Datagram The TCP/IP Protocol in Action  A network frame is created by R2 now that the MAC address is known  The frame is sent directly to D S DR1 R2 63 Source MAC: MACR2 Dest MAC: MACD IP Datagram The TCP/IP Protocol in Action  D extracts the IP datagram from the network frame (which is discarded)  The IP datagram’s payload is passed to the transport layer S DR1 R2 64 The TCP/IP Protocol in Action  The Transport layer (within D’s operating system), will use the port numbers specified in the TCP segment to determine to which application it should send the segment  In this case, to the application bound to port 80 (the web server) S DR1 R2 Source Port: 2765 Destination Port: 80 HTTP Req65 The TCP/IP Protocol in Action  Now, the web server on D has the HTTP request, and it processes it  An HTTP response is sent back using the same process  The web server uses the same IP addresses and logical addresses as the last message S DR1 R2 HTTP Req 66 26. Name & define different types of network bridges. There are four types of network bridges: 1. Transparent basic bridge 2. Source routing bridge 3. Transparent learning bridge 4. Transparent spanning bridge The Transparent Basic Bridge The simplest type of bridge is the transparent basic bridge. It stores the traffic until it can transmit it to the next network. The amount of time the data is stored is very brief. Traffic is sent to all ports except the port from which the bridge received the data. No conversion of traffic is performed by a bridge. In this regard, the bridge is similar to a repeater. Source Routing Bridge The route through the LAN internet is determined by the source (originator) of the traffic hence this bridge is called as source routing bridge. The routing information field (RIF) in the LAN frame header, contains the information of route followed by the LAN network. The Transparent Learning Bridge The transparent bridge finds the location of user using the source and destination address. When the frame is received at the bridge it checks its source address and the destination address. The destination address is stored if it was not found in a routing table. Then the frame sent to all LAN excluding the LAN from which it came. The source address is also stored in the routing table. If another frame is arrived in which the previous source address is now its destination address then it is forwarded to that port.
  • 17. The Transparent Spanning Tree Bridge These bridges use a subnet of the full topology to create a loop free operation. 27. Short notes on routers input buffer, output buffer, processor, switching fabric. Input Buffer: The incoming packets of a network interface are placed in input buffers  These are banks of very high speed memory for packet queuing prior to processing  The packet is stored here until the routing processor is available The network interface may have a routing processor, which would: a. have a copy of the forwarding table (to prevent concurrent access) b. lookup the destination address in this forwarding table, to determine the correct output port c. configure the switching fabric to forward the packet to the correct output buffer Low-end routers would share one routing processor Output Buffer: The switching fabric gets the packet to the right output port  However, that port’s network may not be immediately available  The packets are stored in the output buffer until the network is available Routing Processor: • A routing processor is software which executes on a CPU: – Off-the-shelf CPU • These are very inexpensive • However, the performance of these CPUs is low since they are not optimized for the types of operations a router typically needs to perform – Application-Specific Integrated Circuit (ASIC) • These are expensive to design (time and money) • They are optimized for typical routing operations • High-end routers use these to achieve higher performance levels Switching Fabric: • Switching fabric’s job is to move packets from the input buffer into the correct output buffer – The routing processor determines the correct output port, using the forwarding table • Switching fabric comes in 3 major types: – In-memory switching fabric: • The packets are input into the routing processor’s memory, and output into the correct output buffer – Bus-based switching fabric:
  • 18. • The packets move along a shared bus (similar to a network bus) to the correct output buffer – Crossbar switching fabric: • The packets move along a grid of redundant buses • If any bus fails, alternate paths exist so that forwarding can continue 28. What is switching? Write the reasons for switching in communication. The establishing, on-demand, of an individual connection from a desired inlet to a desired outlet within a set of inlets and outlets for as long as is required for the transfer of information.  Switching implies directing of information flows in communications networks based on known rules  Switching takes place in specialized network nodes  Data switched on bit, octet, frame or packet level  Size of a switched data unit is variable or fixed Reasons for switching in communication:  Switches allow reduction in overall network cost by reducing number and/or cost of transmission links required to enable a given user population to communicate  Limited number of physical connections implies need for sharing of transport resources, which means  better utilization of transport capacity  use of switching  Switching systems are central components in communications networks 29. Describe the main building block of a switch. Define basic type of switching networks.
  • 19. 30. Explain different types of switching modes. Define label switching. Types of switching modes: • Circuit switching • Cell switching • Packet switching – Routing – Layer 3 - 7 switching – Label switching Circuit Switching:  End-to-end circuit established for a connection  Signaling used to set-up, maintain and release circuits  Circuit offers constant bit rate and constant transport delay  Equal quality offered to all connections  Transport capacity of a circuit cannot be shared  Applied in conventional telecommunications networks (e.g. PDH/PCM and N-ISDN) Cell switching: • Virtual circuit (VC) established for a connection • Data transported in fixed length frames (cells), which carry information needed for routing cells along established VCs • Forwarding tables in network nodes • Signaling used to set-up, maintain and release VCs as well as update forwarding tables • VCs offer constant or variable bit rates and transport delay • Transport capacity of links shared by a number of connections (statistical multiplexing) • Different quality classes supported • Applied, e.g. in ATM networks Packet switching:  No special transport path established for a connection  Variable length data packets carry information used by network nodes in making forwarding decisions  No signaling needed for connection setup
  • 20.  Forwarding tables in network nodes are updated by routing protocols  No guarantees for bit rate or transport delay  Best effort service for all connections in conventional packet switched networks  Transport capacity of links shared effectively  Applied in IP (Internet Protocol) based networks  Label Switching:  Evolved from the need to speed up connectionless packet switching and utilize L2-switching in packet forwarding  A label switched path (LSP) established for a connection  Forwarding tables in network nodes  Signaling used to set-up, maintain and release LSPs  A label is inserted in front of a L3 packet (behind L2 frame header)  Packets forwarded along established LSPs by using labels in L2 frames  Quality of service supported  Applied, e.g. in ATM, Ethernet and PPP  Generalized label switching scheme (GMPLS) extends MPLS to be applied also in optical networks, i.e., enables light waves to be used as LSPs