Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
19 views
(Unit-3) Computer Network
AKTU syllabus accordingly computer network chapter 3
Uploaded by
arpitasingh9972
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save (Unit-3) Computer network For Later
Download
Save
Save (Unit-3) Computer network For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
19 views
(Unit-3) Computer Network
AKTU syllabus accordingly computer network chapter 3
Uploaded by
arpitasingh9972
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save (Unit-3) Computer network For Later
Carousel Previous
Carousel Next
Save
Save (Unit-3) Computer network For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 29
Search
Fullscreen
a Ne ey Part-2 Part-3 Part-4 ; Point-to-Point Networks, .. Logical Addressing Basics Internetworking ., (IP, CIDR, ARP, RARP. DHCP, ICMP) Routing, Forwarding and one Delivery, Static and Dynamic Routing, Routing Algorithm and Protocols Congestion Control ca 3-22B to 3-288 Algorithm, [Pv 3-1 B (CS/IT-Sem-6)i. B cat Sem-@) yal No work I “Yep | ParT-1 Point-to-Point Networks Ta i *MPORICAL Addypg ning rf Questions-Answery, FG in [pi | Long a | = Answer Type and Medium ugeeen nia, ——————_— ‘wer Type Qu, ] re e6tiong - | | qe 3.1. | What is a point-to-point network ? . Give th, and disadvantages of a point-to-point networ “advantages Answer A point-to-point network is a permanent link betwee . . nD ‘A point-to-point connection provides a dedicated devices. 7 The dedicated link between two devices can orsatellite link. The entire capacity of the link is reserved for transmission b devices. A point-to-point network uses different types of topol to connect two internet nodes. Pology (mesh or star) Advantages of a point-to-point network : 1. Speeds : A point-to-point network usually use leased lines so the speeds are guaranteed. 2 Control & Monitor : By using the same connection, it becomes easier to monitor data usage across all sites. 3. Prioritise : Point-to-point leased lines allow you to prioritise certain types of data making your connection fast and reliable. 4, Better Security : With broadband your data is going through a public network, this increases the risk of it being intercepted. But with point to points it's your own private networks, so you can transfer data securely. | Disadvantages of a point-to-point network : 1. Distance: For geographically distant locations a point-to-point network | becomes more expensive. [ 2 Limited Connections : With a point to point you can only connect two sites, which can be a disadvantage if you have multiple sites. ; 2 : see --to-poil twor! 4 Fragile: If one node stops working within the point-to point ne then the whole system will stop working. {wo endpoints k between two 1 9 be wire or cable, microwave etween two 5."HOR > TON CSTyT Se ™ 4 Computer Network —_—— pddressing ? Que dd] What do you mean PY hogticnl Answer | 1. mmunicatl through the Internet ually. computers commun : " vc wender computer Passes hrough sey, yi LANe or WANe before reaching th sat eommunication. #e Meee etination computer ‘Phe datn tranamitted by th de a global addressing sey home For thie level own ae logrien! addressing aed to the logical address jn globally to refer PAP protocol hitein length this RIVES USA MAKIN, og 4 An IP addrese 1« used ‘he network layer of the ™ The Internet addresses are 32 232 addresses sence are referred (0 a8 I soci 92-bit address that unique to the Internet. >d addresses or IP addresses ly and univers: ) ally defines 6 These addre 7 An IPv4 addres connection of a device the & One IPvd address defines just one connection of the computer the internet § There can never be more than one IPv4 address for two devices connected to the internet at the same time. 1) Ifa device is connected to the internet through n connections, it js supposed to have n logical addresses. PART-2 Basics Internetworking (IP, CIDR, ARP, RARP, DHCP, ICMP) Questions-Answers Lo ‘ 4 ng Answer ‘Type and Medium Answer Type Questions 3.8. i Que 3.3. | Write a short note on internetworking. 1 Internetworking is the races que of connecti 1B i proce i sateaes th ess or technique of ting differ ie wor * bY using intermediary devices such as r 'S or : . a routers or gateway 2 I etworking ensu internetworking ens res data comr 4nd operated by different entiti ; id t entities ies and the Internet Kouting Protocol munication using nao among networks owned common data communication7 oe Layer when all the connected networks = is only possible k or communication methodologies. sar Se pie o— eworki 4 yntere rotocol stacl the sam ‘king + ‘ts of jnternetwor + te extranet isa network of i Extrooa single organisation oT entity. in so? ‘An intranet is a set of interconnected networks or t Protocol and uses IP-based tools he Internet FTP tools, that is under the control of a single f internetworking that is limited et + t 2 1otre working, Using dl oe asweD prowsers and seiinistrative entity- : et : The internet is the largest pool of networks geographically 3 Inter" throughout the world and these networks are interconnected ated stack, TCP/IP. wt thesame protoco! p addressing ? How it is classified ? How is wei | what is I gis performed ? | ARTU 2016-16, 2017-18, Marks 10 subnet addressini en Give the classification of different IP address. ‘Answer IP addressing * |. [addressing i f finding unique TP address. A unique IP 's the process 0} k component that address iS required for each host and networ! communicates using TCPAP. 9. The [Paddress is a network lay the data link layer address. 3. Each TCP/IP host is identified by Classification of IP address : er address and has no dependence on a logical IP address. 1. Class A: i Class A addresses are assigned to networks with a very large number of hosts. i, The high-order bit in aclass A address is always set to zero. a Ln next seven bits (completing the first octet) complete network » pee remaining 24 bits (the last three octets) represent the si i 2 ClassB: i Class B addres: : oe ; a ses are assigned to medium-sized to large sized s set to binary i Thetwo hi rete high-order bitin a class B address are alway ——wey sy % BEBO Compater Networks wr. mH the Firat two neteta) cy 5 ext 14 pita (completing samt boro ete Mp here ox! ng V6 bit (ast two octeta, repress’ i mt tp ii The 1 network ID. The rf maint hoot ID on a ye heyteh byte L byte? ve be Clase A Clave Chae — Mult od for future Use Fig. 34.1. / r small networks, on are used £0 « Caddresses are alwz » always ner 5 rder bits in a clasi i Clans The three high-o} binary 110. ‘ The next 21 bits (completing the first three octets) complete + ning 8 bits (last octet) represent the Ai é how . network ID The remai ID From To cise [0.0.0.0 Netid Hostid Netid. Hostid Netid Hostid Netid Hostid ‘Netid Hostid Netid ‘Hostid Netid Hoastid Group address Class E[240.0.0.0 Undefined Undefined Fig. 34.2. 4, Class D: Class D addresses are reserved for IP multicast addresses. i. eses are always set? ii. The four high-order bits in a class D addre: binary 1110. iii, The remaining bits are for the addresses that interes recognize. 5. Class E: Class E addresses are experimental addresses reserved for use. ted hosts will future a- cat fem # 4 ‘ 4 soe high order bits a er . * ater performing eubmetting an nen 1 nD ar the ht age - ant! {what the trode net gag, : 9 Obtain the quantity of thnete Ltd ; ng the following torn ons ne The enmay , 1 ite in the pineh atop 4 Acquire the number of hoete Pind the formula 2” 2 The 1 com prevent ig ~ 0° nosae hee of he mask 5 Assess the mask you Will need foxy the ee wah: networks 48 well a8 the hemte f, petwort 9 num im OF Oath not te 2 a formula 2 step 6: Refer to the class C, mask wet way to create sub-networks is to (0 Create sub ney Memorize ¢ defoult subnet mask is 255 255 255.0 There that make up class C. Step 7: Decide which class mask to Perform this step after we determined Que35. | Explain IP addressing, ewer IP addressing is the process of finding unique IP Address. A unique [P address is required for each host and network component nas communicates using TCP/IP. + The IP address is a network layer address and has no eve: adence on the data link layer address (such as a MAC address of 4 network interface card). Por The hae © manieg her tabnet mans Use for our sub, Ret works UF Networks and hoe Each TCP/IP host is identified by a logical IP address * The IP address is a network layer address and has no dependeace un the data Link layer address (such as a MAC address of & ueewors lulterface card) A unique IP address is required fur each host and network cumponeat ‘hat communicates using TCP/IP The IP address Identifies a system’s location on the network Au IP ‘address must be globally unique and have a uniform format Each Ip address includes a networkID and a hostID. 3 the orkLD (also known as a network address) ewklDy The that are located on the same physical network “TkID must be unique to the internetwork The netw *Ystems hetwy eS«TB (Ceypy works 8 a Net wor : computer known as 8 host address) identifies a wy, M4) pat IN alse /TCPAP host within a network 40" ketags ter, or othe to the networkID, ‘The waa must be unique ye! ofe a ; i fthe term networkID re fers 7 any IP ne tworkIp . The use? pnet, or a superne » Whe ‘ tis class-based. asu he, 2-bit ———————__ i -bi . It is a common practi > address is 32-bits long. 4 ice to 6g 4 aie IP address into four 8-bit fields called octets. Bment the } i orted to a decimal number (the ba, ch octet is conve rte se 10 a 10 ae an in the range 0-255 and separated by a period (a dot Ting formal is called dotted decimal notation. TE Quess. | Write a short note on Classless Inter-Domain Routing (CIDR). Answer 1. Classless Inter-Domain Routing (CIDR) is a method for allocat; addresses and for IP routing. The Internet Engineering Task Force introduced CIDR in 1993 replace the previous classful network addressing architecture on th Internet. 3, Its goal was to slow the growth of routing tables on routers across the Internet, and to slow the rapid exhaustion of IPv4 addresses, 4. The objective of CIDR was to address scalability issues with classful P addresses which are based on three classes - Class A, B, and C. © ing Ip N 5. CIDR allows IP addresses to be variable and not bound by the siz limitations of Classes A, B, and C. 6. Since it is not bound by Class, CIDR can organize IP addresses into subnetworks independent of the value of the addresses themselves. 7. This is referred to as supernetting. Que 3.7. | Write a short note on ARP. Also explain its working. ee Address Resolution Protocol (ARP) : 1. Theaddress resolution protocol (ARP) is a protocol ust IP network addresses to the hardware addresses use’ protocol. ed by IPv4 tom? d by a data linkat sem @ NAO Loree ‘ ‘ " ye erates bolo the network layer as » part ory. ote 3] network and O8T Wink bayer ty erty oe Fe OS * ed he . pibernet - na given network te al advtreames “7 Meat tna | rer nacre PSS ot > host can dvnannieaily der 1m egctinae ARF a hos’ , trsrorae the Was ae pe re cpooding to particalae IP network lever 94 dress resolution refers to the process of fed ' tires de i reanlved using protocol in which 9 piece of infor. rest nt process to a Server process ae tion received by the server allows the seprey to aniquei me network system for which the address wae reenmired and ra to provide the required address Le resolution procedure is completed when the chent receives
oF nteret Control Message Protocol (]CMP) has been designed to : compensate for these deficiencies. Itisused for error handling in the network layer, and it is primarily used on network devices such as routers. o ol has no error-reporting or error-correcting mechanism. j ICMP isa network layer protocol. However, its messages are not passed directly to the data-link layer. The messages are first enclosed inside IP datagram and then passed to the data-link layer. 8 ICMP messages are divided into two categories : error-reporting messages and query messages. Que 3.11. | Give the general format of ICMP messages. a lL Ter ‘ ICMP messages are divided into two categories : error-reporting messages and query messages. tw a a router or a host processes an IP packet it may encounter ns, the error-reporting messages report these problems 6 Meabits | 16 bits 8 bits 8 bits 16 bits ua Sittin aaa ioe Data section Tere te Porting messages Query messages Fig. 3.11.1. General format of IOMP messages. = .™~ 4 y tworks 3-11 BiG Computer Netwot SIT ong 3 11 When a network manager wants specific information from » me query message provide this information the An ICMP message has an 8-byte header and a variableeize 2s sey The general format of the header is different for each mos, the first 4 bytes are common to all In Fig. 3.11.1 the ICMP type defines the type of the mersage The ICMP code field specifies the reason for the Particular Messags ty he checksum field is the 16-bit one’s complement Of the one’, complement sum of the ICMP message starting with the ICMP type The rest of the header is specific for each message type The data section carries information for finding the original packet that had the error. In query messages, the data section carries extra information based or the type of query. FEE tbe in, Que 3.12. | What are error reporting messages in ICMP ? = Following are various error reporting messages in ICMP : L e Source quench message : L — When receiving host detects that rate of sending packets is too fast it sends the source quench message to the source to slow the pace down. i ICMP will take source IP from the disca ded packet and informs te source by sending source quench message. ii, Then source will reduce the speed of transmission so that router will be free of congestion. Parameter Problem ; \ Aparameter problem message can be sent when either there is 2 problem in the header of a datagram or some options are massing ! cannot be interpreted. Destination un-reachable ; * Destination unreachable is generated by the host or its inbound Bateway to inform the client that the destination is unreachable fo" some reason. Redirection Message - i The redirection Message 1s generated when the source uses & WTO router to send its message. i, The router redirects the message iii rou to the appropriate router Also it informs the Source to chang: © its default router in the future* Netw. ag) ork Layer sem att wf fe caress ofthe default router is sent in the message the x sages: i owe Mes ages ave used to test the liveliness of hosts or routers in mes § Quer net ternet ihe Ime nd the one-way or the round-trip time for an IP nit ot between two devices. \ ; : dt mre to find out whether the clocks in two devices are is vs a qohronized | sv messages come in pairs: request and reply. er i PART-3 sarding and Delivery, Static and Dynamic Routing, gost: se itil Algorithm and Protocols. oo <————questions- Answers S| eee ee ng Answer Type and Medium Answer Type Questions Css Que 313. What do you understand by routing ? ‘ower | + Inorder to transfer the packets from source to the destination, the network layer must determine the best route through which packets canbe transmitted. 1 The main job of the network layer is to provide the best route. + Routing provides this information. + Routing refers to the way routing tables are created to help in forwarding the packets, “ Therouting protocol is a routing algorithm that provides the best path ‘tom the source to the destination. a path is the path that is the "least-cost path" from source to the tion, wet, What do you understand by delivery in context of “elWork layer 2 ‘aower Delivery, Nery refers to the way a packet is handled by the network layer. weetWork layer supervises the handling of the packets by the Ying physical networks, beig Computer Networks 3. A 1. 4 os 1a B (CSAT-S¢m, es ) ket is accomplished by using direct and ANd indinegy The delivery of a pac! methods of delivery Direct Delivery: Ina direct delivery the source and destination of the packet are jo, cated on the same physical network. Also direct delivery occurs when the delivery is between the last rout, er and the destination host. To determine if the delivery is direct we extract the network address of e88 of the destination (using the mask). Then we compare this address with the addresses of the networks 1, which it is connected. 0 Ifa match is found, the delivery is direct. Indirect Delivery: Ifthe source and destination of the packet are not located on the same physical nétwork, the packet is delivered indirectly. In an indirect delivery, the packet goes from router to router until it reaches its final destination. A delivery always involves one direct delivery but zero or more indirect deliveries The last delivery is always a direct delivery. Que 3.15.’| What do you understand by forwarding ? Mention some of the forwarding techniques. Answer , a. 2. 3. 4. Forwarding refers to the way a packet is delivered to the next station. Forwarding requires a router to have a routing table. With the help of routing table ae Beers ie a router find the route for the pae evebead ae solution is impractical due the large number of eeded in the table which makes table lookups inefficient. Forwardin, iques : i : Koren ie techniques : Following are various forwarding techniques make the size of the routing table manageable : A 1 3. Next-Hop Method : One technig " , - jue to simplify the routing table is called the next-hop method. 2 s techni ‘ In this technique the routing table holds only the address of the °** hop. However, the entries of a routin, tent with , a me ing table must be consistent wit ” 4Tel - Network Layer ( specific Method: a. Nema bens Teduce the routing table and simplify the ing process veehave ony one network itself. ll hosts connecte entity C Defal ntry that defines the address of the destination .d to the same network are treated as one single ult Method = another technique to simplify routing is called the default method. i this technique instead of listing all networks in the entire Internet, has one entry called the default. t bot ally defined as network address 0.0.0.0. 3. ‘Itisnorm Jesse. | Explain static and dynamic routing. Tower | A. Static routing : Static routing is a process in which we have to manually add routes in routing table. Static routes are manually configured by a network administrator by adding in entries into a routing table. Static routes are fixed and do not change if the network is changed or reconfigured. 4 7 routing is used onarouter to maximise routing efficiency and to provide backups in case dynamic routing information fails to be exchanged. 5. Static routing can also be used in i stub netwe y oflast resort sub networks, or to provide a gateway 6 Static routing i i a eee S also known as non-adaptive routing. ome routing : dynami ‘il ee a router adds a new route in the routing table for the oe response to the changes in the condition or topology of Ifthe ro ' riter pay liseovers any change in the condition or topology, then Druamic cast this information to all other routers. q peas are used to discover the new routes to reach the Ind Ynamic routi; ; Protocol in eens all the routers must have the same dynamic routing * fany ae er to exchange the routes. Teac] 8oes down, th ic adj ade to 7 the destination en the automatic adjustments are mace Touting i . ng is also known as adaptive routing.1X Dee Computer Networks Que 3.17. | What are the advantages and disadvantag, en and dynamic routing ? Answer A. Advantages of static routing : _ (C8IIT-g.,, 4) of Atatie 1. No Overhead : It has no overhead on the CPU usage of th Hence cheaper router can be used to obtain static routing. ME Toute, Security : It provides security as t Ho pp routing table. The system administrator should h: XS It is easier to configure. Pra in the condition or topology. peg It is less secure as compared to stati Bandwidth : It has not bandwidth usage between the routers, he system administrator is allowed ed only to have control over the routing to a particular network Disadvantages of static routing : For a large network, it is very difficult to add each route manually to the ave a good knowledge of a topology as he has to add each route manually. Advantages of dynamic routing : It is more effective in selecting the best route in response to the changes Disadvantages of dynamic routing : It is more expensive in terms of CPU and bandwidth usage. ic routing. Que 3.18. | Give difference between static and dynamic routing. Answer S.No. Static routing 1. In static routing routes are | user defined. Dynamic routing In dynamic routing routes are updated according to topology. Dynamic routing uses complex 2. | Statie routing does not use complex routing algorithms. routing algorithms. a Static routing provides more | Dynamic routing provides less | security. — - security. a 4. _| Static routing is manual. Dynamic routing is automated. Static routing is implemented | Dynamic routing is implemented in small networks, __| in large networks. — Additional resources are not | Additional resources ®F@ required. ied Failure of link disrupts the | Failure of link does not interrupt __| rerouting. the rerouting,108 we proto -6) eat Se Network Layer what is unicast routing ? Discuss Unicast routing 19. AKTU 2018-19, Marks 7 cols: AKTU 2017-18, Marks 10 AKTU 2015-16, oF HH OR in path vector routing protocol. psplain er Unicast routing * 7 routing, there is one-to-one relation between the source and In pee That means only one source sends Packets to only one the dest! : destination. a 7 7 of source and destination addresses included in the IP datagram as ea addresses assigned to the hosts as shown in Fig. 3.19.1, are un. ‘1 i it forwards that i ‘outing, when a router Teceives a packet, it 8 i crea ale one of its ports which corresponds to the optimum pac path, + B Source aap . &) LA | Ply : bd a *) &) we AlBr+[ Jays] | = > 5 Fig. 3.19.1, Following are the three unicast routing protocol : i ii Distance vector routing protocol : : 1 Indistance vector Touting, each router maintains a routing table on Touter knows the identity of every other router in the networl . 2 Routing table contains one entry for each router in the subnet. is entry has two parts: anol t The first part shows the preferred outgoing line to be used to Teach the Specific destination. ‘| is that Second part Gives an estimate of the time or distance to that destination, State Youting ; the Thelink state Touting is simple and each router has to perform ‘allowing five operations : , ae<< Computer Networks 317R (can Tg, a. Discover its neighbours and learn their network ~ Sug, b. Measure the delay or cost to each of its neighb reg, rg c. Construct a packet containing the network a a delays of neighbours. P8¢9 and, he d. Send this packet to all other routers, e. Compute the shortest path to every other Touter, iii, Path vector routing : Path vector routing is useful for interdomain Touting, L 2. In path vector routing, there is one node in each Ay System (ASs) that acts on behalf of the entire ASs, This Bey is called the speaker node. Ingle n, Dest. Path = C1 Table AS3 Fig, 3.19.2. Initial routing tables in path vector routing. 3. The speaker node in an authentication server creates a routing table and advertises it to speaker nodes in the neighbouring ASs. 4. The principle of path vector routing is same as for distance vector Touting except that only speaker nodes in each AS can communicate with each other. 5. Aspeaker node advertises the path, not the metric of the nodes, in its autonomous system or other autonomous systems. Que'3.20. | Explain distance vector routing algorithm and how it updates the routing tables with the help of example. Answer mn Distance vector routing algorithm : Refer Q. 3.19, Page 3-16B, Us! _Network Layer ,sendsa copy of its distance vector to all its neighbours, ne il o yee! receives a distance vector from its neighbours, it tries to ws a ou he ther its cost to reach any destination would decrease if it snd a kets (0 othat destination through the particular neighbouring out? shows how the D.V. at A is automatically modified when a 5 FEY ee ae ved from B. calculation takes place at the other routers as well. So, the ei router can change. In Fig. 3.16.1 the initial distance enties ae own. The entries in each source represent the shortest tweed the routers. istan Ie, AC = 3 indicates the cost corresponding to the shortest a oe of number of hops from A to C. - ifs asynchronously update their distance vectors the routing tls eventually converge. nan Ford algorithm is commonly used in distance vector routing. 4 ; Bell inl” a B/C D mrad: (b) Given network of] dafof a] | dafapol2 | q{ 1] 4] 0 Minimum cost\"\ Calculations at “AT when a —§+ frmD we S\ distance vector arrives Entry in each square \ represent the shortest distance from a nade to \ destination. The entry shows \ the mimumum cost fram D to B \. from “B™ . \ ® AB=1 |. Cost ogotoB \\@! Initial distance vectors at the \ our routers z Ct = v 2] 1) 2] 2) .. Cast to destination from A via B 0} 1] 3) =). Current cost to destination from A [0] 2] 2] 2] ..New distance vector for A New D.V. will replace the 7 inital Vol Aig the nest hop (€) Calculation at A when a D.V. arrives from B Fig. 820.1.Distance vector algorithm at router A. aS ou Computer Networks 19 BCR Sem 4 Que 3.21. | Discuss link state routing. Compare distances ,, erty routing with link state routing. . Answer Link state routing : Refer Q 9.19, Page 3 16B, Unit 3 Comparison ¢ TSN | Distance vector routing | Link state ro : jel | routing 1 | Each router maintains It is advanced version of distanes | routing table indexed by and | vector routing | containing one entry for each | router in the subnet t : : | Algorithmisslower, __| Algorithms faster 2 ~ 3, | Bandwidthis less. Bandwidth is high [Sai hishigh, [eee 4. | Router measure delay All delays measured and | directly with special ECHO | distributed to every router | packets 5. | It does not consider line | It considers the line bandwidth bandwidth into account |into account when choosing the | when choosing the routes. routes. ‘Que 3.22, | What is meant by multicast routing ? Explain with suitable diagrams. Answer 1. In multicasting, a message from a sender is to be sent to a group ot destinations but not all the destinations in a network. 2. A process has to send a message to all other processes in the group. For asmall group it is possible to send a point-to-point message. 3. But this is expensive if the group is large. So, we have to send messsé=* to a well defined group which are small compared to the network size o—®- > —_ ® @ Sender Y — @ Forwarder @ Receiver Pig, 9.22.1.Network Layer - such a group is called multicasting and the Touting etos ensins o se ed for multicasting 1s multicast routing. 4 ortho ating is @ special class of broadcast routing as shown in st 10! Fee be the problem of count-to-infinity associated with eee or routing technique. AKTU 2016-17, Marks 7.5 ce gam om! ity problem : ee jssue with Distance Vector Routing (DVR) protocols is routing a as loops in DVR network causes count-to-infinity problem. iaance veetor routing, routing loops usually occur when an interface dis = down. Routing loops usually occur when any interface goes down or ut 2 : :worouters send updates at the same time. Explanation ¢ Consider a network connected with three routers as shown in © Fig 23.1. Fig. 3.23.1. letthe matrices (weight or cost) between the routers is the number of jumps to reach the neighbour router. hn he Fig. 3.23.1 cost between B and C is 1 and cost between A and C Now “uppose the link betweer. B and C is disconnected, then B will Pah “itcan no longer get to C via that link and will remove it from itstable = 4 7 ve ton send any updates, it may be possible that it will receive an Sma which will be advertising that it ean get to Cat a cost of 2 © Bem fy "A ata cost of 1, so it will update a route to C via A at a cost Awilly the = ‘eeeive updates from B later and update its cost to 4 This "1 Propagates through the network until it reaches infinity. wil my Cause Count-to-infinity problem. Wri Tite down class of routing algorithms. aComputer Networks oe BOR Seng saree nS CE eee eeeSer OR What is adaptive routing algorithm ? Explain VEMIONE pes gy adaptive routing algorithm. Answer Various types (class) of routing algorithm are « L Dynamic / Adaptive algorithme - Adaptive algorithms (dynamic reuLine Use suet tiynany information as current topology joad. delay ete. Ww siier cue b A dynamic algorithm can be run erther penthenlis or an diner response to topology or ink cost change While dynamic algortthme are more responsive v0 Tetwrrme ciate they are also more suscepuible to protueme such ae -miinp nm and oscillation in router ad Adapnive algorithms can be further divided a i Isolated : Each router maker me roimang tecuson sig only the local informatuon thet mt siore Specifically cme do not even exchange information with the meypiionrs ii Centralized: A cemtralaed aude maser al rormiug tec Specifically. the centralzed oode has acvest wy puna information iii Distributed : Algormhms that user 2 commen we ord and global informauon. 2 Static / Non-adaptive algorithms - a In non-adaptive algorithms. routes never change ome mn routes have been selected. also called samt roimane b In static routing algorithms, rows change very slow! mwas Tne often as a result of human intervention for exemgiie. ¢ Dum manually editing 2 router's forwarding tae ¢ Non-adaptive algorithms do not handie failed mee a Sallinweing > Que 3.25. | Differentiate between adzptive and nox-ateg7™ routing algorithms. S.No. Adaptive routing algorithm Lo In adaptive algorithm routers exchange and update router table information.Netw 0 gestsem®) ___ Network Layer q < algorithm, routers | In this algorithm, adjustments to ee automatically in changes In network topology a to changes in | require manual update, network topology — ty prevents packet delivery | It provides gr: failure and improves packet paths, network performance. Tint ‘anular contro! over | i Itisdynamic routing. Itis static routing. | | 4 | | 3 Ituses dynamic protocols to | It manually sets uy, . P the optimal update the routing table and_| paths between the Source and the | to find the optimal path destination computers. _ between the source and the | destination computers. PART-4 Congestion Control Algorithm, IPv6, Questions-Answers Long Answer was] What is congestion and congestion control ? Discuss °Pen-loop congestion control techniques. OR Nhatig “ongestion ? Name the t echniques that prevent congestion. AKTU 2015-16, Marks 05 OR : “'S congestion ? Briefly describe the techniques that preven “DReStion, AKTU 2017-18, Marks 10 er Ongesti ae ich may occur if users send data inno ¥Stion : Congestion is a situation which may the network at a rate greater than that allowed by spats —— ey i trol refers to techniques and Stange control Congest eongestion, before it happens, or remove ‘Ms that can either prevent co Coy . "8Stion, after it has happened ~~ ,A Computer Netw orke IRE SF Sony, “ Techniques to preve' nt congestion : gestion control : In open-loop congns ed to prevent congestion before it feene . ation control is handled by either the “ In Paton Openloop con policies are appl mechanisms, cong destination Following Retransmission policy! The retransmission policy va dew, ficiency and at the same time prevent oe i are the policies that can preven 1 @Etinn optimize e ii, Window policy : The type congestion The selective repeat window is better than « me Back-N window for congestion control ne Gm Acknowledgement policy : The acknowledgement policy im by the receiver may also affect congestion. If the receiver on acknowledge every packet it receives, it may slow down theses . and help to prevent congestion oe Closed-loop congestion control : Closed-loop congestion en mechanisms try to reduce congestion after it happens mechanisms have been used by different protocols which are as i. Backpressure : The technique of backpressure refers , congestion control mechanism in which a congested node stp receiving data from the immediate upstream node or nodes Choke packet : Achoke packet is a packet sent by a node ta the source to inform about congestion. In the choke packet method. the warning is from the router, which has encountered congestis to the source station directly. : In implicit signaling, there 13 4 iii. Implicit signaling : communication between the congested node or nodes and tt of window at the sender may ali lew, E source iv. Explicit signaling + The node that experiences congestion explicitly send a signal to the source or destination. Que 3.27. | What is the difference between open-loop congestv" control and closed-loop congestion control ? Answer le ———s - ———_,,,.. 58. No. Open-loop Closed-loop | congestion control | congestion cont 1. | Open-loop congestion Closed-loop congestion contral ® control is based on | based on the solution tor prevention of congestion, removing the congestion 2 It prevents the congestion It removes the congestion alte" | from happening took placesens) : Network Layer dendtoend | It adjusts its data rate depending " on some kind of feedhack ms are as follow : Mechanisms are as follow amsms 4 Retransmission policy |i. ae pressure 4 7 row policy ae hoke packet a. Tr wledgement | iii, Implicit signaling ii ae jiv. Explicit signaling policy Admission policy i
You might also like
Networking
PDF
No ratings yet
Networking
20 pages
IP - Internet Protocol
PDF
No ratings yet
IP - Internet Protocol
63 pages
MC-601-week 6
PDF
No ratings yet
MC-601-week 6
23 pages
Networking
PDF
No ratings yet
Networking
33 pages
Networking
PDF
No ratings yet
Networking
100 pages
Chapter 5 Network Layer
PDF
No ratings yet
Chapter 5 Network Layer
86 pages
Handout 6 - TCP-IP
PDF
No ratings yet
Handout 6 - TCP-IP
18 pages
networking-5
PDF
No ratings yet
networking-5
8 pages
B. American Registry of Internet Numbers (ARIN)
PDF
No ratings yet
B. American Registry of Internet Numbers (ARIN)
5 pages
Chapter 4 - IP Layer
PDF
No ratings yet
Chapter 4 - IP Layer
46 pages
chapter 3
PDF
No ratings yet
chapter 3
6 pages
IP Addressing & Subnetting Strategy
PDF
No ratings yet
IP Addressing & Subnetting Strategy
64 pages
Private Ip Addresses: Ethernet Ethernet Is The Most Used Networking Technology For Lans Today. It Defines Wiring and
PDF
No ratings yet
Private Ip Addresses: Ethernet Ethernet Is The Most Used Networking Technology For Lans Today. It Defines Wiring and
48 pages
Ip Addressing and Subnetting
PDF
No ratings yet
Ip Addressing and Subnetting
36 pages
BSCS_CN_W22_Week10
PDF
No ratings yet
BSCS_CN_W22_Week10
43 pages
Lesson 5 - IP
PDF
No ratings yet
Lesson 5 - IP
28 pages
Chapter 3- Network Layer and Ip_addressing_and_subnetting
PDF
No ratings yet
Chapter 3- Network Layer and Ip_addressing_and_subnetting
61 pages
Ip Addressing and Subnetting
PDF
No ratings yet
Ip Addressing and Subnetting
40 pages
Chapter 4
PDF
No ratings yet
Chapter 4
85 pages
IP Based Network Concepts &: S N Pati, Sde, RTTC
PDF
No ratings yet
IP Based Network Concepts &: S N Pati, Sde, RTTC
26 pages
CN U4 Network Layer
PDF
No ratings yet
CN U4 Network Layer
47 pages
CN Unit-III
PDF
No ratings yet
CN Unit-III
113 pages
CN Unit - 3-1
PDF
No ratings yet
CN Unit - 3-1
14 pages
14 Ip Addresses and Ipv4
PDF
No ratings yet
14 Ip Addresses and Ipv4
37 pages
Unit3 Question Bank
PDF
No ratings yet
Unit3 Question Bank
25 pages
Tcpip Tutorial
PDF
No ratings yet
Tcpip Tutorial
50 pages
Network Layer and Internet Protocols IPv
PDF
No ratings yet
Network Layer and Internet Protocols IPv
52 pages
Acn Unit 1 - 186 - N3
PDF
No ratings yet
Acn Unit 1 - 186 - N3
19 pages
2.1 Internet Principles
PDF
No ratings yet
2.1 Internet Principles
33 pages
Understanding TCP/IP
PDF
No ratings yet
Understanding TCP/IP
9 pages
CCNA 640-802: Chapter 2: Introduction To TCP/IP
PDF
No ratings yet
CCNA 640-802: Chapter 2: Introduction To TCP/IP
24 pages
Network CompTIA
PDF
100% (1)
Network CompTIA
38 pages
Network Addressing
PDF
No ratings yet
Network Addressing
23 pages
#Network Layer
PDF
No ratings yet
#Network Layer
35 pages
Outline: Traditional IP Addressing
PDF
No ratings yet
Outline: Traditional IP Addressing
8 pages
Lecutre-01 NetworkLayer
PDF
No ratings yet
Lecutre-01 NetworkLayer
51 pages
IOT Networking
PDF
No ratings yet
IOT Networking
61 pages
Supernetting: Internet Protocol (IP) Address - Subnetting and
PDF
No ratings yet
Supernetting: Internet Protocol (IP) Address - Subnetting and
10 pages
Network Fundamental
PDF
No ratings yet
Network Fundamental
18 pages
Chapter 4
PDF
No ratings yet
Chapter 4
79 pages
Lecture 06 - Internet Working
PDF
No ratings yet
Lecture 06 - Internet Working
97 pages
TCP/IP Protocol Suite and IP Addressing: Erkki Kukk University of Tartu, Estonia
PDF
No ratings yet
TCP/IP Protocol Suite and IP Addressing: Erkki Kukk University of Tartu, Estonia
19 pages
1740987403155
PDF
No ratings yet
1740987403155
57 pages
Week15 IP Protocols
PDF
No ratings yet
Week15 IP Protocols
46 pages
COMP342 Lecture 4
PDF
No ratings yet
COMP342 Lecture 4
86 pages
Lecture 6 - Internet Layer
PDF
No ratings yet
Lecture 6 - Internet Layer
77 pages
Assignment of Networking Protocols
PDF
No ratings yet
Assignment of Networking Protocols
16 pages
8-IP-1
PDF
No ratings yet
8-IP-1
48 pages
How The TCP/IP Protocol Works: Les Cottrell - SLAC
PDF
No ratings yet
How The TCP/IP Protocol Works: Les Cottrell - SLAC
49 pages
Data Comm Part 2.ppt New
PDF
No ratings yet
Data Comm Part 2.ppt New
48 pages
IST2045#4 Network Layer -Data Plane 2
PDF
No ratings yet
IST2045#4 Network Layer -Data Plane 2
52 pages
CCNA Certification/Addressing: 1 Classful Routing
PDF
No ratings yet
CCNA Certification/Addressing: 1 Classful Routing
5 pages
Network-Addressing
PDF
No ratings yet
Network-Addressing
21 pages
Network+ Guide To Networks 5 Edition: In-Depth TCP/IP Networking
PDF
No ratings yet
Network+ Guide To Networks 5 Edition: In-Depth TCP/IP Networking
63 pages
Cs8591 Computer Networks: Unit - Iii
PDF
No ratings yet
Cs8591 Computer Networks: Unit - Iii
82 pages
3rd - Unit - CN (1) - Master - Copy - 240412 - 140654
PDF
No ratings yet
3rd - Unit - CN (1) - Master - Copy - 240412 - 140654
81 pages
CN 3
PDF
No ratings yet
CN 3
30 pages
IP Address
PDF
No ratings yet
IP Address
22 pages
Related titles
Click to expand Related Titles
Carousel Previous
Carousel Next
Networking
PDF
Networking
IP - Internet Protocol
PDF
IP - Internet Protocol
MC-601-week 6
PDF
MC-601-week 6
Networking
PDF
Networking
Networking
PDF
Networking
Chapter 5 Network Layer
PDF
Chapter 5 Network Layer
Handout 6 - TCP-IP
PDF
Handout 6 - TCP-IP
networking-5
PDF
networking-5
B. American Registry of Internet Numbers (ARIN)
PDF
B. American Registry of Internet Numbers (ARIN)
Chapter 4 - IP Layer
PDF
Chapter 4 - IP Layer
chapter 3
PDF
chapter 3
IP Addressing & Subnetting Strategy
PDF
IP Addressing & Subnetting Strategy
Private Ip Addresses: Ethernet Ethernet Is The Most Used Networking Technology For Lans Today. It Defines Wiring and
PDF
Private Ip Addresses: Ethernet Ethernet Is The Most Used Networking Technology For Lans Today. It Defines Wiring and
Ip Addressing and Subnetting
PDF
Ip Addressing and Subnetting
BSCS_CN_W22_Week10
PDF
BSCS_CN_W22_Week10
Lesson 5 - IP
PDF
Lesson 5 - IP
Chapter 3- Network Layer and Ip_addressing_and_subnetting
PDF
Chapter 3- Network Layer and Ip_addressing_and_subnetting
Ip Addressing and Subnetting
PDF
Ip Addressing and Subnetting
Chapter 4
PDF
Chapter 4
IP Based Network Concepts &: S N Pati, Sde, RTTC
PDF
IP Based Network Concepts &: S N Pati, Sde, RTTC
CN U4 Network Layer
PDF
CN U4 Network Layer
CN Unit-III
PDF
CN Unit-III
CN Unit - 3-1
PDF
CN Unit - 3-1
14 Ip Addresses and Ipv4
PDF
14 Ip Addresses and Ipv4
Unit3 Question Bank
PDF
Unit3 Question Bank
Tcpip Tutorial
PDF
Tcpip Tutorial
Network Layer and Internet Protocols IPv
PDF
Network Layer and Internet Protocols IPv
Acn Unit 1 - 186 - N3
PDF
Acn Unit 1 - 186 - N3
2.1 Internet Principles
PDF
2.1 Internet Principles
Understanding TCP/IP
PDF
Understanding TCP/IP
CCNA 640-802: Chapter 2: Introduction To TCP/IP
PDF
CCNA 640-802: Chapter 2: Introduction To TCP/IP
Network CompTIA
PDF
Network CompTIA
Network Addressing
PDF
Network Addressing
#Network Layer
PDF
#Network Layer
Outline: Traditional IP Addressing
PDF
Outline: Traditional IP Addressing
Lecutre-01 NetworkLayer
PDF
Lecutre-01 NetworkLayer
IOT Networking
PDF
IOT Networking
Supernetting: Internet Protocol (IP) Address - Subnetting and
PDF
Supernetting: Internet Protocol (IP) Address - Subnetting and
Network Fundamental
PDF
Network Fundamental
Chapter 4
PDF
Chapter 4
Lecture 06 - Internet Working
PDF
Lecture 06 - Internet Working
TCP/IP Protocol Suite and IP Addressing: Erkki Kukk University of Tartu, Estonia
PDF
TCP/IP Protocol Suite and IP Addressing: Erkki Kukk University of Tartu, Estonia
1740987403155
PDF
1740987403155
Week15 IP Protocols
PDF
Week15 IP Protocols
COMP342 Lecture 4
PDF
COMP342 Lecture 4
Lecture 6 - Internet Layer
PDF
Lecture 6 - Internet Layer
Assignment of Networking Protocols
PDF
Assignment of Networking Protocols
8-IP-1
PDF
8-IP-1
How The TCP/IP Protocol Works: Les Cottrell - SLAC
PDF
How The TCP/IP Protocol Works: Les Cottrell - SLAC
Data Comm Part 2.ppt New
PDF
Data Comm Part 2.ppt New
IST2045#4 Network Layer -Data Plane 2
PDF
IST2045#4 Network Layer -Data Plane 2
CCNA Certification/Addressing: 1 Classful Routing
PDF
CCNA Certification/Addressing: 1 Classful Routing
Network-Addressing
PDF
Network-Addressing
Network+ Guide To Networks 5 Edition: In-Depth TCP/IP Networking
PDF
Network+ Guide To Networks 5 Edition: In-Depth TCP/IP Networking
Cs8591 Computer Networks: Unit - Iii
PDF
Cs8591 Computer Networks: Unit - Iii
3rd - Unit - CN (1) - Master - Copy - 240412 - 140654
PDF
3rd - Unit - CN (1) - Master - Copy - 240412 - 140654
CN 3
PDF
CN 3
IP Address
PDF
IP Address