Escolar Documentos
Profissional Documentos
Cultura Documentos
Cour CO504.2: Describe, analyze and compare datalink, network and transport layer
se protocol, algorithms and techniques.
Outc CO504.6: Communicate technical, ethical, social information related to computer
ome networking .
Bloo Remember
m's
Taxo Apply
nomy
Level
Usually, the same weight is associated to the two directed edges that
correspond to a physical link (i.e. and ). However,
nothing in the link state protocols requires this. For example, if the
weight is set in function of the link bandwidth, then an asymmetric
ADSL link could have a different weight for the upstream and
downstream directions. Other variants are possible. Some networks
use optimisation algorithms to find the best set of weights to minimize
congestion inside the network for a given traffic demand [FRT2002].
Flooding : example
To ensure that all routers receive all LSPs, even when there are
transmissions errors, link state routing protocols use reliable flooding.
With reliable flooding, routers use acknowledgements and if
necessary retransmissions to ensure that all link state packets are
successfully transferred to all neighbouring routers. Thanks to reliable
flooding, all routers store in their LSDB the most recent LSP sent by
each router in the network. By combining the received LSPs with its
own LSP, each router can compute the entire network topology.
Q.2 Sketch the categories of standard Ethernet and
discuss it in detail.
10Base5:
The original cabling standard for Ethernet that uses coaxial cables.
The name derives from the fact that the maximum data transfer speed
is 10 Mbps, it uses baseband transmission, and the maximum length of
cables is 500 meters.
10Base5 is also called thick Ethernet, ThickWire, and ThickNet.
10Base5 networks are wired together in a bus topology—that is, in a
linear fashion using one long cable. The maximum length of any
particular segment of a 10Base5 network is 500 meters, hence the 5 in
10Base5. If distances longer than this are required, two or more
segments must be connected using repeaters. Altogether, there can
be a total of five segments connected using four repeaters, as long as
only three of the segments have stations (computers) attached to
them. This is referred to as the 5-4-3 rule.
A 10Base5 segment should have no more than 100 stations wired to it.
These stations are not connected directly to the thicknet cable as in
10Base2 networks. Instead, a transceiver is attached to the thicknet
cable, usually using a cable-piercing connector called a vampire tap.
From the transceiver, a drop cable is attached, which then connects
to the network interface card (NIC) in the computer. The minimum
distance between transceivers attached to the thicknet cable is 2.5
meters, and the maximum length for a drop cable is 50 meters.
Thicknet cable ends have N-series connectors soldered or crimped on
them for connecting segments together.
10Base2
A type of standard for implementing Ethernet networks. 10Base2 is
sometimes referred to as thinnet (or “thin coax”) because it uses thin
coaxial cabling for connecting stations to form a network. 10Base2
supports a maximum bandwidth of 10 Mbps, but in actual networks,
the presence of collisions reduces this to more like 4 to 6 Mbps.
10Base2 is based on the 802.3 specifications of Project 802 developed
by the Institute of Electrical and Electronic Engineers (IEEE).
The designation 10Base2 comes from the speed of the network (10
Mbps), the signal transmission method (baseband transmission), and
the maximum segment length (185 meters, rounded off to 200 with the
zeros removed).
10 Base T
A type of standard for implementing Ethernet networks. 10BaseT is
the most popular form of 10-Mbps Ethernet, using unshielded twisted-
pair (UTP) cabling for connecting stations, and using hubs to form a
network. 10BaseT supports a maximum bandwidth of 10 Mbps, but in
actual networks, the presence of collisions reduces this to more like 4
to 6 Mbps. 10BaseT is based on the 802.3 specifications of Project 802
developed by the Institute of Electrical and Electronic Engineers
(IEEE).
Graphic 0-4. A 10BaseT network.
a. Retransmission Policy
b. Window Policy
The type of window at the sender may also affect congestion. The
Selective Repeat window is better than the Go-Back-N window for
congestion control. In the Go-Back-N window, when the timer for a
packet times out, several packets may be resent, although some may
have arrived safe and sound at the receiver. This duplication may
make the congestion worse. The Selective Repeat window, on the
other hand, tries to send the specific packets that have been lost or
corrupted.
c. Acknowledgment Policy
d. Discarding Policy
e. Admission Policy
a. Backpressure
Node III in the figure has more input data than it can handle. It drops
some packets in its input buffer and informs node II to slow down.
Node II, in turn, may be congested because it is slowing down the
output flow of data. If node II is congested, it informs node I to slow
down, which in turn may create congestion. If so, node I inform the
source of data to slow down. This, in time, alleviates the congestion.
Note that the pressure on node III is moved backward to the source to
remove the congestion.
b. Choke Packet
d. Explicit Signaling
i. Backward Signaling
Total Length (16): This 16-bit field defines the entire datagram
size, including header and data, in bytes. The minimum-length
datagram is 20 bytes (20-byte header + 0 bytes data) and the maximum
is 65,535 — the maximum value of a 16-bit word. The minimum size
datagram that any host is required to be able to handle is 576 bytes,
but most modern hosts handle much larger packets.
Identification (16): Unique IP packet value. This field is an
identification field and is primarily used for uniquely identifying
fragments of an original IP datagram. Some experimental work has
suggested using the ID field for other purposes, such as for adding
packet-tracing information to datagrams in order to help trace back
datagrams with spoofed source addresses.
Flags (3): A three-bit field follows and is used to control or
identify fragments. They are (in order, from high order to low order):
Reserved; must be zero.
Don't Fragment (DF)
More Fragments (MF)
If the DF flag is set and fragmentation is required to route the packet
then the packet will be dropped. This can be used when sending
packets to a host that does not have sufficient resources to handle
fragmentation.
When a packet is fragmented all fragments have the MF flag set except
the last fragment, which does not have the MF flag set. The MF flag is
also not set on packets that are not fragmented — an unfragmented
packet is its own last fragment.
Fragment Offset (13): The fragment offset field, measured in
units of eight-byte blocks, is 13 bits long and specifies the offset of a
particular fragment relative to the beginning of the original
unfragmented IP datagram. It provides fragmentation and reassembly
if the packet is too large to put in a frame and allows maximum
transmission unit of the internet. The first fragment has an offset of
zero. This allows a maximum offset of 65,528 ((213 -1) X 8) which
would exceed the maximum IP packet length of 65,535 with the header
length included.
Time to Live (8): An eight-bit time to live (TTL) field helps prevent
datagrams from persisting (e.g. going in circles) on an internet.
Historically the TTL field limited a datagram's lifetime in seconds, but
has come to be a hop count field. Each packet switch (or router) that a
datagram crosses decrements the TTL field by one. When the TTL field
hits zero, the packet is no longer forwarded by a packet switch and is
discarded. Typically, an ICMP message (specifically the time
exceeded) is sent back to the sender that it has been discarded. The
reception of these ICMP messages is at the heart of how trace
route works. It specifies how long, in seconds, a datagram is allowed
to remain in the internet.
Protocol (8): This field defines the protocol used in the data
portion of the IP datagram. Port of upper layer protocol.
Header Checksum (16): The 16-bit checksum field is used for
error-checking of the header. At each hop, the checksum of the
header must be compared to the value of this field. If a header
checksum is found to be mismatched, then the packet is
discarded. The checksum field is the 16-bit one's complement of the
one's complement sum of all 16-bit words in the header. For purposes
of computing the checksum, the value of the checksum field is zero.
Source Address (32): An IPv4 address is a group of four eight-
bit octets for a total of 32 bits. The value for this field is determined by
taking the binary value of each octet and concatenating them together
to make a single 32-bit value. This address is the address of the
sender of the packet.
Destination Address (32): 32 bit IP address of the station this
packet is destined for. Identical to the source address field but
indicates the receiver of the packet.
Option (Variable): Encodes the option requested by the sending
user.
Padding (Variable): Used to ensure that the datagram header is
a multiple of 32 bits in length.
Simplex Mode
Half duplex Mode
Full duplex Mode
SIMPLEX Mode
In this type of transmission mode data can be sent only through one
direction i.e. communication is unidirectional. We cannot send a
message back to the sender. Unidirectional communication is done in
Simplex Systems.
Examples of simplex Mode is loudspeaker, television broadcasting,
television and remote, keyboard and monitor etc.
In full duplex system there can be two lines one for sending the data
and the other for receiving data.
This will only work for the lifetime of that particular console
window. To set your PATH more permanently on Windows NT,
2000, and XP, use the Environment tab of the System Control
Panel. On Windows 95, 98, and ME, you will need to edit
your AUTOEXEC.BAT to include a setcommand like the one
above.
PSCP USAGE:
Once you've got a console window to type into, you can just
type pscp on its own to bring up a usage message. This tells you
the version of PSCP you're using, and gives you a brief summary
of how to use PSCP:
5. Differentiate between IPV4 and IPV6.
Rubri Performance Does not Developing Meets Exceeds
cs for Indicators meet expectations expectations
Asse expectations
ssme
nt Quality No relevantSome ofThe contentThe contents
Content content the contentis not asaddress the
is relateddetailed questions
to theand/or clearly and
assignment concise asfully.
topic. needed.