CLASS:
IV YEAR / VII SEMESTER ECE
SUBJECT
CODE AND NAME: CS2062 & HIGH SPEED
NETWORKS
UNIT I
HIGH SPEED NETWORKS
PART - A
1) What is common channel signaling? Nov/Dec 2008
The
data’s and control signals of a user are transmitted on separate channel. The control
signals of all the user are passed through a single common channel.
2) What is inband signaling?
If
the data’s and control signals of a user are transmitted on same channel with
same frequency then it is called inband signaling.
3) Define cell sequence integrity?
It
is the characteristic of virtual channel to preserve sequence of transmitted
cells.
4) What is the purpose of cell loss priority bit in ATM cell
format? Nov/Dec
2009
It
provides guidance to the network in the event of congestion. A value of
indicates a cell of higher priority which should not be discarded unless no
other alternatives is available. A value of 1 indicates that this cell is
subject to discard with in the network.
5) what are the AAL services? Apr/May
2009
Handling
of transmission errors
Segmentation
and Reassembly to enable large blocks of data to be carried in the information
field
Handling
of lost and misinserted cell condition.
Flow
control and timing control.
6) What are the two types of sublayer used in ATM adaptation
layer?
1. Convergence sub
layer
2. Segmentation and
Reassembly sub layer.
7) Define sustainable cell rate?
The
SCR is the average cell rate over a long time interval. The actual cell rate
may be lower or higher than this value, but the average should be equal to or
less than SCR.
8) Define peak cell rate?
The
PCR defines the sender’s maximum cell rate. The user’s cell rate can sometimes reach
this peak as long as the SCR is maintained.
9) Define fabric in fiber channel communication.
The
fiber channel communication network consists of one or more switching elements which
are collectively called as fabrics.
10) Define collision domain?
The
maximum distance that data can travel between two station is called collision
domain in Ethernet.
11) Define DTE? Nov/Dec
2008
DTEs
generally are considered to be terminating equipment for a specific network and
typically are located on the premises of a customer. In fact, they may be owned
by the customer. Examples of DTE devices are terminals, personal computers, routers,
and bridges.
12) Define DCE?
DCEs
are carrier-owned internetworking devices. The purpose of DCE equipment is to provide
clocking and switching services in a network, which are the devices that
actually transmit data through the WAN. In most cases, these are packet
switches.
13) What is Virtual channel? Apr/May
2009
A Virtual
Channel (VC) denotes the transport of ATM cells which have the same unique
identifier, called the Virtual Channel Identifier (VCI). This identifier is
encoded in the
cell header. A
virtual channel represents the basic means of communication between two
endpoints, and is analogous to an X.25 virtual circuit.
14) What are the benefits
of ATM? Apr/May
2011
The benefits of ATM
are the following:
high
performance via hardware switching
dynamic
bandwidth for bursty traffic
class-of-service
support for multimedia
scalability in speed and network size
common
LAN/WAN architecture
opportunities
for simplification via VC architecture
international
standards compliance
15) What are the Requirements
of Wireless LAN?
Throughput Nov/Dec
2010
Number
of nodes
Connection
to backbone
Service
area
Battery
power consumption
Transmission
robustness and security
16)What are IEEE 802.11 Services?
Association
Reassociation
Disassociation
Authentication
Privacy
17) What are the functions of AAL5? Apr/May
2010
The
type 5 adaptation layer is a simplified version of AAL3/4. It also consists of
message and streaming modes, with the CS divided into the service specific and
common part. AAL5 provides point-to-point and point-to-multipoint (ATM layer)
connections. AAL5 is used to carry computer data such as TCP/IP. It is the most
popular AAL and is
sometimes referred
to as SEAL (simple and easy adaptation layer).
18) Define Basic Service Set?
IEEE
802.11 defines the BSS as the building block of a wireless LAN. It consists of stationary
or mobile stations and a possible central base station known as Access Point.
19) What is PCF?
Point
Co-ordinate Function is a centralized MAC algorithm used to provide contention free
service. This is done by polling stations in turn. Higher priority traffic
makes use of PCF.
20) What are the topologies used in Fiber channel?
1.
Switched topology
2.
Point-to-point topology
3.
Arbitrated loop topology
21. Define frame relay.
A form of packet switching based on
the use of variable-length link-layer frames. There is no network layer, and
many of the basic functions have been streamlined or eliminated to provide for
greater throughput.
22. Define ATM. Apr/May 2011
ATM is a connection-oriented packet
switching technique that generalizes the notion of a virtual connection to one
that Provides quality-of-service guarantees. (Or) A form of packet transmission
using fixed size packets, called cells. ATM is the data transfer interfaces for
B-ISDN. Unlike X.25, ATM does not provide error control and flow control
mechanisms.
23. Write down the advantages of packet switching network
over circuit switching.
a). Line efficiency is greater,
because a single node-to-node link can be dynamically shared by many packets
over time.
b). A packet-switching network can
carry out data-rate conversion.
c). Priorities
can be used.
24. What are the main features of ATM? Apr/May 2010
1. The service is
connection-oriented, with data transfer over a virtual circuit.
2. The data is transferred in 53 byte
packets called cells.
3. Cells from
different VCs that occupy the same channel or link are statistically
multiplexed.
4. ATM switches may treat the cell
streams in different VC connections unequally over the same channel in order to
provide different qualities of services (QOS).
25. What are the traffic parameters of connection-oriented
services? Nov/Dec 2010
1. Peak Cell Rate (PCR)
2. Sustained Cell Rate (SCR)
3. Initial Cell Rate (ICR)
4. Cell Delay Variation Tolerance
(CDVT)
5. Burst Tolerance (BT)
6. Minimum Cell Rate (MCR)
26. What are the quality service (QoS) parameters of
connection-oriented services?
1. Cell Loss Ratio (CLR)
2. Cell Delay Variation (CDV)
3. Peak-to-Peak Cell Delay Variation
(Peak-to-Peak CDV)
4. Maximum Cell Transfer Delay (Max
CTD)
5. Mean Cell Transfer Delay (Mean
CTD)
27. Types of ATM network interface.
Two most important interfaces are:
1. User-network interface (UNI)
2. Network-network interface or
network-node interface (NNI).
28. What are the two sub layers of AAL?
1. Convergence Sub layer (CS)
2. Segmentation and Reassembly Sub
layer (SAR).
29. What is the function of CS?
The Convergence Sublayer (CS)
converts the information stream into four types of packets streams, called AAL
Type1, Type2, Type3/4, and Type5.The packet
formats match the requirements of
the information stream.
30. What are the
subdivisions of CS?
1. Upper, service-specific or SSCS
sub layer
2. Lower, common part or CPCS sub
layer.
31. What do you mean by Type1 traffic?
Type1 traffic is a traffic generated
at constant bit rate, and it is required to be delivered at the same rate (with a fixed delay).
32. What are the functions of management and control?
1. Fault management
2. Traffic and congestion control
3. Network status monitoring and
configuration
4. User/network
signaling.
33. What are the
subdivisions of CS?
1. Upper, service-specific or SSCS
sub layer
2. Lower, common part or CPCS sub
layer.
34. What are the two basic tasks required for
internetworking
over ATM?
The first is encapsulation of the
protocol data units, and the second is Routing or Bridging of these PDUs.
35 Define fast Ethernet Nov/Dec
2012
Fast Ethernet refers to a set of
specifications developed by the IEEE 802.3 committee to provide a low-cost,
Ethernet-compatible LAN operating at 100 Mbps.
36. Define gigabit Ethernet? Apr/May 2012
Gigabit Ethernet, which has a data
rate of 1000 Mbps (Or) 1 Gbps. In which collision domain is reduced. Gigabit
Ethernet is mainly designed to use optical fiber, although the protocol does
not eliminate the use of twisted pair cables.
There are four implementations have been designed for gigabit
Ethernet:
a)
1000Base-LX
b) 1000Base-SX
c) 1000Base-CX
d) 1000Base-T
37. Define Ethernet.
As packet switching has
dominated wide area data networking, Ethernet dominates local area networking.
The original experimental Ethernet operated at 3mbps over coaxial cable. This
remarkable over twisted pair & optical fiber as well as coaxial cable. It
was released commercially at 10 mbps & then was scaled up first to 100bps
& none 1 & 10 gbps.
38.
Give the data rates for frame relay & X.25?
The
lower bit rate for X.25 is 64 kbps. The fixed data for frame relay is
1.544mbps. The higher data rate for frame relay is 44.376mbps
39.List
requirements for WLAN? Nov/Dec 2012
a). Throughput
b). Number of
nodes
c). Connection to backbone LAN
d). Service area
e). Battery power consumption
f). Transmission robustness and
security
g). Collocated network operation
h). License-free operation
i). Handoff/roaming
j). Dynamic configuration
40. List out the important services of IEEE 802.11?
Apr/May
2012
a) Association
b) Reassociation
c) Disassociation
d) Authentication
e) Privacy
41. Mention the requirements for fibre channels?
a) Full duplex links with two fibers
per link.
b) Performance from 100 Mbps TO 800
Mbps on a
single line.
c) Small connectors
d) Support for distances up to 10 km.
e) High capacity utilization with
distance insensitivity.
f) Broad availability.
g) Small systems
h) Interface and network protocols.
42. List out the fibre channel elements?
a) Node: The key elements of a fibre
channel network
are the end systems.
b) Fabric: The collection of
switching elements
43.What is the datalink control functions provided by LAPF?
LAPF core provides a minimal set of
datalink control functions consisting of the following
(i)Frame delimiting, alignment &
transparency.
(ii)Frame multiplexing/demultiplexing
using the
address field.
(iii)Inspection of the frame to
ensure that it consist of
an integer no. of octets prior to zero bit insertion or
following zero bit extraction.
(iv)Inspection of the frame to ensure
that it is neither
too long nor too short.
(v)Detection of transmission errors.
(vi)Congestion control functions.
44. list the levels of fiber channel & the function of
each level?
FC-0 PHSICAL MODE
Includes optical fiber for long
distance application, co-axial for high speeds over short distances &
shielded twisted pair for lower speeds over short distance.
FC-1 TRANSMISSION POROTOCOL
Defines the signal encoding scheme.
FC-2 FRAMING PROTOCOL
Deals with defining topologies, frame
format, flow & error control & grouping of frames into logical entities
called sequences & exchanges.
FC-3 COMMON SERVICES
Include multicasting.
FC-4 MAPPING
Defines the mapping of various
channel & network protocol to fiber channel, including IEEE 802, ATM, IP
& the Small Computer System Interface (SCSI).
45. What is meant by SAR & CS?
The AAL layer is organized in two logical sub layers:
SAR & CSSAR: Segmentation And Reassembly
sub layer is responsible for packing information at the other end.
CS: The Convergence Sublayer provides
the function needed to support specific application using AAL .
46. Compare X.25 and
Frame Relay Apr/May 2011
X.25
Hop by hop flow control
Multiplexing and switching done in
layer 3
Inband signaling
Frame Relay
End to end flow
Multiplexing and switching done in
layer 2
Common channel signaling
PART- B
1.Describe the architecture of IEEE 802.11? Apr/May 2012
2.what are the service provided
by ATM adaptation layer?Explain the operation of various AAL protocols? Apr/May 2010
3.Compare X.25 and
frame relay protocol?
4.Explain the fibre
channel protocol architecture?
5.Describe the Gigabit
Ethernet?
6.Describe the various
requirements and application specific to wireless LAN?
7.Explain the physical
layer access mechanism, MAC layer
protocol and MAC layer phrame format for
802.11? Nov/Dec 2012
8.Describe the fast
Ethernet?
9.Describe ATM cell
format in detail? Nov/Dec 2010
10. Explain in detail about various switching techniques.
11. Explain in detail about frame relay bearer and frame
switching bearer services.
12. Explain the concept of frame
mode call control. Apr/May 2013
13. Explain in detail ATM protocol
architecture Apr/May 2011
14. Explain in detail ATM logical connection with neat diagram
15. Explain in detail AAL3/4 protocol
16. Explain the concept of ATM
service categories Nov/Dec 2009 17.
Explain in detail about transmission of ATM cell.
UNIT II
CONGESTION AND TRAFFIC
MANAGEMENT
PART - A
1) When queue will be formed in a network?
Queue
will be formed if the current demand for a particular service exceeds the
capacity of service provider.
2)what are the characteristics of queuing process?
1.
Arrival pattern Apr/May
2011
2.Service
pattern
3.Number
of server
4.System
capacity
5.Queue
discipline
3) What is meant by implicit congestion signaling?
When
network congestion occurs packets get discard and acknowledgement will be delayed.
As a result source understand that there is congestion implicitly.
4) What are the Congestion-Control Mechanisms?
Backpressure Apr/May
2010
Request from destination to source to reduce
rate
Useful only on a logical connection basis
Requires
hop-by-hop flow control mechanism
Policing
Measuring and restricting packets as they enter the network
Choke packet
Specific message back to source
E.g.,
ICMP Source Quench
Implicit
congestion signaling
Source
detects congestion from transmission delays and lost packets and reduces flow
5) What is meant by FECN?
The
FECN bit is part of the Address field in the Frame Relay frame header. The FECN
mechanism is
initiated when a DTE device sends Frame Relay frames into the network. If the network
is congested, DCE devices (switches) set the value of the frames' FECN bit to
1. When the frames reach the destination
DTE device, the Address field (with the FECN bit set) indicates that the frame
experienced congestion in the path from source to destination.
6) What is meant by BECN? Apr/May 2011
The
BECN bit is part of the Address field in the Frame Relay frame header. DCE
devices set the value of the BECN bit to 1 in frames traveling in the opposite
direction of frames with their FECN bit set. This informs the receiving DTE
device that a particular path through the network is congested.
7) What is the use of Discard Eligibility (DE) bit?
The
Discard Eligibility (DE) bit is used to indicate that a frame has lower
importance than other frames. The DE bit is part of the Address field in the
Frame Relay frame header.
8) What is the error checking mechanism used in Frame Relay?
Frame
Relay uses a common error-checking mechanism known as the cyclic redundancy check
(CRC). The CRC compares two calculated values to determine whether errors
occurred during the transmission from source to destination. Frame Relay
reduces network overhead by implementing error checking rather than error
correction.
9) What are the Considerations for Traffic Management in Congested
Network? Apr/May 2008
Fairness
Quality
of Service
Reservations
10) Advantages of Frame Relay Congestion Control
Minimize frame discard
Maintain
QoS (per-connection bandwidth)
Minimize monopolization of network
Simple to implement, little overhead
Minimal
additional network traffic
11) What are the Frame Relay Traffic Rate Management Parameters?
Committed
Information Rate (CIR)
Average
data rate in bits/second that the network agrees to support for a connection
Data
Rate of User Access Channel (Access Rate)
Fixed
rate link between user and network (for network access)
Committed
Burst Size (Bc)
Maximum
data over an interval agreed to by network
Excess
Burst Size (Be)
Maximum
data, above Bc, over an interval that network will attempt to transfer
12) Define committed Burst size(Bc)?
This
is maximum number of bits in a predefined period of time that the network is committed
to transfer without discarding any frames.
13) Define access rate? Apr/May 2009
For
every connection in frame relay network, an access rate is defined. The access
rate actually depends on bandwidth of channel connecting user to network.
14) What are the steady state performance measures to be
determined in Queueing models?
Queueing
models allow a number of useful steady state performance measures to be determined,
including:
the
average number in the queue, or the system,
the
average time spent in the queue, or the system,
the
statistical distribution of those numbers or times,
the
probability the queue is full, or empty, and
the
probability of finding the system in a particular state.
15)Write Kendall’s notation.
(a/b/c): (d/e) is
Kendall’s notation
a—distribution
of inter arrival time
b—distribution
of service time
c—number
of server
d—maximum
number of allowed items in a system
e—queuing
discipline used
16) Compare single server and multi server queue
Single
server model Apr/May 2009
Congestion statistics
for this model are : M/M/1, M/D/1, M/G/1, Arrival rate=
Multi
server model
Congestion statistics
for this model is : M/M/N
Arrival rate for each
server=
/N
17. When queue will be formed in a network
Queue will be formed, if the current
demand for a particular service exceeds the Capacity of service provider.
18. What are the characteristics of queuing process/
Characteristics of queuing process depend on:
a) Arrival
pattern
b) Service
pattern
c) Number of
server
d) Queue
discipline
e) System
capacity
f) Number of channels
19. compare Single server and Multi server model
congestion statistics
Single server model congestion statistics for this model are M/M/1,
M/D/1, M/G/1
Arrival rate = λ
Multi server model congestion statistics for this model are M/M/N
Arrival rate = λ/N
20. What is meant by traffic intensity in queuing analysis?
And write littles formula for single server queue?
Traffic intensity (or) utilization
factor ρ = λ/μ = arrival rate / rate service
Little’s formula ρ = λ TS
r = λ Tr
w = λ Tw
21. What is meant by implicit congestion signaling?
When network congestion occurs,
packets get discard and acknowledgement will be delayed. As a result, sources
understand that there is congestion implicitly. Here, users are notified about
congestion indirectly.
22. What is meant by explicit congestion signaling?
In this method, congestion is
indicated directly by a notification. The notification may be in backward or
forward direction.
23. Define committed burst size (BC)
It is defined as the maximum number
of bits in a predefined period of time that the network is committed to
transfer with out discarding any frames.
24. Define committed information rate (CIR) Nov/Dec
2010
CIR is a rate in bps that a network
agrees to support for a particular frame mode connection. Any data transmitted
in excess of CIR is vulnerable to discard in event of congestion.
CIR < Access rate
25. Define access rate.
For every connection in frame relay
network, an access rate (bps) is defined. The access rate actually depends on
bandwidth of channel connecting user to network.
26. Write Little’s formula.
Little’s formula is defined as the
product of item arrive at a rate of λ, and Served time of items Tr (or) product
of item arrive at a rate of λ and waiting time of an items Tw.
It is given as, r = λ Tr (or) w = λ Tw
27. List out the model characteristics of queuing models.
a) Item population.
b) Queue size
c) Dispatching discipline
28. List out the fundamental task of a queuing analysis.
Queuing analysis as the following as a input information.
a) Arrival rate b) Service rate
c) Number of servers
Provide as output information concerning:
a) Items waiting
b) Waiting time
c) Items queued
d) Residence time
29. State Kendall’s
notation. Apr/May 2013
Kendall’s notation is X/Y/N, where X
refers to the distribution of the interarrival times, Y refers to the
distribution of service times, and N refers to the number of servers.
The most common distributions are denoted as follows:
G = General distribution of interarrival times or service
times
GI = General distribution of interarrival times with the
restriction
that Interarrival times are independent.
M = Negative exponential distribution
D = Deterministic arrivals or fixed-length service.
Thus, M/M/1 refers to a single-server queuing model with
poisson arrivals (Exponential interarrival times) and exponential service
times.
30. List out the assumptions for single server queues.
a) Poisson arrival rate.
b) Dispatching discipline does not
give preference to items based on service times
c) Formulas for standard deviation
assume first-in, first-out dispatching.
d) No items are discarded from the queue.
31. List out the assumptions for Multiserver queues.
a) Poisson arrival rate.
b) Exponential service times
c) All servers equally loaded.
d) All servers have same mean service
time.
e) First-in, first-out dispatching.
f) No items are discarded from the
queue.
32. State Jackson’s theorem. Nov/Dec 2009
Jackson’s theorem can be used to
analyse a network of queues. The theorem is based on three assumptions:
1. The queuing network consists of m
nodes, each of which provides an independent exponential service.
2. Items arriving from outside the
system to any one of the nodes arrive with a poisson rate.
3. Once served at a node, an item
goes (immediately) to one of the other nodes with a fixed probability, or out
of the system.
33. Define Arrival rate and service rate.
Arrival Rate: The rate at which data
enters into a queuing system i.e., inter arrival rate. It is indicated as λ.
Service Rate: The rate at which data
leaves the queuing system i.e., service rate.
It is indicated as μ.
34. What is meant by congestion avoidance and congestion
recovery technique?
Congestion Avoidance: It is the
procedure used at beginning stage of congestion to minimize its effort. This
procedure initiated prior to or at point A. This procedure
prevent congestion from progressing to point B.
Congestion Recovery: This procedure
operates around at point B and within region of severe congestion to prevent
network collapse. Here dropped frames are reported to higher layer and further
packet delivery is stopped to recover from congestion.
35. what is the role of de in frame relay?
This bit it indicates frame priority.
The DE can taken value of 0 or 1.
DE=0 means frame network element; it can be discard the frame
during periods of congestion. DE=1, for generally considered as high priority
frames.
36. How does frame relay report congestion?
When the particular portion of the
network is heavily congestion. It is Desirable to route packets around rather
than through the area of congestion.
37. What are the functions of user plane? Nov/Dec 2010
It compromise the functions required
for the transmission of user informationfor instance, for an internet protocol
over ATM, these layers could be HTTP/TCP/IP/AAL5.
38. Draw single server queue model. Nov/Dec 2013
39. Draw multiple server queue model.
40. Draw multiple single server queue model
PART – B
1. Explain
in detail about queue analysis and queue models Nov/Dec 2013
2. Explain
kendall’s notation. Write equation for single server that follows M/M/1 model
Apr/May 2013
3. Write
equation for single server that follows M/G/1 and M/D/1 model
4. Explain
in detail about congestion control in frame relay network and packet switching
network
5. Explain
effect of congestion and congestion control mechanism Nov/Dec
2011
6. Explain
congestion avoidance and congestion recovery techniques Apr/May
2010
7. Explain
in detail about traffic control management
UNIT III
TCP AND ATM CONGESTION
CONTROL
1)What are retransmit policies used in TCP traffic control?
1.
First only
2.
Batch
3.
Individual
2) State the condition that must be met for a cell to conform. Apr/May 2010
In
case of ATM, the information flow on each logical connection is organized into
fixed size packets
called cells. Cells should arrive within theoretical arrival time but with in CDVT.
3)What are the mechanisms used in ATM traffic control to avoid
congestion condition? Apr/May 2009
1.Resource
management
2.Connection
admission control
3.Usage
parameter control
4.Traffic
shaping
4) What are the TCP congestion control mechanisms?
1.Retransmission
Timer Management
2.Window
Management
5) What are the Three Techniques to calculate retransmission timer
(RTO):
RTT
Variance Estimation
Exponential
RTO Backoff
Karn’s
Algorithm
6) What is reactive congestion control? Apr/May
2010
Whenever
a packet discard takes place due to severe congestion some control mechanism is
needed to recover from network collapse , these mechanism is reactive congestion
control.
7) What are the requirements for ATM Traffic and Congestion
Control?
Most
packet switched and frame relay networks carry
non-real-time bursty
data
No
need to replicate timing at exit node
Simple
statistical multiplexing
User
Network Interface capacity slightly greater than average of channels
Congestion
control tools from these technologies do not work in ATM
8) Why congestion control is difficult to implement in TCP?
The
end system is expected to exercise flow control upon the source end system at a
higher layer.Thus it is difficult to implement congestion control in TCP.
9)What is meant by silly window syndrome?
If
data’s are send as small segments frequently, the response will be speed in the
sender side, but it cause degradation in performance. This degradation is
called silly window syndrome.
10) What is meant by cell insertion time and allowed cell rate? Apr/May 2009
Cell
insertion time: It is the time taken to insert a single cell on to the network.
Allowed
cell rate: The current rate at which the source is permitted to send or
transmit cell in ABR mechanism is called allowed cell rate.
11) Define Behavior Class Selector (BCS). Nov/Dec 2013
BCS
enables an ATM network to provide different service levels among UBR connections
by associating each connection with one of a set of behavior class.
12)What are the Objectives of ATM layer traffic and congestion
control
Support QoS for all foreseeable services
Not
rely on network specific AAL protocols nor higher layer application specific protocols
Minimize
network and end system complexity
Maximize
network utilization
13)What is meant by Open Loop Control and Closed Loop Control? Apr/May 2012
Open
loop control: If there is no feedback to the source concerning congestion then this
approach is called as open loop control.
Closed
Loop Control: If there is feedback to the source concerning congestion then this
approach is called as closed loop control.
14)What are the accept policies used in TCP traffic control?
1.In-order
policy
2.In-window
policy
15) What are the techniques of Window management?
1.Slow
start
2.Dynamic
window sizing on congest
3.Fast
retransmit
4.Fast
recovery
5.Limited
transmit
16) What does ‘awnd’ and ‘cwnd’ refers to?
‘awnd’
refers to allowed window. This is window size allowed by TCP to send without
waiting for acknowledgement.
‘cwnd’
refers to congestion window. This is window used by TCP during startup and to reduce
flow during congestion.
17) Two techniques to reduce the transmission of useless cells?
1.
Partial packet discard
2.
Early packet discard
18) What are the QoS parameters?
1.
Peak to peak cell delay variation
2.
Maximum cell transfer delay
3.
Cell loss ratio
19) What is Buffer Management? Apr/May 2013
This
mechanism provides the way in which cells are treated that have been buffered
at network switch. When congestion occurs, the buffer occupancy becomes
maximum. Now tagged cells are discarded to give preference to untagged cells.
20) What is self clocking?
TCP
automatically senses the network bottleneck and regulates the flow at
source.This is called self clocking.
21.How is times useful to control congestion in TCP?
The
value of RTO( Retransmission time out) have a critical effect on TCP’s reaction
to congestion. Hence by calculating RTO congestion can be controlled
22. compare flow control and congestion control
In
flow control transmitter should not overwhelm the receiver. In congestion
control it aim to limit the total amount of data entering the network, to
amount of data that network can carry.
23. what is preventive congestion control? Nov/Dec 2008
These
are mechanism to avoid congestion before it occurs.
24. what are the accept policies used in TCP traffic control?
1.
in order policy
2.
in window policy
25. What are the mechanisms used in TVP to control congestion
condition?
1.
RTO timer management
2.
window management.
26. what is meant by ACR (Allowed Cell Rate)
Nov/Dec 2012
The
current rate at which source is permitted to send or transmit cell in ABR
mechanism is called Allowed Cell Rate.
27. What are the two events leads to retransmit?
1. segment fail to reach destination
2. segment may be discarded due to
error.
28. classify TCP implementation policy
1. send policy
2. deliver policy
3. accept policy
4.retransmit policy
5. acknowledge policy
29. How TCP congestion control mechanism?
1. Retransmission timer management
2. Window management
30. state the rules of Karn’s algorithm.
1. Donot use measured RTT
2. Calculate the back off RTO
3. Use the back off value for
succeeding segments.
31. Mention the techniques for window management
1. Slow start
2. Dynamic window sizing
3. Fast retransmit
4. fast recovery
32. Mention the modes of operation ABR flow control
1. Binary mode
2. Explicit rate mode
33. What is the need for ATM congestion control
1. not possible to control flow of
ATM traffic
2. Cell transmission time is small
3. ATM network generates very
different traffic pattern
34. what are the four categories of ATM attributes
1. Traffic descriptor
2. QoS parameter
3. Congestion control attributes
4. other attributes
35.
what are the conditions to avoid congestion? Nov/Dec 2012
1. Resources management using
virtual paths
2. Connection admission control
3. Usage parameter control
4. Traffic shaping
36. State the three case of VPC
1. User to User application
2. user to network application
3. Network to network application
37. What are the two version of generic cell rate algorithm?
1. Virtual scheduling algorithm
2. Leaky bucket algorithm
38. What is sustainable cell rate algorithm Nov/Dec 2013
If generic cell rate algorithm is
used to control SCR and BT, then it is called sustainable cell rate algorithm.
39. What is peak cell rate
The maximum value assigned to ACR
40. What is initial cell rate?
The initial value assigned to ACR
PART – B
1. Explain credit
allocation scheme for TCP flow control in detail Nov/Dec
2013
2. Describe TCP
implementation policy in detail
3. Expliain in TCP
congestion control in detail Nov/Dec 2008
4. Explain the
concept of RTT variance estimation (Jacobson’s algorithm) and Exponential RTO
back off
5. Explain the
concept of Karn’s algorithm Nov/Dec 2009
6. Explain the
concept of window management
7. Explain in
detail about the TCP over ATM Apr/May 2010
8. Explain ATM
traffic control in detail
9. Explain the
algorithms in that specifies ATM traffic management to perform UPC function Apr/May 2013
10. Explain in
detail about ABR traffic management
11. Explain in detail
about ABR rate control
12. Explain in
detail RM cell format Nov/Dec
2011
13. Explain the
concept ABR capacity allocation
14. Explain in
detail about GFR mechanism and GFR traffic management
UNIT
IV
1. What is meant by elastic traffic? Give example.
Apr/May 2010
Elastic
traffic can adjust over wide ranges to changes in delay and throughput across
an internet and still meet the needs of its applications.
Example File transfer
E-mail
Web access
2. What is meant by inelastic traffic? Give
example.
Inelastic
traffic cannot adjust to changes in delay and throughput across an internet.
Example:
Voice
chat
Tele conferencing
3. Define Delay Jitter. Apr/May 2010
The
delay jitter is the maximum variation in delay experienced by packets in a
single session.
4. What is meant by best effort service?
Flows
that are not reserving resources are provided with best effort service. The
network will put best effort to deliver the packet but if congestion occurs
severely discard the packet.
5. What is meant by guaranteed service?
Flows
that are reserving resources are provided with guaranteed service. The service provides
assured capacity levels.
6. Define global synchronization. Apr/May 2008
Due
to packet discard during congestion, many TCP connections entered slow start at
the same time. As a result, the network is unnecessarily under utilized for
some time. The
TCP connections which
entered into slow start, will come out of slow start at about time causing
congestion again. This phenomenon is called global synchronization.
7. What are the design goals of RED algorithm?
1.
Congestion avoidance
2.
Global synchronization avoidance
3.
Round on average queue length
8. Define behavior aggregate in per hop
behavior.
A
set of packets with the same Ds code point crossing a link in particular
direction is called behaviour aggregate.
9. Define DS code point.
A
specified value of 6 bit DS code point portion of the 8 bit DS field in the IP
header which indicate to which class packet belongs and its drop precedence.
10. What is meant by traffic conditioning
agreement?
An
agreement that specify rules that are to apply for packets selected by the
classifier. Control functions performed in TCA are metering, marking, shaping
and dropping.
11. Define DS boundary node. Apr/May 2009
A DS
node that connects one Ds domain to the node in another domain.
12. Define DS interior node.
A
node in DS domain, which is not the boundary node is called Ds interior node.
13. Define Ds node.
A
router that supports DS policies is called as DS node. A host system that use
DS for application is called as DS node.
14. What is meant by differentiated service?
It
does not attempt to view the total traffic demand in integrated sense.
It
does not reserve network capacity in advance.
It
provides differential level of QOS to different traffic flows.
15. What is meant by integrated services? Nov/Dec 2012
The Is provider –
Views
the total of current traffic demand.
Limits
the demand with respect to the current capacity handled by the network.
Reserve
resources with in the domain to provide a particular QOS guaranteed.
16. What are the key elements of controlled load services?
1.
services approximates tightly the behavior visible to applications receiving
best-effort service under unloaded conditions
2.
very high percentage of transmitted packets will be successfully delivered
17. Mention two different traffic management framework
1. Integrated services
2. Differentiated services
18. Mention two broad categories of traffic
1. Elastic
2. Inelastic
19. Define throughput
Inelastic traffic need minimum
throughput
20. Mention the application of Inelastic trafficNov/Dec 2010
1. Teleconferencing
2. Telephony
3. Voice chat
4. Live video
21. What is discard policy? Apr/May 2008
A discard policy is an important
element in managing congestion and meeting QoS guarantees.
22. What are the two main functional area of ISA
1. Classifier and route selection
2. Packet scheduler
23. What are the background function in ISANov/Dec 2013
1. Reservation protocol
2. Admission control
3. management agent
4. Routing Protocol
24. What are the three categories of ISA services
1. Guaranteed
2. Controlled load
3. Best effort
25. What are the limitation of FIFO queue
1. No special treatment for packets
2. small packet is queued behind
long packet
26. state advantage of RED algorithm Apr/May 2012
1. To avoid congestion and global
synchronization
27. Mention features of DS architecture
Provide a simple, easy to implement
and low overhead tool
28. What are the elements of traffic conditioning function
1. Classifier
2. Meter
3. Marker
4. Shaper
5. Dropper
29. Define Classifier
Separate traffic only on the basis
of DS code point
30. Define Meter
Determines whether given packet is
within or exceeds the SLA guaranteed for that class
31. Define Marker Apr/May 2013
Packets that exceeds the traffic
profile (TCA) , then such packets are remarked to provide best effort handling.
32. Define Shaper
It helps the packets to transmit at
specified traffic rate
33. Define Dropper
Drops the packets if its exceeds SLA
34. What are the two types of PHB mechanism?
1. Expedited forwarding PHB
2. Assured Forwarding PHB
35. Define behavior aggregate. Nov/Dec 2010
A set of packets with the same DS
code point crossing a link in a particular direction is called behavior
aggregate.
36. what are the key elements of explicit allocation schemes
1. Each class has different traffic profile
2. The packets are marked in and
marked out
37. Define TCA
An agreement that specifies rules
that are to apply for packets selected by classifier
38. Define DS boundary node
A DS node that connects one DS
domain to the node in another domain
39. Define DS interior node
A node in DS domain, which is not
the boundary node
40. Define DS node
A router that supports DS policies
is called DS node.
PART-B
1. Explain
in detail about integrated service architecture with neat dig Nov/Dec 2010
2.
Explain Bit round fair queuing method in detail Apr/May 2012
3. Explain
weighted fair queuing method in detail
4.
Explain the random early deduction in detail Apr/May 2008
5.
Explain in detail about differentiated service architecture with
neat diagram Nov/Dec 2013
UNIT
V
1. What is meant by soft state in RSVP? Nov/Dec 2010
RSVP
use connectionless approach, each intermediate router maintain state
information about nature of flow, that will be refreshed by end system at
predetermined amount of
time. This is called
soft state.
2. Why receiver is responsible to initiate
reservation in RSVP?
Each
member (destination) in multicast may require different resources to be
reserved depending on QOS it needs. So it is therefore better for receiver to
make resource
reservation.
3. Define session in RSVP?
Once
a reservation is made to the router by a particular destination, the router
considers this as a session and allocates resources for the life of that
session.
Session is defined by
Session:
Destination IP address
IP
protocol identifier
Destination
port
4. Define flow specification in RSVP. Nov/Dec 2011
The
flow specification of RSVP specifies a desired QOS and is used to set
parameters in a node’s packet scheduler.
Flow spec is defined
by
Flow spec: Service class
R spec
T spec
R spec is Reserve
Specification
T spec is Traffic
Specification
5. Define filter specification in RSVP. Nov/Dec 2009
Filter
spec in RSVP defines the set of packets or flow, for which a reservation is requested.
Filter spec is
defined by
Filter
spec: Source address
UDP/TCP
source port
6. What are the types of reservation style used in
RSVP? Wild
card filter reservation style.
Fixed
filter reservation style.
Shared
explicit reservation style.
7. What is meant by label merging and frame
merging?
Label merging: The
replacement of multiple incoming labels for a particular equivalent class with
a single outgoing label is called label merging.
Frame merging: Label
merging, when it is applied to operation over frame based media, then it is
called as frame merging.
8. Define label swapping in MPLS.
The
basic operation of looking up an incoming label to determine the outgoing label
and forwarding is called label swapping.
9. Define Label switched hop in MPLS.
The
hop between two MPLS nodes on which forwarding is done using labels is called label
switched loop.
10. What is meant by ingress edge and egress edge
in MPLS domain? Nov/Dec 2009
Ingress
edge: Label switched router through which packets from internet router
enters
into MPLS domain is
called ingress edge.
Egress
Edge LSR: LSR through which packets leaves the MPLS domain is called
egress
edge.
11. Define Label switched router in MLPS
An
MPLS network consists of a set of nodes called label switched router (LSR)
capable of switching and routing packets on the basis of which a label has been
added to each
packets.
12. What is purpose of time to live field in label
format?
The
value of this field is decremented at each router and the packet is dropped if
the count falls to zero.
13. What is meant by integrated layer processing in
RTP?
In
TCP/IP each layer processed sequentially, whereas in integrated layer
processing, adjacent layers are tightly coupled and they function parallely.
14. What is the function of RTP relays and give its
types?
A
relay operating at a given protocol layer is an intermediate system that acts
as both a destination and a source in a data transfer.
15. What is the function of mixer and translator in
RTP?
Mixer:
It is source of synchronization. It receives stream of RTP packets
from one or more sources. Combines these streams and forwards a new RTP packet
stream to one or
more destinations.
Translator:
It produces one or more outgoing RTP packets for each incoming
packets. It change the format of the data that suite to transfer from one
domain to another.
16. What is wild card filter style? Nov/Dec 2008
Wild
card filter style specifies single resource reservation to be shared by all
senders to this address. This style is represented in the form WF(*{Q}) where
asterisk represent wild card sender and Q is flows pet.
17. RSVP is receiver initiated rather
than sender initiated.why?
RSVP is receiver initiated
reservation, each member in multicast may require different resources to be
reserved, depending on QoS it need.
18. State whether RTP is transport layer
protocol or an application layer
RTP is used as transport layer
protocol for real time application
19. what is forward equivalence class in
MPL’s network?
A group of IP packets that are
forwarded in the same manner is called forward equivalence class.
20. What is advantages of label
switching?
1. It improves performance and provide
different QoS
2. It also speed up IP packet
forwarding process
3. Reduces delay and improve overall
throghput
21. What does RTCP provide to the
sources?
1. QOS and congestion control
2. Identification
3. Session time estimation
4. Session control
22. What is the use of translator in RT
P?
It
produces one or more outgoing RTP packets for each incoming packets. It change
the format of the data that suite to transfer from one domain to another.
23. What is wild card filter style?
It specifies a single resource
reservation to be shared by all senders to this address.
24. What are the characteristics of RSVP?
1.
Unicast and multicast
2.
Simplex
25. What are the concepts of data flow in RSVP
1. session
2. Flow specification
3. Filter specification
26. Classify reservation attributes
1. Shared
2. Distinct
27. Mention the characteristics of MPLS. Apr/May 2008
1. connection oriented QOS support
2. Traffic engineering
3. Virtual private network
4. Multi protocol support
28. What are the parameters for FEC to determine packets
1. Source/destination IP address
2. Source/destination port number
3. IP protocol ID
4. Differentiated service code point
5. IPV6 flow label
29. Write the topology of LSPS
1. Unique ingress and unique egress
LSR
2. Unique egress and multiple
Ingress LSR
3. Multiple egress LSRS for unicast
traffic
30. State the terminology of MPLS Apr/May 2012
1.
Label merging
2. Frame merging
3. label swapping
4. Label switched Hop
31. List the application of TCP` Apr/May 2013
1.
Audio and video conferencing
2. Live video distribution
3.
shared workshops
4.
Telephony
32. what are the two protocol used to design RTP?
1. RTP data transfer protocol
2. RTP control protocol
33. What are the two key concept of RTP protocol
Architecture?
1. Application level framing
2.
Integrated layer processing
34.
Define session
A
session is logical association among two or more RTP entities that is
maintained for the duration of data transfer
35.
How the session is defined?
1.
RTP port number
2.
RTCP port number
3.
Participant IP addresses
36.
What are the four functions performed by RTCP
1.
QOS and congestion control
2.
Identification
3.
session size
4.
Session control
37.
Define label merging
The
replacement of multiple incoming labels for a particular FEC with a single
outgoing label
38.
Define frame merging
Label
merging when its applied to operation over frame based media
39.
Define Label swapping
The
basic operation of looking up an incoming label to determine the outgoing label
and farwarding is called label swapping
40.
Define label switched Hop
The
hop between two MPLS nodes on which forwarding is done using labels.
PART-B
1. Explain
the design goal and the characteristics of RSVP protocol Apr/May
2008
2. Explain
data flow and working mechanism of RSVP
Nov/Dec 2013
3. Explain
the types of reservation style of RSVP in detail
4. Explain
the characteristics and operation of MPLS
Nov/Dec 2012
5. Explain
label stacking and label format in MPLS
6. Explain
route selection and label distribution protocol in detail Apr/May 2012
7. Explain
RTP protocol architecture in detail Nov/Dec 2009
8. Explain
RTP data transfer protocol in detail
9. Explain
RTP control protocol in detail Apr/May 2010
No comments:
Post a Comment