Está en la página 1de 37

CS2060-HIGH SPEED NETWORKS

Question bank

UNIT –I

HIGH SPEED NETWORKS

1. Differentiate Frame relay and X.25 packet-switching service

 Call control signalling is carried on a separate logical connection from user data.
Thus, intermediate nodes need not maintain state tables or process messages relating
to call control on an individual per-connection basis
 Multiplexing and switching of logical connections takes place at layer2
 instead of layer3, eliminating one entire layer of processing
 There is no hop-by-hop flow control and error control. End-to-end flow
 control and error control are the responsibility of a higher layer, if they are employed
at all

2. What is common channel signalling?


 The data’s and control signals of a user are transmitted on separate channel.
 The control signals of all user are passed through a single common channel.

3. What is inband signalling?


If the data’s and control signals of a user are transmitted on same channel with same
frequency then it is called inband signalling.

4. What are the two types of sub layer used in ATM adaptation layer?
1. Convergence sub layer
2. Segmentation and Reassembly sub layer.

5.Define fabric in fiber channel communication.


The fiber channel communication network consists of one or more switching elements which
are collectively called as fabrics.

6. Define collision domain?


The maximum distance that data can travel between two station is called collision domain in
Ethernet.

7 Define DTE?
DTEs generally are considered to be terminating equipment for a specific network and
typically are located on the premises of a customer. In fact, they may be owned by the
customer.
Examples of DTE devices are terminals, personal computers, routers, and bridges.

8. Define DCE?
DCEs are carrier-owned internetworking devices. The purpose of DCE equipment is to
provide clocking and switching services in a network, which are the devices that actually
transmit data through the WAN. In most cases, these are packet switches. Figure 10-1 shows
the relationship between the two categories of devices.
9. What is Virtual channel?
A Virtual Channel (VC) denotes the transport of ATM cells which have the same unique
identifier, called the Virtual Channel Identifier (VCI). This identifier is encoded in the cell
header. A virtual channel represents the basic means of communication between two
endpoints and is analogous to an X.25 virtual circuit.

10. What is jitter?

The packets between a given source and destination may vary in length, may take different
routes, may be subject to varying delays in the switches they encounter, the overall packet
delay can vary substantially. This phenomenon, called JITTER may not be desirable for some
application; for example in real-time applications including telephone voice and real-time
video.

11. List out some of the control functions of LAPF core

 Frame delimiting, alignment and transparency


 Frame multiplexing/demultiplexing using the address field
 Detection of transmission errors
 Congestion control functions

12. What are the benefits of ATM?

The benefits of ATM are the following:


• high performance via hardware switching
• dynamic bandwidth for bursty traffic
• class-of-service support for multimedia
• scalability in speed and network size
• common LAN/WAN architecture
• opportunities for simplification via VC architecture
• international standards compliance

13. What is called a cell in ATM?

In ATM, the information flow on each logical connection is organized into fixed size packets
called cells

14. What are the planes in protocol reference model?

 User plane
 Control plane
 Management plane

15. What are the Requirements of Wireless LAN?


• Throughput
• Number of nodes
• Connection to backbone
• Service area
• Battery power consumption
• Transmission robustness and security

16. What are the functions of AAL5?


The type 5 adaptation layer is a simplified version of AAL3/4. It also consists of message and
streaming modes, with the CS divided into the service specific and common part. AAL5
provides point-to-point and point-to-multipoint (ATM layer) connections. AAL5 is used to
carry computer data such as TCP/IP. It is the most popular AAL and is sometimes referred to
as SEAL (simple and easy adaptation layer).

17. Define Basic Service Set?


IEEE 802.11 defines the BSS as the building block of a wireless LAN. It consists of
stationary or mobile stations and a possible central base station known as Access Point.

18. What is PCF?


Point Co-ordinate Function is a centralized MAC algorithm used to provide contention free
service. This is done by polling stations in turn. Higher priority traffic makes use of PCF.

19. What are the topologies used in Fiber channel?

1. Switched topology
2. Point-to-point topology
3. Arbitrated loop topology

20. What are the advantages of virtual paths?

 Simplified network architecture


 Increased network performance and reliability
 Reduced processing and short connection setup time
 Enhanced network services

21. What is VPI?

The Virtual path identifier constitutes a routing field for the network. It is 8 bits at the user-
network interface and 12 bits at the network-network interface. The latter allows support for
an expanded number of VPCs internal to the network, to include those supporting subscribers
and those required for network management

22. What is CLP?

The cell loss priority bit is used to provide guidance to the network in the event of
congestion. A value of 0 indicates a cell of relatively higher priority, which should not be
discarded unless no other alternative is available. A value of 1 indicates that this cell is
subject to discard within the network
23. What are the services of ATM?
The ATM services are:
i. Real time services:
i. Constant Bit Rate (CBR)
ii. Real Time Variable Bit Rate (rt-VBR)
ii. Non Real time services:
i. Non Real Time Variable Bit Rate (nrt-VBR)
ii. Available Bit Rate (ABR)
iii. Unspecified Bit Rate (UBR)
iv. Guaranteed Frame Rate (GFR)
24. What is Frame Relay Network?

A form of packet switching based on the variable length link layer frames. There is no
network layer. Many of the basic functions have been streamlined and eliminated to provide
great throughput.

25. What is the message types needed for Frame relay call control?
 SETUP
 CONNECT
 RELEASE
 RELEASE COMPLETE
26. What are the AAL SERVICES?

Handling of transmission errors, Segmentation and reassembly, to enable larger blocks of


data to be carried in the information field of ATM cells, Handling of lost and mis-inserted
cell conditions and Flow control and timing control.

27. What are the applications of AAL?

 Circuit emulation
 VBR voice and video
 General data services
 IP over ATM
 Multi protocol encapsulation over ATM LAN emulation

28. What is SNP?

The sequence Number Protection field is an error code for detection and possibly correction
on the sequence number field. It consists of a 3 bit cyclic redundancy check, calculated over
the 4 bit SN field, and a parity bit. The parity bit is set so that the parity of the 8 bit SAR
header is even.
29. Differentiate bridge and layer2 switch

Bridge Layer2Switch
Frame handling Frame handling in hardware
alone in software
Analyze & forward Multiple data paths & can handle
one frame at a time multiple frames at a time
Store and forward Can do cut through

30. What are the benefits of 10 Gbps Ethernet over ATM?

 No expensive, bandwidth consuming conversion between Ethernet packets and ATM


cells
 Network is Ethernet end to end
 IP plus Ethernet offers QoS and traffic policing capabilities approach that of ATM
 Wide variety of standard optical interfaces for 10Gbps Ethernet

31. What is the purpose of Fibre Channel?

Fibre channel is designed to combine the best features of both technologies the simplicity and
speed of channel communication with the flexibility and interconnectivity that characterize
protocol based network communication.

32. What are the IEEE 802.11 services?

 Association
 Reassociation
 Disassociation
 Authentication
 Privacy

33. What are the physical Medias defined in 802.11?

 Direct sequence spread spectrum operating in the 2.4 GHz ISM band, at data rates of
1 Mbps and 2 Mbps
 Frequency hopping spread spectrum (FHSS) operating in the 2.4GHz ISM band at
data rates of 1Mbps and 2Mbps
 Infrared at 1 Mbps and 2 Mbps operating at a wavelength between 850 and 950nm

34. Define sustainable cell rate


The SCR is the average cell rate over a long time interval. The actual cell rate may be lower
or higher than this value, but the average should be equal to or less than SCR.

35 Define peak cell rate


The PCR defines the sender’s maximum cell rate. The user’s cell rate can sometimes reach
this peak as long as the SCR is maintained.
36. Define: Cell lose ratio
It defines the fraction of cells lost during the transmission

37. Define: Cell transfer delay


It is the average time needed for a cell to travel from source to destination.

38. Define: Cell delay variation tolerance


It is a measure of the variation in cell transmission time.

39. Define: Sustainable cell rate.


The SCR is the average cell rate over a long time interval. The actual cell rate may be lower
or higher than this value, but the average should be equal to or less than SCR.

40. Define: peak cell rate


The Peak cell rate (PCR) defines the sender’s maximum cell rate. The user’s cell rate can
sometime reach this pack as long as the cell delivered in error.

41. What is the purpose of pay load type field in ATM cell format?
It is 3 bit information. It indicates type of data in the information field. The first bit indicates
whether it is user data or network management data, second bit indicate whether it experience
congestion or not, third bit indicate SDU type.

42. What is the purpose of cell loss priority bit in ATM cell format?
It provides guidance to the network in the event of congestion. A value of 0 indicates a cell of
relatively higher priority which should not be discarded unless no other alternatives is
available. A value of 1 indicates that this cell is subject to discard with in the network.

43. Define: cell sequence integrity


It is the characteristic of virtual channel that can be used for call control (i.e signalling
channel)

44. What are the two types of sub layer used in ATM adaptation layer?
Convergence layer and Segmentation layer.

45. Compare packet switching (X.25) and frame relay network (AU:Nov/Dec. 2007)

Packet Switching(X.25) Frame-relay network


Hop by hop flow and error control. End-to end flow and error control
Multiplexing & switching done in layer3 Multiplexing and switching operation
are carried out in layer 2
In band signalling. Common channel signalling
Data rate-64Kbps. Data rate -2mbps

46. What is the need for AAL? (AU:Nov/Dec 2007)


The use of ATM creates the need for an adaptation layer to support information transfer
protocol but not based on ATM. Example PCM voice, LAPF.
47. What are the data link control functions that are provide by LAPF core?
(AU:may/june 2008)
 Frame delimiting, alignment and transparency.
 Frame multiplexing.
 Detection of transmission errors.
 Congestion control functions
 Inspection of frame that it is neither too long nor too short.

48. What are the uses of wireless LAN? (AU:may/june 2008)


 It saves the cost of installation of LAN cabling and cases the task of location and
other modification to network structure.
 It provides an effective and more attractive alternative in stock exchanging,
warehouses etc.
49. Distinguish between frame relay and ATM. (AU:may/june 2009)

Frame relay ATM


Variable cell size. Fixed cell size
2Mbps speed 10-100 Mbps speed
Less efficient Compared to Frame relay,
ATM is more efficient

50. What is the difference between class A and class B service offered by ATM?
(AU:may/june 2009)

Class A Class B
Constant bit rate. Variable bit rate
ATM adaptation layer. ATM adaptation layer protocol
used in AAL2

51. Define: minimum cell rate


It is the minimum cell rate acceptable that a sender guaranteed to send.

52. Define: cell error ratio.


It is the fraction of the cell delivered in error.

53. Define: Fabric in fibre channel communication.


The fibre channel communication network consists of one or more switching elements, which
are collectively called as fabrics.

54. What is meant by meta signalling channel?


This channel is used to set up a virtual channel that can be used for call control (i.e signaling
channel)

55. What is meant by ad hoc networking?


An Ad hoc network is a peer-to peer network (no centralized server) set uop temporarily to
meet some immediate need.
56. Draw IEEE 802.3 MAC frame format.

Preambl SFD Destinati Source PDU Data & CRC


e on address padding
address

57. What do you mean by common channel signalling and in channel signalling?
Common channel signalling: The dates and control signals of a user are transmitted on
separate channel. The control signals of all the users are passed through a signal common
channel. In channel signalling:
The data and control signals of a user are transmitted on same channel. There are two types
 Inband signalling.
 Out of band signalling.

58. Compare in band signalling and out of band signalling.


In band signalling: if data and control signals travelling in same channel have same frequency
then it is in band signalling.
Out of band signalling: If data and control signals travelling in same channel with different
frequencies then it is called out-of band signalling.

Part-B

1. Explain in detail about Frame relay architecture and Frame Call Control?
2. Explain in detail about the ATM architecture?
3. What is a ATM cell? Explain about the ATM cell format?
4. Write in detail about Generic Flow control?
5. What are the ATM service categories? Explain?
6. Explain about the different AAL protocols?
7. Explain in detail about the Fibre channel?
8. What are the various IEEE 802.11 requirements?
9. Explain in detail about IEEE 802.11 architecture and services?
10. Explain about the IEEE 802.11 protocol architecture?
11. Explains the Frame relay architecture & compare it with x.25.
12. a. Explain the ATM cell with a suitable diagram and explain Generic Flow
Control and Header error control.
b. Explain varies ATM services.
13. a. Discuss and compare the CPCS-PDU & SAR-PDU of AAL ¾ & AAL 5
b. Explain the architecture of AAL 1
14. Explain the architecture of 802.11
15. Explain the following:
a. Classical Ethernet
b.IEEE 802.3 medium options at 10 Mbps
16 a. Fast Ethernet
b. gigabit Ethernet
c.Explain Fiber channel Protocol architecture.
17. i) Explain about frame relay networks in detail with suitable diagram. (AU June 2012)
ii) Explain in detail about fibre channel networks.
18.i).Describe in detail about Wifi and WiMax network application and requirements.
( AU June 2012)
(ii) Explain about Gigabit Ethernet in detail with neat diagram.
19. i) Explain the operation to AAL 1 and AAL ¾ with an example. (AU Nov 2012)
ii) Explain the working of an ATM error control algorithm.
20. i) Illustrate why CSMA/CD is not suitable for wireless LANs. (AU Nov 2012)
ii) Draw the 802.11 protocol stack and discuss the functions of PCF and DCF.
21. i) Explain the call control procedure in frame relay networks.
(AU Nov 2013)
ii) Explain the various ATM service categories in detail.
22.Explain the IEEE802.11 architecture in detail. Illustrate the functions and combined
operation of various protocol in MAC sub layer. (AU Nov 2013)
23. i)Describe ATM Cell delineation state with diagram. (AU June 2014)
ii) Explain in details about Fibre channel
24.i) Describe the ATM architecture. (AU June 2014)
ii) What is Wi – Fi ? Explain the applications and requirements of Wi-Fi.
25.i) What are the strength of Fibre channel.(AU Nov 2007)
ii)Compare Gigabit and Fast Ethernet
iii) Give ATM cell format. Explain how ATM cells are transmitted.

UNIT II
CONGESTION AND TRAFFIC MANAGEMENT

1. How do congestions occur?

• Congestion occurs when the packets being transmitted through a network begins to
approach packet-handling capacity of the network.
• For each node (data network switch and router), there is a queue for each outgoing
channel.
• As a rule of thumb, when a channel for which packets are queuing becomes more than
80% utilised, it is an alarming rate of threshold.
2. When queue will be formed in a network?
Queue will be formed if the current demand for a particular service exceeds the capacity of
service provider.

3. What is the causes and effect of congestion in the network?


• If packets arrive faster than that they can be cleared from outgoing buffers, no
memory is available.
• Two general strategies: (1) discard those incoming packets for which there is no
available buffer space; (2) apply a sort of flow control over its neighbors so that the
traffic flow remains manageable.
• But the neighbours also manage their queues, the congestion points can propagate
throughout a region or all of network.
4. Difference between multi server queue and multiple single server.

Multi server queues Multiple single sever queues


1.It has less waiting time 1. Waiting time is more since there are
many single servers.
2.It has infinite populations and infinite 2.Population and queue size is less and
queue size have significant impact on performance

5.What are the characteristics of queuing process?


1. Arrival pattern
2.Service pattern
3.Number of server
4.System capacity
5.Queue discipline

6. What is meant by implicit congestion signalling?


When network congestion occurs packets get discard and acknowledgement will be delayed.
As a result source understand that there is congestion implicitly

7. Define: Kendall's notation

A convenient notation called kendall’s notation, have been developed for summarizing the
principle assumption that are made in developing a queuing model.
The notation is given as ( a / b / c) : (d / e)
Here
a – distribution of inter arrival time
b- distribution of service time.
c – number of server
d – maximum number allowed items in system
e – queuing discipline used.

8. What are the Congestion-Control Mechanisms?


Backpressure
– Request from destination to source to reduce rate
– Useful only on a logical connection basis
– Requires hop-by-hop flow control mechanism
Policing
– Measuring and restricting packets as they enter the network
Choke packet
– Specific message back to source
– E.g., ICMP Source Quench
Implicit congestion signalling
– Source detects congestion from transmission delays and lost packets and
Reduces flow
9. What is meant by FECN?
The FECN bit is part of the Address field in the Frame Relay frame header. The FECN
mechanism is initiated when a DTE device sends Frame Relay frames into the network. If the
network is congested, DCE devices (switches) set the value of the frames' FECN bit to 1.
Then the frames reach the destination DTE device, the Address field (with the FECN bit set)
indicates that the frame experienced congestion in the path from source to destination.

10. What is meant by BECN?


The BECN bit is part of the Address field in the Frame Relay frame header. DCE devices set
the value of the BECN bit to 1 in frames traveling in the opposite direction of frames with
their FECN bit set. This informs the receiving DTE device that a particular path through the
network is congested.

11. What is the use of Discard Eligibility (DE) bit?


The Discard Eligibility (DE) bit is used to indicate that a frame has lower importance than
other frames. The DE bit is part of the Address field in the Frame Relay frame header.

12. What is the error checking mechanism used in Frame Relay?


Frame Relay uses a common error-checking mechanism known as the cyclic redundancy
check (CRC). The CRC compares two calculated values to determine whether errors occurred
during the transmission from source to destination. Frame Relay reduces network overhead
by implementing error checking rather than error correction.

13. What are the Considerations for Traffic Management in Congested Network?
Fairness
Quality of Service
Reservations

14. Define: Mean residence time


Residence times is defined as the average time that an item spends in a system, waiting and
being served and it is referred as Tr.

15. List some of the common distributions made.


The Common distributions made are:
 G, general distribution of inter arrival times or service times
 GI, general distribution of inter arrival times with restriction that inter arrival
times are independent
 M, negative exponential distribution
 D, deterministic arrivals or fixed – length service

16. Why Queuing Analysis is used?


The Queuing Analysis is used for:
 Option 1: Will wait and see what happens
 Option 2: Analyst may take the position impossible to project future demand and
degree of certainty
 Option 3: Use of an Analytic model
 Option 4: Use of Simulation model
17. List some of the model characteristics.
The characteristics are
 Item population
 Queue size
 Dispatching discipline

18. List the assumption made on input and output.


The assumptions made on input are,
 Arrival time
 Service time
 Number of servers
 The assumptions made on output are,
o Items queued
o Residence time
o Items waiting
o Waiting time

19. What is the objective of congestion control?


The objective of congestion control is to maintain the number of packets within the network
below the level at which performance falls off dramatically.

20. Differentiate between implicit congestion and explicit congestion

Implicit congestion Explicit congestion


1.It deals with discard and delay 1.It deals with binary rate and credit
2.Mainly used for connectionless or 2.It takes place in two direction
datagram configurations such as IP forward and backward
based interne

21. Define: Backpressure


Backpressure is a method which can be applied in a logical connection used for connection
oriented network and X.25 based packet network in which traffic generation can be reduced.

22. List the congestion control mechanism in packet switching networks.


The Congestion Control Mechanism in Packet Switching networks are:
 Send a control packet from congested node to some or al source nodes
 Rely on routing information
 Make use of an end-to-end probe packet
 Allow a packet switching node to add congestion information to packets as they
go by

23. Define: Choke packet.


Choke packet is control packet generated at a congested node and transmitted back to a
source node to restrict traffic flow.
Eg: ICMP (Internet Control Message Protocol) and Source quench.
24. What is Discard Strategy?
Discard Strategy deals with the most fundamental response to congestion; when congestion
becomes severe enough, the network is forced to discard frames.

25. List the objectives of frame relay congestion control.


The objectives of Frame Relay Congestion Control are:
 Minimize frame discard
 Create minimal network additional traffic
 Maintain, with high probability and minimum variance
 Be simple to implement
 Distribute network resource fairly among users

26. What is Congestion Avoidance?


Congestion Avoidance is used at onset of congestion to minimize the effect on the network.
Explicit signalling mechanism from the network that will trigger the congestion avoidance

27. What is committed information rate (CIR)?

Committed information rate is a rate, in bits per second that the network agrees to support for
a particular frame-mode connection. It is vulnerable to discard in the event of congestion.

28. What is Congestion recovery?


Congestion recovery procedures are used to prevent network collapse in the face of severe
congestion. These procedure are typically initiated when the network begun to drop frames
due to congestion.
Eg. LAPF , TCP

29. What is network response and user response?


Network response is necessary for frame handler to monitor its queuing behavior. Here the
choice is based on end user.
User response is determined by the receipt of BECN or FECN .The simplest procedure is to
use BECN because other one is complex.

30. Write the Little’s formula and explain its uses. (AU:Nov/Dec 2007) (AU:may/june 2008)

Little’s formula for single server is


ρ= λTs
Little’s formula for multiserver is
ρ= λTs/N
It is used to deduce the average at any given value.
31. Compare multi server and multiple single server queues. (AU:Nov/Dec 2007)

Multiple single server queue Multiserver queue


Congestion statistics for this model are Congestion statistics for this model is in
in two cases case of M/M/N
M/MI
M/DI

Probability can be Probability of number of items in the


Zero system is greater than or equal to
Ratio less than I number of servers.
Ratio close to I
Ratio greater than I

32. What are the drawbacks of Backpressure? (AU:may/june 2009)


It can be used only in connection oriented network that allows hop by hop flow control.
Neither frame relay nor ATM has any capability for restricting flow on hop by hop basis.

33.What are the causes for congestion? (AU:may/june 2009)


The causes for congestion are:
Limitation in queue size. Load exceeds the network capability.

34. When queue will be formed in a network?


Queue is formed if the service required by a user is not available immediately. That is, if the
current demand for a particular service exceeds the capacity of service provider then queue
will be formed.

35. What are the characteristics of queue process?


The characteristics of queuing process are
Arrival pattern of data from user
Service pattern of server
Queue discipline
System capacity
Number of servers.

36.What is meant by congestion avoidance?


It is the procedure used at beginning stage of congestion to minimize its effort.

37. What is meant by implicit congestion signalling? (AU: Nov/Dec 2010)


When network congestion occurs, packets get discard and acknowledgement will be delayed.
As a result, source understands that there is congestion implicitly. Here, users are notified
about congestion indirectly.

38. Define: Committed burst size(Bc)


This is the maximum number of bits in a predefined period of time that the network is
committed to transfer without discarding any frames.
39. Define: Committed information rate(CIR)
CIR is a rate in bps that a network agrees to support for a particular frame mode connection.
Any data transmitted in excess of CIR is vulnerable to discard in event of congestion. CIR is
less than access rate.

40. Define: Access rate.


For every connection in frame relay network, an access rate (bps) is defined. The access rate
actually depends on bandwidth of channel connecting user to network.

41. Define: Excess burst rate (Be).


This is the maximum number of bits in excess of Bc that a user can send during a predefined
period of time. The network is committed to transfer these bits if there is no congestion.
Frames with Be have lower probability to transfer than frames with Bc
.
42. What is meant by explicit congestion signalling?
In this method, congestion is indicated directly by a notification. The notification may be in
backward or forward direction.

43. What do you mean by choke packet?


Choke packet is a control packet generated at a congested node and transmitted back to a
source node to restrict traffic flow. A choke packet is the ICMP (internet control message
protocol) source quench packet.

44. Define: Coefficient of variation


The ratio of standard deviation of service time and mean service time is called coefficient of
variation.

45. List the different congestion techniques.


Discard strategy.
Congestion avoidance (Explicit signaling)
Congestion recover ( implicit signaling)

46. What do you mean by traffic control management?


If user does not respond to congestion notices, then frame relay network has to discard
frames. This method is called traffic control management.

47. List the mechanisms used for congestion control in packet switching network.
Mechanisms used are:
Congestion node sends a control packet called choke packet to source nodes. As a
result, it will limit the transmission.
Depending on routing algorithm, routing decision may influence the rate at which
new packets are produced.
Timestamp is added in header of packet and it measures the delay between two
particular points.
Congestion notification information is added to packet, to inform about congestion to
source and destination.
48. What is meant by traffic intensity in queuing analysis?
Traffic intensity ρ=λ/μ
=Arrival rate/Service rate

49. Write Little’s formula in terms of traffic intensity, resident time and waiting time in a
queue.

ρ = λ Ts
r = λ Tr
w = λ Tw

PART – B

1. Explain the single- server and multi server queuing models.


2. At an ATM machine in a supermarket, the average length of a transaction is 2 minutes,and
on average, customers arrive to use the machine once every 5 minutes, How long is the
average time that a person must spend waiting and using the machine? What is the 90th
percentile of residence time? On average, how many people are waiting to use the machine?
Assume M/M/1.
3. Consider a frame relay node that is handling a Poisson stream of incoming frames to be
transmitted on a particular 1 – Mbps outgoing link. The stream consists of two types of
frames. Both types pf frames have the same exponential distribution of frame length with a
mean of 1000 bits.
a. Assume that priorities are not used. The combined arrival rate of frame of both types is 800
frames / second. What is the mean residences time (Tr) for all frames?
b. Now assume that the two types are assigned different priorities, with the arrival rate of type
1 of 200 frames/second and the arrival rate of type 2 of 600 frames/second. Calculate the
mean residence time for type 1, type2, and overall.
c. Repeat (b) for λ1 = λ2 = 400 frames/second.
d. Repeat (b) for λ1 = 600 frames/second and λ 2 = 200 frames/second.
4. Messages arrive at a switching center for a particular outgoing communications line in a
poisson manner with a mean arrival rate of 180 messages per hour. Message length is
distributed exponentially with a mean length of 14,400 characters. Line speed is 9600 bps.
a. What is the mean waiting time in the switching center?
b. How many messages will be waiting in the switching centre for transmission on the
average?
5. a. Explain the effects of congestion.
b. Explain the congestion control mechanisms in networks.
6. Explain the Kendall’s notation and common distributions for the queuing models.
7. Explain single server queuing model with its structures and parameters.
8. (i) Explain in detail the explicit and implicit congestion signalling.
(ii) List and explain the frame relay congestion control techniques.
9. i) Explain in detail about frame relay congestion control technique. (AU May 2012)
ii) Explain about traffic management in packet switching.
10.i) Explain in detail the following congestion control techniques. (AU Nov 2012)
(1) Back pressure.
(2) Choke packet.
(3) Explicit congestion signalling.
(ii) Explain the Kendall’s notation in detail.
11. (i) Explain the single server queuing model and its applications. (AU Nov 2012)
(ii) Explain about traffic rate management in frame relay networks.
12.i) Explain with an example the implementation of single server queues (AU Nov 2013)
ii) Explain in detail about the Jackson’s theorem.

13.i) Explain the effects of congestion in packet switching networks. (AU Nov 2013)
ii) Explain how congestion avoidance is done in a frame relay networks.

14. I. Describe the four regions of Single – Server queue with neat sketches (AU June 2014)
ii. Describe in detail about the Traffic Management.

15.i)What is Kendall’s Notation ? State the equations Single Server that follows the M/G/1
model.(AU Nov 2007)
ii)Explain congestion control in packet switching network.
16.i.What are Open loop and Closed loop congestion control? (AU Nov 2008)
ii) Explain the congestion control technique used in Frame relay and in TCP.
17. Explain M/M/1 and M/D/1 queuing model and derive the expression for (AU Nov 2008)
i)Waiting time in the queue
ii)Waiting time in the system
iii) No. of customers in the queue.
UNIT-III
TCP & ATM Congestion Control

1. State the condition that must be met for a cell to conform. (AU: Nov/Dec 2007)
In case of ATM, the information flow on each logical connection is organized into
fixed size packets called cells. Cells should arrive within theoretical arrival time but with in
CDVT.

2. List the various retransmission strategies in the implementation of TCP. (AU: Nov/Dec
2007)
The various retransmission strategies are as follows:
i. First-only
ii. Batch
iii. Individual

3. What is meant by binary exponential back off?


Binary Exponential Back off is a simple technique for implementing RTO back off is to
multiply the RTO for a segment by a constant value for each retransmission:
RTO=q X RTO
The above equation causes RTO to grow exponentially with each retransmission. The most
commonly used value of q is 2. With this value, the technique is referred to as exponential
back off.

4. What is self-clocking?
TCP automatically senses the network bottleneck and regulates its flow accordingly. This has
been referred to as TCP’s self-clocking behavior.

5. What do you mean by rate-limited mode?


In rate-limited mode TCP is prepared to send segments continuously, and congestion may
occur. The ABR mechanism exerts a back pressure on TCP sources that can reduce the
transmission of TCP segments.

6. What are the characteristic captured by the ATM Traffic Descriptor?

The characteristics of an ATM flow over an ATM connection are captured in a connection
traffic descriptor, which includes the following:
i. Source traffic descriptor
ii. Cell delay variation tolerance(CVDT)
iii. Conformance definition

7. What do you mean by window-limited mode?


In window-limited mode, a TCP source is governed by the TCP flow and congestion control
mechanism. When a TCP connection is set up and a VC is assigned, ABR will typically
allocate a relatively high rate to the source, only reducing that rate when congestion occurs.
Thus, for a time TCP can send as much data as it can.

8. What is meant by source traffic descriptor?


The source characteristics of an ATM flow are captured in source traffic descriptor, which
includes the following:
i. Peak cell rate(PCR)
ii. Sustainable cell rate(SCR)
iii. Maximum burst size(MBS)
iv. Maximum frame size(MFS)

9. What are the mechanisms used in ATM traffic control to avoid congestion condition?
1.Resource management
2.Connection admission control
3.Usage parameter control
4.Traffic shaping

10. Define: peak cell rate

The peak cell rate defines an upper bound on the traffic that can be submitted by a source on
an ATM connection. The PCR is defined in terms of the variable T, the minimum spacing
between cells, so that the PCR=1/T.The PCR descriptor is mandatory for CBR and VBR
services.

11.What are the TCP congestion control mechanisms?


1.Retransmission Timer Management
2.Window Management

12.What are the Three Techniques to calculate retransmission timer (RTO):


 RTT Variance Estimation
 Exponential RTO Backoff
 Karn’s Algorithm

13. What is reactive congestion control?


Whenever a packet discard takes place due to severe congestion some control mechanism is
needed to recover from network collapse , these mechanism is reactive congestion control.

14. Define: Maximum burst size

The maximum burst size is the maximum number of cells that can be sent continuously at the
peak cell rate. If the cells are presented to the network in clumps equal to the MBS, then the
idle gap between clumps must be sufficient so that the overall rate does not exceed the SCR.

15. Define: sustainable cell rate

The sustainable cell rate defines an upper bound on the average rate of an ATM connection,
calculated over a time scale that is large relative to T. SCR is needed to specify a VBR
source. It enables the network to allocate resources efficiently among a number of VBR
sources without dedicating the resources required to support a constant PCR rate.

16. Define: Maximum frame size.

The maximum frame size is the maximum size of a frame in cells that can be carried over a
GFR connection. This parameter is only relevant for that GFR service.

17. Define: Minimum cell rate

The minimum cell rate, used with ABR and GFR, defines the minimum commitment
requested of the network; a value of zero can be used. The goal of both ABR and GFR
service is to provide rapid access to unused network capacity at up to PCR, whenever the
capacity is available.

18. Define: Cell delay variation tolerance

The cell delay variation tolerance is a measure of the amount of variation in cell delay that is
introduced by the network interface (e.g : SDH) and at the UNI. CDVT represents a bound on
the delay variability due to the slotted nature of ATM, the physical layer overhead, and ATM
layer function such as cell multiplexing.

19. Define: Traffic policing

The GCRA algorithm is referred to as a form of traffic policing. Traffic policing occurs when
a flow of data is regulated so that cells ( or frames or packets) that exceed a certain
performance level are discarded or tagged.

20. Define: Cell loss ratio.

The cell loss ratio is simply the ratio of lost cells to total transmitted cells on a connection.

21. What is meant by open loop control?

Open loop control is an approach where there is no feedback to the source concerning to the
congestion once the connection is established, UPC may discard or tag as lower priority any
cell that exceeds parameters of the traffic contract.

22. Define: Traffic shaping

Traffic shaping is used to smooth out a traffic flow and reduce cell clumping. This can result
in a fairer allocation of resources and a reduced average delay time.

23. What is meant by closed loop control?

The way that allow a number of sources to share the capacity not used by CBR and VBR but
to provide feedback to sources to adjust the load dynamically and thus avoid cell loss and
share the capacity fairly. This is referred to as closed-loop control because of its use of
feedback.

24. List the parameters for the rate of transmission of cells.

The rate of transmission of cells from a source on an ABR connection is characterized by


four parameters:
i. Allowed cell rate(ACR)
ii. Minimum cell rate(MCR)
iii. Peak cell rate(PCR)
iv. Initial cell rate(ICR)

25. Define: Fair share.


Fair share can be defined as follows:
Fair share = Target rate
Number of connection

26. Why congestion control is difficult to implement in TCP? (AU: April/may 2008)
The end system is expected to exercise flow control upon the source and system at a higher
layer. Thus it is difficult to implement in TCP.

27. Define sustainable cell rate. What is the use of SCR? (AU: April/may 2008)
The SCR is the average cell rate over a long time interval. the actual cell rate may be lower or
higher than this value, but the average should be equal to or less than SCR.

28. What is protocol? Give two examples. (AU: May/June2009)


A set of rules used to govern the data transfer.
Example: UDP (User datagram protocol, TCP(Transmission control protocol).

29. Give the significance of timer management in networking. (AU: May/June2009)


The value retransmission time out (RTO) have a initial effect on TCP’s reaction to
congestion. Hence by calculating RTO effectively, congestion can be avoided. to calculate
RTO effectively, the timer management is essential.

30. What are the mechanisms used in ATM traffic control to avoid congestion condition?
 Resource management
 Connection admission control
 Usage parameter control
 Traffic shaping.

31. How is RTO useful to control congestion in TCP?


The value of RTO (Retransmission time out) has a critical effect on TCP’s reaction to
congestion. Hence by calculating RTO effectively, congestion can be controlled.
32. What is the use of Preventive congestion control?
This preventive congestion control mechanism is used to avoid congestion before it occurs.

33. What is the difference between flow control and congestion control?
Flow control: The transmitter should not overwhelm the receiver so flow control is
performed.
Congestion control: Its aim is to limit the total amount of data entering the network; to
amount of data that network can carry.

34. What is meant by silly window syndrome?


if frequently data’s are sent as small segment, the response will be speed in sender side but it
cause degradation in performance. This degradation is called silly window syndrome.

35. Define Behavior class selector (BCS).


Behavior class selector (BCS) enables an ATM network to provide different service levels
among UBR connections by associating each connection with one of a set of behavior class.

36. What is meant by allowed cell rate (ACR)?


The current rate at which source is permitted to send or transmit cell in ABR mechanism is
called allowed cell rate.

37. List the three fields in the TCP header.


The three fields in the TCP header are as follows:
 Sequence number (SN)
 Acknowledgement number (AN)
 Window (W)

38. What is meant by closed loop control in ABR mechanism?


Closed loop control: ABR has feedback to the source concerning congestion. This approach
is called closed loop control.

39. What is meant by open loop control in ABR mechanism?


Open loop control: If there is no feedback to the source concerning congestion, then this type
of approach is called as open loop control.

40. What are the requirements for ATM Traffic and Congestion Control?
Most packet switched and frame relay networks carry non-real-time bursty data
– No need to replicate timing at exit node
– Simple statistical multiplexing
– User Network Interface capacity slightly greater than average of channels
– Congestion control tools from these technologies do not work in ATM
41. Why congestion control is difficult to implement in TCP?
The end system is expected to exercise flow control upon the source end system at a higher
layer. Thus it is difficult to implement congestion control in TCP.

42. Define cell insertion time.


It is the time taken to insert a single cell on to the network.

43. List the ATM traffic attributes.


ATM traffic related attributes falls into four categories. They are
 Traffic descriptor.
 QoS parameters
 Congestion control parameters
Other attributes. It includes behaviour class selector and minimum desired cell rate.

44.What is meant by cell insertion time and allowed cell rate?


Cell insertion time: It is the time taken to insert a single cell on to the network.
Allowed cell rate: The current rate at which the source is permitted to send or transmit cell in
ABR mechanism is called allowed cell rate.

45.What are the techniques of Window management?


1.Slow start
2.Dynamic window sizing on congest
3.Fast retransmit
4.Fast recovery
5.Limited transmit

46. What does ‘awnd’ and ‘cwnd’ refers to?


‘awnd’ refers to allowed window.
This is window size allowed by TCP to send without waiting for acknowledgement.
‘cwnd’ refers to congestion window.
This is window used by TCP during startup and to reduce flow during congestion.

47.Two techniques to reduce the transmission of useless cells?


1. Partial packet discard
2. Early packet discard

48. What are the QoS parameters?


1. Peak to peak cell delay variation
2. Maximum cell transfer delay
3. Cell loss ratio
49. What is Buffer Management?
This mechanism provides the way in which cells are treated that have been buffered at
network switch. When congestion occurs, the buffer occupancy becomes maximum. Now
tagged cells are discarded to give preference to untagged cells.

50. What are the tow modes of flow control in ABR?


ABR flow control has two modes:

m to allocate capacity
among the VCs traversing the switch.

PART – B

1 a. Explain TCP flow & congestion control.


b. Explain the Retransmissions Timer management techniques.
2. Explain the five important window management techniques.
3. a Explain the congestion control mechanism in ATM networks carrying TCP traffic.
b. Explain the ATM traffic control
4. a. What are the requirements for ATM traffic and congestion control?
b. Explain the ATM traffic – related attributes.
5 a.. Explain in detail ABR traffic management.
b. Explain in detail GFR traffic management.
6.i)Explain KARN’s algorithm in detail (AU May 2014)
ii) Briefly describe the GFR traffic management.
7.(i) Explain in detail about clock instability and jitter measurements. (AU May 2014)
(ii) Explain about traffic management framework in detail.
8. i) Explain about TCP window management in detail. (AU Nov 2012)
(ii) Explain the RTF variance estimation using Jacobson’s algorithm in detail.
9.i) List and explain the ATM traffic parameter in detail. (AU Nov 2012)
ii) Explain the ATM ABR traffic management in detail.
10. i) Explain the TCP timer management techniques in detail. . (AU Nov 2013)
ii) Discuss in detail about the congestion control techniques followed in ATM networks.
11.i) Explain in detail about ABR capacity allocation. (AU Nov 2013)
ii) Discuss in detail about ABR traffic control. (8)
12..i) Discuss the implementation issues in related to TCP flow control.(AU Nov 2007)
ii) Write notes on TCP over ATM.
13, Explain the retransmission management in techniques used in TCP also explain window
management technique used in TCP for congestion control. (AU Nov 2008)
14. Briefly explain different types of traffic control functions used in ATM networks to
maintain the promised QoS parameters. (AU Nov 2008)
UNIT –IV
INTEGRATED AND DIFFERENTIATED SERVICES

1What is meant by elastic traffic? Give example.


Elastic traffic can adjust over wide ranges to changes in delay and throughput across an
internet and still meet the needs of its applications.
Example: File transfer
E-mail
Web access
2. What is meant by inelastic traffic? Give example.
Inelastic traffic cannot adjust to changes in delay and throughput across an internet.
Example: Voice chat
Tele conferencing

3. What are the requirements for inelastic traffic?


The requirements for inelastic traffic may include the following and they are
i. Throughput.
ii. Delay.
iii. Jitter.
iv. Packet loss.

3. What are the principal background functions of ISA?


The principal background functions of ISA are
i. Reservation protocol.
ii. Admission control.
iii. Management agent.
iv. Routing protocol.

4. What are the services provided by ISA?


Three categories of services are provided by ISA and they are
i. Guaranteed.
ii. Controlled load.
iii. Best effort.

5. What are the functions that are provided by ISA to manage congestion and QoS transport?

The functions that are provided by ISA to manage congestion and QoS transport are
i. Admission control.
ii. Routing algorithm.
iii. Queuing discipline.
iv. Discard policy.
6. Define: RED
RED is an approach to congestion management in internets is proactive packet discard. In
this technique , a router discards one or more incoming packets before the output buffer is
completely full, in order to improve the performance of the network.

7. What are the different queuing techniques?


The different queuing techniques are:

-Round Fair Queuing (BRFQ).

8.Define Delay Jitter.


The delay jitter is the maximum variation in delay experienced by packets in a single session.

9. What is meant by best effort service?


Flows that are not reserving resources are provided with best effort service. The network will
put best effort to deliver the packet but if congestion occurs severely discard the packet.

10. State the design goals of Random Early Detection


The design goals of Random Early Detection (RED) are
i. Congestion avoidance.
ii. Global Synchronization avoidance.
iii. Avoidance of bias against bursty traffic.
iv. Bound on average queue length.

11. What are the different types of Traffic?


The traffic on network or internet can be classified into two broad categories
i. Elastic Traffic
ii. Inelastic Traffic

12. List out the advantages of ISA.


The advantage of ISA is:
i. Many traffic sources can easily and accurately be defined by a token bucket
scheme.
ii.The token bucket scheme provides a concise description of the load to be
imposed by a flow, enabling the service to determine easily the resource
requirement.
iii.The token bucket scheme provides the input parameters to a policing
function.

13. Define Classifier


Classifier selects packets based on the DS field
(BA classifier) or on multiple fields within the packet header
(MF classifier).
14. Define: Behavior Aggregate
Behavior Aggregate is a set of packets with the same DS code point crossing a link in a
particular direction.

15. Define: Marking


Marking is the process of setting the DS codepoint in a packet. Packets may be marked on
initiation and may be re-marked by an en route DS node.

16. Define: Metering


Metering is the process of measuring the temporal properties of a packet stream selected by a
classifier. The instantaneous state of that process may affect marking, shaping and dropping
functions.

17. Define: Shaping


Shaping is the process of delaying packets within a packet stream to cause it to conform to
some defined traffic profile.

18. Define Dropping


Dropping is the process of discarding packets based on specified rules; also called policing.

19. What is traffic conditioning?


Traffic Conditioning is the control functions performed to enforce rules specified in a TCA,
including metering, marking, shaping and dropping.

20. What is Traffic conditioning Agreement?


Traffic Conditioning Agreement is a specifying, classifying rules and traffic conditioning
rules that are to apply to packets selected by the classifier.

21. Draw the format of DS field.


1 2 3 4 5 6 7

22. Draw the format of IPV4.


1 2 3 4 5 6 7
Precedence TOS 0

23. What is elastic traffic? (AU: Nov/Dec2007)


Elastic traffic is that which can adjust, over wide changer to changer in delay and throughput
across an internet and still meet the needs of its applications. This is the traditional type of
traffic supported on IP-based internets and is type of traffic for which internets were
designed.

24. What are the key elements of controlled load service? (AU: Nov/Dec2007)
The key elements of the controlled load services are:
The service approximates tightly the behavior visible to applications receiving best-effort
service under unloaded conditions.
A very high percentage of transmitted packets will be successfully delivered.

25. What are the elements of Traffic conditioning function?


The elements of Traffic Conditioning function are
i. Classifier
ii. Meter
iii. Marker
iv. Shaper
v. Dropper

26. What are the drawbacks of FIFO queuing discipline? (AU:April/May2008)


No special treatment for packets with higher priority is provided.
If small packet is queued behind long packet, then small packet experience long delay.

27. What is an inelastic traffic? What are the requirements for inelastic traffic?
(AU:April/May2008)
It does not easily adapt, if at all, to changes in delay and throughput across the internet.
Example: Real time traffic, its requirements are, throughput, delay, jitter and packet loss.

28 What is meant by rate control? Give examples. (AU:May/June2009)


The rate of transmission of cells from a source to a network connection can be controlled by a
feedback mechanism is known as rate control.
Example: Available bit rate(ABR)

29. What is label stacking? (AU:May/June2009)


Label stacking allows aggregation of more number of label switching paths into single label
switching path.

30. What is meant by guaranteed service?


Flows that are reserving resources are provided with guaranteed service. The service provides
assured capacity levels.

31. Define global synchronization.


Due to packet discard during congestion, many TCP connections entered slow start at the
same time. As a result, the network is unnecessarily under utilized for some time. The TCP
connections which entered into slow start will come out of slow start at about same time
causing congestion again. This phenomenon is called global synchronization.

32. Define: Behavior aggregate in per hop behavior


A set of packets with the same DS code point crossing a link in a particular direction
behavior aggregate.

33. What are the design goals of RED algorithm?


The design goals of RED algorithm are:
Congestion avoidance.
Global synchronization avoidance.
Round on average queue length.

34. Define: DS code point.


A specified value of 6 bit DS code point portion of the 8 bit DS field in the IP header which
indicate to which class packets belongs and its drop procedure.

35. What is meant by traffic conditioning agreement?


An agreement that specify rules that are to apply for packets selected by the classifier is
called traffic conditioning agreement.. Control functions performed in TCA are metering,
marking, shaping and dropping.

36. Define: DS boundary node.


DS boundary node is defined as , DS node that connects one DS domain to the node in
another domain.

37. Define DS interior node.


A node in DS domain, which is not the boundary node is called DS interior node.

38. Define: DS node.


A router that supports DS policies is called as DS node. A host system that use DS for
application is also called as DS node.

39. What is meant by differentiated service?


It does not attempt to view the total traffic demand in integrated service.
It does not reserve network capacity in advance.
It provides different level of QoS to different traffic flows.

40. What is meant by integrated services?

The Is provider –
• Views the total of current traffic demand.
• Limits the demand with respect to the current capacity handled by the network.
• Reserve resources with in the domain to provide a particular QOS guaranteed.
PART – B

1. Explain the block diagram for Integrated Services Architecture. and give details about
Components.
2.a. Explain the services offered by ISA
b.Define Differentiated services.
3. Explain the various queering disciplines in ISA.
4. Explain the RED algorithm.
5. Explain the various types of Traffic.
6. Explain in detail about queuing disciplines: BRFQ, WFQ, GPS, and PS. (AU May 2012)
7. Explain about integrated service architecture and differentiated services in detail with neat
diagram. (AU May 2012)
8. i. Explain the way in which ISA manages congestion and provides QOS transport.
(AU Nov 2012)
ii) Explain hit round fair queuing technique in detail.
9. Explain the differentiated services operation and the traffic conditioning functions in detail.
(AU Nov 2012)
10. i) Draw the Integrated service architecture and explain it in detail. (AU Nov 2013)
ii) Explain the fair queuing in detail.
11. i. Explain in detail the way in which RED techniques overcomes congestion.
(AU Nov 2013)
ii) Write a note on the DS per hop behaviour.
12. i) Describe the components of Integrated service architectures.(AU May 2014)
ii) Explain the differentiated services with the architecture.
13.i)Explain the approaches Integrated service architectures. (AU May 2014)
ii) What is GPS? Explain the triple - differences solution algorithm.
14.i) Explain the various the queuing disciplines used in ISA implementation.
(AU Nov 2007).
ii) Explain the different types of PHB.
15.i)What are the design goals of RED ? Explain in detail about RED algorithm (AU Nov
2007).
ii) What are components of ISA.
16. Write short notes on the following queuing discipline (AU Nov 2008).

i)Fair queuing
ii) Bit round Fair queuing(BRFQ)
iii) Weighted Fair queuing (WFQ)

17. Explain how Random early detection is used to control congestion in networks.
(AU Nov 2008).
UNIT-V
PROTOCOLS FOR QoS SUPPORT

1. What is soft state in RSVP?


RSVP use connectionless approach, each intermediate router maintain state information
about nature of flow, that will be refreshed by end system at predetermined amount of time.
This is called soft state. A soft state is simply a set of state information at a router that expires
unless regularly refreshed from the entity that requested the state.

2.Why receiver is responsible to initiate reservation in RSVP?


Each member (destination) in multicast may require different resources to be reserved
depending on QOS it needs. So it is therefore better for receiver to make resource reservation.

3.Define session in RSVP?


Once a reservation is made to the router by a particular destination, the router considers this
as a session and allocates resources for the life of that session. Session is defined by
Session: Destination IP address
IP protocol identifier
Destination port

4. Define: Channel-changing capability.

Enabling the receiver to select one source from among multiple sources transmitting to a
multicast group is known as channel-changing capability.

5. What are the characteristics of RSVP?

The various characteristics of RSVP are

-initiated reservation

n styles
-RSVP routers

6. Define: A session.

A session is a data flow identified by its destination; it reflects the soft state nature of RSVP
operation. A session is defined by destination IP address, IP protocol identifier, destination
port.

7. Define: Flow descriptor.

A reservation request issued by a destination end system is called a flow descriptor and
consists of a flowspec and a filter spec.
8.Define flow specification in RSVP.
The flow specification of RSVP specifies a desired QOS and is used to set parameters in
a node’s packet scheduler. Flow spec is defined by
Flow spec: Service class
R spec
T spec
R spec is Reserve Specification
T spec is Traffic Specification

9. What is reservation attribute?

A receiver may specify a resource reservation that is to be shared among a number of senders
(shared) or may specify a resource reservation that is to be allocated to each sender (distinct).

10. What is sender selection?

A receiver may either provide a list of source (explicit) or implicitly select all sources by
providing no filter spec (wild card).

11. Define: Wild-card-filter style

The wild-card-filter (WF) style specifies a single resource reservation to be shared by all
senders to this address. Symbolically, this style is represented in the form WF(*{Q}), where
the asterisk represents wild-card sender selection and Q is the flowspec.

12. Define: Fixed-filter style


The fixed-filter (FF) style specifies a distinct reservation for each sender and provides an
explicit list of senders. Symbolically, this style is represented in the form
FF(S1{Q1},S2{Q2}, . . .), where Si is a requested sender and Qi is the resource request for
that sender.

13. Define: Shared-explicit style

The shared-explicit (SE) style specifies a single resource reservation to be shared among an
explicit list of senders. Symbolically, this style is represented in the form SE(S1,S2, . . .{Q}).
14. What is traffic engineering?

The ability to define routes dynamically, plan resource commitments on the basis of known
demand, and optimize network utilization is referred to as traffic engineering.

15. List the requirements for connection-oriented QoS support.

The requirements for connection-oriented QoS support are:

conference.

, or
traffic contracts.
16.. Define: Label switched routers.

An MPLS network or internet consisting of a set of nodes, called label switched router
(LSRs), capable of switching and routing packets on the basis of which a label has been
appended to each packet.

17. Draw the MPLS label format.

18. What is hop-by-hop routing?


In hop-by-hop routing, each LSR independently chooses the next hop for each FEC. RFC
implies that this option makes use of an ordinary routing protocol, such as OSPF.

19. What is explicit routing?


In explicit routing, a single LSR, usually the ingress or egress LSR, specifies some or all of
the LSRs in the LSP for a given FEC. There are two types of explicit routing namely strict
explicit routing and loose explicit routing.

20. Define: Constraint-based routing algorithm.

A routing algorithm that takes into account the traffic requirements of various flows and that
takes into account the resources available along various hops and through various nodes is
referred to as a constraint-based routing algorithm.

21. What is a translator?

The translator is a simpler device that produces one or more outgoing RTP packets for each
incoming RTP packet. The translator may change the format of the data in the packet or use a
different lower-level protocol suite to transfer from one domain to another.

22. What are the fields in RTP fixed header?

The fields in RTP header are :


23. What are the functions performed by RTCP?

24. What is meant by soft state in RSVP?


RSVP use connectionless approach, each intermediate router maintain state information
about nature of flow, that will be refreshed by end system at predetermined amount of time.
This is called soft state.

25. Why receiver is responsible to initiate reservation in RSVP?


Each member (destination) in multicast may require different resources to be reserved
depending on QOS it needs. So it is therefore better for receiver to make resource reservation.

26. Define: Flow specification in RSVP


The flow specification of RSVP specifies a desired QOS and is used to set parameters in a
node’s packet scheduler. Flow space is defined by
Flow space: Service class
Reserve specification
Traffic specification.

27. Define: Filter specification in RSVP


Filter specification in RSVP defines the set of packets or flow, for which a reservation is
requested. Filter space is define by
Filter specification: Source address
UDP / TCP source port.

28. What do you mean by label merging and frame merging?


Label merging: The replacement of multiple incoming labels for a particular forward
equivalent class with a single outgoing label is called label merging.
Frame merging: Label merging, when it is applied to operation over frame based media, then
it is called as frame merging

29. Define label swapping in MPLS.


The basic operation of looking up an incoming label to determine the outgoing label and
forwarding is called label swapping.

30. Define Label switched hop in MPLS.


The hop between two MPLS nodes on which forwarding is done using label is called label
switched hop.
31. Define: MPLS
MPLS (multi protocol label switching) is a mechanism used to speed up IP packet forwarding
process and therefore reduce delay and improve overall throughput of internet.

32. What are the types of reservation style used in RSVP?


Wild card filter reservation style.
Fixed filter reservation style.
Shared explicit reservation style.

33. What is meant by ingress edge and egress edge in MPLS domain?
Ingress edge: Label switched router through which packets from internet router enters into
MPLS domain is called ingress edge.
Egress edge LSR: LSR through which packets leaves the MPLS domain is called egress edge.

34. List the characteristics of MPLS.


MPLS characteristic that ensure its popularity are Connection oriented QOS support.
Traffic Engineering.
Virtual private network (VPN) support.
Multi protocol support.

35. Define: Label switched router in MPLS


An MPLS network consists of a set of nodes called label switched router(LSR) capable of
switching and routing packets on the basis of which a label has been added to each packets.

36. What is the purpose if time to live field in label format?


The value of this field is decremented at each router and the packet is dropped if the count
falls to zero.

37. What is meant by integrated layer processing in RTP?


In TCP/IP each layer processed sequentially, whereas in integrated layer processing, adjacent
layers are tightly coupled and they function parallel.

38. What is the function of RTP relays and give its types?
A relay operating at a given protocol layer is an intermediate system that acts as both a
destination and a source in a data transfer.

39. What is the function of mixer in RTP? (AU: Nov/Dec 2007)


Mixer: It is a source of synchronization. It receives stream of RTP packets from one or more
sources. Combines these streams and forwards a new RTP packet stream to one or more
destinations.
40. What is wild card filter style? (AU: Nov/Dec 2007)
The wild card-filter style specifies a single resource reservation to be shared by all senders to
this address. This style is represented in form WF(*{Q}) where asterisk represent wild-card
sender selection and ‘Q’is the flows pet.

41. What is the use of translator in RTP? (AU: April/may 2008)


Translator produces one or more outgoing RTP packets for each incoming packets. It changes
the format of the data that suite to transfer from one domain to another.

42. Mention the protocol used for congestion control. (AU: May/June 2009)
RSVP (Resource reservation protocol.
TCP (transfer control protocol.

43. What is RTP? Discuss with examples. (AU: May/June 2009)


RTP is the acronym for Real time protocol. It is a transport level protocol used for real time
distributed application.
Example: Audio and video conferencing.
Interactive simulation.
Remote medical diagnosis.

44.What is the function of RTP relays and give its types?


A relay operating at a given protocol layer is an intermediate system that acts as both a
destination and a source in a data transfer.

45. What is the function of mixer and translator in RTP?


Mixer: It is source of synchronization. It receives stream of RTP packets from one or more
sources. Combines these streams and forwards a new RTP packet stream to one or more
destinations.
Translator: It produces one or more outgoing RTP packets for each incoming packets. It
change the format of the data that suite to transfer from one domain to another.
PART – B

1. a. Explain the characteristics of RSVP & the types of data flow.


b. Explain the RSVP operation and protocol mechanisms.
2. Explain the operation of multi protocol label switching.
3 a. Explain the RTP protocol architecture.
b. Explain the RTP data transfer protocol.
4. Explain the MPLS characteristics and advantages.
5. Explain in detail about RTCP architecture and RIP protocol details. (AU May 2012)
6. Discuss about protocols used for QOS support with neat diagram. (AU May 2012)
7. i) List and explain the three RSVP reservation styles in detail. (AU Nov 2012)
ii) Explain the MPLS operation in detail with a diagram.
8.i) Explain the RTP data transfer protocol architecture in detail. (AU Nov 2012)
ii) Explain the functions performed by the RTP control protocol and its packet types in
detail.
9.i) Explain the reservation styles of the RSVP in detail. (AU Nov 2013)
ii) Explain the features of MPLS.
10. i) Explain the RTP protocol architecture in detail. (AU Nov 2013)
ii) Explain the functions and message types of the RTP control protocol.
11.i)Describe the goals and architectures of RSVP in detail. (AU June 2014)
ii)Explain the MPLS forward packet procedures with neat diagram.
12.i) Briefly explain the protocol mechanisms of RSVP (AU June 2014)
ii)What is RTCP? Explain about RTCP distinguishes several types of packets.
13.i) What are the functions that are performed by RTCP and explain the RTCP transmission
in detail? (AU Nov 2007)
ii. Explain the goals and characteristics of RSVP.
14.i) Explain why TCP is not suitable for real time applications. Also explain the need for
RTP. (AU Nov 2007)
ii) Describe the characteristics of MPLS.
15. Eplain the Resource reservation protocol operation by giving its goals and characteristics
(AU Nov 2008)
16. Draw the RTP protocol architecture and explain the concept. Also draw the RTP header
format and explain the significance of each field. What are the difference between RTP and
RTCP? (AU Nov 2008)

También podría gustarte