Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Assignment-3
AJAY MALIK
7450070025
PART-A:
However, circuit switching provides constant bit rate and latency, while these may vary in a
virtual circuit service because of reasons such as:
For VC temporal connectivity a real time systems are used. In this the temporal connectivity for
each VC to be established while not jeopardizing the QoS guarantees to other existing VCs and
To reduce the call blocking probability for future VCs by using the minimum possible resources.
We impose a deterministic guarantee that every message generated at the source node be
delivered to the destination node in a time period no longer than the relative deadline. It means
that the route traverses a minimum number of VPs among all possible routes that have sufficient
resources to fulfill the end-to-end temporal QoS requirement of the VG to be established. To
ensure that sufficient bandwidth is available over all the VPs along the selected route, we
incorporate in our proposed scheme a priority assignment method to calculate the worst-case
delay which messages of a VC will experience on a VP along which the VC is routed
PART-B:
Q4. Discuss the meanings of IDI and of the DSP if AFI =(39,47 or 45)
Ans:- The Authority and Format Identifier (AFI), that identifies the type of addressing scheme
that is used, The IDI(Initial Domain identifier.), which describes the address allocation and
issuing authority and the Domain-Specific Part (DSP), which contains routing information It is a
portion of an NSAP or NSAP-format ATM address that specifies the address allocation and the
administration authority. The IDI identifies the controlling the assignment of the Domain
Specific Part (DSP).
The AFI here specifies the format applicable, Thus the DCC format has AFI=0 X 39, ICD format
has AFI= 0 X 47, E.164 format has AFI= 0 X 45
Q5. What are the three functions with the help of which Routing is accomplished? Discuss
Address summarization.
Ans: - Currently there are three types of ATM routing protocols available which makes routing
accomplish.
1. Proprietary Protocols. Here switch manufacturers supply custom software (e.g. Fore Systems
SPANS). Multivendor interoperability is not possible.
2. Interim Inters witch Signalling Protocol IISP. Each switch maintains a static next-hop routing
table. Network personnel must update these tables, but supplier support is not widespread.
3. Private NNI (PNNI) protocol from the ATM Forum. ATM Forum PNNI v1.0 Its goals
include complete routing support for dynamic environments, support for all Qos and CoS and
multivendor interoperability. It is a very complex, dynamic self-learning protocol that is loosely
based on IETF's OSPF routing protocol. Supplier support is gradually increasing but this calls for
substantial processing power, available on the newest switches. It is not generally available as an
upgrade to existing switches.
Q6. What are various Security management functions done in OSI Management
framework?
Ans:- Security management is one of the key functional areas in open systems network
management. Two key aspects of security management are managing user security services and
providing security to network management systems. These are examined in turn to give the
reader an overview of the state-of-the-art in security management. The ISO OSI Reference
Model is used as a basis to present the security threats, security services and mechanisms which
have to be managed. Telecommunications management networks are used as an example of
management applications which both provide management and require the provision of security
and security management services.
SNMP is a tool (protocol) that allows for remote and local management of items on the
network including servers, workstations, routers, switches and other managed devices.
Comprised of agents and managers
• Agent - process running on each managed node collecting information about the device it
is running on.
• Manager - process running on a management workstation that requests information about
devices on the network.