Académique Documents
Professionnel Documents
Culture Documents
Student’s
Signature:
surendra
Evaluator’s comments:
__________________________________________________________________
___
Ans :-
Wasted bandwidth will be zero if Propagation time & Frame size are zero. But this
is not possible.
Ques 2:-Consider the use of timed token protocol (IEEE 802.4) in the
following situation. We have four nodes in the system. The real time
requirement is that node Ni be able to transmit up to bi bits over each period
of duration pi milliseconds, where bi and pi are given in the table below.
Node bi pi
N1 IK 10,000
N2 4K 50,000
N3 16 K 90,000
N4 16 K 90,000
Choose suitable Target Token rotation Time (TTRT) and obtain suitable
values of fi (total number of bits that can be transmitted by node Ni over every
cycle). Assume that the propagation time is negligible compared to TTRT and
that the system bandwidth is 1 mbps.
Ans :- From an examination of the messages, it can be seen that the shortest
deadline among all the messages is 10,000 msec. Therefore we can select
TTRT=10,000/2=5000msec
The value of fi
N1=C1/T1=1/10000 b/msec
N2=C2/T2=4/50000 b/msec
N3=C3/T3=16/90000 b/msec
N4=C4/T4=16/90000 b/msec
N1+N2+N3+N4=1/10000+1/50000+1/90000+1/90000=64/45000 b/msec
F1=5000*1/10000=1/2=0.5 msec
F3=5000*16/90000=0.89 msec
F4=5000*16/90000=0.89 msec
Ques 3:-In a real time packet switched network, explain the roles of a traffic
police and a traffic shaper, explain one popular traffic shaping and one traffic
policing techniques.
We propose a new traffic shaper which can adjust the burstiness of the input traffic
to obtain reasonable bandwidth utilization while maintaining statistical service
guarantees. The performance study is conducted in two parts. In the first part, we
study the effect of varying the shaper parameters on the input characteristics. In the
second part, we dimension our scheme and a LB equivalently and compare the
mean and peak rate policing behavior with delay and loss as the performance
parameters. Adopting a less stringent attitude towards short term burstiness is
shown to result in considerable advantage while policing real-time traffic. Future
research possibilities in this topic are explored.
Traffic Policing :- Traffic policing allows you to control the maximum rate of
traffic sent or received on an interface, and to partition a network into multiple
priority levels or class of service (CoS).
Traffic policing manages the maximum rate of traffic through a token bucket
algorithm. The token bucket algorithm can use the user-configured values to
determine the maximum rate of traffic allowed on an interface at a given moment
in time. The token bucket algorithm is affected by all traffic entering or leaving
(depending on where the traffic policy with traffic policing is configured) and is
useful in managing network bandwidth in cases in which several large packets are
sent in the same traffic stream.
Part-B
Ans :- In real time system it is not feasible to use Ethernet LAN. The Logical ring
Architecture possesses significant advantages over Ethernet due to inherent
deterministic access arbitration mechanism in contrast to the collision to the based
mechanism of Ethernet.
3) There are EtherNet/IP Required Objects – Identity, TCP, Router that every
device must have. The EtherNet/IP Specification defines those objects.
4) There are EtherNet/IP Application Objects that have the data for your specific
device. For example, an EtherNet/IP Drive device has a Motor Object. EtherNet/IP
devices that support specific devices all have the same set of EtherNet/IP
application objects.
Examples:
Peak = 10mbps
Jitter = 20mbps
Ans is=200mbps