Vous êtes sur la page 1sur 12

SKR ENGINEERING COLLEGE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

TWO MARKS QUESTIONS WITH ANSWERS Subject name: High Speed Networks Class: IV A Subject code: EC1008 Sem: VIII

UNIT-I

HIGH SPEED NETWORKS

1. What is the need for AAL? The use of ATM creates the need for an adaptation layer to support information transfer protocol but not biased on ATM. Example: PCM voice, LAPF 2. List the advantages of frame relay networks? Lower delay, higher throughput, access speed is unto 2Mbps and even higher data rates is now available. 3. Define ATM cell? ATM uses fixed size cells consisting of a 5 octet header and a 48 octet information field. The use of small cells may reduce queuing delay and fixed cells can be switched more efficiently. 4. What are the three separate planes in ATM protocol architecture? 1. User plane 2. Control plane. 3. Management plane. 5. List the advantages of virtual paths. 1. Simplified network architecture 2. Increased network performance & reliability. 3. Reduced processing & short connection setup time. 6. What is the function of ABR mechanism? ABR mechanism uses explicit feedback to sources to assure that capacity is fairly allocated. 7. What are the data link control functions that are generated by LAPF core? 1. Frame delimiting, alignment and transparency 2. Frame multiplexing, 3. Inspection of the frame to ensure that it consists of an integer number of octets prefers to zero bit insertion or following zero bit extraction. 4. Detection of transmission errors 5. Congestion control function. 8. What are the uses of wireless LAN? 1. It saves the cost of installation of LAN cabling & cases the task of location & other modifications to network structure.

2. It is used to support nomadic access by providing a wireless link between a LAN hub and a mobile data terminal equipped with an antenna. 9. State the important requirements for wireless LAN? Throughput Transmission robustness & security Number of nodes Service area Battery- power consumption Roaming Dynamic configuration Connection to backbone LAN License- free operation. 10. What are the two logical sub layers in ALL? 1. Convergence sub layers 2. Segmentation & reassembly sub layer. 11. What are the services defined by IEEE 802.11? 1. Association 2. Resuscitation 3. Dis association 4. Authentication 5. Privacy 12. What are the two types of layer two switches? 1. Store & forward switch 2. Cut through switch 13. What is the function of sequence number protection (SNP) field in AAL? SNP field is an error code for error detection & possibly correction on the sequence number field. 14. Explain the principle of CSMA/CD? 1. If the medium is idle it transmit 2. If the medium is busy, continue to listen until the channel is idle then transmit. 3. If a collision is detected during transmission, immediately cease transmitting. 4. After a collision, wait a random amount of time, then attempt to transmit again. . 15. What is BSS and ESS? BSS- basic service set consists of some number of stations executing the same. MAC protocol & competing for access to the same shared wireless medium. BSS may be isolated or it may connect to a backbone distribution system through an access point. 16. What is a distributed system? A distributed system DS may be a switch, a wired network or a wireless network.

17. State the categories of computer network? There are basically three categories of computer networks They are 1. LAN, 2. MAN, 3.WAN 18. State the categories defined by the ATM form? There are 6 ATM service categories defined by the ATM forum 19. State some examples of requirements that call for higher- speed LANS? 1. Centralized server farms 2. Power work groups 3. High-speed local back bone. 20. Compare packet switching and frame relay network. Packet Switching Hop by hop flow and error control Multiplexing & switching done in layer 3 In band signaling Date rate-64kbps Frame-Relay network End-to-end flow and error control Multiplexing & switching operation are carried out in layer 2 Common channel signaling Data rate-2mbps

21. What is meant by ad-hoc networking? It is a peer-to-peer network set up temporarily to meet some immediate level. 22. Draw IEEE 802.3 MAC frame format. Preamble SFD DSTaddr Src addr PDU Data & Padding CRC

23. What are the AAL services? o Handling of transmission errors. o Segmentation & Reassembly to enlarge large blocks of data to be carried in the informati0on field of ATM cell. o Handling of lost & misinserted cell condition. o Flow control & Timing control. 24. What is meant by common signal signaling and in band signaling? Common Channel signaling: The datas and control signals of a user are transmitted on separate channel. The control signals of all the user are passed through a signal common channel. In Channel signaling: The datas and control signals of a user are transmitted on same channel. There are two types i) Inband signaling ii) Out of band signaling

25. What is the purpose of cell lose priority bit in ATM cell format? It provides guidance to the network in the event of congestion. A value of 0 indicates a cell of relatively higher priority which should not be discarded unless no other alternatives is available. A value of 1 indicates that this cell is subject to discard with in the network. UNIT II 1. CONGESTION AND TRAFFIC MANAGEMENT

What is congestion? Congestion occurs when the number of packages being transmitted through a network begins to approach the packet handling capacity of the network. What are the two different queuing models? 1. Single server queue 2. Multi server queue. What is choke packet? A choke packet is a control packet generated at a congested node and transmitted back to source node to restrict traffic flow. State discard strategy? It deals with the most fundamental response to congestion. When congestion becomes severe enough the network is forced to discard frames and it must be done in a way that is fair to all users. What is CIR? CIR is a rate in bits per second that the network agrees to support for a particular frame mode connection. Any data transmitted in the excess of CIR is vulnerable to discard in the event of congestion. What is the drawback of back pressure? It can be used only in connection oriented network that allows hop by hop flow control. Neither frame relay nor ATM has any capability for restricting flow on a hop by hop basis. Write Littles formula and explain its use? Littles formula for single server is:

2. 3.

4.

5.

6.

7.

= T
for multi sever is

= TS/N
it is used to deduce the average at any time. 8. Brief about explicit congestion signaling . In this the network alerts the end systems to grow congestion within the network and the end systems takes steps to reduce the offered load to the network and it can work in either backward or forward.

9. Brief about implicit congestion signaling . If the source is able to detect increased delays and packet discards then it has an implicit evidence of network congestion. If all sources are able to detect congestion and reduce flow on the congestion then the network congestion will be relieved. Thus the congestion control on the basis of implicit signaling is the responsibility of end systems and does not require action on the part of network nodes. 10.What is meant by committed burst size (Bc)? The maximum amount of data that the network agrees to transfer under normal conditions over a measurement interval T. These datas may or may not be contiguous. 11. What is meant by excess burst size(Be)? The maximum amount of data in excess of Be that the network will attempt to transfer under normal conditions over a measurement interval T. 12.State the elements of a queue? Arrival that need service of some kind Service facilities that take care of the arrivals. The queue where the arrivals wait until they can be served. 13. State some examples of queue. Arrivals Servicing facilities Patients Doctor Automobiles Junction point Telephone calls Circuits The Queue In waiting Traffic jam Uncompleted

14. What is queuing theory? Queuing theory is the analysis of waiting lines or queues. Queue = Waiting line A Queue is a Waiting line 15. What happens when a packet arrives at a router? a. It checks in at the end of the input. b. It moves forward to get processed. By processing, the routing table is referred to and the destination part is fixed. c. Then the packet is put in the end of the appropriate output queue and it waits till it can be sent 16. State the categories of congestion control. In general congestion is has two categories Open loop (prevention) & Closed loop (Removal) 17. State fairness. As congestion develops flow of packets between sources and destination will experience increased delays and with high congestion, packet losses. Example: anode can maintain a separate queue for each logical connection.

18. State reservations. To avoid congestion and also to provide assured service to application is to use a reservation scheme.Such a scheme is an integral part of ATM networks. When a logical connection is established the network agrees to give a defined QOS so long as the traffic flow with in contract parameters; excess traffic is either discarded or handled on a best effort basis. 19. Compare multi server and multiple single server queues? Multi server queues Single server queues 1. Congestion statistics for this model in this case of M/M/N 2. Probability of number of items in the system is greater than or equal to number of servers. 1. Congestion statistics for this model is of two cases a) M/M/I b) M/D/I 2. Probability can be a) Zero b) Ratio less than 1 c) Ratio close to 1 d) Ratio greater than 1

20. What are the characteristics of queuing process? Characteristics of queuing process depends on: a) Arrival Pattern b) Service Pattern c) Number of server d) System Capacity e) Queue discipline 21. Write Kendalls notation. (a/b/c) : (d/e) is Kendalls notation a - distribution of inter arrival time b - distribution of service time c - number of server d -maximum number of allowed items in system e -queuing discipline model UNIT III TCP & ATM CONGESTION CONTROL 1. Write down the policies used in TCP implementation The policies used in TCP implementation are Send policy Delivery policy Accept policy Retransmit policy and Acknowledge policy 2. Give three techniques which deals with calculation of RTO.

The techniques which deals with calculation of RTO are 1.RTT Variance Estimate 2.Exponential RTO backoff 3.Karns Algorithm 3. What are the two techniques use to reduce the transmission of useless cells? The two techniques use to reduce the transmission of useless cellsare 1.Early packet Discard 2.Partial packet Discard 4. Give some ATM traffic related attributes. ATM traffic related attributes are 1.Constant bit rate(CBR) 2.Real time variable bir rate(rt-VBR) 3.Non-real time variable bit rate(nrt-VBR) 4.Unspecified bit rate(UBR) 5.Available bit rate(ABR) 6.Guaranteed frame rate(GFR) 5. Define UBR and ABR. UBR:This is a best effort service.No amount of capacity is guaranteed and cells may be discarded. ABR:It provides the user with a guaranteed minimum capacity.when additional capacity is available,the user may burst above the minimum rate with minimized risk of cell loss. 6. Define peak cell rate. It defines an upper bound on the traffic that can be transmitted by a source on an ATM connection.The PCR is defined in terms of the variable T,the minimum spacing between cells,so that the PCR=1/T.The PCR descriptor is mandatory for CBR and VBR services. 7. Define Sustainable cell rate. It defines an upper bound on the average rate of an ATM connection calculated over a time scale that is large relative to T.SCR is needed to specify a VBR source.The SCR descriptor is only useful if SCR<PCR. 8. Define maximum burst size. It is the maximum number of cells that can be sent continuously at the peak cell rate.If cells are presented to the network in clumps equal to the MBS,then the idle gap between clumps must be sufficient so that the overall rate does not exceed the SCR. 9. Define Minimum cell rate. The minimum cell rate used with ABR and GFR, defines the minimum commitment requested of the network:a value of zero can be used. 10. Define Maximum frame size. It is the maximum size of the frame in cells that can be carried over a GFR connection. This parameter is only relevant for the GFR service.

11. Define cell delay variation tolerance. It is a measure of the amount of variation in cell delay that is introduced by the network interface. 12. Define cell loss ratio. Cell loss ratio is simply the ratio to the total transmitted cell on a connection. 13. What are the four levels of timing in the traffic management? The four levels of timing are 1.Cell insertion time 2.Round trip propagation time 3.Connection duration 4.Long term 14. What is traffic shaping? Traffic Shaping is used to smooth out a traffic flow and reduce cell clumping which will result in a fairer allocation of resources and reduced average delay time. 15. What are the retransmit policies used in TCP traffic control. First-Only Batch Individual 16. What are the mechanisms used in ATM traffic control to avoid congestion condition? Resource Management Connection Admission Control Usage Parameter Control Traffic Shaping 17. What is reactive congestion control and preventive congestion control? Reactive Congestion Control: Whenever a packet discard occur due to severe congestion some control mechanism is needed to recover from network collapse these mechanism is reactive congestion control. Preventive Congestion Control: These are mechanism to avoid congestion before it occurs. UNIT IV INTEGRATED AND DIFFERENTIATED SERVICES 1. What is the need of integrated service Architecture? The need of ISA are 1.To support a variety of traffic with variety of QOS requirements within TCP/IP architecture. 2.To add new functionality to routers. 2. Give the two types of Internet traffic. 1.Elastic Traffic 2.Inelastic Traffic

3. Define Elastic Traffic. It is that which can adjust over wide range ,to changes in delay and throughput across an internet and still meet the needs of its application. 4. Define Inelastic Traffic. Inelastic Traffic does not easily adapt,if at all ,to changes in delay and throughput across an internet. 5. What are the requirements for inelastic requirements? 1.Throughput 2.Delay 3.Jitter 4.Packet loss 6. Why we go for ISA approach? The purpose of ISA is to enable the provision of QOS support over IP-based internets and to share the available capacity in times of congestion. 7. What are the functions of ISA to manage congestion and to provide QOS transport? 1.Admission control 2.Routing Algorithm 3.Queuing discipline 4.Discard policy 8. What are the principal background functions of ISA components? 1.Reservation protocol 2.Admission control 3.Management agent 4.Routing protocol 9. What are the three categories of services provided by ISA? 1.Guaranteed 2.Controlled load 3.Best Effort 10. Explain the use of the term Bucket. Bucket represents a counter that indicates the allowable number of octets of IP data that can be sent at any time.The bucket fills with octet tokens at a rate of R upto the bucket capacity. 11. What are the key elements of Guaranteed service? 1.The service provides assured capacity level. 2.There is a specified upper bound on the queuing delay through the network. 3.There are no queuing losses. 12. What are the key elements of Controlled load service? 1.The service approximates the behaviour visible to applications receiving best effort service under unloaded conditions.

2.There is no specified upper bound on the queuing delay through the network. 3.A very high percentage of transmitted packets will be successfully delivered. 13. Explain fair queuing. In fair queuing,each incoming packet is placed in the appropriate queue.The queues are serviced in round-robin fashion,taking one packet from each non empty queue in turn.Empty queues are skipped over. 14. What are the drawbacks of fair queuing? 1.Short packets are penalized. 2.More capacity goes to flows with longer average packet size compared to flows with shorter average packet size,that is each queue transmits one packet per cycle. 15. What is Bit-Round Fair Queuing(BRFQ)? The BRFQ rule states that whenever a packet finishes transmission,the next packet sent is the one with the smallest value F i 16. What is meant by best effort service. Flows that are not reserving resources are provided with guaranteed service. The service provides assured capacity levels 17. What are the design goals of RED algorithm? 1) Congestion avoidance 2) Global synchronization avoidance 3) Round on average queue length 18. What is meant by integrated services? It provides the total current traffic demand, limits the demand with respect to the current capacity handled by by the network & reserve resources with in the domain to provide a particular QOS guaranteed. UNIT V PROTOCOLS FOR QOS SUPPORT 1. What are the characteristics of RSVP? The characteristics of RSVP are unicast and multicast, simplex; Reciever initiated reservation, maintaining soft state in the internet, providing different reservation styles, transparent operation through non RSPV routers, and support for IPv4 and IPv6. 2. What are the basic concepts relating to data flow of RSVP operation? The basic concepts relating to data flow of RSVP operation are session, Flow specification and Destination port. 3. What is meant by integrated layer processing in RTP? In TCP/IP each layer processed sequentially whereas in integrated layer processing, adjacent layers are tightly coupled and they function parallely. 4. What is meant by ingress edge & egress edge in MPLS domain?

Ingress edge: Label switched router through which packets from internet router enters into MPLS domain is called Ingress edge. Egress edge LSR: LSR through which packets leaves the MPLS domain is called egress edge. 5. Characterize the two different options in the reservation request? The two different options in the reservation request are reservation attribute and sender selection. 6. What are the three reservation styles in RSVP? The three reservation styles in RSVP are Wild card filter, fixed filter style and shared explicit style. 7. What does wild card filter style specify? Wild card filter style specifies a single resource reservation to be shared by all senders to this address. 8. What does fixed filter style specify? Fixed filter style specifies a distinct reservation for each sender and provides an explicit list of senders. 9. What does shared explicit style specify? Shared explicit style specifies a single resource reservation to be shared among an explicit list of senders. 10. Write the label format of MPLS? An MPLS label is a 32 bit field consisting of following elements. 1. Label value (20 bit) 2. Exp (Experimental use)(3 bit) 3. S-set 4. Time to live-TTL (8 bit) 11. Explain the session of RTP concept? Session of RTP concept is defined by RTP port number, RTCP port number, participant IP address. 12. What is Wild card filter style? The wild-card filter style specifies a single resource reservation to be shared by all senders to this address. This style is represented in form WF (*{Q}) where asterisk represents wild card sender selection and Q, is the flowspect. 13. What is mixer in RTP? A mixer in an RTP relay that services streams of RTP packets from one or more sources combines these streams and forwards a new RTP packet stream to one or more destination. 14. What is the use of translator in RTP?

The translator converts the video to a lower quality format requiring a lower data rate.It can replicate an incoming multicast RTP packet and send it to a number of unicast destinations. 15. Define Label switched router in MPLS. An MPLS network consists of a set of nodes called label switched router(LSR) capable of switching and routing packets on the basis of which a label has been added to each packets. 16. What is meant by label merging & frame merging? The replacement of multiple incoming labels for a particular forward equivalent class with a single outgoing label is called label merging. Label merging when it is applied to operation over frame based media then it is called frame merging. 17. Define flow specification in RSVP. The flow specification of RSVP specifies a desired QOS and is used to set parameters In a nodes packet scheduler. Flow spec: Service Class R spec T spec R spec - Reserve Specification T spec - Traffic Specification 18. Define filter specification in RSVP. The filter specification of RSVP defines the set of packets or flow for which a reservation is requested. Filter spec: Source address UDP/TCP source port 19. Define session in RSVP. Once a reservation is made at a router by a particular destination the router considers this as a session and allocates resources for the life of that session. It is defined by: Destination IP address IP protocol identifier Destination port

Vous aimerez peut-être aussi