Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
College aantekeningen

Computer Networks Unit 4 MDU

Beoordeling
-
Verkocht
-
Pagina's
29
Geüpload op
28-06-2024
Geschreven in
2023/2024

These study notes cover essential concepts related to computer networks. Topics include network architectures, protocols, routing algorithms, network security, and more. The material is organized in a concise and easy-to-understand format, making it suitable for both beginners and intermediate learners.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud



, NotesNeo


Unit 4 : Congestion, QoS, LAN and Security
Syllabus :
Congestion Control, Quality of Service, QoS Improving techniques.
LAN: Ethernet, Token Bus, Token Ring, MAN Architecture- DQDB, WAN
Architectures- Frame Relay, ATM, SONET/SDH.
Network Security: Firewalls, security goals, types of attack, Introduction to
cryptography, Types of ciphers: symmetric and asymmetric key ciphers.



Section 1 : Congestion and QoS
1.1 Congestion Control

Definition:

Congestion control refers to the techniques and mechanisms used for managing
data flow to prevent network overload; ensuring efficient data transmission.

Objectives:

● Maintain Network Performance: Ensure data flows smoothly without
excessive delays.
● Prevent Packet Loss: Avoid packet drops due to overflowing buffers.
● Optimize Resource Utilization: Efficiently use network bandwidth and
resources.
● Fairness: Ensure fair bandwidth distribution among users.

Causes of Congestion:
1. High Data Load: Excessive data packets transmitted simultaneously can
exceed the network’s capacity.
2. Inefficient Routing: Suboptimal routing decisions can lead to bottlenecks
where certain paths become overloaded while others are underutilized.
3. Limited Bandwidth: Insufficient bandwidth to handle the volume of data
traffic, particularly during peak usage times.
4. Burst Traffic: Sudden spikes in traffic, such as video streaming or large file
transfers, can overwhelm the network.
5. Network Failures: Failures in network components like routers or links can
reroute traffic to other parts of the network, causing congestion.
6. Poorly Designed Network: Inadequate network design or configuration can
lead to inefficient use of resources and potential congestion points.




1

, NotesNeo


Congestion Control Techniques:

A. Open Loop (Preventive) Methods:
➢ Aim to prevent congestion before it occurs through proactive policies.

1. Traffic Shaping:
Purpose: To smooth out traffic flows by controlling the flow of bursts of data so it
doesn't overwhelm the network, maintaining a consistent transmission rate.
Techniques:
I. Leaky Bucket Algorithm:

● Concept: Imagines a bucket with a small hole at the bottom. Data goes into
the bucket and leaks out at a steady rate.
● Mechanism: Data packets are added to the bucket. If the bucket (buffer)
overflows, packets are discarded. Packets leave the bucket at a constant
rate, regardless of incoming rate.
● Pros: Keeps the data flow steady and predictable. Simplifies traffic flow to a
steady stream, effective for applications needing consistent bandwidth.
● Cons: May not fully utilize available bandwidth during low traffic periods.

II. Token Bucket Algorithm:

● Concept: Imagines a bucket that holds tokens, which are generated at a
steady rate.
● Mechanism: To send a packet, a token is required. If there are enough
tokens, packets are sent, allowing for bursts while controlling the average
rate.
● Pros: Good for allowing bursts of data while controlling the overall rate, more
flexible than leaky bucket.
● Cons: Complexity in managing token generation and consumption.

Traffic Shaping (Token Bucket Example):

● Scenario: A video streaming service that experiences bursts of high traffic.
● Implementation: Tokens are generated at a rate of 100 tokens per second.
Each video packet requires one token. When a burst of video packets arrives,
they are transmitted as long as there are tokens available. If tokens run out,
packets are queued until more tokens are generated.
● Outcome: Smooths out bursts, ensuring that average bandwidth usage stays
within limits while accommodating temporary surges.

2. Admission Control:
Purpose: To prevent too much data from entering the network at once.
Mechanism:

● The network checks current load and resources before admitting new flows.
● If resources are insufficient or network is too busy, new data flows are
rejected or delayed until the network can handle them.
● Ensures that existing traffic is not degraded by new flows.



2

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
28 juni 2024
Aantal pagina's
29
Geschreven in
2023/2024
Type
College aantekeningen
Docent(en)
Deepak modi
Bevat
Alle colleges

Onderwerpen

$10.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
deepakmodi

Maak kennis met de verkoper

Seller avatar
deepakmodi notesneo
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
1 jaar
Aantal volgers
0
Documenten
4
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen