Course Material - HSN
Course Material - HSN
L-1
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
CSE III/VI
Course Name with Code :High Speed Networks-16CSE10
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-3
LECTURE HANDOUTS
CSE III/VI
•
• ATM cells are standardized at a fixed-length size of 53 bytes to enable faster switching than
is possible on networks using variable-packet sizes (such as Ethernet).
• It is much easier to design a device to quickly switch a fixed-length packet than to design a
device to switch a variable-length packet.
• Using fixed-length cells also makes it possible to control and allocate ATM bandwidth
more effectively, making support for different quality of service (QoS) levels for ATM
possible.
ATM Cell Format
Header Format
– Generic flow control
– Only at user to network interface
– Controls flow only at this point
– Virtual path identifier
– Virtual channel identifier
– Payload type
– e.g. user info or network management
– Cell loss priority
– Header error control
Generic Flow Control (GFC)
– Control traffic flow at user to network interface (UNI) to alleviate short term overload
– Two sets of procedures
– Uncontrolled transmission
– Controlled transmission
– Every connection either subject to flow control or not
– Subject to flow control
– May be one group (A) default
– May be two groups (A and B)
– Flow control is from subscriber to network
– Controlled by network side
Single Group of Connections (1)
– Terminal equipment (TE) initializes two variables
– TRANSMIT flag to 1
– GO_CNTR (credit counter) to 0
– If TRANSMIT=1 cells on uncontrolled connection may be sent any time
– If TRANSMIT=0 no cells may be sent (on controlled or uncontrolled connections)
– If HALT received, TRANSMIT set to 0 and remains until NO_HALT
Single Group of Connections (2)
– If TRANSMIT=1 and no cell to transmit on any uncontrolled connection:
– If GO_CNTR>0, TE may send cell on controlled connection
– Cell marked as being on controlled connection
– GO_CNTR decremented
– If GO_CNTR=0, TE may not send on controlled connection
– TE sets GO_CNTR to GO_VALUE upon receiving SET signal
– Null signal has no effect
Header Error Control
– 8 bit error control field
– Calculated on remaining 32 bits of header
– Allows some error correction
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-4
LECTURE HANDOUTS
CSE III/VI
Some networks that need AAL services are Gigabit Ethernet, IP, Frame Relay, SONET/SDH and
UMTS/Wireless.
AAL Protocols
International Telecommunication Union Telecommunication Standardization Sector (ITU-T) has
defined five AAL protocols to provide the range of services.
• AAL Type 0 − This is the simplest service that provides direct interface to ATM services
without any restrictions. These cells are called raw cells that contain 48-byte payload field
without any special fields. It lacks guaranteed delivery and interoperability.
• AAL Type 1 − This service provides interface for synchronous, connection oriented traffic. It
supports constant rate bit stream between the two ends of an ATM link. An AAL 1 cell contains
a 4-bit sequence number, a 4-bit sequence number protection and a 47-byte payload field.
• AAL Type 2 − This service also provides interface for synchronous, connection oriented
traffic. However, this is for variable rate bit stream between the two ends of an ATM link. It is
used in wireless applications.
• AAL Type 3/4 − This includes a range of services for variable rate data or bit stream. It is
suitable for both connection – oriented, asynchronous traffic as well as connectionless traffic.
These ATM cells contain a 4-byte header.
• AAL Type 5 − AAL 5 provides the similar services as AAL 3/4, but with simplified header
information. It was originally named Simple and Efficient Adaptation Layer (SEAL). It is used
in a number of areas like Internet Protocol (IP) over ATM, Ethernet over ATM and Switched
Multimegabit Data Service (SMDS).
High Speed LAN’s:
Fast Ethernet
• Fast Ethernet is a variation of Ethernet standards that carry data traffic at 100 Mbps (Mega bits
per second) in local area networks (LAN). It was launched as the IEEE 802.3u standard in
1995, and stayed the fastest network till the introduction of Gigabit Ethernet.
Video Content / Details of website for further learning (if any):
https://www.geeksforgeeks.org/difference-between-frame-relay-and-atm/
https://www.youtube.com/watch?v=RP4OAbyVjV8&t=597s
Important Books/Journals for further learning including the page nos.:
William Stallings, ”High speed networks and internet”, Pearson Education 2002. -Pg.No (90-97)
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-5
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-6
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-7
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-8
LECTURE HANDOUTS
CSE III/VI
Topic of Lecture: Wireless LAN’s :WiFi and WiMax Networks applications, Requirements
Introduction :
• WiMax can be used to provide internet services such as mobile data and WiFi spots. Wifi is
defined under IEEE 802.11x standards where x stands for various WiFi versions.
• WiMax is defined under IEEE 802.16y standards where y stands for various WiMax versions.
• WiFi is for LAN (Local Area Network) applications.
Prerequisite knowledge for Complete understanding and learning of Topic:
• LAN
• Ethernet
• Wireless Communication
Detailed content of the Lecture:
• WiMAX (Worldwide Interoperability for Microwave Access) is a family of wireless
broadband communication standards based on the IEEE 802.16 set of standards, which provide
multiple physical layer (PHY) and Media Access Control (MAC) options.
• The name "WiMAX" was created by the WiMAX Forum, which was formed in June 2001 to
promote conformity and interoperability of the standard, including the definition of predefined
system profiles for commercial vendors.
• The forum describes WiMAX as "a standards-based technology enabling the delivery of last
mile wireless broadband access as an alternative to cable and DSL.
• IEEE 802.16m or Wireless MAN-Advanced was a candidate for the 4G, in competition with
the LTE Advanced standard.
• WiMAX was initially designed to provide 30 to 40 megabit-per-second data rates, with the
2011 update providing up to 1 Gbit/s for fixed stations.
• The latest version of WiMAX, WiMAX release 2.1, popularly branded as/known as WiMAX
2+, is a smooth, backwards-compatible transition from previous WiMAX generations. It is
compatible and inter-operable with TD-LTE.
Uses of WiMAX
The scalable physical layer architecture that allows for data rate to scale easily with available channel
bandwidth and range of WiMAX make it suitable for the following potential applications:
• Providing portable mobile broadband connectivity across cities and countries through various
devices.
• Providing a wireless alternative to cable and digital subscriber line (DSL) for "last mile" broadband
access.
• Providing data, telecommunications (VoIP) and IPTV services (triple play).
• Providing Internet connectivity as part of a business continuity plan.
• Smart grids and metering.
Requirements
A wireless LAN must meet the same sort of requirements typical of any LAN, including high capacity,
ability to cover short distances, full connectivity among attached stations, and broadcast capability. In
addition, a number of requirements are specific to the wireless LAN environment. The following are
among the most important requirements for wireless LANs:
Throughput: The medium access-control (MAC) protocol should make as efficient use as possible of
the wireless medium to maximize capacity.
Number of nodes: Wireless LANs may need to support hundreds of nodes across multiple cells.
Connection to backbone LAN: In most cases, interconnection with stations on a wired backbone
LAN is required. For infrastructure wireless LANs, this is easily accomplished through the use of
control modules that connect to both types of LANs. There may also need to be accommodation for
mobile users and ad hoc wireless networks.
Service area. A typical coverage area for a wireless LAN has a diameter of 100 to 300 m.
Battery power consumption: Mobile workers use battery-powered workstations that need to have a
long battery life when used with wireless adapters. This suggests that a MAC protocol that requires
mobile nodes to monitor access points constantly or engage in frequent handshakes with a base station
is inappropriate. Typical wireless LAN implementations have features to reduce power consumption
while not using the network, such as a sleep mode.
Transmission robustness and security: Unless properly designed, a wireless LAN may be
interference-prone and easily eavesdropped. The design of a wireless LAN must permit reliable
transmission even in a noisy environment and should provide some level of security from
eavesdropping.
Collocated network operation: As wireless LANs become more popular, it's quite likely that two or
more wireless LANs will operate in the same area or in some area where interference between the
LANs is possible. Such interference may thwart the normal operation of a MAC algorithm and may
allow unauthorized access to a particular LAN.
License-free operation: Users would prefer to buy and operate wireless LAN products without
having to secure a license for the frequency band used by the LAN.
Handoff/roaming: The MAC protocol used in the wireless LAN should enable mobile stations to
move from one cell to another.
Dynamic configuration: The MAC addressing and network management aspects of the LAN should
permit dynamic and automated addition, deletion, and relocation of end systems without disruption to
other users.
Video Content / Details of website for further learning (if any):
https://en.wikipedia.org/wiki/WiMAX
https://www.youtube.com/watch?v=RP4OAbyVjV8&t=597s
Important Books/Journals for further learning including the page nos.:
William Stallings, ”High speed networks and internet”, Pearson Education 2002-Pg.No (173-181)
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-9
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-10
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-11
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-12
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-13
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-14
LECTURE HANDOUTS
CSE III/VI
Choke Packet :A choke packet is a packet sent by a node to the source to inform it of congestion. Note
the difference between the backpressure and choke packet methods. In backpressure choke packet send
the message to source directly.
Control packet
— Generated at congested node
— Sent to source node
— e.g. ICMP source quench
• From router or destination
• Source cuts back until no more source quench message
• Sent for every discarded packet, or anticipated
• Rather crude mechanism
Implicit Signaling
In implicit signaling, there is no communication between the congested node or nodes and the source.
The source guesses that there is a congestion somewhere in the network from other symptoms.
Explicit Signaling
The node that experiences congestion can explicitly send a signal to the source or destination. The
explicit signaling method, however, is different from the choke packet method.
Explicit congestion signaling approaches can work in one of two directions:
• Backward and
• Forward.
We can divide explicit congestion signaling approaches into three general
categories:
• BINARY: A bit is set in a data packet as it is forwarded.
• CREDIT BASED: by the congested node.
These schemes are based on providing an explicit credit to a source
over a logical connection.
Video Content / Details of website for further learning (if any):
https://www.youtube.com/watch?v=6Ojr-Q319r8
Important Books/Journals for further learning including the page nos.:
William Stallings, ”High speed networks and internet”, Pearson Education 2002,Page No: (146-147)
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-15
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-16
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-17
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-18
LECTURE HANDOUTS
CSE III/VI
• This frame is very similar to the HDLC frame except for the missing control field here.
• The control field is not needed because flow and error control are not needed.
• The Flag, FCS and information fields are same as those of HDLC.
• The address field defines the DLCI along with some other bits required for congestion control
and traffic control.
Their description is as follows:
1. DLCI field:
The first part of DLCI is of 6 bits and the second part is of 4 bits. They together form a 10 bit data link
connection identifier.
2. Command / Response (C / R):
The C/R bit allows the upper layers to identify a frame as either a command or response. It is not used
by the frame relay protocol.
3. Extended Address (EA):
• This bit indicates whether the current byte is the final byte of the address.
• If EA = 1 it indicates that the current byte is the final one but if EA = 0, then it tells that another
address byte is going to follow.
4. Forward Explicit Congestion Notification (FECN):
• This bit can be set by any switch to indicate that traffic is congested in the direction of travel of
the frame.
• The destination is informed about the congestion via this bit.
5. Backward Explicit Congestion Notification (BECN):
• This bit indicates the congestion in the direction opposite to the direction of frame travel.
• It informs the sender about the congestion.
6. Discard Eligibility (DE):
• The DE bit indicates the priority level of the frame. In the overload situations a frame may have
to be discarded.
• If DE = 1 then that frame can be discarded in the event of congestion.
• DE bit can be set by the sender or by any switch in the network.
Video Content / Details of website for further learning (if any):
https://fossbytes.com/congestion-control-frame-relay/
Important Books/Journals for further learning including the page nos.:
William Stallings, ”High speed networks and internet”, Pearson Education 2002.Page No: (148-149)
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-19
LECTURE HANDOUTS
CSE III/VI
Credit Policy
• Receiver needs a policy for how much credit to give sender
• Conservative approach: grant credit up to limit of available buffer space
• May limit throughput in long-delay situations
• Optimistic approach: grant credit based on expectation of freeing space before data arrives
Effect of Window Size
W = TCP window size (octets)
R = Data rate (bps) at TCP source
D = Propagation delay (seconds)
• After TCP source begins transmitting, it takes D seconds for first octet to arrive, and D seconds for
acknowledgement to return
• TCP source could transmit at most 2RD bits, or RD/4 octets
The sliding window
• TCP uses a sliding window protocol to control the number of bytes in flight it can have. In other
words, the number of bytes that were sent but not yet acked.
• Both Flow Control and Congestion Control are the traffic controlling methods in different situations.
• The main difference between flow control and congestion control is that, In flow control, Traffics
are controlled which are flow from sender to a receiver. On the other hand, In congestion control,
Traffics are controlled entering to the network.
Video Content / Details of website for further learning (if any):
https://www.youtube.com/watch?v=CQFtBaEzDnU
https://www.brianstorti.com/tcp-flow-control/
https://www.youtube.com/watch?v=4l2_BCr-bhw
https://www.geeksforgeeks.org/difference-between-flow-control-and-congestion-control/
Important Books/Journals for further learning including the page nos.:
William Stallings, ”High speed networks and internet”, Pearson Education 2002.Page No: (189-190)
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-20
LECTURE HANDOUTS
CSE III/VI
Course Name with Code : High Speed Networks-16CSE10
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-21
LECTURE HANDOUTS
CSE III/VI
Fast Recovery
• When TCP retransmits a segment using Fast Retransmit, a segment was assumed lost
• Congestion avoidance measures are appropriate at this point
• E.g., slow-start/congestion avoidance procedure
• This may be unnecessarily conservative since multiple acks indicate segments are getting through
• Fast Recovery: retransmit lost segment, cut cwnd in half, proceed with linear increase of cwnd
• This avoids initial exponential slow-start
Limited Transmit
• If congestion window at sender is small, fast retransmit may not get triggered, e.g., cwnd = 3
• Under what circumstances does sender have small congestion window?
• If the problem is common, why not reduce number of duplicate acks needed to trigger retransmit?
Limited Transmit Algorithm
Sender can transmit new segment when 3 conditions are met:
• Two consecutive duplicate acks are received
• Destination advertised window allows transmission of segment
• Amount of outstanding data after sending is less than or equal to cwnd + 2
Performance of TCP over ATM
• How best to manage TCP’s segment size, window management and congestion control at the same
time as ATM’s quality of service and traffic control policies
• TCP may operate end-to-end over one ATM network, or there may be multiple ATM LANs or
WANs with non-ATM networks
TCP/IP over AAL5/ATM
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-22
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-23
LECTURE HANDOUTS
CSE III/VI
Course Name with Code : High Speed Networks-16CSE10
Introduction :
A traffic management framework, which couples the usage parameter control (UPC) and connection
admission control (CAC) functions in an ATM network, is described.Untagged cells are protected in
the backbone network nodes, whereas tagged cells are selectively discarded upon the onset of
congestion.
Prerequisite knowledge for Complete understanding and learning of Topic:
• Traffic Management
• Congestion Control
• TCP and UDP
Detailed content of the Lecture:
Congestion problem
Framework adopted by ITU-T and ATM forum
– Control schemes for delay sensitive traffic
Voice & video
– Not suited to bursty traffic
– Traffic control
– Congestion control
Bursty traffic
– Available Bit Rate (ABR)
– Guaranteed Frame Rate (GFR)
Requirements for ATM Traffic and Congestion Control
Most packet switched and frame relay networks carry non-real-time burst data
– No need to replicate timing at exit node
– Simple statistical multiplexing
– User Network Interface capacity slightly greater than average of channels
Congestion control tools from these technologies do not work in ATM
Problems with ATM Congestion Control
Most traffic not amenable to flow control
– Voice & video can not stop generating
Feedback slow
– Small cell transmission time v propagation delay
Wide range of applications
– From few kbps to hundreds of Mbps
– Different traffic patterns
– Different network services
High speed switching and transmission
– Volatile congestion and traffic control
Key Performance Issues-Latency/Speed Effects
E.g. data rate 150Mbps
Takes (53 x 8 bits)/(150 x 106) =2.8 x 10-6 seconds to insert a cell
Transfer time depends on number of intermediate switches, switching time and propagation delay.
Assuming no switching delay and speed of light propagation, round trip delay of 48 x 10-3 sec across
USA
A dropped cell notified by return message will arrive after source has transmitted N further cells
N=(48 x 10-3 seconds)/(2.8 x 10-6 seconds per cell)
=1.7 x 104 cells = 7.2 x 106 bits
i.e. over 7 Mbits
Cell Delay Variation
• For digitized voice delay across network must be small
• Rate of delivery must be constant
• Variations will occur
• Dealt with by Time Reassembly of CBR cells (see next slide)
• Results in cells delivered at CBR with occasional gaps due to dropped cells
• Subscriber requests minimum cell delay variation from network provider
– Increase data rate at UNI relative to load
– Increase resources within network
Video Content / Details of website for further learning (if any):
https://www.youtube.com/watch?v=-J55l7XJv0c
https://www.youtube.com/watch?v=JtYrwgzua0g
https://www.youtube.com/watch?v=be7mvlCJ67w
Important Books/Journals for further learning including the page nos.:
William Stallings, ”High speed networks and internet”, Pearson Education 2002,Page No: (280-293)
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-24
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-25
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-26
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-27
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-28
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-29
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-30
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-31
LECTURE HANDOUTS
CSE III/VI
Introduction :
• Fair queuing is a family of scheduling algorithms used in some process and network
schedulers. The algorithm is designed to achieve fairness when a limited resource is shared, for
example to prevent flows with large packets or processes that generate small jobs from
consuming more throughput or CPU time than other flows or processes.
• Processor sharing is a service policy where the customers, clients or jobs are all served
simultaneously, each receiving an equal fraction of the service capacity available. In such a
system all jobs start service immediately.
Prerequisite knowledge for Complete understanding and learning of Topic:
Queue
Process Sharing
Scheduling Algorithm
Detailed content of the Lecture:
Fair Queuing (FQ)
• Multiple queues for each port
–One for each source or flow
–Queues services round robin
–Each busy queue (flow) gets exactly one packet per cycle
–Load balancing among flows
–No advantage to being greedy
Your queue gets longer, increasing your delay
–Short packets penalized as each queue sends one packet per cycle
• A simple variation on basic FIFO queuing is priority queuing.
• The idea is to mark each packet with a priority; the mark could be carried, for example, in the
IP header, as we’ll discuss in a later section. The routers then implement multiple FIFO queues,
one for each priority class.
• The router always transmits packets out of the highest-priority queue if that queue is nonempty
before moving on to the next priority queue.
• Within each priority, packets are still managed in a FIFO manner.
• This idea is a small departure from the best-effort delivery model, but it does not go so far as to
make guarantees to any particular priority class. It just allows high-priority packets to cut to the
front of the line.
FIFO and FQ
Processor Sharing
• Multiple queues as in FQ
• Send one bit from each queue per round
Longer packets no longer get an advantage
• Can work out virtual (number of cycles) start and finish time for a given packet
• However, we wish to send packets, not bits
Video Content / Details of website for further learning (if any):
https://en.wikipedia.org/wiki/Processor_sharing
https://en.wikipedia.org/wiki/Fair_queuing
https://www.youtube.com/watch?v=6MyBum2Njls
Important Books/Journals for further learning including the page nos.:
William Stallings, “High Speed Networks and Internet”, Pearson Education, Second Edition, 2002.
(261-269)
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-32
LECTURE HANDOUTS
CSE III/VI
Course Name with Code : High Speed Networks-16CSE10
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-33
LECTURE HANDOUTS
CSE III/VI
Course Name with Code : High Speed Networks-16CSE10
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-34
LECTURE HANDOUTS
CSE III/VI
Course Name with Code : High Speed Networks-16CSE10
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-35
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-36
LECTURE HANDOUTS
CSE III/VI
DS Traffic Conditioner
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to
Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
CSE III/VI
Course Name with Code : High Speed Networks-16CSE10
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to
Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
LECTURE HANDOUTS L-38
CSE III/VI
Course Name with Code : High Speed Networks-16CSE10
RSVP Operation
• G1, G2, G3 members of multicast group
• S1, S2 sources transmitting to that group
• Heavy black line is routing tree for S1, heavy grey line for S2
• Arrowed lines are packet transmission from S1 (black) and S2 (grey)
• All four routers need to know reservation s for each multicast address
• Resource requests must propagate back through routing tree
Filtering
• G3 has reservation filter spec including S1 and S2
• G1, G2 from S1 only
• R3 delivers from S2 to G3 but does not forward to R4
• G1, G2 send RSVP request with filter excluding S2
• G1, G2 only members of group reached through R4
• R4 doesn’t need to forward packets from this session
• R4 merges filter spec requests and sends to R3
• R3 no longer forwards this session’s packets to R4
Sender selection
– List of sources (explicit)
– All sources, no filter spec (wild card)
Video Content / Details of website for further learning (if any):
https://www.geeksforgeeks.org/resource-reservation-protocol-in-real-time-systems/
Important Books/Journals for further learning including the page nos.:
Important Books/Journals for further learning including the page nos.:
William Stallings, “High Speed Networks and Internet”, Pearson Education, Second Edition, 2002.
(342-349)
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to
Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-39
LECTURE HANDOUTS
CSE III/VI
Course Name with Code : High Speed Networks-16CSE10
• Network protocols divide the communication process into discrete tasks across every layer of
the OSI model. One or more network protocols operate at each layer in the communication
exchange.
Video Content / Details of website for further learning (if any):
http://web.opalsoft.net/qos/default.php?p=rsvp-13
https://www.juniper.net/documentation/en_US/junos-space-apps/connectivity-services-
Important Books/Journals for further learning including the page nos.:
William Stallings, “High Speed Networks and Internet”, Pearson Education, Second Edition, 2002.
(355-361)
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to
Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
L-40
LECTURE HANDOUTS
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to
Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
LECTURE HANDOUTS L-41
CSE III/VI
Introduction :
• MPLS works by prefixing packets with an MPLS header, containing one or more labels. This is
called a label stack.
Prerequisite knowledge for Complete understanding and learning of Topic:
• Stack
• Data Flow
• Routers
Detailed content of the Lecture:
MPLS Operation
• Label switched routers capable of switching and routing packets based on label appended to
packet
• Labels define a flow of packets between end points or multicast destinations
• Each distinct flow (forward equivalence class – FEC) has specific path through LSRs defined
Connection oriented
• Each FEC has QoS requirements
• IP header not examined
• Forward based on label value
PLS works by prefixing packets with an MPLS header, containing one or more labels. This is called a
label stack. Each entry in the label stack contains four fields:
• A 20-bit label value. A label with the value of 1 represents the router alert label.
• a 3-bit Traffic Class field for QoS (quality of service) priority and ECN (Explicit Congestion
Notification). Prior to 2009 this field was called EXP.
• a 1-bit bottom of stack flag. If this is set, it signifies that the current label is the last in the stack.
• an 8-bit TTL (time to live) field.
• These MPLS-labeled packets are switched after a label lookup/switch instead of a lookup into
the IP table. As mentioned above, when MPLS was conceived, label lookup and label
switching were faster than a routing table or RIB (Routing Information Base) lookup because
they could take place directly within the switched fabric and avoid having to use the OS.
• The presence of such a label, however, has to be indicated to the router/switch. In the case of
Ethernet frames this is done through the use of EtherType values 0x8847 and 0x8848,
for unicast and multicast connections respectively.
Video Content / Details of website for further learning (if any):
https://towardsdatascience.com/multiprotocol-label-switching-mpls-explained-aac04f3c6e94
https://www.youtube.com/watch?v=LYFUfywvjhs
Important Books/Journals for further learning including the page nos.:
William Stallings, “High Speed Networks and Internet”, Pearson Education, Second Edition, 2002.
(352-353)
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to
Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
LECTURE HANDOUTS L-42
CSE III/VI
Introduction :
• MPLS works by prefixing packets with an MPLS header, containing one or more labels. This is
called a label stack.
Prerequisite knowledge for Complete understanding and learning of Topic:
• Stack
• Data Flow
• Routers
Detailed content of the Lecture:
Label Stacking
• Packet may carry number of labels
LIFO (stack)
– Processing based on top label
– Any LSR may push or pop label
Unlimited levels
– Allows aggregation of LSPs into single LSP for part of route
– C.f. ATM virtual channels inside virtual paths
– E.g. aggregate all enterprise traffic into one LSP for access provider to handleReduces size of
tables
Label Format Diagram
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to
Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
LECTURE HANDOUTS L-43
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to
Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
LECTURE HANDOUTS L-44
CSE III/VI
Course Faculty
Verified by HOD
MUTHAYAMMAL ENGINEERING COLLEGE
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to
Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
LECTURE HANDOUTS L-45
CSE III/VI
Course Faculty
Verified by HOD