0% found this document useful (0 votes)
6 views5 pages

CN Internal 2

Computer Networks Vipul Viniyam

Uploaded by

vipulviniyam2902
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views5 pages

CN Internal 2

Computer Networks Vipul Viniyam

Uploaded by

vipulviniyam2902
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

The 802.

3 MAC sub layer


protocol:
I) Preamble:Each frame starts with
a preamble of 7 bytes each
containing a bit pattern10101010.
II) Start of frame byte: It denotes
the start of the frame itself. It
contains 10101011.
III) Destination address: This gives
the destination address. The
higher order bit is zero for
ordinary address and 1 for group
address (Multi-casting). All bits in
the destination field frame will be
delivered to all stations (Broad
casting). The 46th bit (adjacent to
the high-order bit) is used to
distinguish local from global
addresses.
IV) Length field: This tells how
many bytes are present in the
data field from 0 to 1500.
V) Data field: This contains the
actual data that the frame
contains.
VI) Pad: Valid frame must be 64
bytes long from destination to
checksum. If the frame size less
than 64 bytes pad field is used to
fill out the frame to the minimum
size.
VII) Checksum: It is used to find
out if the receiver frame is correct
or not. CRC will be used here.

This principle, introduced by


Bellman in 1957, states that if
router J lies on the optimal path
from router I to router K, then the
optimal path from J to K also
follows the same route. This can
be explained by considering
routes from I to J (r1) and from J
to K (r2). If a better route than r2
existed from J to K, it could be
combined with r1 to create a
superior route from I to K,
contradicting the optimality of
r1r2.
Sink Tree: The sink tree is a
tree-like structure formed by
optimal routes from all sources to
a specific destination, adhering to
the optimality principle. Sink trees
play a central role in routing
algorithms, helping efficiently
route packets in networks fig(b).
Directed Acyclic Graphs (DAGs):
Sink trees can extend to become
DAGs if all possible paths are
considered, allowing for more
flexibility in route selection.
However, the fundamental
structure of a sink tree is retained
in DAGs.
Network Dynamics: In practice,
network dynamics, such as link
and router failures, can affect the
stability and accuracy of sink
trees. Routers may have varying
views of the current topology,
leading to dynamic adjustments in
the sink tree.

Routing algorithms often rely on


local knowledge rather than a
complete network view. One basic
local technique is "flooding,"
where every incoming packet is
sent out on all outgoing lines
except the one it arrived on.To
control the potential chaos of
flooding, a hop counter is added
to each packet's header,
decrementing with each hop until
the packet is discarded when the
counter hits zero. Ideally, the hop
counter should be initialized to the
estimated path length from source
to destination.To further manage
flooding, routers keep track of
flooded packets to avoid
duplication. This can be achieved
by having source routers include
sequence numbers in their
packets and maintaining lists of
seen sequence numbers for each
source. While not practical for
most packets, flooding has its
uses. It ensures delivery to every
node in the network, making it
useful for broadcasting
information and maintaining
robustness, even in challenging
conditions. Flooding's minimal
setup requirements also make it a
foundational element for more
efficient routing algorithms and a
valuable metric for performance
comparisons. Flooding inherently
chooses the shortest path, as it
explores all possible paths
simultaneously.

The Link State Routing concept


comprises five key steps for
routers
to function effectively: 1. Neighbor
Discovery: Routers identify their
neighboring devices and learn
their network addresses. 2.
Distance Metric Assignment: Each
router assigns distance or cost
metrics to its neighboring routers.
3. Packet Construction: Routers
construct packets containing the
information they've gathered. 4.
Packet Exchange: These packets
are sent to and received from all
other routers in the network. 5.
Shortest Path Computation:
Routers calculate the shortest
path to reach every other router in
the network.
Learning about the Neighbors:
When a router boots up, it
identifies its neighbors by sending
HELLO packets over point-to-point
connections, receiving replies with
unique neighbor names. For
broadcast links (e.g., Ethernet), the
setup is more complex.
Setting Link Costs: In the link state
routing algorithm, each link must
have a distance or cost metric for
calculating the shortest paths.
Building Link State Packets: In the
link state routing algorithm, each
router creates a packet containing
sender identity, sequence number,
age, and neighbor list with
associated costs.
Distributing the Link State
Packets: Distributing link state
packets is a crucial aspect of the
algorithm. To ensure all routers
quickly and reliably receive these
packets, a flooding approach is
used. Each packet contains a
sequence number that is
incremented with each new
transmission, preventing
duplicates. However, to address
potential issues, packet age is
also included and decremented
periodically.
Computing the New Routes: In link
state routing, once a router has
collected all link state packets
representing the entire network
graph, it can construct a
comprehensive view of the
network, considering links in both
directions with potential different
costs. Dijkstra's algorithm is then
employed locally to compute the
shortest paths to all destinations,
informing the router of the
preferred link for each destination,
which is added to the routing
tables.

Pure ALOHA does not require


global time synchronization,
whereas in slotted ALOHAthe time
is divided into discrete slots into
which all frames must fit.Let users
transmit whenever they have data
to be sent. There will be collisions
and all collided frames will be
damaged. Senders will know
through feedback property
whether the frame is destroyed or
not by listening channel.If the
frame was destroyed, the sender
waits a random amount of time
and again sends the frame.The
waiting time must be random
otherwise the same frame will
collide over and over. Frames are
transmitted at completely arbitrary
times. Whenever two frames try to
occupy the channel at the same
time, there will be a collisionand
both will be destroyed. We have to
find out what is the efficiency of
an ALOHA channel? Let us
consider an infinite collection of
interactive users sitting at their
systems (stations). A user will
always be in two states typing or
waiting. Let the ‘Frame time’
denote the time required to
transmit one fixed length frame.
Assume that infinite populations
of users are generating new
frames according to poisson
distribution with mean N frames
per frame time. If N>1 users are
generating frames at a higher rate
than the channel can handle. For
reasonable throughput 0<N<1. In
addition to new frames, the
station also generates
retransmission of frames. Old and
new frames are G per frame
time.-G> N At low load there will
be few collisions, so G ~ N. Under
all loads, the throughput S = GPo,
where Po is the probability that a
frame does not suffer a collision. A
frame will not suffer a collision if
no other frames are sent with one
frame time of its start. Let ‘t’ be
the time required to send a frame.
If any other user has generated a
frame between time to and to+t,
the end of that frame will collide
with the beginning of the shaded
frame.-Similarly, any other frame
started b/w to+t and to+2t will
bump into the end of the shaded
frame. The probability that ‘k’
frames are generated during a
given frame time is given by the
Poisson distribution: Pr[k] =
Gke-Gk!. The probability of zero
frames is just e-G . In an interval
two frame times long, the mean
number at frames generated is
2G. The probability at no other
traffic being initiated during the
entire vulnerable period is given
by
Po = e-2G S= Ge-2G [S=GPo]. The
Maximum throughput occurs at
G=0.5 with S=1/2e = 0.184.The
channel utilization at pure ALOHA
=18%.
In 1972, Roberts devised a method
for doubling the capacity of the
ALOHA system. In this system the
time is divided into discrete
intervals, each interval
corresponding to one frame.One
way to achieve synchronization
would be to have one special
station emit a pip at the start of
each interval, like
a clock. In Roberts’ method, which
has come to be known as slotted
ALOHA, in contrast to Abramson’s
pure ALOHA; a computer is not
permitted to send whenever a
carriage return is typed. Instead, it
is required to wait for the
beginning of the next slot. Thus
the continuous pure ALOHA is
turned into a discrete one. Since
the vulnerable period is now
halved, the amount of no other
traffic during the same slot as our
test frame is e-G which leads to S
= Ge –G At G=1, slotted ALOHA
will have maximum throughput. So
S=1/e or about 0.368, twice that of
pure ALOHA. The channel
utilization is 37% in slotted
ALOHA.

You might also like