Unit 3 CN Unit 3 of Computer Network Complete Note 3rd Year
Unit 3 CN Unit 3 of Computer Network Complete Note 3rd Year
B.TECH
COMPUTER SCIENCE ENGINEERING
MCA/ BCA/ Polytechnic CS/ B.Sc. IT/CS
(AKTU, Lucknow)
Dr. A.P.J. Abdul Kalam Technical University
University, Uttar Pradesh
By Vishal Dhiman
Que 1.1. What is meant by unicast and multicast routing with suitable diagrams?
AKTU 2013-14, Marks 05
Answer
Unicast routing:
1. In unicast routing, there is one-to-one relation between the source and the
destination. That means only one source sends packets to only one destination.
2. The type of source and destination addresses included in the IP datagram are unicast
addresses assigned to the hosts as shown in Fig. 1.1.1.
3. In unicast routing, when a router receives a packet, it forwards that packet through
only one of its ports which corresponds to the optimum path.
Fig. 1.1.1.
Broadcast routing
Broadcasting in computer network is a group communication, where a sender sends
data to receivers simultaneously. This is an all − to − all communica on model where
each sending device transmits data to all other devices in the network domain.
Broadcasting is shown in the following figure −
Multicast routing:
1.In multicasting, a message from a sender is to be sent to a group of destinations but
not all the destinations in a network.
2.A process has to send a message to all other processes in the group. For a small group
it is possible to send a point-to-point message.
3.But this is expensive if the group is large. So, we have to send messages to a well
defined group which are small compared to the network size.
4.Sending message to such a group is called multicasting and the routing algorithm
used for multicasting is multicast routing.
5.Multicast routing is a special class of broadcast routing as shown in
Fig. 1.1.2.
3. Then, a shortest path algorithm such as Dijkstra's algorithm can be used to find
the shortest path to every other router.
iii. Path vector routing protocols:
1. Path vector routing is useful for inter domain routing.
2. In path vector routing, there is one node in each Autonomous System (ASs) that acts
on behalf of the entire ASs.
3. This single node is called the speaker node. The speaker node in an authentication
server creates a routing table and advertises it to speaker nodes in the neighboring
ASs.
4. The principle of path vector routing is same as for distance vector routing except that
only speaker nodes in each AS can communicate with each other.
5. A speaker node advertises the path, not the metric of the nodes, in its autonomous
system, or other autonomous systems.
Que 1.3. Describe the problem of count-to-infinity associated with distance vector
routing technique.
AKTU 2016-17, Marks 7.5
Answer
Count-to-infinity problem:
1. The main issue with Distance Vector Routing (DVR) protocols is routing loops.
2. This routing loops in DVR network causes count-to-infinity problem.
3. In distance vector routing, routing loops usually occur when an interface goes down.
4. Routing loops usually occur when any interface goes down or two routers send
updates at the same time.
Explanation:
1. Consider a network connected with thr three routers as shown in Fig. 1.3.1.
1.
2. Let the matrices (weight or cost) between the routers is the number of jumps to
reach the neighbor router.
3. In the Fig. 1.3.1. cost between B and C is 1 and cost between A and C is 2.
4. Now suppose the link between B and C is disconnected, then B will know that it can
no longer get to C via that link and will remove it from its table.
5. Before it can send any updates, it may be possible that it will receive an update
from A which will be advertising that it can get to C at a cost of 2.
6. B can get to A at a cost of 1, so it will update a route to C via A at a cost of 3.
7. A will then receive updates from B later and update its cost to 3.
8. This will slowly propagates through the network until it reaches in infinity.
finity.
This will cause count-to-infinity
infinity problem.
Que 1.4. What is congestion and congestion control? Discuss open-loop congestion
control techniques.
OR
What is congestion? Name the techniques that prevent congestion.
AKTU 2015-16, Marks 05
OR
What is congestion? Briefly describe the techniques that prevent congestion.
AKTU 2017-18, Marks 10
Answer
Congestion: Congestion is a situation which may occur if users send data into the
network at a rate greater than that allowed by network resources.
Congestion control: Congestion control refers to techniques and mechanisms that can
either prevent congestion, before it happens, or remove congestion, after it has
happened.
ii. Choke to inform about congestion. In the choke packet method the warning is
from the router, which has encountered congestion. to the source station
directly.
Que 1.5. What is the difference between open-loop congestion control and closed-
loop congestion control?
Answer
S.no. Open-loop congestion control Closed-loop congestion control
Que 1.6. Define traffic shaping. Elaborate leaky bucket algorithm used for congestion
control.
OR
What is the congestion in network layer? Discuss at least one algorithm used for
congestion control.
OR
Write a short note on leaky bucket algorithm.
AKTU 2013-14, Marks 05
Answer
Traffic shaping: Traffic shaping is a mechanism to control the amount and the rate of
the traffic sent to the network.
3. The input rate can vary, but the output rate remains constant. Similarly, in
networking, a technique called leaky bucket which can smooth out bursty traffic.
4. Bursty chunks are stored in the bucket and sent out at an average rate.
5. A simple leaky bucket implementation is shown in Fig. 1.6.1, a FIFO queue holds
the packets. If the traffic consists of fixed size packets the process removes a fixed
number of packets from the queue at each tick of the clock.
Fig. 1.6.1.
6. If the traffic
affic consists of variable length packets, the fixed output rate must be
based on the number of Bytes or bits.
7. The following is an algorithm for variable length packets:
i. Initialize a counter to n at the tick of the clock.
ii. If n is greater than the size of the packet, send the packet and decrement the
counter by the packet size. Repeat this step until n is smaller than the packet size.
iii. Reset the counter and go to step (i).
Classification of IP address:
1. Class A:
i. Class A addresses are assigned to networks with a very large number of hosts.
ii.The high-order bit in a class A address is always set to 0.
ii. The next seven bits (completing the first octet) complete networkID. The
remaining 24-bits (the last three octets) represent the hostID.
Classes of IP
Class A – 0 to 126 – (125.255.23.17)
2. Class B:
i. Class B addresses are assigned to medium-sized to large-sized networks.
ii. The two high-order bit in a class B address are always set to binary 10.
iii. The next 14-bits (completing the first two octets) complete the networkID. The
remaining 16-bits (last two octets) represent the hostID.
Classes of IP
Class B – 128 to 191 – (191.23.28.147)
3. Class C:
i.Class C addresses are used for small networks.
ii. The three high-order bits in a class C address are always set to binary 110.
iii.The next 21-bits (completing the first three octets) complete the networkID. The
remaining 8-bits (last octet) represent the hostID.
Classes of IP
Class C – 192 to 233 – (192.203.28.117)
4. Class D:
i. Class D addresses are reserved for IP multicast addresses.
ii. The four high-order bits in a class D address are always set to binary 1110.
iv. The remaining bits are for the addresses that interested hosts will recognize.
Classes of IP
Class D – 224 to 239 – (used for multicasting)
5. Class E:
i. Class E addresses are experimental addresses reserved for future use.
ii.The high-order bits in a class E address are set to 1111.
Classes of IP
Class E – 240 to 255 – (used for Research)