Notes Data Communication Unit 3 PDF
Notes Data Communication Unit 3 PDF
Network Layer
Datagram Networks:
1. It is connectionless service. There is no need of reservation of resources as
there is no dedicated path for a connection session.
2. All packets are free to go to any path on any intermediate router which is
decided on the go by dynamically changing routing tables on routers.
3. Since every packet is free to choose any path, all packets must be
associated with a header with proper information about source and the
upper layer data.
4. The connectionless property makes data packets reach destination in any
order, means they need not reach in the order in which they were sent.
5. Datagram networks are not reliable as Virtual Circuits.
6. But it is always easy and cost efficient to implement datagram networks as
there is no extra headache of reserving resources and making a dedicated
each time an application has to communicate.
https://www.rgpvonline.com/guide.html
Page no: 1
3.2 Routing
https://www.rgpvonline.com/guide.html
Page no: 2
3.3 Dijkstra’s Routing Algorithm
At the end each node will be labelled (see Figure) with its distance from source
node along the best known path. Initially, no paths are known, so all nodes are
labelled with infinity. As the algorithm proceeds and paths are found, the labels
may change reflecting better paths. Initially, all labels are tentative. When it is
discovered that a label represents the shortest possible path from the source to
that node, it is made permanent and never changed thereafter.
We now start at B, and examine all nodes adjacent to it. If the sum of the label
on B and the distance from B to the node being considered is less than the label
on the node, we have a shorter path, so the node is relabelled. After all the
nodes adjacent to the working node have been inspected and the tentative labels
changed if possible, the entire graph is searched for the tentatively labelled node
with the smallest value. This node is made permanent and becomes the working
node for the next round. The Figure shows the first five steps of the algorithm.
https://www.rgpvonline.com/guide.html
Page no: 3
3.4 Bellman Ford Algorithm
This algorithm solves the single source shortest path problem of a directed
graph G = (V, E) in which the edge weights may be negative. Moreover, this
algorithm can be applied to find the shortest path, if there does not exist any
negative weighted cycle.
Example
The following example shows how Bellman-Ford algorithm works step by
step. This graph has a negative edge but does not have any negative cycle,
hence the problem can be solved using this technique.
At the time of initialization, all the vertices except the source are marked by ∞
and the source is marked by 0.
In the first step, all the vertices which are reachable from the source are
updated by minimum cost. Hence, vertices a and h are updated.
https://www.rgpvonline.com/guide.html
Page no: 4
the next step, vertices a, b, f and e are updated.
Following the same logic, in this step vertices b, f, c and g are updated.
https://www.rgpvonline.com/guide.html
Page no: 5
3.5 Congestion Control
Effects of Congestion
Imagine a bucket with a small hole in the bottom. No matter at what rate water
enters the bucket, the outflow is at constant rate. When the bucket is full with
water additional water entering spills over the sides and is lost.
1. When host wants to send packet, packet is thrown into the bucket.
2. The bucket leaks at a constant rate, meaning the network interface
transmits packets at a constant rate.
3. Bursty traffic is converted to a uniform traffic by the leaky bucket.
4. In practice the bucket is a finite queue that outputs at a finite rate.
https://www.rgpvonline.com/guide.html
Page no: 6
(b) Token bucket Algorithm
The leaky bucket algorithm enforces output pattern at the average rate, no
matter how bursty the traffic is. So in order to deal with the bursty traffic we
need a flexible algorithm so that the data is not lost. One such algorithm is token
bucket algorithm.
https://www.rgpvonline.com/guide.html
Page no: 7
3.6 ATM Traffic Management
A primary role of traffic management is to protect the network and the end-
system from congestion in order to achieve network performance objectives. An
additional role is to promote the efficient use of network resources. Proper
traffic management helps ensure efficient and fair operation of networks in spite
of constantly varying demand and ensure that users get their desired quality of
service. One of the challenges in designing ATM traffic management was to
maintain the QoS for various classes while attempting to make maximal use of
network resources. This is what distinguishes traffic management from
“congestion control” problem of the past. Congestion control deals only with
the problem of reducing load during overload. Traffic management deals not
only with load reduction under overload or load increase during underload but
more importantly it tries to ensure that the QoS guarantees are met in spite of
varying load conditions. Thus, traffic management is required even if the
network is underloaded. The problem is especially difficult during periods of
heavy load particularly if the traffic demands cannot be predicted in advance.
This is why congestion control, although only a part of the traffic management
issues, is the most essential aspect of traffic management.
A number of traffic control mechanisms are defined, which the network may
utilize to meet the QoS objectives. To meet the QoS objectives, the following
functions form a framework for managing and controlling traffic and congestion
in ATM networks and may be used in appropriate combinations depending on
the service category.
• Feedback controls are defined as the set of actions taken by the network and
by end-systems to regulate the traffic submitted on ATM connections according
to the state of network elements.
• Usage Parameter Control (UPC) is defined as the set of actions taken by the
network to monitor traffic and enforce the traffic contract at the User Network
Interface. Network Parameter Control (NPC) is a similarly defined set of actions
at the Network Node Interface. The main purpose of UPC and NPC is to protect
network resources from malicious as well as unintentional misbehavior, which
https://www.rgpvonline.com/guide.html
Page no: 8
can affect the QoS of other already established connections, by detecting
violations of negotiated parameters and taking appropriate actions. Such actions
may include cell discard and cell tagging.
• Cell Loss Priority control may generate traffic flows of cells with Cell Loss
Priority (CLP) marking. The network may follow models which treat this
marking as transparent or as significant. If treated as significant, the network
may selectively discard cells marked with a low priority to protect, as far as
possible, the QoS objectives of cells with high priority.
• Frame Discard , a congested network that needs to discard cells may discard
at the frame level rather than at the cell level.
But this means that every time machine A wants to send packets to machine B,
A has to send an ARP packet to resolve the MAC address of B and hence this
will increase the traffic load too much, so to reduce the communication cost
https://www.rgpvonline.com/guide.html
Page no: 9
computers that use ARP maintains a cache of recently acquired IP_to_MAC
address bindings, i.e. they dont have to use ARP repeatedly. ARP Refinements
Several refinements of ARP are possible: When machine A wants to send
packets to machine B, it is possible that machine B is going to send packets to
machine A in the near future .So to avoid ARP for machine B, A should put its
IP_to_MAC address binding in the special packet while requesting for the MAC
address of B. Since A broadcasts its initial request for the MAC address of B,
every machine on the network should extract and store in its cache the
IP_to_MAC address binding of A When a new machine appears on the network
(e.g. when an operating system reboots) it can broadcast its IP_to_MAC address
binding so that all other machines can store it in their caches..
These addresses are always available and do not have to be bound into
bootstrap code.
Because the identifying information depends on the network and not on
the CPU vendor, all machines on a given network will supply unique
identifiers.
https://www.rgpvonline.com/guide.html
Page no: 10
(3) Internet Controlled Message Protocol (ICMP)
ICMPMessageDelivery
ICMP messages travel across the internet in the data portion of an IP datagram,
which itself travels across the internet in the data portion of an IP datagram,
which itself travels across each physical network in the data portion of a frame.
Datagrams carrying ICMP messages are routed exactly like datagrams carrying
information for users;there is no additional reliability or priority.
https://www.rgpvonline.com/guide.html
Page no: 11