Computer Network KK ..
Computer Network KK ..
2022
Computer Network
(BCA-503) •
(New)
• · Section-B
(Short.Answer Questions)
Note: Attempt any two question~ out of the following
three questions. Each qu~stion carries
.S marks. Short answer is required not exc~eding 209 word
s. . (7.s x 2 = 15)
6. Explain coaxial cable In detail and compJre it with twis
ted pair.
Ans. Refer to Unit-II, Sec-C, Q.1 and Sec-B, Q.9. (Page no. 46, 45)
7• lxi,tatn the significance of swit
ching. Discuss different techniques used in network.
Ans. Significance of Switching: Following are the significance of
switching:
(a) .SWitch increases the bandwidth of the network.
.
(bl It reduces the workload on individual PCs as it sends
the information to only that device which has
been addressed. • . . •
(c) It increases the o~erall performance of the network by
reduci.ng the traffic on the network.·
(d) There will be less frame collision as switch creates the
collision dom
Dllerent Techniques Used In Network: Refer to ·unit-Ill, Sec-C, Q.7: ain for each connection.
(P~e no. 78) • _
2022 (I)
C~ Question Bank tor a.c
8. Write a note on network classes. What is the use of subnetting in assigning IP address, ·.\
Ans. Networ~ Classes: Currently the_re_ are three classes 0 ~ TCP /IP netwo.rks. Each class Uses•
32~bit IP address space differently, prov1d1ng n1 ore or fewer bits for the net\\ ork part of the addr the
These classes are class A, class B and class C. ess.
• Use of Subnetting in Assigning IP Address: CIDR or Classless Inter Domain Routing .
flexibility of borrowing bits of ho~t part of the IP address and using them as network in ne~rovtdes the
Subnet. By using subnetting, one single class A IP address can be used to have smaller b Otk. called
provides better network management capab1·1·1t1es. • su -netwot ks Which
(a) Class A Subnets: In class A, only the first octet is used as network identifi d
are used to be assigned to Hosts (i.e. 16777214 Hosts per Network), To make mer an rest of three Oct
from Host part are borrowed and the subnet mask is changed accordingly. ore subnet in class A. b~ts .
(b) Class e Subnets: By default, using clas~ful networking, 14 bits are use • •ts
(2 ) 16384 networks_ and (2 -2) 65534 hosts. Class B IP addresses ca b d ~ network bits
14 16
Pl'OVid·
dass A addresses, by borrowing bits from host bits. . n. e su netted the sarne wa •ng
(c) Class C Subnets: Class C IP addresses are normally assign d t yas
it can only have 254 hosts in a network. _ e O a very small size network~
. . Use
. Section-c
• (Detailed Answer Questions) •
. Note: Attempt any three questions out of th fi .
1S marks. Answer is required in detail ·. e O11owing fiv~ questions. Each questio
• • •• . n can;es
9. ~•~•n the OSI reference model With neat d" • (1S )( 3::: 45)
Ans• Re,er.
&, • I se~;.C,
t o Unit-., · )· . . iagram.
· _Q.1. (Page no~ . .. . _
14
10. Define co.mputer network. Discuss rl - . ·
tw k. Al • • va ous types of networks to I
ne or so_ discuss advantages and disadvanta po ogles In computer
Ans. Refer to Unit-I, Sec-A. Q.3 and Sec-B QS io Q 10 (P ges of each topology.
11. What is stop-.ind-wait protoc~1? n· • • ::e no. 2, 8 to 11)
stop-and-wait protocol. . ISCUSS e ~d~ntages. and dlsadvantaps of
•Ans. Stop-and-Wait Protocol: Refer to Unit-III, Sec-A, Q.21. (Page no. 56{
Advantages of Stop-and-Wait Protocol . · ·
Following are the advantages of stop-and-wait proto~ol:
(a) . This protocol provides flow control. .
(b) One of the m~in advantages of the stop-a'nd-wait protocol i~ its simplicity.
Cc) Stop-and-wait protocol is useful in LAN as its efficiency decrease with the increasing dislm
between sender and receiver.
Cd) If we increase the data packet size, the efficiency is going to lnCl'ease. Hence, it is suilable ilr
• transmitting big data packets. . • .
(e) Stop-and-wait protocol is accurate as the sender sends the next frame to the receiver only~
the acknowledgement of the previous packet ls received. So, there is less chance of the frame beilC
~ -~
Disadvantages of Stop-and-Walt Protocol . Sender
Following are the disadvantages of stop-and-wait protocol:
(a) Problems Arise because of Lost Data: Let's say the sender sends
the data, but it gets lost ln transit. The receiver ls patiently awaiting the data
packet. The receiver does not send an acknowledgement because.it does not
receive the data. The sender won't send the subsequent packet because It
has not recel~ecJ ~)' acknowledgement. The lost data ls the ro~t cause of ~e FIi-
Issue. ~.- \ ,. ' . .
ZIZZ (I)
y
conrputll Network
...---In this instance, there are tw
7
(i) The sender waits an e d~ problems: Receiver
(ii) The receiver waits ind:fi e~s length of time for a response. • •
(b) Problems Arise a in1tely for data. •
the data was sent by the sender s a Result of th L
e ost Acknowledgement: Let's say
receiver transmits the acknowl da nd was also received by the recipient. The
1nstance, there is no chance fort~ gement after receiving the packet. In this
e acknowledgement is Jost in e se nder to get the acknowledgement because
th
sender to send the subseq uent aPnetwork k . Add'f1 iona IIY, there is no chance for a •'1
• ,••
•
protocol, this cannot happen until th ac et because d'
. , accor ing to the stop-and-wait Fig.
been receiv~d. e. previous pack~t's acknowledgement has • .
One issue arises in this situatio th
(c) Problem Resulting from ;• e se nder waits an endless time for an ackno~ledgement.
sender and was also received by thee1a~e~ Data or Acknowledgement: Let's say the data was
. d sent by the
not receive unti·1 the timeou t periodrec1p1en
h t• The ackn 1 d •
ow e gement 1s .
_then sent by the recipie nt but it is
received after this, Jt can be mistaken fi as paknssed on the sender's end . Due to the acknow
ledgement being
•. • or ac owledging the· receipt of another data packet.
Sender
Receiver
Fig. .
12. What Is ISDN sta_ndards_ ~n compu~e~ networks? E~lain the features and forms of
it.
Ans. ISDN Standa rds•~ Computer Networks: Refer to Unit-III, Sec-C, Q.1. (~age no. 70}
Features of ISDN Standards in Comput~r Networks
Following are the feature s of ISDN standards:
• (a) Offers point-t o-point delivery.
(b) Network access and networ k interconnection for multimedia.
(c) Different data rates from 64 Kbps up to 2 Mbps are commercially available which can meet
many
needs for transpo rting multimedia and is four to many times more than today's analog modems
.
(d) Call set-up times are under one second. ISDN can dramatically speed up transfer of informa
tion
over the Interne t or over a remote LAN connection, especially rich media like graphics, audio
or
video or applica tions that normally run at LAN speeds.
(e) ISDN will be the feeder networ k for broadband ISDN based on ATM standards.
Although ISDN could be cheaper, particularly in the case of widespread use, it is likely to be
cheaper
than ATM connections and more widespread in availability for a long time. It is, therefore, an importa nt tool
In bringing multim edia applications to a wide range of users.
Fonna of ISDN Standards In Computer Networks
1nere are two forms of ISDN standards: . •. . • "
(a) Nam,w Band ISDN: Narrow band ISDN is d1git;1 se~ce w~ere. the transpo rt speeds are
1.544 M d ISDN provides for the 1011owing servi~es.
(I) bps (Tl) or less. Narrow b~n . ·tched voice se~ce is a digital voice service _that offers many of
le Circuit Switch ed Voice: Circuit swid. a .wire ISDN Digital Subscriber Line (DSL).
capabilities of a busines s. It is centere over 4
2022 (ID)
(}jfr6. Question Bank for 8.C.
ice to pa
data service provides end-to-end digital serv
(ii) C!rcui~ Swi tch~ d Data: Circuit swit ched esta blish a
vide o i~9 rma tion ove r the -pub lic netw ork. ISDN uses out-of-band signaling to
da~ o~ ial processing.
ma1nta1n data con nec tion s, whi ch requ ire spec manage ISD
ippe d with a packet connection that is used to
(i,ii) Low Spe ed Packet: ISDN lines are equ i
s mon itor ing capa bilit y is prov ided by using the D channel on a DSL. The D channel
con nec tion s. Thi call proces •
of pass ing low spee d packet while also relaying
16 Kbp s X.25 con nec tion that is also capa ble SI
·infiorm atio • n.
i
equ ippe d with two B channels. Each B channel
(iv) Hig h Specd,Macket: ISDN lines are also pac kets : a.
nne l tha t can be use d for circ uit swi tche d voice, circuit switched data or high-speed
Kbp s cha d (pe rm:
or two of the 64 Kbps B channels are connecte
To pro visi on high -spe ed pac ket serv ice one
prov idin g a 64 Kbps X.25 connection.
virt ual circ uit) to the pac ket netw ork thus 4M
ISDN service is a digital service in excess of 1.54
(b) Bro adb and ISDN Ser vice : Bro adb and ic
ice can be in the form of Fram e Relay, SMDS or ATM. Broadband ISDN is the serv
Thi s digi tal serv the Informa
futu re. The high er spe eds offe red are requ ired to sup por t the many applications of
the from 25 Mbps.u
the broa dba nd ISDN services usually range
Sup er Highway. The rang e of spe eds for s and OC-3
mos t ofte n disc usse d are OC-1 that is 155 Mbp
the Gig abit rang e. The two spe eds tha t are the digital facil
Mbp s. The spe eds in the bro adb and are mad e possible by the high quality of
is 622 to insur
oco ls such as X.25 requ ired extensive overhead
in plac.e on the netw ork . The earl y data prot a
. Err or corr ecti on and flow con trol wer e perf orm ed at~ num ber of intermittent points
deli very of data cs have elimin
way of a dat a con nec tion . The new digi tal facilities a~d the introduction of fiber opti
the on the upper
-ed broa dba nd services rely for the most part
this nee d up to a max imu m exte nt. High-spe . .
.end-to-end basis.
pro toco ls to per form thes e func tion s on an ss (BRA)
d thro ugh one of two serv ice, nam ed by the CCITT as Basic Rate Acce
ude a num ber of B (beare~) channels ~nd ~ D (d~lt
ISD N is acc esse a~ channe~
Prim ary Rat e Acc ess (PRA). Bot h rate s incl 1nforma
ices. The D cha nne l c~rn es control and-s1gnahng
cha nne ls car ry data , voic e and oth er serv
8 ISDN use_r with
Bas ic Rat e Acc ess (BRA) prov ides an
data chan nels using the Basic
si{n ulta neo us acc ess to two 64 Kbps
cable._ Each data channel Rate
exis tin twi sted pai r cop per tele pho ne
is ref e;e d to as a B-channel and can carry v01ce or d~ta. An: ~er
I use or Interface
• rate s at 16 Kbps and isl data rate·
cha nne l, the D-c ann er ~deV
h o~e d·th ISDN The tota
Ices an e • l ---------
lntertace
. ar g betw een use Kb s The two B-channels and the sing e Fig. Basic Rate
sign in_ & 144 refe rred
P • D BRA is also
of BRA 1s ther e1 ore
l give rise to the term 2B~ • . t ISDN is inte nde d for low capacity usage,
sign alin g cha nne n. Basic ra e
to as 1.42 0, afte r the CCITT reco mm end atio se
30 . d end ent 64 Kbps B channels and a
that requ ired for sma ll bus ines•ses. 1·des up to in
. 1 ep
.
Prim ary rate acce ss serv ice pro v basi cal Y . • c
cha nne l to carr y the sign alin g. T~is
64 Kbps D 544 . _ /
ides digi tal acce ss via a TI line . A TI l!ne proVIdes a 1.
prov 64
twe nty- four
bandwidth. This ban dwi dth is divided into
e Tl channels Primary
Kb channels. The ISDN PRI service uses 23 of.th
to provide B channel access and uses the
24th channel for CJ)
edu res use packet Rate.
signaling purposes. ISDN call control proc In a
'c::D
itor and rele ase conn ecti ons.
messages to initiate, mon the D channel. Interface
BRI connection thes e messages are rout ed via
messages are
On the PRI service the /connection/call control nel in this
D
routed over the 24th channel which is the Mbps. ·Primary chan
B
instance. The total data r~te of PRA is 1.54 4 channel
use of the
rate access is often referred to as 23B+D beca Fig. Primary Rate Interface
1 because of
number of B channels and D channels or 1.42
,, j I 1 I
2022 (Iv)
computer Network
, "" (
1
the CCITT rec om men dat ion from
whi ch it is taken. This form of acc
situations which_ req uire a larg e tran ess is prim aril y 1n:tended for use
in
smi ssio n capacity, suc h as whe n org
calls thro ugh an inte gra ted serv ices PBX. anis atio ns mak e voice a nd dat a
13. Differentiate (any three):
I. Peer-t~-peer and s~rver based
network.
Ans. . D~fference between Peer-to-Peer
Th_e prim ary diffe~ence be~ een the
and Client-Server Networ.k
1sta nd se two term s is that , in a pee r-to -pe
for ass nce a deh ver serv ices . While er netw ork , eve ry nod e can ask
in a clie nt-s erv er net wor k the clie
the serv er nod e ans wer s wit h ass\ nt nod es dem and serv ices and
peer-to-peer net wor ks: stance., Let 's find out som e maj or'
differences bet wee n clie nt-s erv er
and
s.No. Peer-to-Peer Network
1. Client..Server Network
When it comes to the peer-to-peer
netw ork, both When it comes to a client-serve
clients a nd servers are not distinID}ish r network, clients
ed. and servers are distinguished beca
use of the
2. distinctive serv ers and clients present.
It majorly concentrates on the connect
ivity part.
It majorly concentrates on sharing the
3. Here,. eveiy.peer stores its own data. information.
Here, we mainly prefer the centrali
sed server to
keep the data.
4. In _the case of a _peer-to-peer network,
every node In the case of the client-s
can accomplish bot h request and .resp erver network, the server
onse. replies to the services which are asked
by the client.
5. The peer-to-~eer network is affordab '
le as compared the client-server network is expensive as
• to the client-server network. compared
to the peer-to-peer network.
6. They are comparatively less stable.
They.are a more s.table network form.
7. It is mostly preferred for sho rt netw
orks. These can be used both in small and larg
e networks.
II. Connectiqnless and connection
-orien ted services.
Ans. Ref er to Unit-IV, Sec-B, Q.8. (Pa ge
no. 98)
III. Hub and switches. .
.
1 Ans. Difference between Hub and Switch
, Hub and swi tch are the net wo rk con
nec ting devices, bot h hel p to con
at the physical lay er and tran smi ts the sign nec t var iou s devices. Hub wor ks
al to the por t. S~ tch rou te the info
network. Let 's find out the diff ere nce bet rma tion and sen d it ov~r the
wee n hub and swi tch:
S.No. Hub
Switch
1. It functions in a physical layer.
It functions in the data link layer.
2. Switch allows packet switching. There is a separate collision domain in
the switch.
3. Hub follows bro adc ast transmission. Switch follows three, i.e. multica
st, unicast and
broadcast type transmission.
4. In Hub, half duplex transmission
technique is In switch, full duplex transmission techniqu
e is
utilised. utilised.
5. Hub doe s not allow packet filtering. Switch allows packet filtering.
.
6. There can be 4'por ts in hub.
L •
2022 (v)
{!;f,-6. Question Bank tor B.C.A
IV. Synchronous and asynchronous protocol.
Ans. Difference between Synchronous and Asynchronous
Protocol/Tran·smission .
Synchronous and asynchronous transmission are types of serial data transmission methods. Bot
transmission methods are based on clock pulses that are used for synchronisation. Let's explore som
major differences between synchronous and asynchronous transmission:
•
{.!;fr6 Question Bank tor 8.C:A.
(c) Wid e Area Ne two rk (WAN):
(i) AWAN covers a vast geographical
area, often spanning countries or con •
(ii) It connects LANs and MANs ove ti~en_ts.
r long distances using various commu
suc h as lea sed line s, sate llit e link nication technologies
(iii) WANs are used by iarg s or fibe r opt ics.
e corporations, government agenci
companies to enable communication es and telecommunicatj
and data exchange between remote
(d) Global Are a Ne two locations. • ons
rk (GAN):
(i) A GAN is an ext ens ion of WA
N and cov ers the ent ire glo be.
(ii) It util ises inte rco nne cte d
WANs,
provide worldwide connectivity. sat elli te link s and oth er com mu nic atio n inf
•
(iii) GANs are use d by mu ltin rastructures to
atio nal cor por atio ns, int ern atio
enable global communication and dat nal org ani sat i nd •
a exchan
ge. . on a the internet to
S. Compare byte-oriented ver sus
bit -or ien ted protocols.
Ans. Fol low
. ing are th_e com par iso n bet we en byt
e-o rie nte d and b't-
1 one • nte d protocols.
S.No. Basis of difference Byte-Or-iented Protocol
·t
1. Data uni Op era te on byt es (8 bits). Bit-Oriented Protocol
2. Transmission e_fficiency Operate on indiVidual b'ts
3. Overhead Less efficient for bit-level operati 1
Typ' ons. •
ically have hig her overhead due More efficient for bit•level•op •
to byte alig nm ent and framing. Lower overhead due toeratid'ons
• •
4. • lati
manipu lrect
Syn chr oni sati on on of bits.
Often req uire byt e alignment
synchronisation. for S h
• ync ronisation is typically done at
5. Flexibility. the bit level.
Less fle~ible •fpr ha~dling individ
ual More flexible
bits . for handling. individual
6. · Exa mp les b'its.
E_thernet, TCP /IP.
HDLC (High-Level Data tink Control)
.PPP (Point-to-Point Protocol), USB
(Universal Serial Bus).
Section-B
(Short.Answer Questions)
Note: Attempt any tw o questio~s
out of the following three questions.
7 .S marks. Short answer is required Each question carries
not exceeding-200 words.
6. What are the approaches used· • (7.S x 2 = 15)
to provi~e a range of Quality of Servic
. Ans. Ser ver a\ app roa ches are use d to provide a range <if Qualit e {QoS)?
an d tel eco mm uni cat ion s system y of Service (QoS) in computer networks
s. These approaches aim to prioritise
allocate resources efficiently and ens certain types of traffic over others,
ure that performance requirements are
Following are some common approa met.
(a} Traffic Pr ior che s: •
itis ati on : Prioritising different typ
es of traffic based on their importance
characteristics. This can be ach or
ieved through techniques such a
(DiffServ)or Class-Based Queuing .Differentiated Services
(CBQ), where packets are classified
into different classes
and given prefer.ential tre atm
(b} Quality of Ser vic e Parameteent based on their class. . , h as
rs: Defining and enforcing specific
minimum bandwidth guarantees parameters for QoS, sue
maximum latency or jitter thresholds
This can be done through Servic'e and packet loss rate~
Level Agreements (SLAs) between net k viders an
customers, where specific QoS par wor pro
ameters are agreed upon and guaran
teed•
.2023 (II)
computer Network
f (c) Trame Shaping and Policing: Regulating the flow of traffic to ensure that
it conforms to
• specified QoS requirements. Traffic shaping involves smoothing out traffic flows
to prevent
.: ... congestion and meet performance goals, while traffic policing involves enforc
ing traffic limits
and dropping or marking pack~ts that exceed those limits. . •
(d) Resource Reservation: Reserving netwo rk resources (such as .bandwidth,
buffer sp_ace or
• processing capacity) in advance for specific types of traffic or applications. This
can be done
through protocols like Resource Reservatio~ Protocol (RSVP) or by using dedica
ted ~hannels
or virtual circuits for high-priority traffic. •
(e) Congestio~ Control~ Implementing mechanisms to detect and alleviate
congestion in the
netwo rk This can include techniques such as Random Early Detection (RED), which
proactively
drops packets before congestio~ becomes s_erve~e or Explicit Congestion Notific
ation (ECN),
which signals congestion to endpoints so ~hey·c~n adjust their transmission rates.
(f) Multiprotocol Label Switching (MPLS): MPLS is a technique used to efficien
tly route traffic.
• based· on labels rather than traditional IP ·addresses. It allows for the creatio
• n of Virtual
~rivate Netwo r~ (VPNs) with guaranteed QoS by assigning different labels to
packets and
• forwarding them along pre-defined paths. •
(g) Appllcation:..Layer QoS: Optimising.- a:pplicatiori performance • by implem
enting QoS
mechanisms at the application' layer. This can include techniques· such as adaptiv
e streaming
for vi~eo or au~io applicatio.ns; where the q~allty of the media_is adjusted.dynamically
~ased
on available netwo rk resources and client capabilities. •
7. Brief about·tiie ~inportance of Simple Network M~ag emen t Protocol (SNMP
.
).
Ans. .Simple Netwo rk Manag ement Protoc ol (SNMP )
.
. . . .
network devices, ensuring the smooth operation of compu
plays
.
a crucial
. . .
role·il) manag ing and monitoring
ter n~tworks. Following are the importance of
SNMP:
(a) Cen~ ised Network Management: SNMP allows for ·centralised management
of network
device·s, including routers, switches, servers, printer s and other-network-enabl
ed devices.
By providing a standar~ised framework for monitoring. an~ controlling
these devices, SNMP
simplifies network a_~ministration and tro~bleshootiilg tasks. ••
(b) Real-time Monitoring: SNMP enables real-time monitoring of network perform
ance, health
and status.
. Network ·administrato
. rs can use SNMP to collect....
-information such as bandwidth
utilisation, CPU and memory usage, interface status; error rates and device
availability.
This data helps identify and resolve issues promptly, minimising down'tihle and
optimising
network performance. . .
( c) Proactive Problem Identification: SNMP facilitates proactive problem
identification by
. generating alerts and notifications ~ased on predefined thresholds or conditi
ons. Netw~rk
administrator can configure SNMP agents on devices to send traps or alerts when
specific
events occur, such as interface errors, high CPU utilisation or device failures. This
allows 'for
• timely intervention .and troubleshooting before issues escalate~
(d) ~emot e Co~ftguratlon and· Management: SNMP s~pports remote config
uration and
management of network devices, allowing administrators. to modify device setting
s, update •
firmware or perfo ~ di_agnostic tests from a central . manag~ment station. This
remote
management capability is particularly valuable for distributed or geographicall
y dispersed
networks~ reducing is particularly • valuable for distributed or geographicall
y dispersed .
networks, reducing the need for physical access to individual devices.
• ..
2023 (Ill)
.c
computer Network
.
Congestion Control Techniques in Computer Network ,
Congestion control in compute r networks is crucial for ensuring efficient data transmission and
preventing network congestion, w~ich can le~d to packet loss, ~ncreased latency and reduced throughput.
There'-are ·several congestion control techniques employed 1n compute r networks, each with its own
mechanisms and approaches. Some of the key congestion control techniques are:
,., -: . (~) Window-based Congestion C~ntrol: TCP (Transmission Control Protocol) uses a window-based
congestion control mechanism to t'egulate the amount of data a sender can transmit before receiving an
. acknowledgement fr~m the receiver. !~P employs several congestion control algorithms, such as slow
•sUlrt, congestion avoidance, fast ret~an~mit and fast recovery. . ,.
(b) Explicit Congestion Notification (E~N): ECN is a congestion avoidance mechanism that allows ·
routers to notify endpoints about impendi_~g congesti.on before packet loss occurs. This is achieved by
. ~etting a bit in the IP header to signal congest~on to the sender. When a router detects congestion, instead
of dropping packets, it marks them with ~he E~N bit. Upon receiving an ECN- marked packet, the sender
reduces its transmission rate to alleviate congestion.
(c) Random Early Detection (RED):· RED i& a proactive congestion avoidance mechanism
• i~pleme nted in r~uters. It monitors the queue length and selectively drops or marks packets before
the queue bec?mes co~gested by dropping or marking packets randomly_when the queue approaches
•a certain threshold, RED e~courages ·TCP senders to _reduce th~ir transmis sion ~ates before congestion
beco·mes severe.
. . .. .
(d) Traffic Policing and S~aping: Traffic; policing and shaping techniques are used to regulate the
flow of traffic entering or.leaving a ~etwork- Policing involves monitoring the rate of incom~g traffic
. and dropping. packets that exceed pr~defined thresholds, while shaping involves buffering and delaying
.
excess,traffic. to
.
bring
.
in the line with the desired traffic profile.
.
• (e) Quality of Service (QoS): QoS mechanisms pfioritise· certain types of traffic over others
based on predefined criteria such· as packet classification, bandwid th requirem ents and Service Level •
Agreements (SLAs). Differentiated Services (Diff$erv) artd Integrated Services (IntServ)
QoS architectures used to prQvide
are two common
. . ..
different
. levels of service to network traffic. . •
(f) Load Balancing: Load b_alancing distributes network traffic across multiple paths or links
to prevent congesti_on on any single path. It. optimises ~esource utilisation and improves network
performance by evenly distributing the traffic load. • •
13. W~te short notes on any three:
(a) ISDN
I