Wednesday, 9 July 2014

Different types of Routing methods

Different types of Routing methods:
there are four type of routing methods are there those are:
         1 Fixed
  2 Flooding
  3 Random
  4 Adaptive

       1 Fixed Routing:

1 Single permanent route for each source to destination pair
2 Determine routes using a least cost algorithm 
3 Route fixed, at least until a change in network topology


2) Flooding:
1 No network info required Packet sent by node to every neighbor
2 Incoming packets re transmitted on every link except incoming link
3 Eventually a number of copies will arrive at destination
4 Each packet is uniquely numbered so duplicates can be discarded
5 Nodes can remember packets already forwarded to keep network load in bounds
6 Can include a hop count in packets

3 Random:
Node selects one outgoing path for re transmission of incoming packet
Selection can be random or round robin
Can select outgoing path based on probability calculation
No network info needed
Route is typically not least cost nor minimum hop


 4 Adaptive:
Used by almost all packet switching networks
Routing decisions change as conditions on the network change
1Failure
Congestion
Requires info about network
Decisions more complex
Tradeoff between quality of network info and overhead
Reacting too quickly can cause oscillation
Too slowly to be relevant 

Tuesday, 8 July 2014

Segmentation vs. Fragmentationa

Segmentation vsFragmentation:

         Segmentation is basically the same as fragmentation, with a few differences:

          Fragmentation (IP layer):

      only occurs when transmitting a packet whose size is larger than the MTU of the estination network
           Any router (connecting two different network types) could theoretically fragment ackets

          Fragmentation can almost be considered an emergency practice (what to do when omething goes wrong)

    Segmentation (TCP layer):

          Occurs for all data streams, to divide the data into packets (above TCP layer data is ontinuous)


            Only the source host will segment packets

            Segmentation is a normal part of TCP’s job

    Shortest-Job-First (SJF) Scheduling with example

    Shortest-Job-First (SJF) Scheduling:

    • Associate with each process the length of its next CPU burst.Use these lengths to schedule the process with the shortest time
    • Two schemes:
      • l nonpreemptive – once CPU given to the process it cannot be preempted until completes its CPU burst
      • l preemptive – if a new process arrives with CPU burst length less than remaining time of current executing process, preempt. This scheme is know as the Shortest-Remaining-Time-First (SRTF)
    • SJF is optimal – gives minimum average waiting time for a given set of processes

    First-Come, First-Served (FCFS) Scheduling with Example

    First-come, first-served (FCFS): – sometimes first-in, first-served and first-come, first choice – is a service policy whereby the requests of customers or clients are attended to in the order that they arrived, without other biases or preferences. The policy can be employed when processing sales orders, in determining restaurant seating, on a taxi stand, etc. In Western society, it is the standard policy for the processing of most queues in which people wait for a service that was not prearranged or pre-planned.

    Example:















    Suppose that the processes arrive in the order
    P2 , P3 , P1
     The Gantt chart for the schedule is:


    • Waiting time for P1 = 6; P2 = 0; P3 = 3
    •  Average waiting time: (6 + 0 + 3)/3 = 3
    •  Much better than previous case
    •  Convoy effect short process behind long process

    Monday, 7 July 2014

    Adaptive Routing and its advantages

    Adaptive Routing:
    • Adaptive Routing used by almost all packet switching networks
    • Routing decisions change as conditions on the network change
      • Failure
      • Congestion
    • Requires info about network
    • Decisions more complex
    • Trade off between quality of network info and overhead
    • Reacting too quickly can cause oscillation
    • Too slowly to be relevant 
    Advantages of Adaptive Routing:

    1) Improved performance
    2) Aid congestion control 
    3) Complex system
    4)May not realize theoretical benefits



    What are the Properties of Flooding?

    1. All possible routes are tried
    2. Very robust
    3. At least one packet will have taken minimum hop count route
    4. Can be used to set up virtual circuit
    5. All nodes are visited
    6. Useful to distribute information (e.g. routing)

    What is flooding?


    1. No network info required
    2. Packet sent by node to every neighbor
    3. Incoming packets re transmitted on every link except incoming link
    4. Eventually a number of copies will arrive at destination
    5. Each packet is uniquely numbered so duplicates can be discarded
    6. Nodes can remember packets already forwarded to keep network load in bounds
    7. Can include a hop count in packets

    Sunday, 6 July 2014

    what are the different type of networks

    Different type of networks are :


    • LAN
    • MAN
    • WAN 

    Local Area Network(LAN): LAN is only limited space cover like one bulling, college,university and industry.we can send data very efficient to delivery on node to other. 



    Local Area Network

    Metropolitan Area Network (MAN): Metropolitan area network   is it cover only city's and big industry.


      metropolitan area network



    Saturday, 28 June 2014

    Difference in virtual packet switching and datagram switching

    Virtual Circuit Packet Switching
    1. Virtual circuits allow packets to contains circuit number instead of full destination address so less router memory and bandwidth require. Thus cost wise it is cheaper.
    2. Virtual circuit requires a setup phase, which takes time and consume resources.
    3. In virtual circuit, router just uses the circuit number to index into a table to find out where the packet goes.
    4. Virtual circuit has some advantages in
    avoiding congestion within the subnet
    Because resources can be reserved in advance, when the connection is established.
    5. Virtual circuit have some problem.
    It a router crashes and loses its memory,
    even it come back up a second later, all the
    virtual circuits passing through it will have
    to be aborted.
    6. The loss fault on communication line
    vanishes the virtual circuits.
    7. In virtual circuit a fixed path is used during
    transmission so traffic throughout the
    subnet can not balanced. It cause congestion problem.
    8. A virtual circuit is a implementation of connection oriented service.


    Datagram Packet Switching
    1. Datagram circuits allow packets to contains full address instead of circuit number so each packet has significant amount of overhead, and hence wasted band width. Thus it is costly.
    2. Datagram circuit does not require setup phase , so no resources are consumed.
    3. In datagram circuit, a more complicated procedure is required to determine where the packet goes.
    4. In a datagram subnet, congestion avoidance is more difficult.
    5. In datagram circuit if a router goes down only those user whose packets were queued up in the router at the time will suffer.
    6. The loss or fault on communication line can be easily compensated in datagram circuits.
    7. Datagram allow the router to balance the traffic throughout the subnet, since router can be changed halfway through a connection.

    CIDR Notation

    Inside the computer each address mask is stored as a 32 bit value in binary, which is then expressed in dotted octet notation.
    The new CIDR notation append a slash and the size of the mask in decimal notation:

           For example 128.10.0.0/16
    CIDR Address Block Example
    Suppose an ISP has a single Class B license 128.211.00.0.  Using a classful address scheme, he/she can only assign the prefix to one customer, who can have up to 216 host addresses.
    Using CIDR, the ISP could assign the entire prefix to a single organization by using 128.211.0.0/16
    Or he could partition the address into three pieces (two of them big enough for 2 customers with 12 computers each and the remainder available for future use.
    One customer could be assigned 128.211.0.16/28
    and the other could be assigned  128.211.0.32/28
    Both customers have the same mask size (28 bits), but the prefixes differ and each has a unique prefix.  More importantly the ISP retains most of the addresses, which can then be assigned to other customers.

    Routers and Addresses

    •Routers compare the network prefix portion of the address to a value in their routing tables.
    •Suppose a router is given a destination address, D and a pair (A,M) that 
    represents the 32 bit address and the 32 bit subnet mask.
    •To make the comparison, the router tests the logical "and" condition to set 
    the host bits of address D to zero and then compares the result with the network prefix A:

      A == ( D & M)
    •For example consider this 32 bit mask: 
      (255.255.0.0 in decimal)
    11111111 11111111 00000000 00000000
      and the network prefix (128.10.0.0 in decimal):
    10000000 00001010 00000000 00000000
    •Now consider the 32 bit destination address
     128.10.2.3 which has the binary equivalent of
    10000000 00001010 00000010 00000011
    •The logical "and" between the destination address and the address mask
     produces the result:
    10000000 00001010 00000000 00000000
    •which is equal to the prefix 128.10.0.0

    Address Masks in Networks

    How can an IP address be divided at an arbitrary boundary?

    It requires an additional piece of information to be stored with each address. This information specifies the exact boundary between the network prefix and the host suffix.
    To use classless or subnet addressing the routers must store 2 pieces of information:
    the 32 bit address and
    another 32 bit value that specifies the boundary between the prefix and suffix.
    This second value is called the called the subnet mask and 1 bits mark the network prefix and zero bits mark the host portion. This makes computation efficient.

    IP Address Classes

    IP Address Classes

    IP Addressing


    IP Addressing

    ·  Octet (8-bit) boundaries  are used to 

    partition an address into prefix and suffix

    ·  Class A, B and C are primary classes

    ·  Used for ordinary host addressing

    ·  Class D is used for multicast, a limited 

    form of broadcast

    ·  Internet hosts join a multicast group

    ·  Packets are delivered to all members of 

    group

    ·  Routers manage delivery of single packet


     from source to all members of multicast

     group

    ·  Used for MBone (multicast backbone)

    ·  Class E is reserved ( for future use)

    ·  IP software computes the class of the destination address when it receives a packet.
    ·  IP addresses are self-identifying because the class can be computed directly from the first few bits of the address
    · The first 4 (leading) bits of the address denote the class:
    –Class A begins with 0
    –Class B begins with 10
    –Class C begins with  110




    difference between circuit-switched and packet-switched networks?

    Packet Switching:
    ØIn packet-based networks,  the message gets broken into small data packets. 
    ØThese packets are sent out from the computer and they travel around the network seeking out the most efficient route to travel as circuits become available. 
    ØThis does not necessarily mean that they seek out the shortest route.

    ØEach packet may go a different route from the others

    Advantages:

    •   Security
    •   Bandwidth used to full potential
    •  Devices of different speeds can communicate
    •   Not affected by line failure (redirects signal)
    •   Availability – no waiting for a direct connection to become available
    •   During a crisis or disaster, when the public telephone network might stop working, e-mails and texts can still be sent via packet switching
    Disadvantages
    »Under heavy use there can be a delay
    »Data packets can get lost or become corrupted
    »Protocols are needed for a reliable transfer
    »Not so good for some types data streams (e.g. real-time video streams can lose frames due to the way packets arrive out of sequence)

    Circuit Switching:
     ØCircuit switching was designed in 1878 in order to send telephone calls down a dedicated channel. 
    ØThis channel remains open and in use throughout the whole call and cannot be used by any other data or phone calls.

    Advantages

    »Circuit is dedicated to the call – 
    no interference, no sharing

    »Guaranteed the full bandwidth
     for the duration of the call

    »Guaranteed quality of service
    Disadvantages

    »Inefficient – the equipment may be 
    unused for a lot of the call; if no data is 
    being sent, the dedicated line still 
    remains open.

    »It takes a relatively long time to set up
     the circuit.

    »During a crisis or disaster, the network 
    may become unstable or unavailable.
    »It was primarily developed for voice 

    traffic rather than data traffic.