BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Size: px
Start display at page:

Download "BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS"

Transcription

1 BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry equal marks Time: TWO hours Answer any Section A questions you attempt in Answer Book A Answer any Section B questions you attempt in Answer Book B The marks given in brackets are indicative of the weight given to each part of the question. Only non-programmable calculators are allowed in this examination. Section A Answer Section A questions in Answer Book A S O L U T I O N S A1. This question is about the features and operation of Asynchronous Transfer Mode (ATM) which has seen widespread adoption within the Universal Mobile Telecommunication System, 3 rd generation mobile phone networks. a) Show by means of a diagram, the cell format using within an ATM network. (5 marks)

2 1 octet Generic Flow Control Virtual Path identifier Virtual Path identifier Virtual Channel identifier Virtual Channel Identifier Virtual Channel identifier Payload Type CLP Header Error Control 5 octets Information Field (48 octets) (Marking scheme: 1 for a 5 octet header; 1 for 48 octet payload; 1 for Virtual Path identified; 1 for Virtual Channel identifier; 1 for Header Error Control) b) What is the difference between a Virtual Path and a Virtual Channel? (5 marks) A virtual channel defines a single point to point connection, identified by its virtual channel identifier (VCI). A virtual path however, is a bundle of virtual channels that share the same end-point. Hence, a virtual path can be considered as a container that contains several virtual channels. Each virtual path is identified by its unique virtual path identifier (VPI). (Marking scheme: 2 for the VC, 3 for the VP) c) When a connection is established over an ATM network a process called Connection Admission Control is used to ensure that the network is able to provide the required quality of service. Briefly explain how this process works and explain how a quality of service requirement is specified using a traffic contract. (6 marks) When an end-station wishes to establish an ATM connection it must issue a call request message that identifies the remote end of the connection and also the quality of service required from the connection. Each ATM switch on receiving this request will determine if it

3 has the resources to support such a connection. If it can then the request is passed onto the next switch along the route and so on until it reaches the intended destination. If any switch is unable to commit the necessary resources then the connection will fail. This process is called connection admission control. When requesting a connection the desired quality of service is defined within a traffic contract which forms part of the CAC process. This traffic contract will define a range of traffic parameters that define characteristics such as the peak cell rate, the cell delay variation tolerance, sustainable cell rate, maximum burst size etc. (Marking scheme: 1 for the fact that the connection request specifies the QoS required, 2 for the fact that switches check the request against the resources they have reserve capacity as required, 1 for the fact that the connection will fail if any switch cannot support the request, 2 marks for examples of typical traffic characteristic parameters) d) Explain the purpose and function of the ATM Adaptation Layer type 5 (AAL5) protocol. (9 marks) The lower layers of the ATM protocol suite are responsible for the transmission of the 53 octet ATM cells. At the higher layer we have the applications between transported over the network. Hence, there is a requirement in the middle to convert the application to and from an ATM cell stream. This is the function of the AAL layer. The AAL protocols are end to end protocols and hence, only present in the end-stations. The basic function of AAL5 is: to provide a way for variable bit rate, connectionless applications to send and receive data over an ATM network; to accept data from higher layer protocols (typically IP) and map this onto a stream of 53 octet cells; to Receive ATM cells and combine these into data structures that are acceptable to the higher layer protocol, i.e. convert an ATM cell stream back into an IP datagram; to ensure the delivery of each higher layer protocol message (IP datagram) by inserting an error check sequence (CRC) into a trailer that is added into the last ATM cell of the combined cell stream. This will allow lost cells to be detected and that in turn would result in deletion of the whole higher layer protocol message. (Marking scheme: 1 for AAL being between higher layer protocols and ATM cell layer; 1 for AAL being present in the end stations only, 1 for AAL5 being for variable bit rate, connectionless applications; 2 for mapping higher layer (IP datagram) onto a cell stream; 2 for reassembly of that cell stream, 2 for additional of a CRC in a trailer field to detect any transmission errors)

4 A2. This question is about physical layer transmission systems. a) A transmission system uses a data coding scheme that defines a symbol as a voltage that can have one of sixteen possible values. If the system operates at a transmission rate of 400 symbols per second, determine the data rate measured in: i) baud; (2 marks) Baud is defined as the number of symbols per second. Therefore if the system transmits at 400 symbols per second then the data rate is also 400 baud. (Marking scheme: 1 for Baud = 1 symbol per second, 1 for 400 baud) ii) bits per second. (4 marks) A symbol is a voltage level that can have one of 16 possible values. Sixteen levels can be represented by 4 bits. Therefore one symbol represents 4 data bits. If each symbol represents 4 bits then the transmission rate in bits per second will be 400 x 4 = 1600 bits per second. (Marking scheme: 2 for determining each symbol represents 4 bits and 2 for 1600 bits per second) b) Show by means of a diagram how a logic 1 and a logic 0 is represented by using Manchester encoding. (4 marks) (Marking scheme: 2 for the logic 1 encoding, 2 for the logic 0 encoding. The key feature is that there is a transition in the centre of the bit. Half marks if the transitions are the other way up.)

5 c) Show by means of a diagram how the bit sequence, would be transmitted using Manchester encoding. (4 marks) (Marking scheme: 0.5 for each bit. Important that a transition occurs within the centre of each bit with additional transitions where subsequent bits have the same value.) d) Wide Area Network (WAN) encapsulation protocols are used when connecting a router to an externally provided WAN service. These protocols are based on the High Level Data Link Control (HDLC) in which each message starts and ends with the unique flag sequence of In order to prevent this flag sequence from occurring at other parts of the message, a process known as zero bit insertion, or bit stuffing is used. By considering the transmission of the following 5 message data bytes show by means of a diagram how zero bit insertion is used when transmitting this message (9 marks) With zero bit insertion, when five consecutive 1s are detected then an additional zero bit is inserted in the data stream as shown below. Note that the transmitted bytes must be considered as a continuous data stream. (Marking scheme: 1 for knowing that zero bit insertion means adding logic 0s into the data stream; 2 for knowing that this must be done after 5 consecutive logic 1s; 2 for noting that a 0 needs to be inserted within byte 2; 2 for knowing that a 0 has to be inserted within byte 3 and 2 for byte 5 as shown above.)

6 e) When transmitting the data sequence shown in part (d), how many bits in total have to be sent? (2 marks) Note that an additional 3 logic 0s have had to be inserted. This means that (8x5) + 3 bits need to be sent = 43 bits. (59 when including the start and end flags) (Marking scheme: 1 for 43 and 1 mark for 59) A3. This question is about the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). a) Both the TCP and UDP protocols use port numbers. What are these port numbers used for and what is meant by the term well known port? (6 marks) Both TCP and UDP provide services to higher layer protocols however multiple higher layer protocols can be multiplexed onto a single UDP or TCP layer. Each of these higher layer protocols are then differentiated by means of UDP/TCP port numbers. Port numbers are 16 bits in length. Therefore the port number identifies the particular higher layer protocol to which a given data stream is destined. Some of these port numbers are pre-defined and are therefore referred to as "well known ports", for example port 80 refers to the higher layer http protocol. (Marking scheme: 2 for recognising that port numbers are 16 bits in length; 2 for knowing that they identify the higher layer protocol to which the data stream is destined, 2 for explaining what a well known port is) b) For each of the following applications determine whether you would use TCP or UDP and explain the reasons for your choice. i. File transfer This should be TCP The reason is that you want a file to be transmitted in its entirety without any errors, therefore the error detection and correction properties of TCP are needed. (Marking scheme: 1 mark for protocol selection; 2 marks for reason) ii. Watching a real time streamed video This should be UDP. The reason is that when watching a movie, delay is critical and therefore there simply isn't any time to seek the retransmission of any errors. The simplicity of UDP is therefore required.

7 (Marking scheme: 1 mark for protocol selection; 2 marks for reason) iii. Web browsing This should be TCP The reason is that web pages need to be delivered without error so that all content is properly formatted and presented. Therefore the error detection and correction properties of TCP are needed. (Marking scheme: 1 mark for protocol selection; 2 marks for reason) iv. A Voice over IP (VoIP) telephone conversation This should be UDP. The reason is that a telephone conversation has strict timing requirements for the transfer of data and seeking the retransmission of any errors would introduce too much delay. Therefore the simplicity of UDP is needed. (Marking scheme: 1 mark for protocol selection; 2 marks for reason) (4 x 3 = 12 marks) b) By considering the operation of the TCP protocol, briefly explain how it is able to overcome errors in the transmission and ensure that data is transferred reliably over a network. (7 marks) The following process is followed: Every octet transmitted through TCP is uniquely identified by a 32 bit sequence number which increases by one for each new octet. Data is transmitted and acknowledged by the receiving end station. Acknowledgements are identified by means of the ACK bit and acknowledgement number within the TCP header. A positive acknowledgement is indicated by virtue of the fact that the ACK bit is set and then the acknowledgement number will indicate the number of the first nonacknowledged octet. In other words all octets up to an including acknowledgement number -1 have been successfully received. If data is corrupted or lost in transit then this must be detected by the transmitter. If an acknowledgement has not been received within a given time determined by a timer then the transmitter simply sends the data again. It is the responsibility of the receiver to ignore any duplicates it receives. Hence, the transmitter will continue re-sending data until a positive acknowledgement is received. (Marking scheme: 1 for knowing that each octet is uniquely identified by a sequence number; 2 for the acknowledgement using an ACK bit and the operation of the acknowledgement number; 2 marks for ACK timeout at the transmitter and 2 marks for resending until a positive ACK is received)

8 Section B Answer Section B questions in Answer Book B S O L U T I O N S B4. This question is about IPv4 addressing. a) In classful addressing, the IP address space is divided into 5 classes. Indicate the classes of each of the following address expressed in binary. Indicate how the class was identified (8 marks) In the binary notation, the first few bits can immediately tell us the class of the address: Class A starts in 0 Class B starts in 10 Class C starts in 110 Class D starts in 1110 Class E starts in 1111 Therefore the address given are: Class A Class C Class B Class E (Marking scheme: 2 marks per address correctly identified, 8 marks in total) b) A host was given the /27 IP address, indicate: The network address to which the host belongs. The network broadcast address to which the host belongs. The total number of hosts available in the network (6 marks)

9 If we apply the AND function to the binary representation of the IP address and the network mask ( ) we will obtain the network address: Network address: The broadcast address is represented by putting as 1s all the bits belonging to the host portion: The total number of hosts is given by the following formula: 2 n 2, where n represents the number of bits available in the host portion. In this case n = 5, which means that we have hosts or 30. (Marking scheme: 2 marks per correct answer) c) Describe the concept of classless addressing, indicating the reason why it was proposed and providing an example of a classless IP address. (5 marks) With the growth of the Internet, it was clear that a larger address space was needed as a long-term solution. The larger address space, however, requires that the length of IP addresses to be increased, which means the format of the IP packets needs to be changed. Although the long-range solution has already been devised and is called IPv6, a short-term solution was also devised to use the same address space but to change the distribution of addresses to provide a fair share to each organization. The short-term solution still uses IPv4 addresses, but it is called classless addressing. In other words, the class privilege was removed from the distribution to compensate for the address depletion. (Marking scheme: 2 marks for describing the concept, 2 for the reason why it was proposed and 1 for the example) d) Considering classes addressing, an organization is granted a block of addresses with the beginning address /24. The organization needs to have 3 subblocks of addresses to use in its three subnets as shown below: One subblock of 120 addresses. One subblock of 60 addresses. One subblock of 10 addresses. Indicate the network IP address and the subnet mask for each of the subblocks. (6 marks) For 120 addresses we need 7 bits in the host portion, therefore the network address is: /25, leaving /25 available for other networks. For 60 addresses we need 6 bits in the host portion, therefore the network address is: /26, leaving /26 available for other networks. For 10 addresses we need 4 bits, therefore the network address is /28 leaving 3 more subblocks of 14 hosts each available.

10 (Marks: 2 marks per correct answer) B5. This question concerns wireless local area networks (WLAN) technology and IEEE standards. a) The data link layer in the IEEE standard is divided into two sublayers: LLC and MAC. Indicate the functions performed by each sublayer. (5 marks) Logical Link Control: handles framing, flow control, and error control. Media Access Control: defines the access method and the framing format specific to the corresponding LAN protocol. (Marking scheme: 1 mark per correct function in each sublayer) b) Draw the flow diagram of the Carrier Sense Multiple Access/Collision Avoidance mechanism used by (CSMA/CA). (6 marks) (Marking scheme: 2 marks for the back off mechanism, 2 marks for the persistent strategy, 2 marks for the collision detection mechanism) c) Indicate at least the reasons why CSMA/CD cannot be implemented by Wireless LANs. (6 marks) For collision detection a station must be able to send data and receive collision signals at the same time. This can mean costly stations and increased bandwidth requirements. Collision may not be detected because of the hidden station problem. We will discuss this problem later in the chapter. The distance between stations can be great. Signal fading could prevent a station at one end from hearing a collision at the other end.

11 (Marking scheme: 2 marks per reason given) d) The IEEE addressing mechanism specifies four cases, defined by the value of the two flags in the FC field, ToDs and FromDS. Explain the values those flags could take and the values the different addresses should take. Use the following table to provide your answer: (8 marks) ToDS FromDS Address 1 Address 2 Address 3 Address Destination Source BSS ID N/A 0 1 Destination Sending AP Source N/A 1 0 Receiving AP Source Destination N/A 1 1 Receiving AP Sending AP Destination Source (Marking scheme: 1 mark per correct cell value) B6. This question is about the concept of Quality of Service (QoS). a) Traditionally, four types of characteristics are attributed to a flow: reliability, delay, jitter, and bandwidth. Briefly explain how each concept is related to QoS. (8 marks) Reliability is a characteristic that a flow needs. Lack of reliability means losing a packet or acknowledgment, which entails retransmission. However, the sensitivity of application programs to reliability is not the same. For example, it is more important that electronic mail, file transfer, and Internet access have reliable transmissions than telephony or audio conferencing. Source-to-destination delay is another flow characteristic. Again applications can tolerate delay in different degrees. In this case, telephony, audio conferencing, video conferencing, and remote log-in need minimum delay, while delay in file transfer or e- mail is less important. Jitter is the variation in delay for packets belonging to the same flow. For example, if four packets depart at times 0, 1, 2, 3 and arrive at 20, 21, 22, 23, all have the same delay, 20 units of time. On the other hand, if the above four packets arrive at 21, 23, 21, and 28, they will have different delays: 21, 22, 19, and 24. For applications such as audio and video, the first case is completely acceptable; the second case is not. For these applications, it does not matter if the packets arrive with a short or long delay as long as the delay is the same for all packets. For this application, the second case is not acceptable. Jitter is defined as the variation in the packet delay. High jitter means the difference between delays is large; low jitter means the variation is small. Different applications need different bandwidths. In video conferencing we need to send millions of bits per second to refresh a colour screen while the total number of bits in an may not reach even a million.

12 (Marking scheme: 2 marks per explanation) b) Briefly explain the concept of RSVP and the three reservation styles defined by RSVP. (8 marks) In the Integrated Services model, an application program needs resource reservation. This means that if we want to use IntServ at the IP level, we need to create a flow, a kind of virtual-circuit network, out of the IP, which was originally designed as a datagram packet-switched network. A virtual-circuit network needs a signalling system to set up the virtual circuit before data traffic can start. The Resource Reservation Protocol (RSVP) is a signalling protocol to help IP create a flow and consequently make a resource reservation. When there is more than one flow, the router needs to make a reservation to accommodate all of them. RSVP defines three types of reservation styles: Wild Card Filter Style In this style, the router creates a single reservation for all senders. The reservation is based on the largest request. This type of style is used when the flows from different senders do not occur at the same time. Fixed Filter Style In this style, the router creates a distinct reservation for each flow. This means that if there are n flows, n different reservations are made. This type of style is used when there is a high probability that flows from different senders will occur at the same time. Shared Explicit Style In this style, the router creates a single reservation that can be shared by a set of flows. (Marking scheme: 2 marks per description of RSVP, 2 marks per style) c) Describe two problems with Integrated Services (4 marks) Scalability. The Integrated Services model requires that each router keep information for each flow. As the Internet is growing every day, this is a serious problem. Service-Type Limitation. The Integrated Services model provides only two types of services, guaranteed and control-load. Those opposing this model argue that applications may need more than these two types of services. (Marking scheme: 2 marks per problem) d) Briefly explain the concept of Differentiated Services and one of the per-hop behaviours specified by it. (5 marks) Differentiated Services (DS or Diffserv) was introduced by the IETF (Internet Engineering Task Force) to handle the shortcomings of Integrated Services. Two fundamental changes were made: 1. The main processing was moved from the core of the network to the edge of the network. This solves the scalability problem. The routers do not have to store information about flows. The applications, or hosts, define the type of service they need each time they send a packet.

13 2. The per-flow service is changed to per-class service. The router routes the packet based on the class of service defined in the packet, not the flow. This solves the service-type limitation problem. We can define different types of classes based on the needs of applications. The Diffser model defines three per-hop behaviours (PHBs) for each node that receives a packet. DE PHB. The DE PHB (default PHB) is the same as best-effort delivery, which is compatible with TOS. EF PHB. The EF PHB (expedited forwarding PHB) provides the following services: Low loss Low latency Ensured bandwidth This is the same as having a virtual connection between the source and destination. AF PHB. The AF PHB (assured forwarding PHB) delivers the packet with a high assurance as long as the class traffic does not exceed the traffic profile of the node. The users of the network need to be aware that some packets may be discarded. (Marking scheme: 3 marks for explaining DiffServ and 2 marks for explaining one of the PHBs.

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT APRIL 2013 COMPUTER NETWORKS EXAMINERS REPORT

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT APRIL 2013 COMPUTER NETWORKS EXAMINERS REPORT BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT APRIL 2013 COMPUTER NETWORKS EXAMINERS REPORT General Comments This session is again like the last September

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

CS413: Computer Networks

CS413: Computer Networks CS413: Computer Networks 2005 Fall Term Midterm Exam Solution Student ID: Name: Problem No. Marks Your Marks 1 16 2 5 3 5 4 7 5 4 6 7 7 3 8 3 Total 50 1 [Marking schemes are given in blue color and the

More information

QoS in Axis Video Products

QoS in Axis Video Products Table of contents 1 Quality of Service...3 1.1 What is QoS?...3 1.2 Requirements for QoS...3 1.3 A QoS network scenario...3 2 QoS models...4 2.1 The IntServ model...4 2.2 The DiffServ model...5 2.3 The

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

Chapter 2 NETWORK LAYER

Chapter 2 NETWORK LAYER Chapter 2 NETWORK LAYER This chapter provides an overview of the most important and common protocols associated with the TCP/IP network layer. These include: Internet Protocol (IP), Routing protocols Routing

More information

DIN 2012 Tutorial. physical links between primary and secondary stations: Synchronous Connection Oriented (SCO); Asynchronous Connection Link (ACL).

DIN 2012 Tutorial. physical links between primary and secondary stations: Synchronous Connection Oriented (SCO); Asynchronous Connection Link (ACL). DIN 2012 Tutorial (Q1a) In the IEEE 802.15 standard (Bluetooth), describe the following two types of : physical links between primary and secondary stations: (i) (ii) Synchronous Connection Oriented (SCO);

More information

920-803 - technology standards and protocol for ip telephony solutions

920-803 - technology standards and protocol for ip telephony solutions 920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the

More information

Protocol Architecture. ATM architecture

Protocol Architecture. ATM architecture Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode: ATM 1990 s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated,

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols IP Version 4 The most commonly used network layer protocol is IP, or the Internet Protocol. As its name would indicate, IP is the protocol used on

More information

Module 6. Internetworking. Version 2 CSE IIT, Kharagpur

Module 6. Internetworking. Version 2 CSE IIT, Kharagpur Module 6 Internetworking Lesson 2 Internet Protocol (IP) Specific Instructional Objectives At the end of this lesson, the students will be able to: Explain the relationship between TCP/IP and OSI model

More information

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions 1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Introduction to Networking S Y STEMS

Introduction to Networking S Y STEMS Introduction to Networking CS 40: INTRODUCTION TO U NIX A ND L I NUX O P E R AT ING S Y STEMS Objectives Introduce networking, including what it is and what it contains, which includes: Networking layers

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches?

6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? TUTORIAL 2 (EKT 332) 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? Why broadcast network? -The computers in a LAN are separated by a short

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Circuit vs. Packet Switching

Circuit vs. Packet Switching Circuit vs. Packet Switching 1 Taxonomy of Switched Wide Area Networks WAN Telecommunication Systems intelligent core dumb nodes Circuit-Switched Networks (e.g. telephone networks) dumb core intelligent

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

CHAPTER 2. QoS ROUTING AND ITS ROLE IN QOS PARADIGM

CHAPTER 2. QoS ROUTING AND ITS ROLE IN QOS PARADIGM CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Telecommunication Systems

Telecommunication Systems PUF-HCM Master Informatics Telecommunication Systems RTEL 1 Team teaching Responsible Team: Email Rami Langar Rami Langar (Courses) Su Tam Nguyen (TD) Rami.Langar@lip6.fr guitar1911@yahoo.com RTEL 2 Organisation

More information

Tutorial Questions EG/ES The tutorial questions illustrate the style of examination questions for EG/ES 3567.

Tutorial Questions EG/ES The tutorial questions illustrate the style of examination questions for EG/ES 3567. The tutorial questions illustrate the style of examination questions for EG/ES 3567. The paper will be of 3 hours duration, and each student should attempt four questions during this time. You should aim

More information

VoIP network planning guide

VoIP network planning guide VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead

More information

Asynchronous Transfer Mode

Asynchronous Transfer Mode CHAPTER 15 Asynchronous Transfer Mode Background Asynchronous Transfer Mode (ATM) technology is based on the efforts of the International Telecommunication Union Telecommunication Standardization Sector

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

Module 11: TCP/IP Transport and Application Layers

Module 11: TCP/IP Transport and Application Layers Module 11: TCP/IP Transport and Application Layers 11.1 TCP/IP Transport Layer 11.1.1 Introduction to the TCP/IP transport layer The primary duties of the transport layer are to transport and regulate

More information

18: Enhanced Quality of Service

18: Enhanced Quality of Service 18: Enhanced Quality of Service Mark Handley Traditional best-effort queuing behaviour in routers Data transfer: datagrams: individual packets no recognition of flows connectionless: no signalling Forwarding:

More information

Converged Networks. Networks

Converged Networks. Networks Converged Networks Networks From Telecom to Datacom, Asynchronous Transfer Mode () From Datacom to Telecom, Multiprotocol Label Switching (MPLS) Further Convergence Evolving Networks OPTI 500, Spring 2011,

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

IP (Internet Protocol) -Offered Services -Packet Format -ICMP

IP (Internet Protocol) -Offered Services -Packet Format -ICMP IP (Internet Protocol) -Offered Services -Packet Format -ICMP IP Communication Service Connectionless packet-oriented (or datagram) paradigm Two packets meant for the same destination may be handled in

More information

CSE 3461: Introduction to Computer Networking and Internet Technologies. Packet Switching. Presentation G

CSE 3461: Introduction to Computer Networking and Internet Technologies. Packet Switching. Presentation G CSE 3461: Introduction to Computer Networking and Internet Technologies Packet Switching Presentation G Study: 10.5, 10.6, 12.1, 12.2, 13.1, 13.2, 18.3, 18.4 Gojko Babić 10-09-2012 The Network Core mesh

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

ISO-OSI 7-Layer Network Architecture

ISO-OSI 7-Layer Network Architecture ISO-OSI 7-Layer Network Architecture This lecture introduces the ISO-OSI layered architecture of Networks. According to the ISO standards, networks have been divided into 7 layers depending on the complexity

More information

ATM. Asynchronous Transfer Mode. Networks: ATM 1

ATM. Asynchronous Transfer Mode. Networks: ATM 1 ATM Asynchronous Transfer Mode Networks: ATM 1 Issues Driving LAN Changes Traffic Integration Voice, video and data traffic Multimedia became the buzz word One-way batch Two-way batch One-way interactive

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the

More information

DigiPoints Volume 1. Student Workbook. Module 12 Asynchronous Transfer Mode

DigiPoints Volume 1. Student Workbook. Module 12 Asynchronous Transfer Mode Asynchronous Transfer Mode Page 12.1 DigiPoints Volume 1 Module 12 Asynchronous Transfer Mode Summary This last chapter of, covers ATM, and provides an end-to-end data communications model that draws on

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Quality of Service (QoS)) in IP networks

Quality of Service (QoS)) in IP networks Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

USN 06EC71 Seventh Semester D.E. Degree Examination, December 2010 Computer Communication Networks Time: 3 hrs. Note: Answer any FIVE full questions, selecting at least TWO questions/rom each part. Max.

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

ATM vs Gigabit Ethernet

ATM vs Gigabit Ethernet ATM vs Gigabit Ethernet (Research Essay #2) Seok Bum Ko kosby@ele.uri.edu ELE548 Computer Architecture 5 March, 1999 1. Introduction In the past several years, Local Area Networks have evolved from simple

More information

Distributed Systems 3. Network Quality of Service (QoS)

Distributed Systems 3. Network Quality of Service (QoS) Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

The OSI Reference Model and What the Protocols do

The OSI Reference Model and What the Protocols do The OSI Reference Model and What the Protocols do Contents OSI Reference model Protocols and services, the difference Protocol stacks and implementations What services protocols provide Layered Protocols

More information

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Voice over IP. Presentation Outline. Objectives

Voice over IP. Presentation Outline. Objectives Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester

More information

Packet Switched Networks

Packet Switched Networks Packet Switched Networks Acknowledgements These Slides have been adapted from the originals made available by J. Kurose and K. Ross All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights

More information

TCP/IP and OSI model. TCP/IP Protocol (2) B.2

TCP/IP and OSI model. TCP/IP Protocol (2) B.2 TCP/IP Protocol TCP/IP Transmission Control Protocol/Internetworking Protocol (TCP/IP) standard for the Internet five layers = physical = data link = network = transport = application B.1 TCP/IP and OSI

More information

TCP/IP Tutorial. Transmission Control Protocol Internet Protocol

TCP/IP Tutorial. Transmission Control Protocol Internet Protocol TCP/IP Tutorial Transmission Control Protocol Internet Protocol 1 TCP/IP & OSI In OSI reference model terminology -the TCP/IP protocol suite covers the network and transport layers. TCP/IP can be used

More information

Switched Multimegabit Data Service

Switched Multimegabit Data Service CHAPTER 14 Switched Multimegabit Data Service Background Switched Multimegabit Data Service (SMDS) is a packet-switched datagram service designed for very high-speed wide-area data communications. SMDS

More information

SONET/SDH. the current standard for high speed carrier infrastructure in North America. the European counterpart (closely related).

SONET/SDH. the current standard for high speed carrier infrastructure in North America. the European counterpart (closely related). SONET/SDH SONET/SDH! SONET (Synchronous Optical Network) is the current standard for high speed carrier infrastructure in North America.! SDH (Synchronous Digital Hierarchy) is the European counterpart

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization encor! enetworks TM Version A, March 2008 2010 Encore Networks, Inc. All rights reserved. IP Quality of Service The IP Quality of Service (QoS) feature allows you to assign packets a level of priority

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Introduction OSI Model Open Systems Interconnection OSI OSI Seven Layer Model

Introduction OSI Model Open Systems Interconnection OSI OSI Seven Layer Model OSI MODEL 1 Introduction Open Systems Interconnection Basic Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design.

More information

Simulation of IP over ATM over SONET Layered Architecture

Simulation of IP over ATM over SONET Layered Architecture Simulation of IP over ATM over SONET Layered Architecture Vaibhav Shah and Girish P. Saraph Department of Electrical Engineering IIT-Bombay Mumbai-400076 {vaibhavs,girishs}@ee.iitb.ac.in ABSTRACT This

More information

TrueCircuit Technology

TrueCircuit Technology TrueCircuit Technology A fast, low cost, and adaptable way to distribute Video, Audio, Control, and Metadata via widespread IP networking technology SMPTE Presentation Pasadena, CA October 18-21, 2000

More information

Lecture Computer Networks

Lecture Computer Networks Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Asynchronous

More information

Multimedia Communications Voice over IP

Multimedia Communications Voice over IP Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony

More information

Review of Legacy LANs: IEEE 802.{2,3,5} MACs

Review of Legacy LANs: IEEE 802.{2,3,5} MACs Review of Legacy LANs: IEEE 802.{2,3,5} MACs 1 Medium Access Control Methods (MACs) Most LANs use shared transmission media. Hence need a mechanism to control access for one station at a time. Most common

More information

Multimedia Networking. Real-Time (Phone) Over IP s Best-Effort. Recovery From Jitter. Settings. up to 10 % loss is tolerable TCP instead of UDP?

Multimedia Networking. Real-Time (Phone) Over IP s Best-Effort. Recovery From Jitter. Settings. up to 10 % loss is tolerable TCP instead of UDP? Multimedia Networking Principles Classify multimedia applications Identify the network services the apps need Making the best of best effort service Mechanisms for providing QoS Protocols and Architectures

More information

8 Wide Area Network (WAN)

8 Wide Area Network (WAN) Wide Area Network (WAN).1 Introduction Objectives.2 Why need a WAN?.3 Switching Techniques.3.1 Circuit switching network.3.2 Packet switching Network.3.2.1 How Packet Switching Network Works?.3.2.2 Datagram

More information

Computer Networking

Computer Networking 5-44 5-44 Computer Networking 5-64 Virtual Circuits, MPLS, VLANs Peter Steenkiste Fall 05 www.cs.cmu.edu/~prs/5-44-f5 Outline Circuit switching refresher Virtual Circuits - general Why virtual circuits?

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

ALOHA Class of Multiple Access Protocols

ALOHA Class of Multiple Access Protocols ALOHA Class of Multiple Access Protocols ALOHA, also called pure ALOHA: Whenever a user has a frame to send, it simply transmits the frame. If collision occurs, it waits for a random period of time and

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

More information

CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE

CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE CS/ECE 438: Communication Networks Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE Introduction The Internet only provides a best effort service

More information

Lecture (03) Data Encapsulation and OSI model

Lecture (03) Data Encapsulation and OSI model Lecture (03) Data Encapsulation and OSI model By: Dr. Ahmed ElShafee ١ Agenda TCP/IP suite Data Encapsulation OSI History OSI Layers Layers function OSI & TCP/IP & NetWare Example protocols OSI Layering

More information

William Stallings Data and Computer Communications. Chapter 15 Internetwork Protocols

William Stallings Data and Computer Communications. Chapter 15 Internetwork Protocols William Stallings Data and Computer Communications Chapter 15 Internetwork Protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

IP - The Internet Protocol. Magda El Zarki Dept. of CS UC Irvine

IP - The Internet Protocol. Magda El Zarki Dept. of CS UC Irvine 1 IP - The Internet Protocol Magda El Zarki Dept. of CS UC Irvine Email: elzarki@uci.edu http://www.ics.uci.edu/~magda 2 Overview IP (Internet Protocol) is a Network Layer Protocol. Several versions most

More information

Introduction VOIP in an 802.11 Network VOIP 3

Introduction VOIP in an 802.11 Network VOIP 3 Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11

More information

Frame Relay and Frame-Based ATM: A Comparison of Technologies

Frame Relay and Frame-Based ATM: A Comparison of Technologies White Paper and -Based : A Comparison of Technologies Larry Greenstein Nuera Communications VP, Technology, Forum June 1995 June 27, 1995 i TABLE OF CONTENTS 1. PREFACE...1 2. INTRODUCTION...1 3. INTERWORKING

More information

QoS Tools in the WAN. Need for QoS on WAN Links. Need for QoS in the WAN

QoS Tools in the WAN. Need for QoS on WAN Links. Need for QoS in the WAN QoS Tools in the WAN Need for QoS on WAN Links This topic defines the need for QoS in a WAN. Need for QoS in the WAN Voice must compete with data. Voice is real-time and must be sent first. Overhead should

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Figure 5.1: Issues addressed by network layer protocols. (Figure by Forouzan)

Figure 5.1: Issues addressed by network layer protocols. (Figure by Forouzan) Chapter 5 Network Layer The main responsibility of a network layer protocol is host-to-host data delivery. In doing this, the network layer has to deal with network layer addressing, packetization and

More information

The Conversion Technology Experts. Quality of Service (QoS) in High-Priority Applications

The Conversion Technology Experts. Quality of Service (QoS) in High-Priority Applications The Conversion Technology Experts Quality of Service (QoS) in High-Priority Applications Abstract It is apparent that with the introduction of new technologies such as Voice over IP and digital video,

More information

High-Level Data Link Control

High-Level Data Link Control High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

4. MAC protocols and LANs

4. MAC protocols and LANs 4. MAC protocols and LANs 1 Outline MAC protocols and sublayers, LANs: Ethernet, Token ring and Token bus Logic Link Control (LLC) sublayer protocol Bridges: transparent (spanning tree), source routing

More information