Missing Answers
Missing Answers
List the fields in the TCP header that are missing from
UDP header. Give the reason for their absence
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are the two
standard transport layers used with internet protocol (IP). The field that are missing in the
UDP header but present in the TCP header are - The sequence number, acknowledge
number, and Window fields.The reason why the fields are absent in UDP is because TCP
uses acknowledge flags to make an established reliable connection between a client and
server.
#The following is a dump of a UDP header in hexadecimal format.
0632000DOO lCE217
b. Port number 13
c. 28 bytes
In congestion control, the load on a network is prevented from exceeding the capacity. Quality of service
refers to the characteristics that a flow of data seeks to attain. If there is good congestion control, then
the QoS is also good and vice versa.
What is the relationship between average data rate and peak data rate?
By definition, average rate is the average bits per second during the interval and
peak rate is the peak or the highest bits per second during that interval. The
PacketShaper keeps count of the incoming and outgoing bytes for the link as well as all
the classes
In computer networking, integrated services or IntServ is an architecture that specifies the
elements to guarantee quality of service (QoS) on networks. IntServ can for example be
used to allow video and sound to reach the receiver without interruption.
. Explain the leaky bucket traffic shaping algorithm with state diagram and algorithm
The leaky bucket is an analogy for describing how inputs and outputs work in a
wide variety of business and technology systems. The analogy is to a physical
bucket with a hole in it: The bucket can hold water up to its maximum capacity and it
loses water at a rate determined by the size of the hole.
The leaky bucket algorithm is a method of temporarily storing a variable number of requests
and organizing them into a set-rate output of packets in an asynchronous transfer mode
(ATM) network. The leaky bucket is used to implement traffic policing and traffic shaping in Ethernet
and cellular data networks.
8. Describe thee four general techniques to improve quality of service?
The four common methods: scheduling, traffic shaping, admission control, and resource
reservation. Some techniques that can be used to improve the quality of service. The four
common methods: scheduling, traffic shaping, admission control, and resource reservation.
12. 3. State and explain the classification of routing protocols used in Adhoc network.
Mobile ad hoc network (MANET): An ad hoc network of mobile devices. Vehicular ad hoc
network (VANET): Used for communication between vehicles. Intelligent VANETs use artificial
intelligence and ad hoc technologies to communicate what should happen during accidents.
In ad hoc, routing algorithms are classified into nine categories namely: source-initiated
(reactive), table-driven (proactive), hybrid, hierarchical, multipath, multicast, location-
aware, geographical-multicast and power-aware
LEACH is a hierarchical protocol in which most nodes transmit to cluster heads, and the
cluster heads aggregate and compress the data and forward it to the base station (sink).
Each node uses a stochastic algorithm at each round to determine whether it will become a
cluster head in this round.
2.Explain Mobile Ad-Hoc Networks (MANET) and
Vehicular Ad-hoc Network (VANET). Give two significant
difference of them.
1. Mobile Ad hoc Network (MANET) :
MANET consists of number of mobile devices that are connected together to
form a network, without any support from an existing internet infrastructure or
any other fixed network station. It is autonomous system of nodes connected by
wireless links. In MANET the network topology may change dynamically in an
unpredictable manner since there is no fixed infrastructure and the nodes are
free to move, but each node have limited transmitting power. MANET’s are
basically peer-to-peer, multi-hop wireless network in which packets are
transmitted in store.
2. Vehicular Ad Hoc Networks (VANET) :
VANET is similar to MANET in terms, that is also do not need any infrastructure
for data transmission. VANET play important role in aspect of safe driving,
intelligent navigation, emergency and entertainment applications .It can be
defined as an intelligent component of transport system as vehicle are able to
communicate with each other as well as roadside base station, which are
located at critical points of the road. Example :-Intersection and Construction
Sites.
3.What are ad-hoc networks? Mention their applications
types and unique features
Ad hoc networks are mostly wireless local area networks (LANs). The devices communicate
with each other directly instead of relying on a base station or access points as in wireless LANs
for data transfer co-ordination. Each device participates in routing activity, by determining the
route using the routing algorithm and forwarding data to other devices via this route.
A sensor network is a group of sensors where each sensor monitors data in a different
location and sends that data to a central location for storage, viewing, and analysis.
Clustering is one of the important methods for prolonging the network lifetime in wireless sensor
networks (WSNs). It involves grouping of sensor nodes into clusters and electing cluster
heads (CHs) for all the clusters