0% found this document useful (0 votes)
87 views8 pages

Missing Answers

The document compares the TCP and UDP headers, noting that the TCP header contains sequence number, acknowledgement number, and window fields that are missing from the UDP header. These fields are absent from UDP because TCP uses acknowledgements to establish a reliable connection between client and server, while UDP is unreliable. The summary provides the key information that TCP headers contain additional fields like sequence numbers and acknowledgements that help establish reliable connections, while these fields are omitted from UDP since it does not provide reliability.

Uploaded by

Manzil Tanvir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views8 pages

Missing Answers

The document compares the TCP and UDP headers, noting that the TCP header contains sequence number, acknowledgement number, and window fields that are missing from the UDP header. These fields are absent from UDP because TCP uses acknowledgements to establish a reliable connection between client and server, while UDP is unreliable. The summary provides the key information that TCP headers contain additional fields like sequence numbers and acknowledgements that help establish reliable connections, while these fields are omitted from UDP since it does not provide reliability.

Uploaded by

Manzil Tanvir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

#Compare the TCP header and the UDP header.

List the fields in the TCP header that are missing from
UDP header. Give the reason for their absence

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are the two
standard transport layers used with internet protocol (IP). The field that are missing in the
UDP header but present in the TCP header are - The sequence number, acknowledge
number, and Window fields.The reason why the fields are absent in UDP is because TCP
uses acknowledge flags to make an established reliable connection between a client and
server.
#The following is a dump of a UDP header in hexadecimal format.
0632000DOO lCE217

i. What is the source port number?


ii. What is the destination port number?
iii. iii. What is the total length of the user datagram?
iv. iv. What is the length of the data?
v. Is the packet directed from a client to server or vice versa?
vi. What is the client process?

a. Port number 1586

b. Port number 13

c. 28 bytes

d. 20 bytes (28 – 8 byte header)

e. From a client to a server f. Daytime

#1. How are congestion control and quality of service related


The main focus of congestion congestion control and quality quality of service service is data traffic . In
congestion control we try to avoid traffic congestion . In quality of service , we try to create an
appropriate environment for the traffic. So, before talking talking about congestion congestion control
control and quality quality of service, service, we discuss discuss the data traffic traffic itself

In congestion control, the load on a network is prevented from exceeding the capacity. Quality of service
refers to the characteristics that a flow of data seeks to attain. If there is good congestion control, then
the QoS is also good and vice versa.

2. Explain how congestion is managed effectively by TCP.

To avoid congestive collapse, TCP uses multi-faceted congestion-control strategy. For each


connection, TCP maintains a CWND, limiting the total number of unacknowledged
packets that may be in transit end-to-end. This is somewhat analogous to TCP's sliding
window used for flow control.
TCP detects congestion when it fails to receive an acknowledgement for a packet within
the estimated timeout. In such a situation, it decreases the congestion window to one
maximum segment size (MSS), and under other cases it increases the congestion window by
one MSS.

What is the relationship between average data rate and peak data rate?
By definition, average rate is the average bits per second during the interval and
peak rate is the peak or the highest bits per second during that interval. The
PacketShaper keeps count of the incoming and outgoing bytes for the link as well as all
the classes

6. Give the overview of QoS methods in integrated services.


Quality of service (QoS) refers to any technology that manages data traffic to
reduce packet loss, latency and jitter on a network. QoS controls and
manages network resources by setting priorities for specific types of data on
the network.

In computer networking, integrated services or IntServ is an architecture that specifies the
elements to guarantee quality of service (QoS) on networks. IntServ can for example be
used to allow video and sound to reach the receiver without interruption.

. Explain the leaky bucket traffic shaping algorithm with state diagram and algorithm

The leaky bucket is an analogy for describing how inputs and outputs work in a
wide variety of business and technology systems. The analogy is to a physical
bucket with a hole in it: The bucket can hold water up to its maximum capacity and it
loses water at a rate determined by the size of the hole.
The leaky bucket algorithm is a method of temporarily storing a variable number of requests
and organizing them into a set-rate output of packets in an asynchronous transfer mode
(ATM) network. The leaky bucket is used to implement traffic policing and traffic shaping in Ethernet
and cellular data networks.
8. Describe thee four general techniques to improve quality of service?
The four common methods: scheduling, traffic shaping, admission control, and resource
reservation. Some techniques that can be used to improve the quality of service. The four
common methods: scheduling, traffic shaping, admission control, and resource reservation.

9. Explain Token Bucket Traffic Shaping


The token bucket is an algorithm used in packet-switched and telecommunications
networks. It can be used to check that data transmissions, in the form of packets,
conform to defined limits on bandwidth and burstiness (a measure of the unevenness or
variations in the traffic flow).
10. 0. Differentiate between leaky bucket and token bucket traffic shaping?
Slide
11. What are the factors affecting QoS parameters?
The factors affecting the QoS parameters are:
 Propagation Delay.
 Capacity of Buffer.
 Traffic Load.
 Allocation of resources.
 Architecture of switch present in network.
 Media error statistics.
11. 2. How is jitter estimated in real time traffic?
Slide

12. 3. State and explain the classification of routing protocols used in Adhoc network.
Mobile ad hoc network (MANET): An ad hoc network of mobile devices. Vehicular ad hoc
network (VANET): Used for communication between vehicles. Intelligent VANETs use artificial
intelligence and ad hoc technologies to communicate what should happen during accidents.
In ad hoc, routing algorithms are classified into nine categories namely: source-initiated
(reactive), table-driven (proactive), hybrid, hierarchical, multipath, multicast, location-
aware, geographical-multicast and power-aware

5. What is the role of a cluster head in the clustering protocol?


Cluster head collects data of sensor nodes that belongs to that cluster. Clustering
algorithms apply data aggregation techniques [8,16] which reduce the collected data at cluster
head in the form of significant information. Cluster heads then send the aggregated data to base
station.
#block diagram of typical wireless sensor node

. What do clustering protocols specify? Explaim any clustering one in detail

Clustering protocols specify the topology of the hierarchical nonoverlapping clusters of


sensor nodes. A robust clustering technique is essential for self-organizing sensor networks.
explain any one clustering protocol in detail

LEACH is a hierarchical protocol in which most nodes transmit to cluster heads, and the
cluster heads aggregate and compress the data and forward it to the base station (sink).
Each node uses a stochastic algorithm at each round to determine whether it will become a
cluster head in this round.
2.Explain Mobile Ad-Hoc Networks (MANET) and
Vehicular Ad-hoc Network (VANET). Give two significant
difference of them.
1. Mobile Ad hoc Network (MANET)  : 
MANET consists of number of mobile devices that are connected together to
form a network, without any support from an existing internet infrastructure or
any other fixed network station. It is autonomous system of nodes connected by
wireless links. In MANET the network topology may change dynamically in an
unpredictable manner since there is no fixed infrastructure and the nodes are
free to move, but each node have limited transmitting power. MANET’s are
basically peer-to-peer, multi-hop wireless network in which packets are
transmitted in store. 
2. Vehicular Ad Hoc Networks (VANET) : 
VANET is similar to MANET in terms, that is also do not need any infrastructure
for data transmission. VANET play important role in aspect of safe driving,
intelligent navigation, emergency and entertainment applications .It can be
defined as an intelligent component of transport system as vehicle are able to
communicate with each other as well as roadside base station, which are
located at critical points of the road. Example :-Intersection and Construction
Sites. 
3.What are ad-hoc networks? Mention their applications
types and unique features
Ad hoc networks are mostly wireless local area networks (LANs). The devices communicate
with each other directly instead of relying on a base station or access points as in wireless LANs
for data transfer co-ordination. Each device participates in routing activity, by determining the
route using the routing algorithm and forwarding data to other devices via this route.

Classifications of Ad Hoc Networks


Ad hoc networks can be classified into several types depending upon the nature of their
applications. The most prominent ad hoc networks that are commonly incorporated are
illustrated in the diagram below −
Ad Hoc Network Features
Ad Hoc Network Characteristics: These networks are characterized by need for low power
consumption and low levels of physical security and broadcast physical medium. Asymmetric
techniques like RSA are not to be used as are inefficient and consume too much power.

7. What is sensor network? Explain clustering in Sensor networks

A sensor network is a group of sensors where each sensor monitors data in a different
location and sends that data to a central location for storage, viewing, and analysis.
Clustering is one of the important methods for prolonging the network lifetime in wireless sensor
networks (WSNs). It involves grouping of sensor nodes into clusters and electing cluster
heads (CHs) for all the clusters

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy