Beruflich Dokumente
Kultur Dokumente
P
ROLL NO. - 520791371
ASSIGNMENT SET 2
SUBJECT - MC0075
COMPUTER NETWORKS
B) Error Control
C) Flow
Control
ANS:
A) Framing
Software design is a process of problem-solving and planning for a software
solution. After the purpose and specifications of software is determined, software
developers will design or employ designers to develop a plan for a solution. It includes
low-level component and algorithm implementation issues as well as the architectural
view. The software requirements analysis (SRA) step of a software development process
yields specifications that are used in software engineering. A software design may be
platform-independent or platform-specific, depending on the availability of the technology
called for by the design.
Design is a meaningful engineering representation of something that is to be
built. It can be traced to a customer's requirements and at the same time assessed for
quality against a set of predefined criteria for 'good' design. In the software engineering
context, design focuses on four major areas of concern, data, architecture, interfaces,
and components.
Designing software is an exercise in managing complexity. The complexity exits
within the software design itself, within the software organization of the company, and
within the industry as a whole. Software design is very similar to systems design. It can
span multiple technologies and often involves multiple sub-disciplines. Software
specifications tend to be fluid, and change rapidly and often, usually while the design
process is still going on. Software development teams also tend to be fluid, likewise
often changing in the middle of the design process. In many ways, software bears more
resemblance to complex social or organic systems than to hardware. All of this makes
software design a difficult and error prone process.
negligible proportion of cases. Error control aims to cope with errors owing to noise or to
equipment malfunction in which case it overlaps with fault tolerance (see fault-tolerant
system) but not usually with the effects of errors in the design of hardware or software.
An important aspect is the prevention of mistakes by users. Checking of data by
software as it is entered is an essential feature of the design of reliable application
programs. Error control is expensive: the balance between the cost and the benefit
(measured by the degree of protection) has to be weighed within the technological and
financial context of the system being designed. Software Quality Control is the set of
procedures used by organizations (1) to ensure that a software product will meet its
quality goals at the best value to the customer, and (2) to continually improve the
organizations ability to produce software products in the future. Software quality control
refers to specified functional requirements as well as non-functional requirements such
as supportability, performance and usability. [2] It also refers to the ability for software to
perform well in unforeseeable scenarios and to keep a relatively low defect rate.
C) Flow controls
In computer networking, flow control is the process of managing the rate of data
transmission between two nodes to prevent a fast sender from outrunning a slow
receiver. It provides a mechanism for the receiver to control the transmission speed, so
that the receiving node is not overwhelmed with data from tranceiving nodes. Flow
control should be distinguished from congestion control, which is used for controlling the
flow of data when congestion has actually occurred [1]. Flow control mechanisms can be
classified by whether or not the receiving node sends feedback to the sending node.
Flow control is important because it is possible for a sending computer to
transmit information at a faster rate than the destination computer can receive and
process them. This can happen if the receiving computers have a heavy traffic load in
comparison to the sending computer, or if the receiving computer has less processing
power than the sending computer.
2. Describe the following Medium Access Control Sub Layers multiple access
protocols:
A) Pure ALOHA or Unspotted ALOHA
B) Slotted ALOHA or Impure ALOHA
ANS:
ALOHA net, also known as ALOHA, was a pioneering computer networking system
developed at the University of Hawaii. It was first deployed in 1970 by Bruce Rights, and
while the network itself is no longer used, one of the core concepts in the network is the
basis for the widely used Ethernet.
The ALOHA protocol is an OSI layer 2 protocol for LAN networks with broadcast
topology. The difference between ALOHA and Ethernet on a shared medium is that
Ethernet uses CSMA/CD, which broadcasts a jamming signal to notify all computers
connected to the channel that a collision occurred, forcing computers on the network to
reject their current packet or frame. The use of a jamming signal enables early release of
the transmission medium where transmission delays dominate propagation delays, and
is appropriate for many Ethernet variants..
The first version of the protocol (now called "Pure ALOHA") was quite simple:
Note that the first step implies that Pure ALOHA does not check whether the channel is
busy before transmitting. The critical aspect is the "later" concept: the quality of the back
off scheme chosen significantly influences the efficiency of the protocol, the ultimate
channel capacity, and the predictability of its behavior.
To assess Pure ALOHA, we need to predict its throughput, the rate of (successful)
transmission of frames. (This discussion of Pure Alohas performance follows
Tanenbaum. First, let's make a few simplifying assumptions:
Stations cannot generate a frame while transmitting or trying to transmit. (That is,
if a station keeps trying to send a frame, it cannot also be generating more
frames to send.)
The population of stations attempts to transmit (both new frames and old frames
that collided) according to a Poisson distribution.
Let "T" refer to the time needed to transmit one frame on the channel, and let's define
"frame-time" as a unit of time equal to T. Let "G" refer to the mean used in the Poisson
distribution over transmission-attempt amounts: that is, on average, there are G
transmission-attempts per frame-time.
Overlapping frames in the pure ALOHA protocol. Frame-time is equal to 1 for all frames.
Consider what needs to happen for a frame to be transmitted successfully. Let "t" refer to
the time at which we want to send a frame. We want to use the channel for one frametime beginning at t, and so we need all other stations to refrain from transmitting during
this time. Moreover, we need the other stations to refrain from transmitting between t-T
and t as well, because a frame sent during this interval would overlap with our frame.
For any frame-time, the probability of there being k transmission-attempts during that
frame-time is:
Therefore, the probability (Probpure) of there being zero transmission-attempts between tT and t+T (and thus of a successful transmission for us) is:
Probpure = e 2G
The throughput can be calculated as the rate of transmission-attempts multiplied by the
probability of success, and so we can conclude that the throughput (Spure) is:
Spure = Ge 2G
The maximum throughput is 0.5/e frames per frame-time (reached when G = 0.5), which
is approximately 0.184 frames per frame-time. This means that, in Pure ALOHA, only
about 18.4% of the time is used for successful transmissions.
An improvement to the original ALOHA protocol was "Slotted ALOHA", which introduced
discrete timeslots and increased the maximum throughput. A station can send only at the
beginning of a timeslot, and thus collisions are reduced. In this case, we only need to
worry about the transmission-attempts within 1 frame-time and not 2 consecutive frametimes, since collisions can only occur during each timeslot. Thus, the probability of there
being zero transmission-attempts in a single timeslot is:
Probslotted = e G
the probability of k packets is:
Probslottedk = e G(1 e G)k 1
Field Name
(bytes)
Network Mask
Hello Interval
Options
Rtr Pri
Router
Interval
Dead
Description
Designated
Router
Backup
Designated
Router
Neighbors
Multiple
10
of 4
Database Description:
These messages contain descriptions of the topology of the AS or area. That is, they
convey the contents of the link-state database for the autonomous system or area from
one router to another. Communicating a large LSDB may require several messages to
be sent; this is done by having the sending device designated as a master device and
sending messages in sequence, with the slave (recipient of the LSDB information)
responding with acknowledgements.
11
Size
Name
(bytes)
Interface
MTU
Options
Flags
DD
Sequence 4
Number
LSA
Headers
Description
12
13
Field Name
Size
(bytes)
LS Type
Link State ID
Advertising
Router
Description
14
Size
Name
(bytes)
# LSAs
LSAs
Variable
Description
15
Field Name
LSA
Headers
Size
(bytes)
Variable
Description
16
17