Beruflich Dokumente
Kultur Dokumente
1. Correctness: The routing should be done properly and correctly so that the
packets may reach their proper destination.
Static routing can be used to define an exit point from a router when no other routes are
available or necessary. This is called a default route.
Static routing can be used for small networks that require only one or two routes. This is
often more efficient since a link is not being wasted by exchanging dynamic routing
information.
Static routing is often used to help transfer routing information from one routing protocol
to another (routing redistribution).
packet is used for this purpose; in the explicit signaling method, the signal is
included in the packets that carry data. Explicit signaling, as we will see in Frame
Relay congestion control, can occur in either the forward or the backward
direction.
Congestion control algorithms
(a) Leaky Bucket Algorithm
It is a traffic shaping mechanism
that controls the amount and the rate
of the traffic sent to the network.
A leaky bucket algorithm shapes
bursty traffic into fixed rate traffic by
averaging the data rate.
Imagine a bucket with a small hole
at the bottom.
The rate at which the water is poured into the bucket is not fixed and can vary but it
leaks from the bucket at a constant rate. Thus (as long as water is present in bucket),
the rate at which the water leaks does not depend on the rate at which the water is
input to the bucket.
Also, when the bucket is full, any additional water that enters into the bucket spills
over the sides and is lost.
The same concept can be applied to packets in the network. Consider that data is
coming from the source at variable speeds. Suppose that a source sends data at 12
Mbps for 4 seconds. Then there is no data for 3 seconds. The source again transmits
data at a rate of 10 Mbps for 2 seconds. Thus, in a time span of 9 seconds, 68 Mb data
has been transmitted.
If a leaky bucket algorithm is used, the data flow will be 8 Mbps for 9 seconds. Thus
constant flow is maintained.
A leaky bucket algorithm does not consider the idle time of the host. For example, if
the host was idle for 10 seconds and now it is
willing to sent
data at a very high speed for another 10 seconds,
the total data
transmission will be divided into 20 seconds
and
average
data rate will be maintained. The host is having no advantage of
sitting
idle for 10 seconds.
To overcome this problem, a token
bucket algorithm is used. A token bucket
algorithm allows bursty data transfers.
A token bucket algorithm is a modification of leaky bucket in which leaky bucket
contains tokens.
In this algorithm, a token(s) are generated at every clock tick. For a packet to be
transmitted, system must remove token(s) from the bucket.
Thus, a token bucket algorithm allows idle hosts to accumulate credit for the future
in form of tokens.
For example, if a system generates 100 tokens in one clock tick and the host is idle
for 100 ticks. The bucket will contain 10,000 tokens.
Now, if the host wants to send bursty data, it can consume all 10,000 tokens at once
for sending 10,000 cells or bytes.
Thus a host can send bursty data as long as bucket is not empty.
TCP/IP
Like OSI network model, TCP/IP also has a network model. TCP/IP
was on the path of development when the OSI standard was
published and there was interaction between the designers
of OSI and TCP/IP standards. The TCP/IP model is not same as OSI
model. OSI is a seven-layered standard, but TCP/IP is a four layered
standard.
Layer 4. Application Layer
Application layer is the top most layer of four layer TCP/IP model.
Application layer is present on the top of theTransport layer.
Source Port
Destination Port
length
checksum
Usage of the Checksum in UDP is optional. In case the sender does not use it, it
sets the checksum field to all 0's. Now if the sender computes the checksum then
the recipient must also compute the checksum an set the field accordingly. If the
checksum is calculated and turns out to be all 1's then the sender sends all 1's
instead of all 0's. This is since in the algorithm for checksum computation used by
UDP, a checksum of all 1's if equivalent to a checksum of all 0's. Now the
checksum field is unambiguous for the recipient, if it is all 0's then checksum has
not been used, in any other case the checksum has to be computed.
Transport Layer: Transport layer offers peer-to-peer and end-to-end connection between
two processes on remote hosts. Transport layer takes data from upper layer (i.e. Application
layer) and then breaks it into smaller size segments, numbers each byte, and hands over to
lower layer (Network Layer) for delivery.
Functions : This Layer is the first one which breaks the information data, supplied by
Application layer in to smaller units called segments. It numbers every byte in the segment and
maintains their accounting.
This layer ensures that data must be received in the same sequence in which it was
sent.
This layer provides end-to-end delivery of data between hosts which may or may not
belong to the same subnet.
All server processes intend to communicate over the network are equipped with wellknown Transport Service Access Points (TSAPs) also known as port numbers.
End-to-End Communication : A process on one host identifies its peer host on remote
network by means of TSAPs, also known as Port numbers. TSAPs are very well defined and a
process which is trying to communicate with its peer knows this in advance.
The two main Transport layer protocols are:
Transmission Control Protocol
It provides reliable communication between two hosts.
User Datagram Protocol
It provides unreliable communication between two hosts.
UNIT-V
DNS (Domain Name Service)
The internet primarily uses IP addresses for locating nodes. However, its humanly
not possible for us to keep track of the many important nodes as numbers.
Alphabetical names as we see would be more convenient to remember than the
numbers as we are more familiar with words. Hence, in the chaotic organization of
numbers (IP addresses) we would be much relieved if we can use familiar sounding
names for nodes on the network.
There is also another motivation for DNS. All the related information about a
particular network (generally maintained by an organization, firm or university)
should be available at one place. The organization should have complete control
over what it includes in its network and how does it "organize" its network.
Meanwhile, all this information should be available transparently to the outside
world.
Conceptually, the internet is divide into several hundred top level domains where
each domain covers many hosts. Each domain is partitioned in subdomains which
may be further partitioned into subsubdomains and so on... So the domain space is
partitioned in a tree like structure as shown below. It should be noted that this tree
hierarchy has nothing in common with the IP address hierarchy or organization.
The internet uses a hierarchical tree structure of Domain Name Servers for IP
address resolution of a host name.
eg.
entry
.in (India)
for
.uk
Domain Name
Class
Type
Time to Live
Value
of: IN the
Internet
system
or CH the
Chaos
TTL which is the time to live of the RR. This field is a 32 bit
integer in units of seconds, an is primarily used by resolvers
when they cache RRs. The TTL describes how long a RR can
be cached before it should be discarded.
RDATA Data in this field depends on the values of the type
and class of the RR and a description for each is as follows:
o for A: For the IN class, a 32 bit IP address For the CH
class, a domain name followed by a 16 bit octal Chaos
address.
o for CNAME: a domain name.
Email is the most widely used application service which is used by computer users.
It differs from other uses of the networks as network protocols send packets
directly to destinations using timeout and retransmission for individual segments if
no ack returns. However in the case of email the system must provide for
instances when the remote machine or the network connection has failed and take
some special action.Email applications involve two aspects User-agent( pine, elm etc.)
Transfer agent( sendmail daemon etc.)
When an email is sent it is the mail transfer agent (MTA) of the source that
contacts the MTA of the destination. The protocol used by the MTA 's on the
source and destination side is called SMTP. SMTP stands for Simple Mail
Transfer Protocol.. There are some protocols that come between the user agent
and the MTA eg. POP,IMAP which are discussed later.
Mail Gateways Mail gateways are also called mail relays, mail bridges and in such systems the
senders machine does not contact the receiver's machine directly but sends
mail across one or more intermediate machines that forward it on.
These intermediate machines are called mail gateways.Mail gateways are
introduce unreliablity.Once the sender sends to first intermediate m/c then it
discards its local copy. So failure at an intermediate machine may result in
message loss without informing the sender or the receiver. Mail gateways also
introduce delays. Neither the sender nor the receiver can determine how long
the
delay
will
last
or
where
it
has
been
delayed.
Network Security
The various issues in Network security are as follows:
1. Authentication: We have to check that the person who has requested for
something or has sent an e-mail is indeed allowed to do so. In this process
we will also look at how the person authenticates his identity to a remote
machine.
1) Message Confidentiality:
Message confidentiality or privacy means that the sender and the receiver expect
confidentiality. The transmitted message must make sense to only the intended receiver. To
all others, the message must be garbage. When a customer communicates with her bank, she
expects that the communication is totally confidential.
Confidentiality with Symmetric-Key Cryptography: To provide confidentiality with
symmetric-key cryptography, a sender and a receiver need to share a secret key. A person
residing in the United States cannot meet and exchange a secret key with a person living in
China. To be able to use symmetric-key cryptography, we need to find a solution to the key
sharing. This can be done using a session key. A session key is one that is used only for the
duration of one session. The session key itself is exchanged using asymmetric key
cryptography. Note that the nature of the symmetric key allows the communication to be
carried on in both directions although it is not recommended today. Using two different keys
is more secure, because if one key is compromised, the communication is still confidential in
the other direction. For a long message, symmetric-key cryptography is much more efficient
than asymmetric-key cryptography.
Confidentiality with Asymmetric-Key Cryptography: The problem we mentioned about
key exchange in symmetric-key cryptography for privacy culminated in the creation of
asymmetric-key cryptography. Here, there is no key sharing; there is a public announcement.
Bob creates two keys: one private and one public. He keeps the private key for decryption; he
publicly announces the public key to the world. The public key is used only for encryption;
the private key is used only for decryption. The public key locks the message; the private key
unlocks it. For a two-way communication between Alice and Bob, two pairs of keys are
needed. When Alice sends a message to Bob, she uses Bob's pair; when Bob sends a message
to Alice, he uses Alice's pair as shown in Figure.
destination. This makes it easier to bill data usage. However, an ATM network is less adaptable
to a sudden network traffic surge.
The ATM provides data link layer services that run on the OSI's Layer 1 physical links. It
functions much like small-packet switched and circuit-switched networks, which makes it ideal for
real-rime, low-latency data such as VoIP and video, as well as for high-throughput data traffic like
file transfers. A virtual circuit or connection must be established before the two end points can
actually exchange data.
ATM services generally have four different bit rate choices:
Available Bit Rate: Provides a guaranteed minimum capacity but data can be bursted to
higher capacities when network traffic is minimal.
Constant Bit Rate: Specifies a fixed bit rate so that data is sent in a steady stream. This
is analogous to a leased line.
Unspecified Bit Rate: Doesnt guarantee any throughput level and is used for applications
such as file transfers that can tolerate delays.
Variable Bit Rate (VBR): Provides a specified throughput, but data is not sent evenly. This
makes it a even popular choice for voice and videoconferencing.
ATM Architecture:
ATM is a cell-switched network. The user access devices, called the endpoints, are connected
through a user-to-network interface (UNI) to the switches inside the network.
The switches are connected through network-to-network interfaces (NNIs).