Page 168 - DCAP406_DCAP_207_Computer Networks
P. 168
Unit 10: Network Layer in the Internet
The traffic management facility allows maximizing available network resources and Notes
ensures efficient use of resources that have not been explicitly allocated. Traffic management
will be mainly dependent on transmit priority and bandwidth availability. In the transmit
priority, delay-sensitive traffic is assigned a higher transmit priority.
The leaky bucket algorithm finds its use in the context of network traffic shaping or rate
limiting. The algorithm enables to control the rate at which data is injected into a network
and thus handling burstiness in the data rate.
10.5 Keywords
Congestion: A communication channel of a network is called congested if packets traversing the
path experience delays largely in excess of the paths propagation delay.
IP Address: An Internet Protocol address (IP address) is a numerical label assigned to each
device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol
for communication.
IP Protocol: The Internet Protocol (IP) is the principal communications protocol used for relaying
datagrams (packets) across an internetwork using the Internet Protocol Suite.
Traffic Shaping: Attempts to regularize the average rate of data transmission.
10.6 Review Questions
1. Describe IP Protocol. How does it differ from TCP protocol.
2. What are IP addresses? Describe the format of an IP address.
3. Discuss IPV4 addressing along with its classification.
4. Describe the concept of subnetting.
5. Explain the general principles of congestion.
6. What do you understand by QoS? Describe the basic QoS structure.
7. Discuss the following two algorithms:
(a) Leaky Bucket
(b) Token Bucket
8. What are two types of congestion control? Where is congestion control implemented in
each case?
Answers: Self Assessment
1. Internet 2. subnet prefix
3. Class C 4. Classless Inter Domain Routing
5. 32 6. True
7. False 8. True
9. True 10. False
11. True
LOVELY PROFESSIONAL UNIVERSITY 161