Page 168 - DCAP406_DCAP_207_Computer Networks
P. 168

Unit 10: Network Layer in the Internet




              The traffic management  facility  allows  maximizing available  network resources  and  Notes
               ensures efficient use of resources that have not been explicitly allocated. Traffic management
               will be mainly dependent on transmit priority and bandwidth availability. In the transmit
               priority, delay-sensitive traffic is assigned a higher transmit priority.
              The leaky bucket algorithm finds its use in the context of network traffic shaping or rate
               limiting. The algorithm enables to control the rate at which data is injected into a network
               and thus handling burstiness in the data rate.

          10.5 Keywords


          Congestion: A communication channel of a network is called congested if packets traversing the
          path experience delays largely in excess of the paths propagation delay.

          IP Address: An Internet Protocol address (IP address)  is a numerical label assigned to  each
          device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol
          for communication.

          IP Protocol: The Internet Protocol (IP) is the principal communications protocol used for relaying
          datagrams (packets) across an internetwork using the Internet Protocol Suite.
          Traffic Shaping: Attempts to regularize the average rate of data transmission.

          10.6 Review Questions


          1.   Describe IP Protocol. How does it differ from TCP protocol.
          2.   What are IP addresses? Describe the format of an IP address.
          3.   Discuss IPV4 addressing along with its classification.

          4.   Describe the concept of subnetting.
          5.   Explain the general principles of congestion.
          6.   What do you understand by QoS? Describe the basic QoS structure.
          7.   Discuss the following two algorithms:
               (a)  Leaky Bucket

               (b)  Token Bucket
          8.   What are two types of congestion control? Where is congestion control implemented in
               each case?

          Answers: Self  Assessment


          1.   Internet                          2.  subnet prefix
          3.   Class C                           4.  Classless Inter Domain Routing
          5.   32                                6.  True
          7.   False                             8.  True

          9.   True                              10.  False
          11.  True






                                           LOVELY PROFESSIONAL UNIVERSITY                                   161
   163   164   165   166   167   168   169   170   171   172   173