SlideShare a Scribd company logo
1 of 16
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
UNIT 4-NETWORK ARCHITECTURE
1. What are the functions of routing/addressing?
It provides robust and flexible connectivity between devices Eg: Addressing ways to
allocate aggregate space, routing-routers routing protocol ways to manipulate routing flow.
2. What is the function of network management?
Provides monitoring, configuring, and troubleshooting for the network ex: Network
management protocols, Network management devices,Ways to configure network,
management in the network.
3. What is the function of performance?
Provides network resources to support requirements for capacity, delay, RMA eg:Quality
of Service, Service-Level Agreements, Policies.
4. What is the security?
Restricts unauthorized access, usageand visibility within network to reduce, the threat
and effects of attacks ex:firewalls, security policies and procedures,filters and access control
lists.
5. What is Scaling network management traffic?
Determining how much network capacityshould be reserved for network management.
6. Define in band and out band management?
In-band and out-of-band management: Whether management data flow alongthesame
path as user traffic or have a separate path.
7. Define policies?
Policies are sets (again, formal or informal) ofhigh-level statements about how network
resources are to be allocated among users.
8. Define Service-level agreements?
(SLAs are informalor formal contracts between a provider and user that define the terms
of theprovider’s responsibility to the user and the type and extent of accountability ifthose
responsibilities are not met.
9. What is Remote access security?
Securing network access based on traditional dial-in,point-to-point sessions, and virtual
private network connections.
10. Define Network perimeter security?
Protecting the external interfaces between your network and external networks.
11. What is end-to-end architectural model?
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
The end-to-end architectural model focuses on all components in the end to-end path of a
traffic flow. This model is most closely aligned to the flow-based perspective of networking.
12. Describe the peer-to-peer architectural model?
The peer-to-peer architectural model is based on the peer-to-peer flow model,where the
users and applications are fairly consistent in their flow behaviors throughout the network.
13. What are multicast?
Multicasts are packets targeted toward multiple destinations;mobile IP is providing
network (IP) connectivity for devices that move, roam, or are portable.
14. What is addressing?
Addressing is assigning local or global, private or public, temporary or persistent,
identifiers to devices.
15 Explain Routing?
Routing consists of learning about the reachability within and between networks and then
applying this reachability information to forward IP packets toward their destinations.
16. Define Public IP address?
Public IP addresses are those that can be advertised and forwarded by network devices in
the public domain (i.e., the Internet).
17. Define Private IP address?
Private IP addresses are those that cannot be advertised and forwarded by network
devices in the public domain. Private IP address space has been allocated out of previously
public IP address space.
18. State some of the mechanisms of the router?
 Routers forward packets based on reachability.
 Routers storereachability information and update it from time to time, or upon a
change in the state of routing in the network.
 Routers may also look at labels in a packet and use that information for routing.
19. Define Default route?
Default routeis the route used when there is no other route for that destination.It is the
route of last resort and is useful when a lot of traffic flows toward one upstream router or
network (e.g., a home or business connection to an ISP).
20. What is Classful addressing?
Classful addressing is applying predetermined mask lengths to addresses in order to
support a range of network sizes. The result is a set of classes of addresses (A, B, C, D, and
E), each of which supports a different maximum network size.
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
21. Define Subnetting?
Subnetting is using part of the device (host) address space to create another level of
hierarchy. Changing the address mask increases the number of bits allocated to the network,
creating the subnet. The resultant mask now includes a subnet mask, and the network
segments that are created are termed subnets.
22. What is variable-length subnetting?
Variable-length subnetting is subnetting where multiple variable-length subnet masks
(VLSM) are used, creating subnets of different sizes.
23. What is Supernetting?
Supernetting is aggregating network addresses, by changing the address mask to decrease
the number of bits recognized as the network. By decreasing the number of bits recognized,
we ignore part of the network address, which results in aggregating network addresses.
24. Define Routing Flows?
Routing flows are flows of routing information, passed between functional areas as well
as between ASs. This routing information includes routing initialization, updates, transients,
and background traffic such as hello or keep alive messages.
25. Define route propagation?
Default route propagation is the technique used to inform the network (or subnets or FAs)
of the default path; propagation begins at the exit point for the network.
26. What is Route aggreation?
Route aggregation is the technique exchanging of routing information between ASs,
usually between service providers with transit networks, and between large customer
networks. This technique is typically used at hard boundaries and may include policy
information.
27. What is done to scale network addressing?
To scale the network addressing, we will use the numbers of
 Functional areas within the network.
 Workgroups within each functional area.
 Subnets within each workgroup.
 Total numbers of subnets (current and future) in the organization.
 Total numbers of devices (current and future) within each subnet.
28. Based on what characteristics routing protocols are evaluated?
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
 Convergence times.
 Protocol overheads in terms of capacity (bandwidth over- head).
 CPU and memory utilization.
29. Explain Distance vector routing algorithm?
In a distance-vector routing algorithm each router maintains the “distance” (a metric to
weight each hop, or connection between routers) between itself and possible destinations. A
vector (or list) of these distances is computed from distance information received from other
participating routers on that network.
30. Explain link state routing algorithm?
In a link-state routing algorithm each router learns about itself, its links to next-hop
routers (its neighbors), and the state of each link. This information is multi- casted to other
participating routers, and all routers build their routing information from the sum of these
multicasts.
31. State the uses of BGP?
 It can use policies to determine actions to be taken on paths.
 BGP exchanges routing information by establishing peering connections using TCP
with a user-defined list.
 BGP is used to enforce network transport policies for an AS, and only announcing
certain routes from this AS to other peers.
32. How to choose and apply routing protocols?
1. Minimize the number of routing protocols used in the network. Two should be the
maximum number of protocols allowed, with only one IGP.
2. Start with the simplest routing strategy and routing mechanism/protocol.
3. As the complexity in routing and choices of routing protocols increase, reeval- uate
the previous decisions.
33. Define network management?
 Network management (NM) consists of the set of functions to control, plan, allocate,
deploy, coordinate, and monitor network resources.
 Network management used to be an afterthought in many network architectures.
 For example, most network architectures and designs were developed without a thought
about users being malicious, which was generally true up until a few years ago.
 Consider the changes that have recently been made in SNMP security. Today, and in the
future, networks are a resource whose integrity must be measurable and verifiable.
34. What are the layers of network management? Give an example of management at
eachlayer?
 Business Management: The management of the business aspects of a network—for
example, the management of budgets/resources, planning, and agreements.
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
 Service Management: The management of delivery of services to users—for example,
for service providers this would include the management of access bandwidth, data
storage, and application delivery.
 Network Management: The management of all network devices across the entire
network.
 Element Management: The management of a collection of similar network devices—for
example, access routers or subscriber management systems.
 Network-Element Management: The management of individual network devices—for
example, a single router, switch, or hub.
35. Define structure of network management hierarchy?
 Network management structure is a top-down approach, with the most abstract
component(business management) at the top of the hierarchy, and the most specified,
concrete component (network-element management) at the bottom of this hierarchy.
 Correspondingly, as the components become more abstract, the ways that they are
applied and measured (their information elements) change.
 Thus, at the bottom of this hierarchy, (network-element, element, network)
management is applied with variables and parameters, while at the top of this hierarchy
(service, business), management is applied in more abstract terms, using policies.
36. Define the basic functions of network management?
 Network management can be divided into two basic functions:
 The transport of management information across the system.
 The management of NM information elements.
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
 It consist of a variety of tasks—monitoring, configuring, troubleshooting, and planning—
that are performed by users, administrators, and network personnel.
37. What are the four categories of network management tasks?
 The four categories of network management tasks are:
 Monitoring for event notification
 Monitoring for trend analysis and planning
 Configuration of network parameters
 Troubleshooting the network
38. Define network devices?
 A network device is an individual component of the network that participates at one or
more of the protocol layers. This includes end devices, routers, switches, DSUs, hubs,
and NICs.
39. What are the network devices characteristic?
 Network devices have characteristics that can be measured. They are grouped into end-
to-end, per-link, per-network or per-element characteristics.
40. What is end-to-end characteristics?
 End-to-end characteristics are those that can be measured across multiple network
devices in the path of one or more traffic flows, and may be extended across the entire
network or between devices.
 Examples of end-to-end characteristics for network devices are availability, capacity,
delay, delay variation (jitter), throughput, error rates, and network utilization. These
characteristics may be modified or added to, depending on the types of traffic on the
network.
41. What is Per-link/per-network or per-element characteristics?
 Per-link/per-network or per-element characteristics are those that are specific to the type
of element or connection between elements being monitored.
 These characteristics may be used individually, or may be combined to form an end-to-
end characteristic.
 Examples of per-link characteristics are propagation delay and link utilization, while
examples of per-element characteristics include (for an IP router) IP forwarding rates
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
(e.g., in IP packets/second), buffer utilization for the router, and any logs of
authentication failures.
42. Define major types of network management protocols?
 The two major network management protocols:
 Simple Network Management Protocol (SNMP)
 Common Management Information Protocol (CMIP)
 These network management protocols provide the mechanism for retrieving, changing,
and transport of network management data across the network.
43. Define SNMP?
 SNMP has seen widespread use and forms the basis for many popular commercial and
public network management systems.
 It provides facilities for collecting and configuring parameters from network devices.
 Parameters that are accessible via SNMP are grouped into management information
bases, or MIBs.
 Parameters can be part of the standard MIB (MIB-II), other standard MIBs (typically
based on a type of network device, technology, or protocol), remote monitoring MIBs, or
enterprise-specific MIBs, which have parameters specific to a particular vendor’s
product.
44. Define SNMPv3?
SNMP version 3 (SNMPv3) builds on the previous versions of SNMP, providing more
secure authentication, the ability to retrieve blocks of parameters, and trap generation for
most parameters.
45. List the SNMP commands?
SNMP commands are listed below:
 Get
 Get-next
 Set
Get: To collect the value of a parameter
Get-next: To collect the value of the next parameter in the list
Set: To change the value of a parameter
46. Define Trap?
 A trap is a user-configurable threshold for a parameter.
 When this threshold is crossed, the values for one or more parameters are sent to a
specified location.
 A benefit of trap generation is that polling for certain parameters can be stopped or the
polling interval lengthened, and instead an automatic notice is sent to the management
system when an event occurs.
47. Define CMIP/CMOT?
 CMIP includes CMIP over TCP/IP (CMOT).
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
 CMIP/CMOT provides for parameter collection and setting, as with SNMP, but also
allows for more types of operations.
 Many CMIP/CMOT features, such as globally unique object naming, object
classification, alarm reporting, audit trails, and test management, can also be provided by
SNMP by creating new MIBs and tools to support such abstractions.
48. Define monitoring?
 Monitoring is obtaining values for end-to-end, per-link, and per-element characteristics.
 The monitoring process involves collecting data about the desired characteristics,
processing some or all of this data, displaying the (processed) data, and archiving a subset
of this data.
 Data are usually collected through a polling (actively probing network devices for
management data) or monitoring process involving a network management protocol (e.g.,
SNMP) or proxy service.
49. Define events?
 An event is something that occurs in the network that is noteworthy.
 This may be a problem or failure in a network device, across the network, or when a
characteristic crosses a threshold value.
 It may only be something that is informational to the user, administrator, or manager,
such as notification of an upgrade.
 Events may be noted in a log file, on a display, or by issuing an alarm, depending on the
priority level of the event.
 Events are similar to transients, which are short-lived changes in the behavior of the
network.
50. Explain the instrumentation mechanisms?
 Instrumentation is the set of tools and utilities needed to monitor and probe the network
for management data.
 Instrumentation mechanisms include access to network management data via SNMP,
monitoring tools, and direct access.
 Instrumentation can be coupled with monitoring, display, processing. and storage to form
a complete management system.
51. List the base set of parameters to monitor?
 The base set of parameters to monitor is listed below:
 ifInOctets Number of bytes received
 ifOutOctets Number of bytes sent
 ifInUcastPkts Number of unicast packets received
 ifOutUcastPkts Number of unicast packets sent
 ifInNUcastPkts Number of multicast/broadcast packets received
 ifOutNUcastPkts Number of multicast/broadcast packets sent
 ifInErrors Number of errored packets received
 ifOutErrors Number of packets that could not be sent
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
 These parameters can be used for both short-term event monitoring and long-term trend
analysis of throughput and error rates.
52. Define configuration mechanisms?
 Configuration is setting parameters in a network device for operation and control of that
element.
 Configuration mechanisms include direct access to devices, remote access to devices, and
downloading configuration files.
 SNMP set commands
 Telnet and command line interface (CLI) access
 Access via HTTP
 Access via common object request broker architecture (CORBA)
 Use of FTP/TFTP to download configuration files.
53. Define FCAPS model?
 Fault management
 Configuration management
 Accounting management
 Performance management
 Security management
54. Define In-Band and Out-of-Band Management?
 In-band management occurs when the traffic flows for network management follow the
same network paths as the traffic flows for users and their applications.
 Out-of-band management occurs when different paths are provided for network
management data flows and user traffic flows.
55. Define the terms Centralized, Distributed, and Hierarchical Management?
Terms Definitions
Centralized
Management
Centralized management occurs when all management data
(e.g., pings, SNMP polls/responses, Trace route, etc.)
radiate from a single (typically large) management system.
The flows of management data then behave like the client–
server flows.
Distributed
Management
Distributed management occurs when there are multiple
separate components to the management system, and these
components are strategically placed across the network,
localizing network management traffic and distributing
management domains. (e.g., one management
system per campus or per management domain, or a single
management system with several monitoring nodes).
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
56. Define check and balances & its objectives?
o Checks and balances are methods to duplicate measurements in order to verify
and validate network management data.
o Objectives of check & balances:
o Errors in recording or presenting network management data.
o Rollovers of counters (e.g., returning a counter value to zero without proper
notification).
o Changes in MIB variables from one software version to another.
57. Define northbound interface?
 When the network includes an interface to an operations support system (OSS), the
network management architecture must consider how management is to be integrated
with the OSS.
 The interface from network management to OSS is often termed the northbound
interface, as it is in the direction of service and business management.
 This northbound interface is typically CORBA or SNMP.
58. What are the different types of relationships in network management
architecture?
• The different types of relationships in NMA are:
o Internal relationships
o External relationships
Hierarchical
Management
Hierarchical management occurs when the management
functions (monitoring, display, storage, and processing)
are separated and placed on separate devices.
Management is hierarchical in that, when the functions are
separated, they can be considered layers that communicate
in a hierarchical client–server fashion.
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
• Internal relationships: Internal relationships for the network management
architecture comprise the interactions, dependencies, trade-offs, and constraints
between network management mechanisms.
• It is important to understand these relationships, as they are part of a complex,
nonlinear system and they define and describe the behavior of this architecture.
• External relationships: External relationships comprise trade-offs, dependencies,
and constraints between the network management architecture and each of the
other component architectures (addressing/routing, performance, security, and any
other component architectures you may develop).
59. What is Performance?
Performance is the set of levels for capacity, delay, and RMA in a network. It is mainly
to optimize these levels, either for all (user, application, and device) traffic flows in the
network, or for one or more sets of traffic flows, based on groups of users, applications,
and/or devices.
60. What is Performance architecture?
A performance architecture is the set of performance mechanisms to configure, operate,
manage, provision, and account for resources in the network that support traffic flows. The
performance architecture shows where these mechanisms are applied within the network.
61. What are the common problems addressed by performance architecture?
 Improving the overall performance of a network
 Improving the performance to select users, applications, and/or devices
 Changing the network from a cost center to profitability
 Merging multiple traffic types over a common network infrastructure
 Differentiating customers for multiple levels of service.
62. Define Qos and its 2 types?
Quality of Service, or QoS, is determining, setting, and acting upon priority levels
for traffic flows. QoS is usually associated with IP but is used here to define a class of
mechanisms and apply priority levels in the network. The 2 types are
 Differentiated services (DiffServ, or DS)
 Integrated services (IntServ, or IS)
DiffServapproaches QoS from the perspective of aggregating traffic flows on a per-hop
basis based on traffic behavior, while IntServ approaches QoS from the perspective of
supporting traffic flows on an individual, end-to-end basis.
63. Compare Differentiated Services and Integrated Services.
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
64. What is Prioritization and Scheduling?
Prioritization is the process of determining which user, application, device, flow, or
connection gets service ahead of others, or gets a higher level of service. Prioritization is
necessary as there will be competition between traffic flows for network resources.
Schedulingis the mechanism that determines the order in which traffic is processed for
transmission. Scheduling uses priority levels to determine which traffic flows get processed
first and most often.
65. What is Traffic management and Queueing?
Traffic Management: Traffic management consists of admission control and traffic
conditioning. Admission control is the ability to refuse access to network resources. Traffic
conditioning is a set of mechanisms that modify performance to traffic flows, as a precursor
to scheduling.
Queuing is storing IP packets (this can also be applied to frames or cells, but for the
purposes of this discussion we limit it to IP packets) within a network device while they wait
for processing. There may be several locations where packets are stored (queues) within a
network device.
66. What are the Queueing mechanisms?
The following queuing mechanisms:
 First in first out (FIFO)
 Class-based queuing (CBQ)
 Weighted fair queuing (WFQ)
 Random early detect (RED)
 Weighted RED (WRED)
67. What are Service Level Agreements?
Service-level agreements(SLAs) are formal contracts between a provider and user that
define the terms of the provider’s responsibility to the user and the type and extent of
accountability if those responsibilities are not met.
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
SLA performance elements may be data rate (minimum, peak) and burst tolerance (size,
duration), and can be separated into upstream (in the direction from the destination to the
source) and downstream (in the direction from the source to the destination).
68. What are Policies?
Policies are formal or informal sets of high-level statements and rules about how network
resources are to be allocated among users. They are used to create and manage one or more
performance objectives.
69. What is network security?
Network security is defined here as the protection of networks and their services
fromunauthorized access, modification, destruction, or disclosure. It provides assurancethat
thenetwork performs its critical functions correctly and that there are noharmful side effects.
70. What is network privacy?
Network privacy is a subset of network security, focusing on protection of networks and
their services from unauthorized access or disclosure. This includes all user, application, device,
and network data.
71. What is threat analysis?
A threat analysis is a process used to determine which components of the system need to
be protected and the types of security risks (threats) they should be protected.
72. What is security policies and procedures?
Security policies and procedures are formal statements on rules for system, network, and
information access and use, in order to minimize exposure to security threats.
73. What is physical security?
Physical security is the protection of devices from physical access, damage, and theft.
74. What is security awareness?
Security awareness entails getting users educated and involved with the day to- day
aspects of security in their network, and helping them to understand the potential risks of
violating security policies and procedures.
75. What is encryption and decryption?
Encryption/decryption is a security mechanism where cipher algorithms are applied
together with a secret key to encrypt data so that they are unreadable if they are intercepted. Data
are then decrypted at or near their destination.
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
76. What is public key infrastructure?
Public key infrastructure is a security infrastructure that combines security mechanisms,
policies, and directives into a system that is targeted for use across unsecured public networks
(e.g., the Internet), where information is encrypted through the use of a public and a private
cryptographic key pair that is obtained and shared through a trusted authority.
77. What is network address translation?
Network address translation, or NAT, is the mapping of IP addresses from one realm to
another. Typically this is between public and private IP address space. Private IP address space is
the set of IETF-defined private address spaces (RFC 1918):
• Class A 10.x.x.x 10/8 prefix
• Class B 172.16.x.x 172.16/12 prefix
• Class C 192.168.x.x 192.168/16 prefix.
78. What is remote access?
Remote access consists of traditional dial-in, point-to-point sessions, and virtual private
network connections, Security for remote access includes what is commonly known as AAAA:
authentication of users; authorization of resources to authenticated users; accounting of resources
and service delivery; and allocation of configuration information (e.g., addresses or default
route).
79. What is firewalls?
Firewalls are combinations of one or more security mechanisms, implemented in network
devices (routers) placed at strategic locations within a network.
16 MARKS
1. Explain Addressing/Routing Component Architecture?(8)
2. Explain Network Management Component Architecture?(8)
3. Explian Architecture and Design?(8)
4. Explain in detail about Architectural Models with neat diagram?(16)
5. Explain addressing and routing fundamentals?
6. Write short notes on (i) Subnetting (ii) Supernetting (iii)Variable-length subnetting.
7. What are the routing mechanisms?
- Establishing routing flows
- Identifying and classifying routing boundaries
- Manipulating routing flows.
8. What are the routing strategies available?
- Evaluating Routing Protocols.
- Choosing and Applying Routing Protocols.
9. Explain briefly about the network management mechanisms?
o Two major network management protocols:
o Simple Network Management Protocol (SNMP)
o Common Management Information Protocol (CMIP)
o There are 3 ways of network management mechanisms:
o Monitoring mechanisms
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
o Instrumentation mechanisms
o Configuration mechanisms
o How to manage a network management data?
o Recommendation 1: Local storage versus archival.
o Recommendation 2: Selective copying of data.
o Recommendation 3: Data migration.
o Recommendation 4: Metadata.
10. Discuss the following performance mechanisms.
i)Quality Of Service
ii)Prioritization
11. Explain Traffic Management and Scheduling?
12. Explain i)Goals for Performance Mechanism(8)
ii)Service Level Arguments and Policies(8)
13. How much storage capacity is required for the following network management
configuration?
To solve this problem refer the sample problem given below:
o For example, consider a network that has 100 network devices, where each
element has an average of four interfaces and each interface is monitored for eight
characteristics. This would add up to
o (100 network devices)∗ (4 interfaces/network device)∗(8characteristics/interface)
= 3200 characteristics.
o If each of the 3200 characteristics generates an average of 8 bytes of data and an
estimated 60 bytes of protocol overhead, the amount of data generated per polling
session would be
o (3200 characteristics)∗(8 bytes+60 bytes) = 217.6 KB of traffic, or 1.74 Mb of
traffic.
o If we plan to poll with a polling interval of 5 seconds, at best this 1.74 Mb of
traffic would be spread out over the 5 seconds, or 384 Kb/second.
o It is more likely, however, that most of the data will arrive shortly after the polls
are generated, so the traffic may be more like a spike of 1.74Mb for the second
after the polls occur.
o For a period of one day, the total amount of traffic will be
o (1.75 Mb/polling interval)∗(720 polling intervals/hour)∗(24 hours/day) = 30.2Gb
of traffic
o And the amount of data stored would be
o (3200 characteristics/polling interval)∗(8 bytes)∗(720 polling intervals/day)∗ (24
hours/day) = 442 MB data stored per day .
CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS
o Over the course of a year, this would add up to over 161 GB of data. And this is a
conservative estimate for mid-range enterprise environment.
14. Describe briefly about Security and Privacy Administration?
o Threat analysis
o Plans and procedures
15. Describe briefly about Security and Privacy Mechanisms?

More Related Content

What's hot

1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase theyasinalimohammed
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Efficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh NetworksEfficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 

What's hot (17)

1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
Unit 1
Unit 1Unit 1
Unit 1
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 5
Unit 5Unit 5
Unit 5
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Mane ts
Mane tsMane ts
Mane ts
 
Ad hoc networks introduction
Ad hoc networks   introductionAd hoc networks   introduction
Ad hoc networks introduction
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Unit 4
Unit 4Unit 4
Unit 4
 
Efficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh NetworksEfficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh Networks
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 

Similar to Unit 4 for PG PAWSN

Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
 
Chapter 5 2 marks for PG PAWSN
Chapter 5 2 marks for PG PAWSNChapter 5 2 marks for PG PAWSN
Chapter 5 2 marks for PG PAWSNDhaya kanthavel
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Network architecture
Network architectureNetwork architecture
Network architecturecsk selva
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSNDhaya kanthavel
 
2 Marks Questions And Answers MC1628 TCP IP Protocol Suite
2 Marks Questions And Answers MC1628   TCP IP Protocol Suite2 Marks Questions And Answers MC1628   TCP IP Protocol Suite
2 Marks Questions And Answers MC1628 TCP IP Protocol SuiteScott Bou
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewIRJET Journal
 
Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Kimberly Jones
 
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...rahulmonikasharma
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architecturescsk selva
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2Sohail Gohir
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocolIJCNCJournal
 
Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Cisco Service Provider
 
Computer network
Computer networkComputer network
Computer networksana zaib
 

Similar to Unit 4 for PG PAWSN (20)

Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Chapter 5 2 marks for PG PAWSN
Chapter 5 2 marks for PG PAWSNChapter 5 2 marks for PG PAWSN
Chapter 5 2 marks for PG PAWSN
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 
2 Marks Questions And Answers MC1628 TCP IP Protocol Suite
2 Marks Questions And Answers MC1628   TCP IP Protocol Suite2 Marks Questions And Answers MC1628   TCP IP Protocol Suite
2 Marks Questions And Answers MC1628 TCP IP Protocol Suite
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
 
Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...
 
Computer network
Computer networkComputer network
Computer network
 

Recently uploaded

Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Recently uploaded (20)

Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 

Unit 4 for PG PAWSN

  • 1. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS UNIT 4-NETWORK ARCHITECTURE 1. What are the functions of routing/addressing? It provides robust and flexible connectivity between devices Eg: Addressing ways to allocate aggregate space, routing-routers routing protocol ways to manipulate routing flow. 2. What is the function of network management? Provides monitoring, configuring, and troubleshooting for the network ex: Network management protocols, Network management devices,Ways to configure network, management in the network. 3. What is the function of performance? Provides network resources to support requirements for capacity, delay, RMA eg:Quality of Service, Service-Level Agreements, Policies. 4. What is the security? Restricts unauthorized access, usageand visibility within network to reduce, the threat and effects of attacks ex:firewalls, security policies and procedures,filters and access control lists. 5. What is Scaling network management traffic? Determining how much network capacityshould be reserved for network management. 6. Define in band and out band management? In-band and out-of-band management: Whether management data flow alongthesame path as user traffic or have a separate path. 7. Define policies? Policies are sets (again, formal or informal) ofhigh-level statements about how network resources are to be allocated among users. 8. Define Service-level agreements? (SLAs are informalor formal contracts between a provider and user that define the terms of theprovider’s responsibility to the user and the type and extent of accountability ifthose responsibilities are not met. 9. What is Remote access security? Securing network access based on traditional dial-in,point-to-point sessions, and virtual private network connections. 10. Define Network perimeter security? Protecting the external interfaces between your network and external networks. 11. What is end-to-end architectural model?
  • 2. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS The end-to-end architectural model focuses on all components in the end to-end path of a traffic flow. This model is most closely aligned to the flow-based perspective of networking. 12. Describe the peer-to-peer architectural model? The peer-to-peer architectural model is based on the peer-to-peer flow model,where the users and applications are fairly consistent in their flow behaviors throughout the network. 13. What are multicast? Multicasts are packets targeted toward multiple destinations;mobile IP is providing network (IP) connectivity for devices that move, roam, or are portable. 14. What is addressing? Addressing is assigning local or global, private or public, temporary or persistent, identifiers to devices. 15 Explain Routing? Routing consists of learning about the reachability within and between networks and then applying this reachability information to forward IP packets toward their destinations. 16. Define Public IP address? Public IP addresses are those that can be advertised and forwarded by network devices in the public domain (i.e., the Internet). 17. Define Private IP address? Private IP addresses are those that cannot be advertised and forwarded by network devices in the public domain. Private IP address space has been allocated out of previously public IP address space. 18. State some of the mechanisms of the router?  Routers forward packets based on reachability.  Routers storereachability information and update it from time to time, or upon a change in the state of routing in the network.  Routers may also look at labels in a packet and use that information for routing. 19. Define Default route? Default routeis the route used when there is no other route for that destination.It is the route of last resort and is useful when a lot of traffic flows toward one upstream router or network (e.g., a home or business connection to an ISP). 20. What is Classful addressing? Classful addressing is applying predetermined mask lengths to addresses in order to support a range of network sizes. The result is a set of classes of addresses (A, B, C, D, and E), each of which supports a different maximum network size.
  • 3. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS 21. Define Subnetting? Subnetting is using part of the device (host) address space to create another level of hierarchy. Changing the address mask increases the number of bits allocated to the network, creating the subnet. The resultant mask now includes a subnet mask, and the network segments that are created are termed subnets. 22. What is variable-length subnetting? Variable-length subnetting is subnetting where multiple variable-length subnet masks (VLSM) are used, creating subnets of different sizes. 23. What is Supernetting? Supernetting is aggregating network addresses, by changing the address mask to decrease the number of bits recognized as the network. By decreasing the number of bits recognized, we ignore part of the network address, which results in aggregating network addresses. 24. Define Routing Flows? Routing flows are flows of routing information, passed between functional areas as well as between ASs. This routing information includes routing initialization, updates, transients, and background traffic such as hello or keep alive messages. 25. Define route propagation? Default route propagation is the technique used to inform the network (or subnets or FAs) of the default path; propagation begins at the exit point for the network. 26. What is Route aggreation? Route aggregation is the technique exchanging of routing information between ASs, usually between service providers with transit networks, and between large customer networks. This technique is typically used at hard boundaries and may include policy information. 27. What is done to scale network addressing? To scale the network addressing, we will use the numbers of  Functional areas within the network.  Workgroups within each functional area.  Subnets within each workgroup.  Total numbers of subnets (current and future) in the organization.  Total numbers of devices (current and future) within each subnet. 28. Based on what characteristics routing protocols are evaluated?
  • 4. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS  Convergence times.  Protocol overheads in terms of capacity (bandwidth over- head).  CPU and memory utilization. 29. Explain Distance vector routing algorithm? In a distance-vector routing algorithm each router maintains the “distance” (a metric to weight each hop, or connection between routers) between itself and possible destinations. A vector (or list) of these distances is computed from distance information received from other participating routers on that network. 30. Explain link state routing algorithm? In a link-state routing algorithm each router learns about itself, its links to next-hop routers (its neighbors), and the state of each link. This information is multi- casted to other participating routers, and all routers build their routing information from the sum of these multicasts. 31. State the uses of BGP?  It can use policies to determine actions to be taken on paths.  BGP exchanges routing information by establishing peering connections using TCP with a user-defined list.  BGP is used to enforce network transport policies for an AS, and only announcing certain routes from this AS to other peers. 32. How to choose and apply routing protocols? 1. Minimize the number of routing protocols used in the network. Two should be the maximum number of protocols allowed, with only one IGP. 2. Start with the simplest routing strategy and routing mechanism/protocol. 3. As the complexity in routing and choices of routing protocols increase, reeval- uate the previous decisions. 33. Define network management?  Network management (NM) consists of the set of functions to control, plan, allocate, deploy, coordinate, and monitor network resources.  Network management used to be an afterthought in many network architectures.  For example, most network architectures and designs were developed without a thought about users being malicious, which was generally true up until a few years ago.  Consider the changes that have recently been made in SNMP security. Today, and in the future, networks are a resource whose integrity must be measurable and verifiable. 34. What are the layers of network management? Give an example of management at eachlayer?  Business Management: The management of the business aspects of a network—for example, the management of budgets/resources, planning, and agreements.
  • 5. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS  Service Management: The management of delivery of services to users—for example, for service providers this would include the management of access bandwidth, data storage, and application delivery.  Network Management: The management of all network devices across the entire network.  Element Management: The management of a collection of similar network devices—for example, access routers or subscriber management systems.  Network-Element Management: The management of individual network devices—for example, a single router, switch, or hub. 35. Define structure of network management hierarchy?  Network management structure is a top-down approach, with the most abstract component(business management) at the top of the hierarchy, and the most specified, concrete component (network-element management) at the bottom of this hierarchy.  Correspondingly, as the components become more abstract, the ways that they are applied and measured (their information elements) change.  Thus, at the bottom of this hierarchy, (network-element, element, network) management is applied with variables and parameters, while at the top of this hierarchy (service, business), management is applied in more abstract terms, using policies. 36. Define the basic functions of network management?  Network management can be divided into two basic functions:  The transport of management information across the system.  The management of NM information elements.
  • 6. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS  It consist of a variety of tasks—monitoring, configuring, troubleshooting, and planning— that are performed by users, administrators, and network personnel. 37. What are the four categories of network management tasks?  The four categories of network management tasks are:  Monitoring for event notification  Monitoring for trend analysis and planning  Configuration of network parameters  Troubleshooting the network 38. Define network devices?  A network device is an individual component of the network that participates at one or more of the protocol layers. This includes end devices, routers, switches, DSUs, hubs, and NICs. 39. What are the network devices characteristic?  Network devices have characteristics that can be measured. They are grouped into end- to-end, per-link, per-network or per-element characteristics. 40. What is end-to-end characteristics?  End-to-end characteristics are those that can be measured across multiple network devices in the path of one or more traffic flows, and may be extended across the entire network or between devices.  Examples of end-to-end characteristics for network devices are availability, capacity, delay, delay variation (jitter), throughput, error rates, and network utilization. These characteristics may be modified or added to, depending on the types of traffic on the network. 41. What is Per-link/per-network or per-element characteristics?  Per-link/per-network or per-element characteristics are those that are specific to the type of element or connection between elements being monitored.  These characteristics may be used individually, or may be combined to form an end-to- end characteristic.  Examples of per-link characteristics are propagation delay and link utilization, while examples of per-element characteristics include (for an IP router) IP forwarding rates
  • 7. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS (e.g., in IP packets/second), buffer utilization for the router, and any logs of authentication failures. 42. Define major types of network management protocols?  The two major network management protocols:  Simple Network Management Protocol (SNMP)  Common Management Information Protocol (CMIP)  These network management protocols provide the mechanism for retrieving, changing, and transport of network management data across the network. 43. Define SNMP?  SNMP has seen widespread use and forms the basis for many popular commercial and public network management systems.  It provides facilities for collecting and configuring parameters from network devices.  Parameters that are accessible via SNMP are grouped into management information bases, or MIBs.  Parameters can be part of the standard MIB (MIB-II), other standard MIBs (typically based on a type of network device, technology, or protocol), remote monitoring MIBs, or enterprise-specific MIBs, which have parameters specific to a particular vendor’s product. 44. Define SNMPv3? SNMP version 3 (SNMPv3) builds on the previous versions of SNMP, providing more secure authentication, the ability to retrieve blocks of parameters, and trap generation for most parameters. 45. List the SNMP commands? SNMP commands are listed below:  Get  Get-next  Set Get: To collect the value of a parameter Get-next: To collect the value of the next parameter in the list Set: To change the value of a parameter 46. Define Trap?  A trap is a user-configurable threshold for a parameter.  When this threshold is crossed, the values for one or more parameters are sent to a specified location.  A benefit of trap generation is that polling for certain parameters can be stopped or the polling interval lengthened, and instead an automatic notice is sent to the management system when an event occurs. 47. Define CMIP/CMOT?  CMIP includes CMIP over TCP/IP (CMOT).
  • 8. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS  CMIP/CMOT provides for parameter collection and setting, as with SNMP, but also allows for more types of operations.  Many CMIP/CMOT features, such as globally unique object naming, object classification, alarm reporting, audit trails, and test management, can also be provided by SNMP by creating new MIBs and tools to support such abstractions. 48. Define monitoring?  Monitoring is obtaining values for end-to-end, per-link, and per-element characteristics.  The monitoring process involves collecting data about the desired characteristics, processing some or all of this data, displaying the (processed) data, and archiving a subset of this data.  Data are usually collected through a polling (actively probing network devices for management data) or monitoring process involving a network management protocol (e.g., SNMP) or proxy service. 49. Define events?  An event is something that occurs in the network that is noteworthy.  This may be a problem or failure in a network device, across the network, or when a characteristic crosses a threshold value.  It may only be something that is informational to the user, administrator, or manager, such as notification of an upgrade.  Events may be noted in a log file, on a display, or by issuing an alarm, depending on the priority level of the event.  Events are similar to transients, which are short-lived changes in the behavior of the network. 50. Explain the instrumentation mechanisms?  Instrumentation is the set of tools and utilities needed to monitor and probe the network for management data.  Instrumentation mechanisms include access to network management data via SNMP, monitoring tools, and direct access.  Instrumentation can be coupled with monitoring, display, processing. and storage to form a complete management system. 51. List the base set of parameters to monitor?  The base set of parameters to monitor is listed below:  ifInOctets Number of bytes received  ifOutOctets Number of bytes sent  ifInUcastPkts Number of unicast packets received  ifOutUcastPkts Number of unicast packets sent  ifInNUcastPkts Number of multicast/broadcast packets received  ifOutNUcastPkts Number of multicast/broadcast packets sent  ifInErrors Number of errored packets received  ifOutErrors Number of packets that could not be sent
  • 9. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS  These parameters can be used for both short-term event monitoring and long-term trend analysis of throughput and error rates. 52. Define configuration mechanisms?  Configuration is setting parameters in a network device for operation and control of that element.  Configuration mechanisms include direct access to devices, remote access to devices, and downloading configuration files.  SNMP set commands  Telnet and command line interface (CLI) access  Access via HTTP  Access via common object request broker architecture (CORBA)  Use of FTP/TFTP to download configuration files. 53. Define FCAPS model?  Fault management  Configuration management  Accounting management  Performance management  Security management 54. Define In-Band and Out-of-Band Management?  In-band management occurs when the traffic flows for network management follow the same network paths as the traffic flows for users and their applications.  Out-of-band management occurs when different paths are provided for network management data flows and user traffic flows. 55. Define the terms Centralized, Distributed, and Hierarchical Management? Terms Definitions Centralized Management Centralized management occurs when all management data (e.g., pings, SNMP polls/responses, Trace route, etc.) radiate from a single (typically large) management system. The flows of management data then behave like the client– server flows. Distributed Management Distributed management occurs when there are multiple separate components to the management system, and these components are strategically placed across the network, localizing network management traffic and distributing management domains. (e.g., one management system per campus or per management domain, or a single management system with several monitoring nodes).
  • 10. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS 56. Define check and balances & its objectives? o Checks and balances are methods to duplicate measurements in order to verify and validate network management data. o Objectives of check & balances: o Errors in recording or presenting network management data. o Rollovers of counters (e.g., returning a counter value to zero without proper notification). o Changes in MIB variables from one software version to another. 57. Define northbound interface?  When the network includes an interface to an operations support system (OSS), the network management architecture must consider how management is to be integrated with the OSS.  The interface from network management to OSS is often termed the northbound interface, as it is in the direction of service and business management.  This northbound interface is typically CORBA or SNMP. 58. What are the different types of relationships in network management architecture? • The different types of relationships in NMA are: o Internal relationships o External relationships Hierarchical Management Hierarchical management occurs when the management functions (monitoring, display, storage, and processing) are separated and placed on separate devices. Management is hierarchical in that, when the functions are separated, they can be considered layers that communicate in a hierarchical client–server fashion.
  • 11. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS • Internal relationships: Internal relationships for the network management architecture comprise the interactions, dependencies, trade-offs, and constraints between network management mechanisms. • It is important to understand these relationships, as they are part of a complex, nonlinear system and they define and describe the behavior of this architecture. • External relationships: External relationships comprise trade-offs, dependencies, and constraints between the network management architecture and each of the other component architectures (addressing/routing, performance, security, and any other component architectures you may develop). 59. What is Performance? Performance is the set of levels for capacity, delay, and RMA in a network. It is mainly to optimize these levels, either for all (user, application, and device) traffic flows in the network, or for one or more sets of traffic flows, based on groups of users, applications, and/or devices. 60. What is Performance architecture? A performance architecture is the set of performance mechanisms to configure, operate, manage, provision, and account for resources in the network that support traffic flows. The performance architecture shows where these mechanisms are applied within the network. 61. What are the common problems addressed by performance architecture?  Improving the overall performance of a network  Improving the performance to select users, applications, and/or devices  Changing the network from a cost center to profitability  Merging multiple traffic types over a common network infrastructure  Differentiating customers for multiple levels of service. 62. Define Qos and its 2 types? Quality of Service, or QoS, is determining, setting, and acting upon priority levels for traffic flows. QoS is usually associated with IP but is used here to define a class of mechanisms and apply priority levels in the network. The 2 types are  Differentiated services (DiffServ, or DS)  Integrated services (IntServ, or IS) DiffServapproaches QoS from the perspective of aggregating traffic flows on a per-hop basis based on traffic behavior, while IntServ approaches QoS from the perspective of supporting traffic flows on an individual, end-to-end basis. 63. Compare Differentiated Services and Integrated Services.
  • 12. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS 64. What is Prioritization and Scheduling? Prioritization is the process of determining which user, application, device, flow, or connection gets service ahead of others, or gets a higher level of service. Prioritization is necessary as there will be competition between traffic flows for network resources. Schedulingis the mechanism that determines the order in which traffic is processed for transmission. Scheduling uses priority levels to determine which traffic flows get processed first and most often. 65. What is Traffic management and Queueing? Traffic Management: Traffic management consists of admission control and traffic conditioning. Admission control is the ability to refuse access to network resources. Traffic conditioning is a set of mechanisms that modify performance to traffic flows, as a precursor to scheduling. Queuing is storing IP packets (this can also be applied to frames or cells, but for the purposes of this discussion we limit it to IP packets) within a network device while they wait for processing. There may be several locations where packets are stored (queues) within a network device. 66. What are the Queueing mechanisms? The following queuing mechanisms:  First in first out (FIFO)  Class-based queuing (CBQ)  Weighted fair queuing (WFQ)  Random early detect (RED)  Weighted RED (WRED) 67. What are Service Level Agreements? Service-level agreements(SLAs) are formal contracts between a provider and user that define the terms of the provider’s responsibility to the user and the type and extent of accountability if those responsibilities are not met.
  • 13. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS SLA performance elements may be data rate (minimum, peak) and burst tolerance (size, duration), and can be separated into upstream (in the direction from the destination to the source) and downstream (in the direction from the source to the destination). 68. What are Policies? Policies are formal or informal sets of high-level statements and rules about how network resources are to be allocated among users. They are used to create and manage one or more performance objectives. 69. What is network security? Network security is defined here as the protection of networks and their services fromunauthorized access, modification, destruction, or disclosure. It provides assurancethat thenetwork performs its critical functions correctly and that there are noharmful side effects. 70. What is network privacy? Network privacy is a subset of network security, focusing on protection of networks and their services from unauthorized access or disclosure. This includes all user, application, device, and network data. 71. What is threat analysis? A threat analysis is a process used to determine which components of the system need to be protected and the types of security risks (threats) they should be protected. 72. What is security policies and procedures? Security policies and procedures are formal statements on rules for system, network, and information access and use, in order to minimize exposure to security threats. 73. What is physical security? Physical security is the protection of devices from physical access, damage, and theft. 74. What is security awareness? Security awareness entails getting users educated and involved with the day to- day aspects of security in their network, and helping them to understand the potential risks of violating security policies and procedures. 75. What is encryption and decryption? Encryption/decryption is a security mechanism where cipher algorithms are applied together with a secret key to encrypt data so that they are unreadable if they are intercepted. Data are then decrypted at or near their destination.
  • 14. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS 76. What is public key infrastructure? Public key infrastructure is a security infrastructure that combines security mechanisms, policies, and directives into a system that is targeted for use across unsecured public networks (e.g., the Internet), where information is encrypted through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. 77. What is network address translation? Network address translation, or NAT, is the mapping of IP addresses from one realm to another. Typically this is between public and private IP address space. Private IP address space is the set of IETF-defined private address spaces (RFC 1918): • Class A 10.x.x.x 10/8 prefix • Class B 172.16.x.x 172.16/12 prefix • Class C 192.168.x.x 192.168/16 prefix. 78. What is remote access? Remote access consists of traditional dial-in, point-to-point sessions, and virtual private network connections, Security for remote access includes what is commonly known as AAAA: authentication of users; authorization of resources to authenticated users; accounting of resources and service delivery; and allocation of configuration information (e.g., addresses or default route). 79. What is firewalls? Firewalls are combinations of one or more security mechanisms, implemented in network devices (routers) placed at strategic locations within a network. 16 MARKS 1. Explain Addressing/Routing Component Architecture?(8) 2. Explain Network Management Component Architecture?(8) 3. Explian Architecture and Design?(8) 4. Explain in detail about Architectural Models with neat diagram?(16) 5. Explain addressing and routing fundamentals? 6. Write short notes on (i) Subnetting (ii) Supernetting (iii)Variable-length subnetting. 7. What are the routing mechanisms? - Establishing routing flows - Identifying and classifying routing boundaries - Manipulating routing flows. 8. What are the routing strategies available? - Evaluating Routing Protocols. - Choosing and Applying Routing Protocols. 9. Explain briefly about the network management mechanisms? o Two major network management protocols: o Simple Network Management Protocol (SNMP) o Common Management Information Protocol (CMIP) o There are 3 ways of network management mechanisms: o Monitoring mechanisms
  • 15. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS o Instrumentation mechanisms o Configuration mechanisms o How to manage a network management data? o Recommendation 1: Local storage versus archival. o Recommendation 2: Selective copying of data. o Recommendation 3: Data migration. o Recommendation 4: Metadata. 10. Discuss the following performance mechanisms. i)Quality Of Service ii)Prioritization 11. Explain Traffic Management and Scheduling? 12. Explain i)Goals for Performance Mechanism(8) ii)Service Level Arguments and Policies(8) 13. How much storage capacity is required for the following network management configuration? To solve this problem refer the sample problem given below: o For example, consider a network that has 100 network devices, where each element has an average of four interfaces and each interface is monitored for eight characteristics. This would add up to o (100 network devices)∗ (4 interfaces/network device)∗(8characteristics/interface) = 3200 characteristics. o If each of the 3200 characteristics generates an average of 8 bytes of data and an estimated 60 bytes of protocol overhead, the amount of data generated per polling session would be o (3200 characteristics)∗(8 bytes+60 bytes) = 217.6 KB of traffic, or 1.74 Mb of traffic. o If we plan to poll with a polling interval of 5 seconds, at best this 1.74 Mb of traffic would be spread out over the 5 seconds, or 384 Kb/second. o It is more likely, however, that most of the data will arrive shortly after the polls are generated, so the traffic may be more like a spike of 1.74Mb for the second after the polls occur. o For a period of one day, the total amount of traffic will be o (1.75 Mb/polling interval)∗(720 polling intervals/hour)∗(24 hours/day) = 30.2Gb of traffic o And the amount of data stored would be o (3200 characteristics/polling interval)∗(8 bytes)∗(720 polling intervals/day)∗ (24 hours/day) = 442 MB data stored per day .
  • 16. CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORKS o Over the course of a year, this would add up to over 161 GB of data. And this is a conservative estimate for mid-range enterprise environment. 14. Describe briefly about Security and Privacy Administration? o Threat analysis o Plans and procedures 15. Describe briefly about Security and Privacy Mechanisms?