Professional Documents
Culture Documents
Assignment No:- 3
Subject :- Computer Network
Subject Code:- CAT-312
Date of submission:- 12-11-19
Streaming stored audio and video: In this class of applications, clients request
on-demand compressed audio or video files, which are stored on servers. For
audio, these files can contain a professor's lectures, rock songs, symphonies,
archives of famous radio broadcasts, as well as historical archival recordings.
For video, these files can contain video of professors' lectures, full-length
movies, prerecorded television shows, documentaries, video archives of
historical events, video recordings of sporting events, cartoons and music video
clips.
One to many streaming of real-time audio and video: This class of applications
is similar to ordinary broadcast of radio and television, except the transmission
takes place over the Internet. These applications allow a user to receive a radio
or television transmission emitted from any corner of the world. (For example,
one of the authors of this book often listens to his favorite Philadelphia radio
stations from his home in France.).
Real-time interactive audio and video: This class of applications allows people
to use audio/video to communicate with each other in real-time. Real-time
interactive audio is often referred to as Internet phone, since, from the user's
perspective, it is similar to traditional circuit-switched telephone service.
Internet phone can potentially provide PBX, local and long-distance telephone
service at very low cost. It can also facilitate computer-telephone integration (so
called CTI), group real-time communication, directory services, caller
identification, caller filtering, etc.
Ans:- The data link layer is concerned with local delivery of frames between
nodes on the same level of the network. Data-link frames, as these protocol data
units are called, do not cross the boundaries of a local area network. Inter-
network routing and global addressing are higher-layer functions, allowing data-
link protocols to focus on local delivery, addressing, and media arbitration. In
this way, the data link layer is analogous to a neighborhood traffic cop; it
endeavors to arbitrate between parties contending for access to a medium,
without concern for their ultimate destination. When devices attempt to use a
medium simultaneously, frame collisions occur. Data-link protocols specify
how devices detect and recover from such collisions, and may provide
mechanisms to reduce or prevent them.
Examples of data link protocols are Ethernet for local area networks (multi-
node), the Point-to-Point Protocol (PPP), HDLC and ADCCP for point-to-point
(dual-node) connections. In the Internet Protocol Suite (TCP/IP), the data link
layer functionality is contained within the link layer, the lowest layer of the
descriptive model, which also includes the functionality encompassed in the
OSI model's physical layer.
The data link layer has two sublayers: logical link control (LLC) and media
access control (MAC).[2]
The uppermost sublayer, LLC, multiplexes protocols running at the top of data
link layer, and optionally provides flow control, acknowledgment, and error
notification. The LLC provides addressing and control of the data link. It
specifies which mechanisms are to be used for addressing stations over the
transmission medium and for controlling the data exchanged between the
originator and recipient machines.
MAC may refer to the sublayer that determines who is allowed to access the
media at any one time (e.g. CSMA/CD). Other times it refers to a frame
structure delivered based on MAC addresses inside.
There are generally two forms of media access control: distributed and
centralized.[3] Both of these may be compared to communication between
people. In a network made up of people speaking, i.e. a conversation, they will
each pause a random amount of time and then attempt to speak again,
effectively establishing a long and elaborate game of saying "no, you first".
The Media Access Control sublayer also determines where one frame of data
ends and the next one starts – frame synchronization. There are four means of
frame synchronization: time based, character counting, byte stuffing and bit
stuffing.
Open loop congestion control policies are applied to prevent congestion before
it happens. The congestion control is handled either by the source or the
destination.
Window Policy :
The type of window at the sender side may also affect the congestion. Several
packets in the Go-back-n window are resent, although some packets may be
received successfully at the receiver side. This duplication may increase the
congestion in the network and making it worse.
Discarding Policy :
A good discarding policy adopted by the routers is that the routers may prevent
congestion and at the same time partially discards the corrupted or less sensitive
package and also able to maintain the quality of a message.
In case of audio file transmission, routers can discard less sensitive packets to
prevent congestion and also maintain the quality of the audio file.
Acknowledgment Policy :
Since acknowledgement are also the part of the load in network, the
acknowledgment policy imposed by the receiver may also affect congestion.
Several approaches can be used to prevent congestion related to
acknowledgment.
The receiver should send acknowledgement for N packets rather than sending
acknowledgement for a single packet. The receiver should send a
acknowledgment only if it has to sent a packet or a timer expires.
Admission Policy :
Backpressure :
Backpressure
In above diagram the 3rd node is congested and stops receiving packets as a
result 2nd node may be get congested due to slowing down of the output data
flow. Similarly 1st node may get congested and informs the source to slow
down.
choke packet
Implicit Signaling :
Explicit Signaling :
Ans;- Network congestion may occur when a sender overflows the network
with too many packets. At the time of congestion, the network cannot handle
this traffic properly, which results in a degraded quality of service (QoS). The
typical symptoms of a congestion are: excessive packet delay, packet loss and
retransmission.
Ans:-
Suppose the data to be transmitted is 1011001, the bits will be placed as follows:
To find the redundant bit R1, we check for even parity. Since the total number
of 1’s in all the bit positions corresponding to R1 is an even number the value of
R1 (parity bit’s value) = 0
2. R2 bit is calculated using parity check at all the bits positions whose binary
representation includes a 1 in the second position from the least significant bit.
R2: bits 2,3,6,7,10,11
To find the redundant bit R2, we check for even parity. Since the total number
of 1’s in all the bit positions corresponding to R2 is an odd number the value of
R2(parity bit’s value)=1
3. R4 bit is calculated using parity check at all the bits positions whose binary
representation includes a 1 in the third position from the least significant bit.
R4: bits 4, 5, 6, 7
To find the redundant bit R4, we check for even parity. Since the total number
of 1’s in all the bit positions corresponding to R4 is an odd number the value of
R4(parity bit’s value) = 1
4. R8 bit is calculated using parity check at all the bits positions whose binary
representation includes a 1 in the fourth position from the least significant bit.
R8: bit 8,9,10,11
To find the redundant bit R8, we check for even parity. Since the total number
of 1’s in all the bit positions corresponding to R8 is an even number the value of
R8(parity bit’s value)=0.