Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

King Saud University

College of Computer and Information Sciences

Computer Science Department

CSC 524 First semester 1442/1443

Assignment 4

Name ID Section

1- A network is given with the topology sketched in the figure below. The links are
assigned with a cost.
U V
1
5
2 Z 15
2 10

X Y
1

a) Use the Distance vector routing to find the initial and final routing tables of X, Z, and V.
To Cost Next To Cost Next To Cost Next
X 0 - X 2 X X ∞
Z 2 Z Z 0 - Z 5 Z
Y 1 Y Initial Y 10 Y Table Y 15 Y X's
V ∞ Initial Z's V 5 V Table V 0 -
U 2 U Initial V's U ∞ Table U 1 U

To Cost Next To Cost Next To Cost Next


X 0 - X 2 X X 3 U
Z 2 Z Z 0 - Z 5 Z
Y 1 Y Final Y 10 Y Table Y 15 Y X's
V 3 U Final Z's V 5 V Table V 0 -
U 2 U Final V's U 4 X Table U 1 U

2) A network is given with the topology sketched in the figure below. The links are assigned
with a cost. Use Dijkstra algorithm to find the routing table of U.

1
Tentativ
Iteration Permanent X W V Y Z
e
Initial {U} {X,W,V} 5 3 7 ∞ ∞
1 {U,W} {X,V,Y} 5 6 11 ∞
2 {U,W,X} {V,Y,Z} 6 11 14
3 {U,W,X,V} { Y,Z} 10 14
4 {U,W,X,V,Y} {Z} 12
5 {U,W,X,V,Y,Z} {}

3
U W Y Z
2
3
4
X
V
Routing table for router U

Network address Cost Next hop


U 0 -
W 3 W
X 5 X
V 6 W
Y 10 W
Z 12 W

2
3) Define the concept of quality of service (QoS) management in network

Quality of service mechanisms let a network with less capacity meet application requirements just as well
at a lower cost. With quality of service mechanisms, the network can honor the performance guarantees
that it makes even when traffic spikes, at the cost of turning down some requests. This makes it possible
to ensure that critical network applications receive priority handling.

Four issues must be addressed to ensure quality of service:


1. What applications need from the network.
2. How to regulate the traffic that enters the network.
3. How to reserve resources at routers to guarantee performance.
4. Whether the network can safely accept more traffic.

No single technique deals efficiently with all these issues. Instead, a variety of techniques have
been developed for use at the network (and transport) layer. There are two versions of QoS for
the Internet called Integrated Services and Differentiated Services.

Measurements of concern to QoS are bandwidth (throughput), latency (delay), jitter (variance in
latency), and reliability. This renders QoS of particular importance to high-bandwidth, real-time
traffic such as voice over IP (VoIP), video conferencing, and video-on-demand that have a high
sensitivity to delay and jitter.

4)Explain briefly the differences between IntServ and DiffServ approaches for quality of
service management.

In the DiffServ model a packet's "class" can be marked directly in the packet, which contrasts
with the IntServ model where a signaling protocol is required to tell the routers which flows of
packets requires special QoS treatment. DiffServ achieves better QoS scalability, while
IntServ provides a tighter QoS mechanism for real-time traffic. These approaches can be
complimentary and are not mutually exclusive.

The DiffServ architecture model divides traffic into a small number of classes, and allocates
resources on a per-class basis. Because DiffServ has only a few classes of traffic, a packet's
"class" can be marked directly in the packet.

In DiffServ the choice of service classes is up to each operator, the simplest class defined is
expedited class: it contains two classes of service: regular and expedited. The expedited packets
should be able to transit the network as though no other packets were present. Another scheme
for managing the service classes is called assured forwarding: it specifies four priority classes:
the top three classes called gold, silver, and bronze each class having its own resources. In
addition, it defines three discard classes for packets congestion: low, medium, and high. After
classifying packets four priority and determining the discard class for each packet, the packets
are processed by routers with a packet scheduler using weighted fair queueing (higher classes
given higher weights).

3
In the IntServ model, packets are classified and marked to receive a particular forwarding
treatment (per-hop behavior or PHB) on nodes along their path. Sophisticated classification,
marking, policing, and shaping operations need only be implemented at network boundaries or
hosts, enabling greater scalability than other models of service differentiation.

IntServ handles multicast traffic using spanning tree. The main part of the IntServ architecture
that is visible to the users of the network is RSVP (Resource reSerVation Protocol). This
protocol is used for making the reservations; which allows multiple senders to transmit to
multiple groups of receivers, permits individual receivers to switch channels freely, and
optimizes bandwidth use while at the same time eliminating congestion.

You might also like