Full Form and Their Uses
Full Form and Their Uses
Full Form and Their Uses
The backpressure technique can be applied only to virtual circuit networks. In such virtual circuit each node knows the upstream
node from which a data flow is coming.
In this method of congestion control, the congested node stops receiving data from the immediate upstream node or nodes.
This may cause the upstream node on nodes to become congested, and they, in turn, reject data from their upstream node or nodes.
As shown in fig node 3 is congested and it stops receiving packets and informs its upstream node 2 to slow down. Node 2 in turns
may be congested and informs node 1 to slow down. Now node 1 may create congestion and informs the source node to slow
down. In this way the congestion is alleviated. Thus, the pressure on node 3 is moved backward to the source to remove the
congestion.
ii. Choke Packet
In this method of congestion control, congested router or node sends a special type of packet called choke packet to the source to
inform it about the congestion.
Here, congested node does not inform its upstream node about the congestion as in backpressure method.
In choke packet method, congested node sends a warning directly to the source station i.e. the intermediate nodes through which
the packet has traveled are not warned.
FIFO Queuing: In this queuing technique, the arrival packets are stored in First Come First Serve basis. If the arrival rate is less than the
processing rate, then the queue will fill up and the new arriving packets will not have any space to store in the queue and gets discarded.
Priority Queuing - In priority queuing packets are first assigned to a priority class. Each priority class has its own queue. The packets in
the highest priority queue are processed first. The packets in the lowest priority queue are processed last. This process continues until
the queue is empty.
Weighted Fair Queuing In Weighted Fair Queuing technique, the packets are still assigned to different classes and admitted to different
queues. However, the queues are weighted based on the priority of the queues (higher priority means a higher weight). The system
processes packets in each queue in a round robin fashion with the number of packets selected from each queue based on the
corresponding weight.
2. Traffic Shaping:
Traffic shaping is a mechanism to control the amount and the rate of the traffic sent to the network. There are two techniques under this
mechanism.
Leaky Bucket If the traffic consists of fixed size packets, the process removes a fixed number of packets from the queues. If the traffic
consists of variable length packets, the fixed output rate must be based on the number of bytes or bits.
Token Bucket Leaky bucket algorithm outputs the data in average rate from the burst data, but it does not taken the time when the host
was idle, into account.
3. Admission Control:It is a mechanism used by the networking device like router and switches to accept or reject a flow based on
predefined parameters called flow specification. Before a router accepts a flow for processing, it checks the flow specification to see if its
capacity and its previous commitments to other flows can handle the new flow.
4. Resource reservation: A flow of data needs resource such as buffer bandwidth, CPU time and so on. The QoS is improved if these
resources are reserved beforehand.
5. Write any on IP Address, MAC Address, Socket Address and IPv6 Address.
IP Address:
The IP address is an address bound to the network device, i.e., computer, via software.
Example: 192.168.188.2
MAC Address:
The MAC address is a hardware address, which means it is unique to the network card installed on your PC.
Example: DE-56-0A-DC-E6-88
Socket Address: Socket address is the combinations of IP addresses and port number.
IPv6 Address:
An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets, a
group sometimes also called a hextet. The groups are separated by colons (:).
Example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
3. Look Back.
Look Back is use to check connections on both side i.e. sender and receiver.
Network part= 127, Host part=anything.
Example: 127.162.198.255
PATHPING: Pathping is a TCP/IP based utility (command-line tool) that provides useful information about network latency and network
loss at intermediate hops between a source address and a destination address.
TRACEROUTE: A traceroute is a function which traces the path from one network to another. It allows us to diagnose the source of many
problems.
A default gateway serves as an access point or IP router that a networked computer users to send information to a computer in another
network or the internet.