Free Essay

Frame Relay Congestion Control

In: Computers and Technology

Submitted By djones19143
Words 2007
Pages 9
Frame Relay Congestion Control

CIS532004016-201003: Network Architecture and Analysis

TABLE OF CONTENTS

Chapter 1- Introduction …………………………………………………………. 3
Chapter 2- Background …………………………………………………………. 4
Chapter 3- Review and Findings ………………………………………………. 11
Chapter 4- Conclusion …………………………………………………………. 12
References ……………………………………………………………………... 13

Frame Relay Congestion Control This document is a study of the principles of congestion control within the frame relay protocol. From examining existing congestion management efforts to up and coming possible solutions there are a multiplicity of efforts intent on solving network congestion issues. These efforts include work by independent research groups as well standards groups like the Internet Engineering Task Force (IETF) and IEEE (802.1Qau - Congestion Notification). Congestion is defined as the condition in which demand exceeds available network resources (i.e., bandwidth or buffer space) for a sustained period of time. Congestion control deals with the resource allocation and traffic management mechanisms that avoid or recover from conditions causing congestive situations. (McDysan, Spohn (1999). The methods for congestion control in frame relay involve congestion management and avoidance. Congestion management attempts to make sure the network never experiences congestion. One method of management attempts to avoid congestion entirely. This involves network designers allocating proper resource allocation which may include changes to: * Physical trunk capacity * Virtual Path Connection (VPC) Bandwidth * Allocated Buffer Space

The way in which a network allocates resources may be a balance between economic implementation cost and the degree of guaranteed Quality of Server (QoS). Congestion avoidance attempts to avoid severe congestion while at the same time keeping the offered load at the lower edge of the mildly congested region. In other words, it attempts to remain below some threshold deemed acceptable transmission rate.
Background
Frame Relay provides for a fair allocation of resources with a concept called a committed information rate (CIR). This rate is defined as an average transmission capacity agreed upon for a virtual circuit that connects one company location to another under normal conditions. For instance, a company may have a need for a virtual circuit with a CIR of 128kbps. What this means is that the company is basically guaranteed that they will have a bandwidth of at least 128kbps available at hand. However, because of the shared nature amongst many subscribers on frame relay networks, there will often be excess bandwidth available at any point and time. This excess bandwidth will actually allow customer’s traffic to “burst” to higher speeds than their subscription rate within allowable bandwidth permission. This “burst” speed is referred to as the Committed Burst Information Rate (CBIR). For example, a virtual circuit with a CIR of 128 Kbps may have a CBIR of 256 Kbps.
Frame relay traffic control procedures which out of necessity precede congestion control procedures are described in the diagram depicted in Figure 1. The total number of bits which are transmitted are plotted on the vertical axes versus time on the horizontal axes. The maximum bit rate per unit of time is limited by the access line rate, AR. The CIR is the number of bits in a committed burst size, Bc, that arrives during a measured interval of time T arriving at the equation CIR = Bc/T. The dashed line in the figure represents the slope equal to CIR. If the amount of bits arriving during the interval T exceeds Bc, but lower than what is represented as a threshold, Bc+Be (with Be equaling the amount of data in excess of Bc the network will attempt to transfer), then the frames associated with those bits are marked as Discard Eligible (DE) as represented in Figures 1 and 2.

Figure 1 Example of Frame Relay Traffic Control Operation (McDysan & Spohn,1999)

Figure 2 The basic 2-byte frame relay frame and header (McDysan & Spohn,1999)
Frame Relay switched networks provide simple congestion-notification mechanisms. Frame Relay switching equipment can mark a Frame Relay packet with either front-end congestion notification (FECN) or back-end congestion notification (BECN) within the frame relay header field as illustrated in Figure 2. As components of congestion avoidance, both FECN and BECN notifications are defined as explicit signaling. According to Stallings (2002), for explicit signaling, two bits in the address field of each frame are provided. Either bit may be set by any frame handler that detects congestion. The two bits are as follows:

* Backward explicit congestion notification (BECN): Notifies the user that congestion avoidance procedures should be initiated where applicable for traffic in the opposite direction of the received frame. It indicates that the frames that the user transmits on this logical connection may encounter congested resources. BECN sends a message to the source router when a Frame Relay switch senses congestion in the network. A BECN message requests a reduced data-transmission rate. BECN messages are also relayed to the higher-layer protocols, which can initiate some form of flow control or traffic shaping. In some cases, the higher-layer protocols ignore BECN messages. (Stallings, 2002; McDysan & Spohn,1999)

* Forward explicit congestion notification (FECN): Notifies the user that congestion avoidance procedures should be initiated where applicable for traffic in the same direction as the received frame. It indicates that this frame, on this logical connection, has encountered congested resources. A DTE device receiving this message can relay this information to a higher-layer protocol for processing, which in turn can initiate flow control or simply ignore the message. (Stallings, 2002; McDysan & Spohn,1999)

The DTE equipment at the other end of a circuit notices whether a packet has experienced congestion and notifies a higher layer that congestion has occurred. Additionally, the equipment can mark a packet as discard eligible (DE) to indicate that it is less important, which means that it can be dropped if congestion occurs.

As mentioned, the Forward Explicit Congestion Notification (FECN) and Backward Explicit Congestion Notification (BECN) bits indicate to the receiver and sender, respectively, the presence of congestion in the network. The Discard Eligibility (DE) bit, when set to 1, indicates that during congestion conditions the network should discard this frame in preference to other frames with a higher priority, for example, those with DE bit set to 0. The danger with this method though during long periods of congestion is that the application may react by retransmitting lost frames, intensifying congestion, and possibly resulting in a phenomenon called congestion collapse. Congestion collapse, in a nutshell is the condition where the total incoming bandwidth to a node exceeds the outgoing bandwidth. This condition back in 1987 with the ARPANET led to the development of the TCP network protocol.

RFC 2914 from which many of the principles described is a comprehensive examination of the protocols for correct effective congestion control implementation. It describes through illustration the danger of not implementing proper congestion control mechanisms and discusses the role of the Internet Engineering Task Force (IETF) in standardizing congestion control protocols. This RFC was released in September, 2000. Mentioned in the text in subsection 4.3, New develops in the standards process, are RFC’s [RFC 2212, RFC 2475] concerning the development of integrated and differentiated services and of Explicit Congestion Notification (ECN) [RFC 2481]. As a forefront to newer developments a proposed construction of Endpoint Congestion Management enabling multiple concurrent flows from a sender to the same receiver to share congestive control state. The idea is to allow multiple connections to the same destination governed by a Congestion Manager to slow-start individual connections taking advantage of previous congestive states in end-to-end paths.

There are a number of recent studies intent on improving the problems associated with network congestion. One such study, Adaptive Routing in Data Center Bridges (Minkenberg, Gusat &Rodriguez, 2009), studies the benefits of multi-pathing, i.e., the presence of multiple alternative paths between any pair of end nodes. Multiple path alternatives lead to significant performance improvements by taking full advantage of path diversity. This diversity avoids congestion by rerouting “hot” flows (i.e., those detected as contributing to congestion) onto an alternative, uncongested path; only when no uncongested alternative exists are transmission rates of hot flows reduced at the sources.

The premise behind this study is to prove that if a congested flow can be routed on an alternative, uncongested path, its rate does not have to be reduced. Therefore, as the paper indicates, combining adaptive routing (AR) with congestion management (CM) can significantly increase the throughput of a congested network, because send rates have to be reduced only if no alternative uncongested path exists. Congestion due to routing conflicts could be resolved effectively by rerouting some or all of the congested flows onto an alternative path, thereby obtaining higher overall network throughput than in existing 802.1Qau approaches, which merely reduce the source rates. An advantage of the proposed scheme is that no changes are necessary to the Ethernet frame format, existing CM schemes, and Ethernet adapters; it operates by exclusively modifying the routing behavior of the Ethernet switches. Interoperation with 802.1Qau is seamless: if no alternative path exists, the send rates will eventually be reduced to match the bottleneck rate.

This groups conclusive efforts showed that the performance can be improved significantly (increased throughput, reduced latency) under both specific congestion scenarios and uniform traffic. Execution times were lowered compared to existing benchmarks which in some cases found that enabling congestion management by itself (without adaptive routing) does more harm than good.

Another study, An Architecture for Congestion Management in Ethernet Clusters ( McAlpine, Wadekar , Gupta , Crouch & Newell, 2005), describes methods for dealing with congestion by employing three levels of congestion management: 1) provide congestion detection and information feedback from the Ethernet interconnect that can be used to enable higher layer congestion management, 2) support rate control at Ethernet entrances to avoid oversubscription of the lower layer interconnect resources, and 3) provide flow optimization and rate control on the links local to congestion to deal with transient congestion issues. The final expectation was to deal with congestion by providing a method for efficient throughput, low latency, low delay variations, and eliminating frame drops, even with very modest sized switch buffers.

The simulation results presented in this paper demonstrated that these mechanisms can significantly improve performance of short-range Ethernet interconnects during heavy congestion. This study is a work-in-progress conducted in parallel with IEEE standards efforts (i.e. 802.1Qau).

Review and Findings The congestion management tools in place have been effective in alleviating what has been a growing need since networks are ever increasing capacity and bandwidth. The methods introduced in the IEEE studies are evidence that by and large the ability does exist to add on and to improve issues related to network congestion. I found the study on Adaptive Routing in Data Center Bridges (Cyriel Minkenberg, Mitchell Gusat, German Rodriguez), most interesting since they seemed to have a more complete understanding of how their methods could adapt to existing congestion methodologies. The idea where previous use of adaptive routing was limited to compensating loss of connections between nodes can now be used to establish new connections to compensate for congestive connections is a very much needed adaption.

Conclusion
This study was very much a learning experience allowing comparisons from what exists in congestion management schemes to what is now being proposed. As time progresses and network connection rates are ever increasing, there definitely is a need to modify existing congestion relief efforts to incorporate the kinds of methods which seem to be in the works as of this report. I look forward to investigating progress in this area as modifications are implemented.

References

McDysan, D., Spohn, D. (1999). ATM Theory and Applications (Signature ed.), McGraw-Hill.
Stallings, W. (2002). Network Architecture and Analysis. Upper Saddle River, NJ: Prentice Hall.
Minkenberg, C., Gusat, M., Rodriguez, G. (2009). Adaptive Routing in Data Center Bridges. 2009 17th IEEE Symposium on High Performance Interconnects, August 2009, 33-41.
McAlpine, G., Wadekar, M., Gupta, T., Crouch, A., Newell, D. (2005). An Architecture for Congestion Management in Ethernet Clusters. 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 9, April 2005, 211a.

Similar Documents

Free Essay

Frame Relay Migration to Mpls

...Frame Relay Migration to MPLS Frame Relay is a standardized wide area network technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology. Multiprotocol Label Switching (MPLS) is a mechanism in high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table. Frame Relay aimed to make more efficient use of existing physical resources as clients were unlikely to be utilizing a data service 100 percent of the time. In more recent years, Frame Relay has acquired a bad reputation in some markets because of excessive bandwidth overbooking by these telcos. Telcos often sell Frame Relay to businesses looking for a cheaper alternative to dedicated lines; its use in different geographic areas depended greatly on governmental and telecommunication companies' policies. Many customers are likely to migrate from Frame Relay to MPLS over IP or Ethernet within the next two years, which in many cases will reduce costs and improve manageability and performance of their wide area networks. Multiprotocol Label Switching (MPLS) enables Enterprises and Service Providers to build next-generation intelligent networks that deliver a wide variety of advanced, value-added services over a single infrastructure. This economical solution can be integrated seamlessly over any existing infrastructure...

Words: 755 - Pages: 4

Free Essay

You Decide Week 3

...began reading up on Frame Relay, but was confused by all of the new terminology. Perhaps with your networking knowledge, you can help Kim in this area. First I think Kim has some serious control issues that at some point should be addressed. The writers of this scenario mustn’t realize that at the understanding that a non-tech person is beginning to read a tech book to help make important tech decisions is equal to an NFL team whose looking for a new coach and gets a resume from someone whose accomplishments only include how many Madden championships he’s won. While on the surface it looks similar, but in reality it’s just scary. I would first explain to Kim that Frame Relay is a WAN implementation methodology which uses virtual circuits to insure an end to end data transmission rate at a guaranteed level of service with additional bandwidth made available if it is not being utilized, but that is not guaranteed. So when considering price, you should only consider the guaranteed rate as opposed to the theoretical additional bandwidth as it is not guaranteed and in a major metropolitan area you might not ever see this extra bandwidth. As it is expressed in the scenario summary Kim is going to see a lot of terminology that she might not understand so I would prepare a short description of all the most common terms she might come across. DLCI— Data-link connection identifier is a number that identifies the logical local circuit between the router and the frame switch. My discussion...

Words: 774 - Pages: 4

Free Essay

Frame-Relay

...Professor Jeffrey Robinson August 20, 2013 Abstract In this discussion we look at some of the history around frame-relay. We then look at some of the equipment necessary to create the frame relay connections, as well as how the connections work both logically and physically. Some limiting factors are discussed as well as committed information rates, burst rates, an error handling. Some of the positive aspects of frame-relay are identified along with some options for the future of WAN technologies. Frame-Relay Operating at the physical and datalink layers of the OSI model, frame relay is a high-performing WAN protocol. It was originally designed for use with ISDN integrated services digital network interfacing. It has evolved into being used on multiple types of network interfaces. In 1984 the initial proposal for frame-relay standardization was presented to the CCITT Consultative Committee on international telephone and telegraph. Because interoperability standards were lacking, frame-relay did not fully take off until the 1990s. In 1990 StrataCom, Northern Telecom, Digital Equipment Corporation (DEC), and Cisco created a consortium that focused on the technical development of frame-relay technology. While the CCITT was already discussing frame-relay, the consortium established specifications that while still conforming to the frame-relay protocol, enhanced the protocol with additional features to accommodate more complex internetworking environments...

Words: 2574 - Pages: 11

Free Essay

Chapter 11 Ccna

...connections is mandatory. ____ 5. The Frame Relay map can be built automatically or statically depending on the Frame Relay topology. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. PPP is an Internet standard protocol defined in RFCs 2153 and ____. a.|1551|c.|2234| b.|1661|d.|2532| ____ 7. The ____ is used at the Data Link layer to establish, configure, and test the connection. a.|NCP|c.|IPCP| b.|ATCP|d.|LCP| ____ 8. In a production environment, you can use the ____ command from interface configuration mode, which will automatically shut down that interface when looping is detected. a.|off-looped-interface|c.|down-when-looped| b.|looped off|d.|off-when-lopped| ____ 9. ____ checks the reliability of the link by monitoring the number of errors, latency between requests, connection retries, and connection failures on the PPP link. a.|LQM|c.|CHAP| b.|PAP|d.|LCDI| ____ 10. Once you have completed configuring your PPP interface, you can verify the changes using the ____ command. a.|show ppp|c.|show connection| b.|show link|d.|show interface| ____ 11. ____ is a communications technique for sending data over high-speed digital connections operating at anywhere from 56 Kbps to 44.736 Mbps or higher. a.|Frame Relay|c.|Slip| b.|PPP|d.|DLCI| ____ 12. The Frame Relay switch is also called the ____. a.|FRAP|c.|FRND| b.|PDN|d.|FRAD| ____ 13. Frame Relay separates...

Words: 2989 - Pages: 12

Free Essay

It530 - Unit 3 Frame Relay in a Wan

...medium-sized business that will need to consider WAN technology using Frame relay technology within the company for the future expansion to other towns and cities. The Frame relay analysis will include the operation of frame relay, what equipment is needed, what switching technologies are employed by frame relay and how frame relay is actually brought into the business premises. Frame Relay in a WAN Frame Relay Frame Relay is one of the most common WAN protocols. This high performance protocol operates at the Physical and Data Link layers of the OSI, performing any type of serial interface. This technology was developed at an attempt to resolve some of the communication problems that the other protocols would not. There was an increased need for higher speeds, an increased need for larger bandwidth efficiency, an increase in intelligent network devices that lower protocol processing, and the need to connect LANs and WANs. The Frame relay evolved passed the X.25 as a less careful, but less burdensome protocol designed to transmit packets across a network. (Horton, 2010) Frame relay is known all around the world in many different networks. There are many terms that describe and refer to Frame relay and Wide Area Networking in telecommunications. These terms are also noted when referring to Local Area Networking as well. The table below describes these terms. (Horton, 2010) Table 1 – Frame Relay Terms CIR Committed Information Rate – the minimum level of throughput...

Words: 1228 - Pages: 5

Premium Essay

Protocol Paper

...communication between devices actually take place. Bits are sent and received across physical mediums like cable and radio waves. Hardware devices include hubs and repeaters. The next layer is the Data Link layer; it provides a reliable method for transmitting data across the communication link. It's broken up into two sub layers called the Logical Link Control (LLC) and the Media Access Control (MAC). LLC sub-layer handles error checking and flow control. It also is responsible for communicating with the Network Layer. MAC is the lower sub-layer and maps between logical (IP) and physical (MAC) addresses and access to the network media. Switches typically are a Layer 2 hardware device. The next layer is the network layer. Here IP addressing and routing of messages to their proper final destination occurs. Routers communicate at this layer, taking advantage of collision detection and forwarding packets based on the IP Address. The Transport Layer is the 4th Layer, it manages the data delivery between system or hosts. The communication protocols can be connectionless like User Datagram Protocol, UDP, or connection orientated like Transmission Control Protocol, TCP. In this layer data is broken up into segments. All segments are numbered assisting with reassembly after it delivered to the destination. Layer 5 is the session layer; it sets up, coordinates, and terminates conversations, exchanges, and dialogues between devices across the network. Sessions can be either Simplex, Half-Duplex,...

Words: 664 - Pages: 3

Premium Essay

Team a Protocol Paper

...Protocol Paper Team A: Amy Dippolino, Christine Giles, Bill Groom, and Scott Schultz NTC/362: Fundamentals of Networking November 2, 2015 Stanley Kuchel Protocol Paper Network communication is vital to any organization that is trying to conduct any type of business, but a lot of people fail to realize all the vital components that must work together in order to make this work. This is why it is important to know the OSI model is constructed and how data moves up and down this stack. However, there are other components that are just as important such as, TCP/IP, circuit and packet switching, and the major protocols that circuit and packet switching use. These processes are truly important because without them the way we communicate today would not exist. Open Systems Interconnection Protocol The Open Systems Interconnection (OSI) is a framework for how applications will communicate and work over a network. There are seven layers of related functions that a computer can provide for a user, which define the how two endpoints communicate in a telecommunication network. “The seven layers of function are provided by a combination of applications, operating systems, network card device drivers and networking hardware that enable a system to put a signal on a network cable or out over Wi-Fi or other wireless protocol” (WhatIs.com, 2015). Below is a description of these seven layers. Layer | Name | Description | 7 | Application Layer | This role identifies how the user...

Words: 2378 - Pages: 10

Free Essay

Designing a Secure Network

...WAN Design with Frame Relay David Horton CST-443 Abstract This paper gives a high-level overview of how to design a Wide Area Network (WAN) using Frame Relay technology. Aspects of the WAN design process are explored through the use of a fictitious manufacturing company called Zippy's Chips. The Zippy's WAN design covers the topics of weighing alternative technologies, setting up basic Frame Relay Permanent Virtual Circuit (PVC) connections, adding redundant links and scaling the network for future growth. Table of Contents Frame Relay in a Nutshell.......................................................................................................................... 2 Terminology.......................................................................................................................................... 2 Basic Concepts...................................................................................................................................... 2 A Sample Design...................................................................................................................................3 Deciding if Frame Relay is Right for the Network.................................................................................... 4 Advantages of Frame Relay...................................................................................................................4 Disadvantages of Frame Relay..............................................................

Words: 3194 - Pages: 13

Premium Essay

Kff Individual: Indp Week 1 Project

...of 100Mbps, which connects all the devices, and point of sale (POS) terminals (Apollo Group, Inc. ©2013). The Ethernet local area network (LAN) need to upgrade to 1 Gbps from 100Mbps to accommodate future needs of KFF in case if they want to expand or to provide sufficient bandwidth. KFF needs to utilize wireless local area network (WLAN) to minimize the cost of wiring to connect all the devices using the wireless access point to integrate all the devices within the location. The process of redesigning a network involves a lot of planning to analyze the communications standards need to implement, the appropriate topology and protocols involved in the network. Building a network needs specific hardware, software to connect the networks, control traffic flow and minimizing network latency, and other types of network-related issues. Communication Protocols The communication protocols play an important role in designing the network because KFF uses various devices to accomplish the daily activities needed to run the store efficiently. KFF use devices like blade servers, Windows computers, POS terminals, and other devices, where each device use different coding schemes or communication protocols (Apollo Group, Inc. ©2013). Communication protocols differ based on the region or the type of device designed to support various languages encoded into bits (Goleniwski, 2007). There are several communication standards evolved over time like American Standard...

Words: 1328 - Pages: 6

Free Essay

Test

...Chapter 1: Introduction to Computer Networks and Data Communications TRUE/FALSE 1. Data is information that has been translated into a form that is more conducive to storage, transmission, and calculation. ANS: T 2. ANS: F PTS: 1 Some people call computer terminals thick-client workstations. PTS: 1 3. A type of microcomputer-to-local area network connection that is growing in popularity is the wireless connection. ANS: T PTS: 1 4. To communicate with the Internet using a dial-up modem, a user’s computer must connect to another computer that is already communicating with the Internet. ANS: T PTS: 1 5. It is not possible to connect two local area networks so that they can share peripherals as well as software. ANS: F PTS: 1 6. Metropolitan area networks can transfer data at fast, LAN speeds but over smaller geographic regions than typically associated with a local area network. ANS: F 7. ANS: T 8. networks. ANS: T 9. ANS: F PTS: 1 The Internet is not a single network but a collection of thousands of networks. PTS: 1 One of the most explosive areas of growth in recent years has been cellular phone PTS: 1 By the 1970s, telephone systems carried more computer data than voice. PTS: 1 10. Network architectures are cohesive layers of protocols defining a set of communication services. ANS: T PTS: 1 11. The OSI model tells us what kind of wire or what kind of connector to use to connect the pieces of a network...

Words: 46505 - Pages: 187

Free Essay

Atm Protocol

...physical layer. The AAL interfaces the higher layer protocols to the ATM Layer, which relays ATM cells both from the upper layers to the ATM Layer and vice versa. When relaying information received from the higher layers, the AAL segments the data into ATM cells. When relaying information received from the ATM Layer, the AAL must reassemble the payloads into a format the higher layers can understand. This is called Segmentation and Reassembly (SAR). Different AALs are defined in supporting different types of traffic or service expected to be used on ATM networks. The ATM layer is responsible for relaying cells from the AAL to the physical layer for transmission and from the physical layer to the AAL for use at the end systems, it determines where the incoming cells should be forwarded to, resets the corresponding connection identifiers and forwards the cells to the next link, as well as buffers cells, and handles various traffic management functions such as cell loss priority marking, congestion indication, and generic flow control access. It also monitors the transmission rate and conformance to the service contract (traffic policing). The physical layer of ATM defines the bit timing and other characteristics for encoding and decoding the data into suitable electrical/optical waveforms for transmission and reception on the specific physical media used. In addition, it also provides frame adaptation function, which includes cell delineation, header error check (HEC) generation...

Words: 506 - Pages: 3

Premium Essay

Week 3 Team

...Week 3 Team Assignment NTC/362 November 24, 2014 OSI Model The Open Systems Interconnection (OSI) has been a reference for model network protocols since the mid-1990s. The OSI is formally known as the Open Systems Interconnection (OSI) model ISO/IEC 7498-1. The International Organization for Standardization (ISO), is a global standards-settings group that is comprised of members from various national standards groups. International Electrotechnical Commission (IEC) is another global standards-settings group; however, it focuses on electrical, electronic, and related technologies. (Foundational Focus: OSI Model-Breaking Down the Seven Layers, 2013) The OSI model is comprised of seven layers, with layer one positioned at the bottom of the layer stack and layer seven at the top. The layers have assigned names as well as number references. Layer 7, the application layer, is the interface between the protocol stack and application software. The software might be client or utilities or server services. It is the ability of software to communicate with the standardized interface of application layer protocols that makes network communications possible. Layer 6, the presentation layer, establishes the context between disparate application layer protocols. Effectively, the presentation layer adjusts syntax, semantics, data types, data formats, etc. This layer ensures that data sent by the application is compatible with the lower layers of network communication and that data...

Words: 2317 - Pages: 10

Premium Essay

Indp Part 2

...with the current Cisco switches and routers already used in the IT data center. The Open Systems Interconnection (OSI) protocol model is a standard seven layer framework utilized by the industry. These protocols are important because they establish the communication rules. Two devices that require each other to communicate on a network must follow a set of rules to ensure they are compatible to each other. The seven layers of the OSI specify the hardware and software component requirements to ensure that the collection of these is adequate enough to exchange information on the network. The inclusion of a WLAN, WAN, and VoIP will require additional protocols that are unique from the OSI. * Required Protocols * The Transmission Control Protocol/Internet Protocol (TCP/IP) and VoIPs are required for the improvement designs to the Patton-Fuller network. There is a four-layer reference model for the TCP/IP and they all relate to one or more of the seven OSI layers. * TCP/IP Layer...

Words: 1783 - Pages: 8

Premium Essay

Piop;

...COMPUTER NETWORKS (CS6004) HOME ASSIGNMENT 128W1A05F3 Q1. A system has an n-layer protocol hierarchy. Applications generate messages of length "M" bytes. At each layer, an "H"-byte header is added. What fraction of the network bandwidth is filled with headers? ANS: Message length = M bytes Header length = H bytes Protocol layers = n Header bytes per packet = aH Total bytes per packet = M+aH Fraction of bandwidth filled with header= aH / ( M+aH) If the packets were fragmented it would result in a larger fraction of the bandwidth filled with header information since fragments would have to replicate header information. So this extra header information would increase message overhead. Q2. Research the terms IEEE, IAB, IETF, IRTF, ANSI, EIA, RFC and describe their importance ANS: IAB (The Internet Architecture Board): It is the Internet Society overseer of the technical evolution of the Internet. The IAB supervises the Internet Engineering Task Force (IETF), which oversees the evolution of TCP/IP, and the Internet Research Task Force ( IRTF ),which works on network technology. IEEE (Institute of Electrical and Electronics Engineers): It was formed in 1963 when AIEE merged with IRE. IEEE is an organization composed of...

Words: 2790 - Pages: 12

Premium Essay

Indp Part 2 Final

...present with the current Cisco switches and routers already used in the IT data center. The Open Systems Interconnection (OSI) protocol model is a standard seven layer framework utilized by the industry. These protocols are important because they establish the communication rules. Two devices that require each other to communicate on a network must follow a set of rules to ensure they are compatible to each other. The seven layers of the OSI specify the hardware and software component requirements to ensure that the collection of these is adequate enough to exchange information on the network. The inclusion of a WLAN, WAN, and VoIP will require additional protocols that are unique from the OSI. Required Protocols * The Transmission Control Protocol/Internet Protocol (TCP/IP) and VoIPs are required for the improvement designs to the Patton-Fuller network. There is a four-layer reference model for the TCP/IP and they all relate to one or more of the seven OSI layers. * ATM-user network interface (Goleniewski, 2007, p. 169). * Layer one defines the interface to the...

Words: 1773 - Pages: 8