Professional Documents
Culture Documents
2.Distributed Operating Systems Users not aware of multiplicity of machines Access to remote resources similar to access to local resources Data Migration transfer data transferring entire file, or transferring only those portions of the file necessary for the immediate task
Reliability Redundancy. With proper configuration, when one site goes down, the others can not continue. But this doesn't happen automatically.
Load balancing distribute processes across network to even the workload Computation speedup subprocesses can run concurrently different sites Hardware preference process execution may require specialized processor
Software preference required software may be available at only a particular site Data access run process remotely, rather than transfer all data locally
Topology
Methods of connecting sites together can be evaluated as follows:
Basic cost: This is the price of wiring, which is the proportional to the number of
connections.
Communication cost:
The time required to send a message. This is proportional to the amount of wire and the number of nodes traversed.
PARTIALLY CONNECTED
Direct links exist between to the some, but not all, the sites.
HIERARCHICAL
Links are formed in a tree structure. Cheaper than partially the connected; slower; children of failed components can not communicate.
STAR
All sites connected through a central site. Basic cost low; bottleneck and reliability are low at hub.
RING
Uni or bi-directional, single, double link. Cost is linear with number of sites; communication cost is high; failure of any site partitions ring.
MULTIACCESS BUS
Nodes hang off a ring rather than being part of it.
Cost is linear; communication cost is low; site failure doesn't affect partitioning.
2. Describe the architecture and usage of ISDN. Ans:- Integrated Services Digital Network (ISDN) is a set of communication
standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. It was first defined in 1988 in the CCITT red book.Prior ISDN the telephone system was viewed as a way to transport voice, with some special services available for data. The key feature of ISDN is that it integrates speech and data on the same lines, adding features that were not available in the classic telephone system. There are several kinds of access interfaces ISDN defined as Basic Rate Interface (BRI),Primary Rate Interface (PRI) and Broadband ISDN (B-ISDN).
ISDN is developed by ITU-T in 1976.It is a set of protocols that combines digital telephony and data transport services.The whole idea is to digitize the telephone network to permit the transmission of audio, video, and text over existing telephone lines. ISDN is an effort to standardize subscriber services, provide user/network interfaces, and facilitate the internetworking capabilities of existing voice and data networks.
The goal of ISDN is to form a wide area network that provides universal end-to-end connectivity over digital media. This can be done by integrating all of the separate transmission services into one without adding new links or subscriber lines. The purpose of ISDN is to provide fully integrated digital services to users. These services fall into three categories:-
2.Tele Services:In this service,the network may change or process the contents of the
data. These services correspond to layer 4-7 of the OSI model. Teleservices rely on the facilities of the bearer services and are designed to accommodate complex user needs without the user having to be aware of details of the process. Teleservices include telephony,teletex,videotext,telex,and teleconferencing.
Principals of ISDN:Standards for ISDN have been defined by ITU-T (formerly CCITT). ISDN
relates standards states the principals of ISDN from the point of view of CCITT.
3. Explain the concept of framing in Data Link Layer and its importance in data communication. Ans:-Data transmission in the physical layer means moving bits in the form of a signal from
the source to destination. The physical layer provides bit synchronization to ensure that the sender and receiver use the same bit durations and timing. The data link layer on the other hand needs to pack bits into frames, so that each frame is distinguishable from another. Framing in the link layer separates a message from one source to a destination, or from other message to other destinations, by adding a sender address and a destination address, The destination address defines where the packet is to go: the sender address help the recipient acknowledge the receipt. Although the whole message could be packed into one frame, it is not normally done. When a message is carried in one very large frame, even a single bit error would require the retransmission of the whole message. When a message is divided into smaller frames, a single bit error affects only that small frame. Fixed-Size Framing In this, there is no need for defining the boundaries of the frame the size itself can be used as a delimiter. Example: The ATM WAN, which uses frames of fixed size called cells. Variable Size Framing This type of framing is prevalent in LANs. In this, we need a way to define the end of the frame and the beginning of the next. Two approaches are sued for this purpose: a character-oriented approach and a bit oriented approach. Character Oriented Protocols In these protocols, data to be carried out are 8-bit characters from a coding system such as ASCII. he DLL translates the physical layers raw bit stream into discrete units (messages) called frames. That is because the physical layer just accepts a raw bit stream and to deliver it to the destination. This bit stream is not guaranteed to error free. The number of bits received may be less than, equal to, or more than the number of bits transmitted. They may also have different values. It is up to the DLL to detect and if necessary correct errors. If not correct at least detect errors and take proper action like ask for retransmission etc. The usual approach of DLL is break the bit stream up into discrete frames and then for the purpose.
1.Simplest Protocol
This protocol has no flow or error control. It is a unidirectional protocol in which data frames are travelling in only one direction from the sender to receiver. We assume that the receiver can handle any frame it receivers with a processing time is small enough to be negligible, The data link layer of the receiver immediately removes the header from the frame and hands the data packet to its network layer, which can also accept the packet immediately. i.e. the receiver can never be overwhelmed with incoming frames.
Noisy Channels
Noiseless channels are non-existent. We can ignore the error or we need to add error control to our protocols. We discuss three protocols in this section that use error control.
Hierarchical Routing
When hierarchical routing is used, the routers are divided into regions. Each router knows all details about how to route packets to destinations within its own regin. But it does not have any idea about internal structure of other regions. For huge networks, a two level hierarchy may be insufficient hence it may be necessary to group the regions into clusters, the clusters into zones, the zones into groups and so on. As an example consider a two level hierarchy with five regions.The full routing table for router 1A has 17 entries. When routing is done hierarchically there will be only 7 entries. The saving in table space increases. Unfortunately this reduction in the table space comes with the increased path length. For example the best path from 1A to 5C is via region 2, but hierarchical routing all traffic to region 5 goes via region 3.