- First
approach: The sender must transmit an IP datagram of size as same as that
of the first hop’s MTU.
- Second
approach: Running the path MTU discovery algorithm.
Thursday, September 19, 2013
What is fragmentation?
Posted by
Sunflower
at
9/19/2013 03:41:00 PM
0
comments
Labels: Data, Datagrams, Destination, Fragmentation, Fragments, Host, Hosts, IP, Layers, Messages, Packets, Paths, Protocols, Receiver, Router, Sender, Source, Techniques, transmission, Transport
![]() | Subscribe by Email |
|
Wednesday, September 18, 2013
What are the advantages and disadvantages of datagram approach?
- Datagrams
can contain the full destination address rather than using some number.
- There
is no set up phase required for the datagram circuits. This means that no
resources are consumed.
- If
it happens during a transmission that one router goes down, the datagrams
that will suffer will include only those routers which would have been
queued up in that specific router. The other datagrams will not suffer.
- If
any fault or loss occurs on a communication line, the datagrams circuits are
capable of compensating for it.
- Datagrams
play an important role in the balancing of the traffic in the subnet. This
is so because halfway the router can be changed.
- Since
the datagrams consist of the full destination address, they generate more
overhead and thus lead to wastage of the bandwidth. This in turn makes
using datagram approach quite costly.
- A
complicated procedure has to be followed for datagram circuits for
determining the destination of the packet.
- In
a subnet using the datagram approach, it is very difficult to keep
congestion problems at bay.
- The
any-to-any communication is one of the key disadvantages of the
datagram subnets. This means that if a system can communicate with any
device, any of the devices can communicate with this system. This can lead
to various security issues.
- Datagram
subnets are prone to losing or re - sequencing the data packets during the
transition. This puts a great burden on the end systems for monitoring,
recovering, and reordering the packets as they were originally.
- Datagram
subnets have less capability of dealing with congestion control as well as
flow control. This happens because the direction of the incoming traffic
is not specified. In the virtual circuit subnets, the flow of the packets
is directed only along the virtual circuits thus making it comparatively
easy for controlling it.
- The
unpredictable nature of the flow of the traffic makes it difficult to
design the datagram networks.
Posted by
Sunflower
at
9/18/2013 05:51:00 PM
0
comments
Labels: Address, Advantages, Connection, Datagrams, Destination, Disadvantages, Information, Layers, Models, Networking, Networks, OSI, Packets, Paths, Route, Router, Routing, Source, Switching, transmission
![]() | Subscribe by Email |
|
Monday, August 19, 2013
What is meant by multi-destination routing?
- Effective routing algorithms have been developed that are capable of routing the messages from one source node to a number of receiving nodes i.e., the multiple destination nodes.
- These algorithms are termed as the multi – destination routing algorithms and the process is therefore called as the multi – destination routing.
- This type of routing has been developed for the minimization of the cost of the network i.e., NC (network cost).
- Network cost can be defined as the sum of all the links’ weights that consist of the routing path.
- There are many heuristic algorithms available for determining the NC min path.
- This problem falls under the category of the NP – complete problems.
- Heuristics are available for the traveling salesman problem and MST (minimum spanning tree) variations.
- Global information is used by both of them.
- Another set of such heuristics is available that uses only shortest paths for reaching the destinations.
- The best worst case performance is exhibited by the MST algorithm.
- However, one study revealed that effectiveness of the simpler heuristics is higher.
- The network cost (NC) is often compared with the destination cost (DC).
- Destination cost is the sum of the cost of all the shortest paths that lead to the destination.
- A scheme of algorithms has been developed for trading off between these two costs i.e., the NC and DC.
- The sender of the transmitted data cannot be taken as a single node in a network where the cooperative communication is supported.
- This asks for the re-investigation of the traditional link concept.
- Any routing scheme thus depending up on this link concept needs to be reconsidered.
- Also, the potential performance gain resulting because of the cooperative communication needs to be exploited.
- Routing often gets complicated for some networks where the selection of the paths is no longer the job of a single entity.
- Rather, a number of entities are involved in the selection of the paths.
- Multiple entities can even select specific parts of a path.
- If these selected paths are chosen by the entities for their own objectives optimization then it can lead to inefficiency or serious complications in the network since they may or may not conflict with the other entities’ objectives.
- This would become clear from the following example, consider traffic moving in a system of roads.
- Now here each driver selects a path that would minimize only his/her traveling time.
- In this kind of routing, there are longer equilibrium routes (i.e., longer than the optimal.) for almost all other drivers.
- This is often termed as the Braess paradox.
- Another example is of the routing the AGVs (automated guided vehicles) by a model on some terminal.
- For prevention of the simultaneous usage of the infrastructure’s same part reservations are made. - This is called as the context – aware routing.
- The internet is divided in to a number of divisions which are nothing but Ass i.e., the autonomous system like ISPs.
- All these systems have control over the routes that lie in their own network at various different levels.
Following steps are involved in multi – destination routing:
1. The BGP protocol is used for selecting the AS – level paths.
2. A sequence of autonomous systems is produced by the BGP protocol via which the packet flow will take place.
3. The neighboring Ass offer multiple paths for each of the AS from which it can choose. Paths are selected based up on the relationships between the neighboring systems.
4. Each selected path refers to multiple corresponding router level paths.
Posted by
Sunflower
at
8/19/2013 04:53:00 PM
0
comments
Labels: Algorithms, Communication, Cost, Destination, Entity, Links, Messages, Multi-destination Routing, Multiple, Network, Nodes, optimization, Paths, Performance, Process, Receive, Route, Routing, Source
![]() | Subscribe by Email |
|
Friday, August 16, 2013
What is meant by flow based routing?
- Maximum information routing
(MIR) and
- Conditional maximum
information routing (CMIR)
About MREP Algorithm
About MIR Algorithm
About CMIR Algorithm
Posted by
Sunflower
at
8/16/2013 03:37:00 PM
0
comments
Labels: Algorithm, Application, Flow based routing, Flows, Information, Links, Network, Networking, Nodes, optimization, Packets, Paths, Performance, Process, Protocols, Route, Router, Routing, Shortest, traffic
![]() | Subscribe by Email |
|
Wednesday, August 14, 2013
What is the idea behind link state routing?
- IS – IS i.e., intermediate
system to intermediate system and
- OSPF i.e., the open shortest
path first
Idea behind the Link State Routing
- Determination of the
neighboring nodes: Each node determines to which all neighboring nodes it
is connected to. Also, it needs to know whether over the links through
which it is connected are fully working or not. A reach-ability protocol is
used for accomplishing this task. This protocol is run regularly but in
separation from the neighboring nodes.
- Distribution of the map
information: The link state advertisement is the short message that is
made by the node in case of some modification in the connectivity
periodically.
- Calculation of the shortest
paths: Shortest path from one node to other nodes is determined by running
a shortest path routing algorithm over the entire map. The commonly used
algorithm is the Dijkstra’s algorithm.
- Filling the routing table: The
table is filled with best shortest paths obtained in the above step for
every two nodes.
- Optimizations: We gave a
glance of the simple form of this algorithm but in practical applications
this form is used along with a number of optimizations. Whenever a change
is detected in the network connectivity, the shortest path tree has to be
immediately recomputed and then the routing table must be recreated. A
method was discovered by the BBN technologies for recomputing only the affected
part of the tree.
Posted by
Sunflower
at
8/14/2013 08:00:00 PM
0
comments
Labels: Communication, Destination, Information, Link state Routing, Links, Network, Networking, Packet Switching Network, Paths, Protocols, Route, Routes, Routing, Routing table, Source, States, Switch, Switching, Tasks
![]() | Subscribe by Email |
|
Tuesday, August 6, 2013
What is meant by an optimal route?
- Throughput or the Quantity
of service: This includes the amount of data that is transmitted and time
it takes to transfer.
- Average packet delay or Quality of service: This includes the time taken by a packet to arrive at its destination and
the response of the system to the commands entered by the user.
- Adaptive Algorithms: These algorithms are
meant for the networks in which the routes change in a dynamic manner.
Here the information regarding the route to be followed is obtained at the
run time itself from adjacent as well as the all other routers. The routes
change whenever there is a change in the load, change in the topology and
every delta T seconds.
- Non – adaptive algorithms: These algorithms
the same routes cannot be followed every time. Therefore the measurements
that were made for the previous condition cannot be used for the current
condition. The routes thus obtained are called static routes and are
computed at the boot time.
Posted by
Sunflower
at
8/06/2013 09:29:00 PM
0
comments
Labels: Algorithm, Computer Network, Information, Memory, Metrics, Network, Networking, Nodes, Optimal, Optimal Route, Paths, Performance, Protocols, Quality, Quantity, Routes, Routing, Testing
![]() | Subscribe by Email |
|
Friday, July 19, 2013
What are the goals and properties of a routing algorithm?
- The packets must reach their destination if there are no factors preventing this such as congestion.
Posted by
Sunflower
at
7/19/2013 09:30:00 PM
0
comments
Labels: Algorithms, Application, Channels, Communication, Data, Destination, Efficiency, Goals, Hops, Link, Networks, Nodes, Packets, Paths, Properties, Route, Routing, Routing tables, Source, Transfer
![]() | Subscribe by Email |
|
Saturday, October 20, 2012
What are the challenges of testing Web Applications? How to use Silk Test with Web Applications?
What are Web Applications?
- Accessibility
and
- Security
How is web testing done in SilkTest?
- Test planning
- Test management
- Direct data base access and validation
Posted by
Sunflower
at
10/20/2012 01:52:00 PM
0
comments
Labels: Application, Automated Software Testing, Automation, Browser, Challenges, Content, Design, Features, Organization, Paths, Platforms, Security, SilkTest, Test Plan, Testers, Testing, Web, Web Application, Web browser
![]() | Subscribe by Email |
|
Wednesday, October 17, 2012
Is there any problem in using scripts created on v6.0 to 6.5 or higher versions?
- Silk test classic: This client of the silk test makes use of the domain specific language
called “4test” for scripting of the test automation scripts. This language
just like the C++ language is an object oriented language. Just like C++
it also makes use of the Object Oriented concepts such as following:
- Silk 4J: This client
of the silk test enables one to follow test automation by using java as
the scripting language in eclipse.
- Silk 4 net: This
client of the silk test also enables one to follow test automation by
using VBScript or sometimes using C# as the scripting language in the
visual studio.
- Silk test work
bench: This client of the silk test enables the testers to carry out the
automation testing using VB.net as the scripting language as well as on a
visual level.
- Borland silk test
13- june 2012
- Micro focus silk
test 2011 – November 2011
- Micro focus silk
test 2010 R2 WS 2 – may 2011
- Micro focus silk
test 2010 R2 – December 2010
- Micro focus silk
test 2010 – july 2010
- Silk test 2009 –
august 12, 2009
- Silk test 2008 SP1 –
jusly 2008
- Silk test 2008 –
april 2008
- Silk test 2006 R2
service pack 2 – September 2007
- Silk test 2006 R 2
service pack 1 – june 2007
- Silk test 2006 R2 –
January 2007
- Silk test 2006 –
September 2006
- Silk test 8.0 – may
2006
- Silk test 7.6 –
September 2005
- Silk test 7.5 – june
2005
- Silk test 7.1 –
October 2004
- Silk test 6.5 –
November 2003
- Silk test 6.0 –
November 2002
- Silk test 5.0.1 –
September 1999
- QA partner 4.0 –
November 1996
Posted by
Sunflower
at
10/17/2012 12:30:00 PM
0
comments
Labels: Automated, Automation, Bugs, Clients, Concepts, Defects, Issues, Languages, Object Oriented, Paths, Problems, Scripts, SilkTest, Software testing, Statement, Test automation, Testers, Testing tools, Tests, Versions
![]() | Subscribe by Email |
|