Acn s23 Acn Summer 23 Sloved Model Paper
Acn s23 Acn Summer 23 Sloved Model Paper
2M
Diagram
Page 1 / 29
Page 2 / 29
Page 3 / 29
When the site receives a data chunk, it stores it at the end of the
buffer (queue) and subtracts the size of the chunk from winSize.
The TSN number of the chunk is stored in the cumTSN variable. 2.
When the process reads a chunk, it removes it from the queue and
adds the size of the removed chunk to winSize (recycling). 3. When
the receiver decides to send a SACK, it checks the value of lastAck;
if it is less than cumTSN, it sends a SACK with a cumulative TSN
number equal to the cumTSN. It also includes the value of winSize
as the advertised window size. Sender Site: The sender has one
buffer (queue) and three variables: curTSN, rwnd, and inTransit, as
shown in the following figure. We assume each chunk is 100 bytes
long. The buffer holds the chunks produced by the process that
either have been sent or are ready to be sent.
Page 4 / 29
The first variable, curTSN, refers to the next chunk to be sent. All
chunks in the queue with a TSN less than this value have been sent,
but not acknowledged; they are outstanding. The second variable,
rwnd, holds the last value advertised by the receiver (in bytes). The
third variable, inTransit, holds the number of bytes in transit, bytes
sent but not yet acknowledged. The following is the procedure used
by the sender.
Page 5 / 29
Page 6 / 29
❑ SMTP Commands:
1. HELO: Used by client to identify itself.
2. MAIL FROM: Identify sender.
3. RCPT TO: Identify intended recipient.
4. DATA: Send actual message.
5. QUIT: Terminate the message.
6. RSET: Reset the connection
7. VRFY: Verify the add of recipient
8. HELP: Mail
(d) a) For the block of IPv4 address given below build subnet mask, 4M
broadcast Address and Number of Hosts possible.
I. 10.0.199.237/22
II. 192.168.1487/26 2M for each
correct
Ans answer
Page 8 / 29
Step 2: Let all edges are processed in the following order: (B, E),
(D, B), (B, D), (A, B), (A, C), (D, C), (B, C), (E, D). We get the
following distances when all edges are processed the first time.
The first row shows initial distances. The second row shows
distances when edges (B, E), (D, B), (B, D) and (A, B) are processed.
The third row shows distances when (A, C) is processed. The
fourth row shows when (D, C), (B, C) and (E, D) are processed.
Page 9 / 29
Step 3: The first iteration guarantees to give all shortest paths which are at
most 1 edge long. We get the following distances when all edges are
processed second time (The last row shows final values.
Step 4: The second iteration guarantees to give all shortest paths which are at
most 2 edges long. The algorithm processes all edges 2 more times. The
distances are minimized after the second iteration, so third and fourth
iterations don’t update the distances.
WORKING
It makes available users by an interactive and bidirectional text-
oriented message system exploit an effective terminal connection
which is much more than 8 byte.
User data is sprinkled in the band long with telnet control information
above the TCP. It helps to achieve some functions in a remote manner.
The user joins the server beside using the TCP protocol, so that means
like the other side connection is also established using the
telnet hostname. These commands are used on the server by the
corresponding user to achieve the need task. These commands are used
Page 10 / 29
SYNTAX
telnet hostname port
Page 11 / 29
SMTP POP3
Ans. SMTP stands for SIMPLE POP3 stands for POST
MAIL TRANSFER OFFICE PROTOCOL
PROTOCOL & is also called VERSION 3 & is also called a
Push Protocol. Pop Protocol.
SMTP is used for Sending POP3 is used to retrieve the
emails. emails.
SMTP transfers Email from POP3 retrieves Emails from Any 4
Sender’s Device to the the mailbox on the receipting’s points
mailbox on the recipient’s server to their device. 1M
server. each
It is a message transfer Agent. It is a message access Agent.
SMTP has two MTAS. POP3 has two MAAS.
SMTP uses Ports 25, 465 & POP3 uses Ports 110 or 995.
587.
Page 13 / 29
Page 14 / 29
(e) Explain the process of resolving the given host name into IP 4M
address using DNS.
Ans. You can find the hostname of any computer with a public IP
address by passing the address to any Domain Name System (DNS)
server. However, since the computers on a small business network
have private IP addresses, you can only discover their hostnames if
the network has a local DNS server. To discover the hostname of a
computer with a private IP address and no local DNS server, you 4M for
need to use a Windows utility to query the host itself. Explanat
ion
Querying DNS
Page 17 / 29
➢ Tunnelling:
1. When two computers using IPV6 want to communicate with each other
& the packet
must pass through a region that uses IPV4.
2. The IPV6 packet is encapsulated in a IPV4 packet when it enter the
region & leaves its capsule when it exits the region.
➢ Header Translation:
1. It is used when some of the system uses IPV4. the sender wants to use
IPV6, but the receiver don’t understand IPV6
2. The header format must be totally changed through header translation.
The header of IPV6 packet is converted to IPV4 header.
Page 18 / 29
(b) Explain TCP with respect to flow control and error control. 6M
Ans.
TCP Flow Control is a protocol designed to manage the data flow
between the user and the server. It ensures that there is a specific
bandwidth for sending and receiving data so the data can be processed
without facing any major issues. In order to achieve this, the TCP
protocol uses a mechanism called the sliding window protocol.
Each
explan
ation
of flow
control
3M
and
error
control
3M
.
Error control in TCP is mainly done through the use of three simple
techniques :
1. Checksum – Every segment contains a checksum field which is
used to find corrupted segments. If the segment is corrupted,
then that segment is discarded by the destination TCP and is
considered lost.
2. Acknowledgement – TCP has another mechanism called
acknowledgement to affirm that the data segments have been
delivered. Control segments that contain no data but have
sequence numbers will be acknowledged as well but ACK
segments are not acknowledged.
3. Retransmission – When a segment is missing, delayed to
Page 19 / 29
• First Scenario
Page 20 / 29
When the sender and the receiver of an e-mail are on the same mail server, we
need only two user agents.
• Second Scenario
When the sender and the receiver of an e-mail are on different mail servers,
we need two UAs and a pair of MTAs (client and server).
• Third Scenario
When the sender is connected to the mail server via a LAN or a WAN, we
need two UAs and two pairs of MTAs (client and server).
Page 21 / 29
• Fourth Scenario
When both sender and receiver are connected to the mail server via a LAN or
a WAN, we need two UAs, two pairs of MTAs (client and server), and a pair
of MAAs (client and server). This is the most common situation today.
Ans
i. Bellman ford algorithm is a single-source shortest path algorithm.
ii. This algorithm is used to find the shortest distance from the single 3M for
vertex to all the other vertices of a weighted graph. explainati
on and 3M
iii. Various other algorithms are used to find the shortest path, like the for
Dijkstra algorithm. example
iv. If the weighted graph contains the negative weight values, then the
Dijkstra algorithm does not confirm whether it produces the correct
answer or not.
Page 22 / 29
Step 2: Let all edges are processed in the following order: (B, E),
(D, B),(B, D), (A, B), (A, C), (D, C), (B, C), (E, D). We get the
following distances when all edges are processed the first time. The
first row shows initial distances. The second row shows distances
when edges (B, E), (D, B), (B, D) and (A, B) are processed. The
third row shows distances when (A, C) is processed. The fourth row
shows when (D, C), (B, C) and (E, D) are processed.
Page 23 / 29
Step 3: The first iteration guarantees to give all shortest paths which
are at most 1 edge long. We get the following distances when all
edges are processed second time (The last row shows final values).
Page 24 / 29
(b) a. For the IP address given below, find the range of addresses in the 6M
following blocks:
a. 123.56.77.32/29
b. 200.17.21.128/27
c. 17.34.16.0/23
d. 180.34.64.64/30
a. 123.56.77.32/29
Ans. • The subnet mask “/29” means the first 29 bits are network bits, 𝟏
1𝟐M
and the remaining 3 bits are host bits. for
• The network address can be obtained by setting the host bits to each
zero: 123.56.77.32 sub-
• The broadcast address can be obtained by setting the host bits to questio
n
one: 123.56.77.39
• The range of addresses in this block is from 123.56.77.32 to
123.56.77.39
• Range of addresses: 123.56.77.32 to 123.56.77.39
b. 200.17.21.128/27
• The subnet mask "/27" means the first 27 bits are network
bits, and the remaining 5 bits are host bits.
• The network address can be obtained by setting the host bits to
zero: 200.17.21.128.
• The broadcast address can be obtained by setting the host bits
to one: 200.17.21.159.
• Range of addresses: 200.17.21.128 to 200.17.21.159
c. 17.34.16.0/23:
• The subnet mask "/23" means the first 23 bits are network bits,
and the remaining 9 bits are host bits.
• The network address can be obtained by setting the host bits to
zero: 17.34.16.0.
• The broadcast address can be obtained by setting the host bits
to one: 17.34.17.255.
• Range of addresses: 17.34.16.0 to 17.34.17.255
Page 25 / 29
Ans SCTP transmits data in the form of messages and each message 3M for
contains one or more packets. The control come before data chunks. describi
ng
fields &
3M for
associat
ion
establis
hment
process
Page 27 / 29
Page 28 / 29
Page 29 / 29