CN Question Bank 24-25
CN Question Bank 24-25
QUESTION BANK
1. Business Applications
a) Resource Sharing:The goal is to make all programs, equipment, and especially data available to
anyone on the network without regard to the physical location of the resource or the user.
Probably even more important than sharing physical resources such as printers, and tape backup systems, is
sharing information. Companies small and large are vitally dependent on computerized information and large
are vitally dependent on computerized information.
Networks called VPNs (Virtual Private Networks) may be used to join the individual networks at different
sites into one extended network.
b) Providing Communication Medium:Every company that has two or more computers now has
email (electronic mail), which employees generally use for a great deal of daily communication.
Telephone calls between employees may be carried by the computer network instead of by the
phone company. This technology is called IP telephony or Voice over IP (VoIP) when Internet
technology is used.
Desktop sharing lets remote workers see and interact with a graphical computer screen. This
makes it easy for two or more people who work far apart to read and write a shared blackboardor
write a report together.
c) Doing Business Electronically: Airlines, bookstores, and other retailers have discovered that many
customers like the convenience of shopping from home.
a) Access to remote information: Internet access provides home users with connectivity to remote
computers.As with companies, home users can access information, communicate with other
people, and buy products and services with e-commerce
Any teenager worth his or her salt is addicted to instant messaging. This facility, derived from the
UNIX talk program in use since around 1970, allows two people to type messages at each other in
real time. There are multi-person messaging services too, such as the Twitter service that lets
people send short text messages called ‘‘tweets’’ to their circle of friends or other willing audiences.
person-to-person communications and accessing information are social network applications like
Facebook
c) Interactive Entertainment
Many people already pay their bills, manage their bank accounts, and handle their investments
electronically.
3. Mobile Users: Mobile computers, such as laptop and handheld computers, are one of the
Social networks, message boards, content sharing sites, and a host of other applications allow people to
share their views with like-minded individuals.
The trouble comes with topics that people actually care about, like politics, religion, or sex. Views that are
publicly posted may be deeply offensive to somepeople.
Worse yet, they may not be politically correct. Furthermore, opinions need not be limited to text; high-
resolution color photographs and video clips are easily shared over computer networks. Some people take a
live-and-let-live view,but others feel that posting certain material (e.g., verbal attacks on particular
countries or religions, pornography, etc.) is simply unacceptable and that such content must be censored.
Different countries have different and conflicting laws in this area.
4) Define ARPANET
The Advanced Research Projects Agency (ARPA)Network in the Department of Defense (DoD)
was interestedin finding a way to connect computers so that the researchers they funded could share
their findings,thereby reducing costs and eliminating duplication of effort.
The internet is a globally-connected network of computers that enables people to share information
and communicate with each other. An intranet, on the other hand, is a private and internal network
that enables people to store, organize, and share information within an organization.
Internet. There is a standard for wireless LANs called IEEE 802.11, popularlyknown as
WiFi andit runs at speed from 11 to hundreds of Mbps. Wired LANsuse a range of different
transmission technologies. Most of them use copper wires, but some use optical fiber.
Wide Area Network
A WAN (Wide Area Network) spans a large geographical area, often a country
or continent. In most WANs, the subnet consists of two distinct components:
transmission lines and switching elements. Transmission lines move bits
between machines. They can be made of copper wire, optical fiber, or even
radio links. Most companies do not have transmission lines lying about, so
instead they lease the lines from a telecommunications company. Switching
elements, or just switches, are specialized computers that connect two or more
transmission lines.
LONG QUESTION AND ANSWERS
1) Describe about Network Hardware and Network Software.
Physical Topology
The term physical topology refers to the way in which a network is laid out physically. One or more
devices connect to a link; two or more links form a topology. The topology of a network is the
geometric representation of the relationship of all the links and linking devices (usually called
nodes) to one another. There are four basic topologies possible: mesh, star, bus, and ring
Mesh: In a mesh topology, every device has a dedicated point-to-point link to every other device.
The term dedicated means that the link carries traffic only between the two devices it connects. To
find the number of physical links in a fully connected mesh network with n nodes, we first consider
that each node must be connected to every other node. Node 1 must be connected to n - I nodes,
node 2 must be connected to n – 1 nodes, and finally node n must be connected to n - 1 nodes. We
need n(n - 1) physical links. However, if each physical link allows communication in both directions
(duplex mode), we can divide the number of links by 2. In other words, we can say that in a mesh
topology, we need n(n -1) /2 duplex-mode links.
To accommodate that many links, every device on the network must have n – 1 input/output
(VO) ports to be connected to the other n - 1 stations.
Mesh: In a mesh topology, every device has a dedicated point-to-point link to every other device.
The term dedicated means that the link carries traffic only between the two devices it connects. To
find the number of physical links in a fully connected mesh network with n nodes, we first consider
that each node must be connected to every other node. Node 1 must be connected to n - I nodes,
node 2 must be connected to n – 1 nodes, and finally node n must be connected to n - 1 nodes. We
need n(n - 1) physical links. However, if each physical link allows communication in both directions
(duplex mode), we can divide the number of links by 2. In other words, we can say that in a mesh
topology, we need n(n -1) /2 duplex-mode links.
To accommodate that many links, every device on the network must have n – 1 input/output
(VO) ports to be connected to the other n - 1 stations.
Advantages:
1. The use of dedicated links guarantees that each connection can carry its own data load, thus
eliminating the traffic problems that can occur when links must be shared by multiple
devices.
2. A mesh topology is robust. If one link becomes unusable, it does not incapacitate the entire
system. Third, there is the advantage of privacy or security. When every message travels
along a dedicated line, only the intended recipient sees it. Physical boundaries prevent other
users from gaining access to messages. Finally, point-to-point links make fault
identification and fault isolation easy. Traffic can be routed to avoid links with suspected
problems. This facility enables the network manager to discover the precise location of the
fault and aids in finding its cause and solution.
Disadvantages:
1. Disadvantage of a mesh are related to the amount of cabling because every device must be
connected to every other device, installation and reconnection are difficult.
2. Second, the sheer bulk of the wiring can be greater than the available space (in walls,
ceilings, or floors) can accommodate. Finally, the hardware required to connect each link
(I/O ports and cable) can be prohibitively expensive.
For these reasons a mesh topology is usually implemented in a limited fashion, for example, as a
backbone connecting the main computers of a hybrid network that can include several other
topologies.
Star Topology:
In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another. Unlike a mesh
topology, a star topology does not allow direct traffic between devices. The controller acts as an
exchange: If one device wants to send data to another, it sends the data to the controller, which then
relays the data to the other connected device .
A star topology is less expensive than a mesh topology. In a star, each device needs only one link
and one I/O port to connect it to any number of others. This factor also makes it easy to install and
reconfigure. Far less cabling needs to be housed, and additions, moves, and deletions involve only
one connection: between that device and the hub.
Other advantages include robustness. If one link fails, only that link is affected. All other links
remain active. This factor also lends itself to easy fault identification and fault isolation. As long as
the hub is working, it can be used to monitor link problems and bypass defective links.
One big disadvantage of a star topology is the dependency of the whole topology on one single
point, the hub. If the hub goes down, the whole system is dead. Although a star requires far less
cable than a mesh, each node must be linked to a central hub. For this reason, often more cabling is
required in a star than in some other topologies (such as ring or bus).
Bus Topology:
The preceding examples all describe point-to-point connections. A bus topology, on the
other hand, is multipoint. One long cable acts as a backbone to link all the devices in a network
Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection
running between the device and the main cable. A tap is a connector that either splices into the main
cable or punctures the sheathing of a cable to create a contact with the metallic core. As a signal
travels along the backbone, some of its energy is transformed into heat. Therefore, it becomes
weaker and weaker as it travels farther and farther. For this reason there is a limit on the number of
taps a bus can support and on the distance between those taps.
Advantages of a bus topology include ease of installation. Backbone cable can be laid along the
most efficient path, then connected to the nodes by drop lines of various lengths. In this way, a bus
uses less cabling than mesh or star topologies. In a star, for example, four network devices in the
same room require four lengths of cable reaching all the way to the hub. In a bus, this redundancy
is eliminated. Only the backbone cable stretches through the entire facility. Each drop line has to
reach only as far as the nearest point on the backbone.
Disadvantages include difficult reconnection and fault isolation. A bus is usually designed to be
optimally efficient at installation. It can therefore be difficult to add new devices. Signal reflection
at the taps can cause degradation in quality. This degradation can be controlled by limiting the
number and spacing of devices connected to a given length of cable. Adding new devices may
therefore require modification or replacement of the backbone.
In addition, a fault or break in the bus cable stops all transmission, even between devices on the
same side of the problem. The damaged area reflects signals back in the direction of origin, creating
noise in both directions.
Bus topology was the one of the first topologies used in the design of early local area networks.
Ethernet LANs can use a bus topology, but they are less popular.
Ring Topology In a ring topology, each device has a dedicated point-to-point connection with
only the two devices on either side of it. A signal is passed along the ring in one direction, from
device to device, until it reaches its destination. Each device in the ring incorporates a repeater.
When a device receives a signal intended for another device, its repeater regenerates the bits and
passes them along
A ring is relatively easy to install and reconfigure. Each device is linked to only its immediate neighbors (either
physically or logically). To add or delete a device requires changing only two connections. The only constraints are
media and traffic considerations (maximum ring length and number of devices). In addition, fault isolation is
simplified. Generally in a ring, a signal is circulating at all times. If one device does not receive a signal within a
specified period, it can issue an alarm. The alarm alerts the network operator to the problem and its location.
However, unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring (such as a disabled
station) can disable the entire network. This weakness can be solved by using a dual ring or a switch capable of closing
off the break. Ring topology was prevalent when IBM introduced its local-area network Token Ring. Today, the need
for higher-speed LANs has made this topology less popular. Hybrid Topology A network can be hybrid. For example,
we can have a main star topology with each branch connecting several stations in a bus topology as shown in Figure
Network Software
Protocol Hierarchies
To reduce their design complexity, most networks are organized as a stack of layers or levels, each
one built upon the one below it. The number of layers, the name of each layer, the contents of each
layer, and the function of each layer differ from network to network. The purpose of each layer is
to offer certain services to the higher layers while shielding those layers from the details of how
the offered services are actually implemented. In a sense, each layer is a kind of virtual machine,
-offering certain services to the layer above it. When layer n on one machine carries on a
conversation with layer n on another machine, the rules and conventions used in this conversation
are collectively known as the layer n protocol. Basically, a protocol is an agreement between the
communicating parties on how communication is to proceed. Between each pair of adjacent layers
is an interface. The interface defines which primitive operations and services the lower layer makes
available to the upper one.
A set of layers and protocols is called a network architecture. A list of the protocols used by a
certain system, one protocol per layer, is called a protocol stack.
In networking, a protocol defines the rules that both the sender and receiver and
all intermediate devices need to follow to be able to communicate effectively.
A protocol provides a communication service that the process use to exchange
messages.
When communication is simple, we may need only one simple protocol.
When the communication is complex, we may need to divide the task between
different layers, in which case we need a protocol at each layer, or protocol
layering.
Protocol layering is that it allows us to separate the services from the
implementation.
A layer needs to be able to receive a set of services from the lower layer and to
give the services to the upper layer.
Any modification in one layer will not affect the other layers.
Connection-less service is related to the postal system. It does not include any connection
establishment and connection termination. Connection-less Service does not give a guarantee
of reliability. In this, Packets do not follow the same path to reach their destination.
Service Primitives
A service is formally specified by a set of primitives (operations) available touser processes to access the
service. These primitives tell the service to perform some action or report on an action taken by a peer entity.
If the protocol stack is located in the operating system, as it often is, the primitives are normally system
calls. These calls cause a trap to kernel mode, which then turns control of the machine
over to the operating system to send the necessary packets
2) Explain the functionality of each layer in OSI reference model.
each layer in OSI reference model.
computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each
layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed
independently.
The physical layer coordinates the functions required to transmit a bit stream over a
physical medium.
The physical layer is concerned with the following functions:
Physical characteristics of interfaces and media - The physical layer defines
the characteristics of the interface between the devices and the transmission
medium.
Representation of bits - To transmit the stream of bits, it must be encoded to
signals. The physical layer defines the type of encoding.
Signals: It determines the type of the signal used for transmitting the information.
Data Rate or Transmission rate - The number of bits sent each second –is also
defined by the physical layer.
Synchronization of bits - The sender and receiver must be synchronized at the
bit level. Their clocks must be synchronized
Line Configuration - In a point-to-point configuration, two devices are
connected together through a dedicated link. In a multipoint configuration, a link
is shared between several devices.
Physical Topology - The physical topology defines how devices are connected to
make a network. Devices can be connected using a mesh, bus, star or ring
topology.
Transmission Mode - The physical layer also defines the direction of
transmission between two devices: simplex, half-duplex or full-duplex.
2. DATA LINK LAYER
It is responsible for transmitting frames from one node to the next node.
The other responsibilities of this layer are
Framing - Divides the stream of bits received into data units called frames.
Physical addressing – If frames are to be distributed to different systems on the
network , data link layer adds a header to the frame to define the sender and
receiver.
Flow control- If the rate at which the data are absorbed by the receiver is less
than the rate produced in the sender, t he Data link layer imposes a flow ctrl
mechanism.
Error control- Used for detecting and retransmitting damaged or lost frames and
to prevent duplication of frames. This is achieved through a trailer added at the
end of the frame.
Medium Access control -Used to determine which device has control over the
link at any given time.
3. NETWORK LAYER
This layer is responsible for the delivery of packets from source to destination.
It determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors.
The other responsibilities of this layer are
Logical addressing - If a packet passes the network boundary, we need another
addressing system for source and destination called logical address. This
addressing is used to identify the device on the internet.
Routing – Routing is the major component of the network layer, and it determines
the best optimal path out of the multiple paths from source to the destination.
4. TRANSPORT LAYER
5. SESSION LAYER
6. PRESENTATION LAYER
It is concerned with the syntax and semantics of information exchanged between two
systems.
The other responsibilities of this layer are
Translation – Different computers use different encoding system, this layer is
responsible for interoperability between these different encoding methods. It will
change the message into some common format.
Encryption and decryption-It means that sender transforms the original
information to another form and sends the resulting message over the n/w. and
vice versa.
Compression and expansion-Compression reduces the number of bits contained
in the information particularly in text, audio and video.
7. APPLICATION LAYER
This layer enables the user to access the network. It handles issues such as network
transparency, resource allocation, etc. This allows the user to log on to remote user.
The other responsibilities of this layer are
FTAM (File Transfer, Access, Management) - Allows user to access files in
a remote host.
Mail services - Provides email forwarding and storage.
Directory services - Provides database sources to access information about
various sources and objects.
TRANSPORT LAYER
The transport layer is responsible for the reliability, flow control, and correction
of data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
o UDP – UDP provides connectionless service and end-to-end delivery of
transmission. It is an unreliable protocol as it discovers the errors but
not specify the error.
o TCP – TCP provides a full transport layer services to applications. TCP
is a reliable protocol as it detects the error and retransmits the
damaged frames.
INTERNET LAYER
The internet layer is the second layer of the TCP/IP model.
An internet layer is also known as the network layer.
The main responsibility of the internet layer is to send the packets from any
network, and they arrive at the destination irrespective of the route they take.
Internet layer handle the transfer of information across multiple networks through
router and gateway .
IP protocol is used in this layer, and it is the most significant part of the entire
TCP/IP suite.
Following are the differences between OSI and TCP/IP Reference Model −
OSI TCP/IP
The OSI model was developed first, and then The protocols were created first and then built
protocols were created to fit the network the TCP/IP model.
architecture’s needs.
The OSI model represents defines It does not mention the services, interfaces,
administration, interfaces and conventions. It and protocols.
describes clearly which layer provides
services.
The protocols of the OSI model are better The TCP/IP model protocols are not hidden,
unseen and can be returned with another and we cannot fit a new protocol stack in it.
appropriate protocol quickly.
oriented transmission in the network layer; network layer and supports connecting and
however, only connection-oriented connectionless-oriented transmission in the
transmission in the transport layer. transport layer.
The smallest size of the OSI header is 5 bytes. The smallest size of the TCP/IP header is 20
bytes.
Protocols are unknown in the OSI model and In TCP/IP, returning protocol is not difficult.
are returned while the technology modifies.
5) Describe guided and unguided transmission media.
Explain about various transmission media in physical layer with a neat sketch.
Transmission Media
Transmission media is a communication channel that carries the information fromthe sender to the receiver
o Data is transmitted through the electromagnetic signals.
o The main functionality of the transmission media is to carry the information
in the form of bits (Either as Electrical signals or Light pulses).
o It is a physical path between transmitter and receiver in data communication.
o The characteristics and quality of data transmission are determined by the
characteristics of medium and signal.
o Transmission media is of two types : Guided Media (Wired) and UnGuided
Media (wireless).
o In guided (wired) media, medium characteristics are more important whereas, in
unguided (wireless) media, signal characteristics are more important.
o Different transmission media have different properties such as bandwidth, delay,
cost and ease of installation and maintenance.
o The transmission media is available in the lowest layer of the OSI reference
model, i.e., Physical layer.
GUIDED MEDIA
It is defined as the physical medium through which the signals are transmitted.
It is also known as Bounded media.
Types of Guided media: Twisted Pair Cable, Coaxial Cable, Fibre Optic Cable
Twisted pair is a physical media made up of a pair of cables twisted with each
other.
A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable.
The frequency ranges for twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.
Unshielded Twisted Pair
An unshielded twisted pair is widely used in telecommunication.
Following are the categories of the unshielded twisted pair cable:
o Category 1: Suports low-speed data.
o Category 2: It can support upto 4Mbps.
o Category 3: It can support upto 16Mbps.
o Category 4: It can support upto 20Mbps.
o Category 5: It can support upto 200Mbps.
Advantages :
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
A shielded twisted pair is a cable that contains the mesh surrounding the wire that allows
the higher transmission rate.
Advantages :
o The cost of the shielded twisted pair cable is not very high and not very low.
o Installation of STP is easy.
o It has higher capacity as compared to unshielded twisted pair cable.
o It has a higher attenuation.
o It is shielded that provides the higher data transmission rate.
Disadvantages:
o It is more expensive as compared to UTP and coaxial cable.
o It has a higher attenuation rate.
COAXIAL CABLE
o The name of the cable is coaxial as it contains two conductors parallel to each
other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the outer
conductor is made up of copper mesh.
o The middle core is made up of non-conductive cover that separates the inner
conductor from the outer conductor.
o The middle core is responsible for the data transferring whereas the copper mesh
prevents from the EMI(Electromagnetic interference).
o Common applications of coaxial cable are Cable TV networks and traditional
Ethernet LANs.
Advantages :
o Fibre optic cable is a cable that uses electrical signals for communication.
o Fibre optic is a cable that holds the optical fibres coated in plastic that are used to
send the data by pulses of light.
o The plastic coating protects the optical fibres from heat, cold, electromagnetic
interference from other types of wiring.
o Fibre optics provide faster data transmission than copper wires.
Basic elements of Fibre optic cable:
o Core: The optical fibre consists of a narrow strand of glass or plastic known as
a core. A core is a light transmission area of the fibre. The more the area of the
core, the more light will be transmitted into the fibre.
o Cladding: The concentric layer of glass is known as cladding. The main
functionality of the cladding is to provide the lower refractive index at the core
interface as to cause the reflection within the core so that the light waves are
transmitted through the fibre.
o Jacket: The protective coating consisting of plastic is known as a jacket. The
main purpose of a jacket is to preserve the fibre strength, absorb shock and extra
fibre protection.
Advantages:
o Greater Bandwidth
o Less signal attenuation
o Immunityto electromagnetic interference
o Resistance to corrosive materials
o Light weight
o Greater immunity to tapping
Disadvantages :
o Requires Expertise for Installation and maintenance
o Unidirectional light propagation.
o Higher Cost.
Multimode Propagation
Multimode is so named because multiple beams from a light source move through
the core in different paths.
How these beams move within the cable depends on the structure of the core.
Single-Mode Propagation
Single-mode uses step-index fiber and a highly focused source of light that limits
beams to a small range of angles, all close to the horizontal.
The single-mode fiber itself is manufactured with a much smaller diameter than
that of multimode fiber, and with substantially lower density(index of refraction).
The decrease in density results in a critical angle that is close enough to 90° to
make the propagation of beams almost horizontal.
In this case, propagation of different beams is almost identical, and delays are
negligible. All the beams arrive at the destination “together” and can be
recombined with little distortion to the signal.
UNGUIDED MEDIA
o An unguided transmission transmits the electromagnetic waves without using any
physical medium. Therefore it is also known as wireless transmission.
o In unguided media, air is the media through which the electromagnetic energy
can flow easily.
Unguided transmission is broadly classified into three categories : Radio Waves, Microwaves ,
Infrared
RADIO WAVES
o Radio waves are the electromagnetic waves that are transmitted in all the
directions of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the
directions.
o The range in frequencies of radio waves is from 3Khz to 1Ghz.
o In the case of radio waves, the sending and receiving antenna are not aligned, i.e.,
the wave sent by the sending antenna can be received by any receiving antenna.
o An example of the radio wave is FM radio.
MICROWAVES
Microwaves are of two types - Terrestrial microwave & Satellite microwave
Terrestrial Microwave
o Terrestrial Microwave transmission is a technology that transmits the focused
beam of a radio signal from one ground-based microwave transmission antenna to
another.
o Microwaves are the electromagnetic waves having the frequency in the range
from 1GHz to 1000 GHz.
o Microwaves are unidirectional as the sending and receiving antenna is to be
aligned, i.e., the waves sent by the sending antenna are narrowly focused.
o In this case, antennas are mounted on the towers to send a beam to another
antenna which is km away.
o It works on the line of sight transmission, i.e., the antennas mounted on the
towers are at the direct sight of each other.
Satellite Microwave
o A satellite is a physical object that revolves around the earth at a known height.
o Satellite communication is more reliable nowadays as it offers more flexibility
than cable and fibre optic systems.
o We can communicate with any point on the globe by using satellite
communication.
o The satellite accepts the signal that is transmitted from the earth station, and
it amplifies the signal. The amplified signal is retransmitted to another earth station.
INFRARED WAVES
o An infrared transmission is a wireless technology used for communication over
short ranges.
o The frequency of the infrared in the range from 300 GHz to 400 THz.
o It is used for short-range communication such as data transfer between two cell
phones, TV remote operation, data transfer between a computer and cell phone
and devices that resides in the same closed area.
Characteristics of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared communication
in one room cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum interference.
o Infrared communication is unreliable outside the building because the sun rays
will interfere with the infrared waves.
UNIT-2
SHORT QUESTION & ANSWERS
1) Explain in brief about the design issues in the data link layer.
specific responsibilities of the data link layer include framing, addressing, flow control, error
control, and media access control.
.1 DESIGN ISSUES:
Frame synchronization: Data are sent in blocks called frames. The beginning and end of
each frame must be recognizable.
Flow control: The sending station must not send frames at a rate faster than the receiving
station can absorb them.
Error control: Bit errors introduced by the transmission system should be corrected.
Addressing: On a shared link, such as a local area network (LAN), the identity of the two
stations involved in a transmission must be specified.
Access Control: It is usually not desirable to have a physically separate communications
path for control information. Accordingly, the receiver must be able to distinguish control
information from the data being transmitted.
Link management: The initiation, maintenance, and termination of a sustained data
exchange require a fair amount of coordination and cooperation among stations.
Procedures for the management of this exchange are required.
The data link layer divides the stream of bits received from the network layer into
manageable data units called frames.
When a frame arrives at the destination, the checksum is recomputed.
If the newly-computed checksum is different from the one contained in the frame,
the data link layer knows that an error has occurred and takes steps to deal with it
(e.g., discarding the bad frame and possibly also sending back an error report).
Pure ALOHA
The original ALOHA protocol is called pure ALOHA. This is a simple, but
elegant protocol.
The idea is that each station sends a frame whenever it has a frame to send.
Since there is only one channel to share, there is the possibility of collision
between frames from different stations.
A collision involves two or more stations.
Figure: Pure ALOHA
Drawback of FDM: FDM is a simple and efficient allocation mechanism. But, when the number of
senders is large and continuously varying or the traffic is bursty.
Time Division Multiplexing: Each user is statically allocated every Nth time slot. If a user does
not use the allocated slot. The same holds if we split up the networks physically.
7) Define BRIDGES
A bridge operates in both the physical and the data link layer.
In physical layer it regenerates the signal it receives.
In data link layer, the bridge can check the physical (MAC) addresses (source and
destination) contained in the frame.
CSMA / CD resends the data frame whenever Whereas CSMA / CA will first transmit the intent
a conflict occurs. to send for data transmission.
It is more efficient than simple CSMA(Carrier While it is similar to simple CSMA(Carrier Sense
Sense Multiple Access). Multiple Access).
It is the type of CSMA to detect the collision It is the type of CSMA to avoid collision on a
on a shared channel. shared channel.
Ex:
Suppose we want to transmit the information string:
1111101.
The receiver and sender decide to use the polynomial
pattern, 1101.
The information string is shifted left by one position less
than the number of positions in the divisor.
The remainder is found through modulo 2 division (at right)
and added to the information string: 1111101000 + 111 =
1111101111.
Check Sum:
o Checksum is an error detection method.
o The checksum is used in the Internet by several protocols although not at
the data link layer.
o The receiver follows these steps:
The unit is divided into k sections, each of n bits.
All sections are added using one’s complement to get the sum
The sum is complemented.
If the result is zero, the data are accepted: otherwise rejected.
o The sender follows these steps:
The unit is divided into k sections, each of n bits.
All sections are added using one’s complement to get the sum.
The sum is complemented and becomes the checksum.
The checksum is sent with the data.
Figure: Checksum
3) Explain in detail about Error correction.
ERROR CORRECTION:
Hamming Code:
o Hamming codes provide for Forward Error Correction using a “Block
Parity” i.e, instead of one parity bit send a block of parity bits
o Allows correction of single bit errors.
o This is accomplished by using more than one parity bit.
o Each computed on different combination of bits in the data.
o In hamming code, the redundant bits are added to the original data at all 2ith
position where i=0,1,2... such that 2i<n where n is the no of bits in original
data.
Ex:
o The Redundant bits are calculated as
Pure ALOHA
The original ALOHA protocol is called pure ALOHA. This is a simple, but elegant
protocol.
The idea is that each station sends a frame whenever it has a frame to send.
Since there is only one channel to share, there is the possibility of collision between
frames from different stations.
A collision involves two or more stations.
Figure: Pure ALOHA
o Let us assume that the stations send fixed-length frames with each frame
taking Tfr s to send.
o The Above figure gives the vulnerable time of the Station A, Station A sends a
frame at time t. Now imagine station B has already sent a frame between t - Tfr
and t. This leads to a collision between the frames from station A and station
B. The end of B's frame collides with the beginning of A's frame.
o On the other hand, suppose that station C sends a frame between t and t+Tfr.
Here, there is a collision between frames from station A and station C. The
beginning of C's frame collides with the end of A's frame.
o The vulnerable time, during which a collision may occur in pure ALOHA,
is 2 times the frame transmission time.
Pure ALOHA vulnerable time = 2 x Tfr
Slotted ALOHA
Slotted ALOHA was invented to improve the efficiency of pure ALOHA.
In slotted ALOHA we divide the time into slots of Tfr s and force the station to send
only at the beginning of the time slot.
Because a station is allowed to send only at the beginning of the synchronized time
slot, if a station misses this moment, it must wait until the beginning of the next
time slot. This means that the station which started at the beginning of this slot has
already finished sending its frame.
There is still the possibility of collision if two stations try to send at the beginning
of the same time slot.
Figure: Slotted ALOHA
Vulnerable Time: The vulnerable time for slotted ALOHA is one-half that of pure
ALOHA.
Slotted ALOHA vulnerable time = Tfr
o Frame control (FC): The FC field is 2 bytes long and defines the type of
frame and some control information.
The Subfields of FC:
o Addresses: There are four address fields, each 6 bytes long. The meaning
of each address field depends on the value of the To DS and From DS
subfields.
o Sequence control: This field defines the sequence number of the frame to
be used in flow control.
o Frame body: This field, which can be between 0 and 2312 bytes, contains
information based on the type and the subtype defined in the FC field.
o FCS: The FCS field is 4 bytes long and contains a CRC-32 error detection
sequence.
Frame Types
o A wireless LAN defined by IEEE 802.11 has three categories of frames:
management frames, control frames, and data frames.
o Management Frames: Management frames are used for the initial
communication between stations and access points.
o Control Frames: Control frames are used for accessing the channel and
acknowledging frames.
o Data Frames: Data frames are used for carrying data and control
information.
Hidden Station Problem:
Figure shows that the RTS message from B reaches A, but not C.
Because both Band C are within the range of A, the CTS message,
which contains the duration of data transmission from B to Areaches
C.
Station C knows that some hidden station is using the channel and
refrains from transmitting until that duration is over.
Exposed Station Problem:
o In this problem a station refrains from using a channel when it is, available.
o In Figure, station A is transmitting to station B.
o Station C has some data to send to station D, which can be sent without
interfering with the transmission from A to B.
o Station C is exposed to transmission from A; it hears what A is sending and
thus refrains from sending. In other words, C is too conservative and wastes
the capacity of the channel.
Figure: Exposed Station Problem
o Solution:
The handshaking messages RTS and CTS cannot help in this case,
despite what you might think.
Station C hears the RTS from A, but does not hear the CTS from B.
Station C, after hearing the RTS from A, can wait for a time so that
the CTS from B reaches A; it then sends an RTS to D to show that
it needs to communicate with D. Both stations B and A may hear
this RTS, but station A is in the sending state, not the receiving state.
Station B, responds with a CTS. The problem is here. If station A
has started sending its data, station C cannot hear the CTS from
station D because of the collision; it cannot send its data to D.
It remains exposed until A finishes sending its data.
Ans: Guaranteed delivery, Guaranteed delivery with bounded delay, In-Order packets, Guaranteed
max jitter.
4.What is Routing?
Ans: A Router is a process of selecting path along which the data can be transferred from source to the
destination. Routing is performed by a special device known as a router.
5. Types of Routing?
o Static Routing
o Default Routing
o Dynamic Routing
6. Default Routing?
Ans: Default Routing is a technique in which a router is configured to send all the packets to the same
hop device, and it doesn't matter whether it belongs to a particular network or not. A Packet is
transmitted to the device for which it is configured in default routing.
7.What is ARP?
8.What is RARP?
9. What is ICMP?
o The ICMP is a network layer protocol used by hosts and routers to send the notifications of IP
datagram problems back to the sender.
o ICMP uses echo test/reply to check whether the destination is reachable and responding.
o ICMP handles both control and error messages, but its main function is to report the error but
not to correct them.
o Destination unreachable
o Source Quench
o Time Exceeded
o Parameter problems
o Redirection
o Multicasting: Sometimes the sender wants to send the same message to a large
number of receivers simultaneously. This process is known as multicasting which has
one-to-many communication.
1. Explain the design issues of the Network layer.
As an example, consider the above figure, Here, host H1 has established connection
1 with host H2. It is remembered as the first entry in each of the routing tables.
The first line of A's table says that if a packet bearing connection identifier 1 comes
in from H1, it is to be sent to router C and given connection identifier 1.
Similarly, the first entry at C routes the packet to E, also with connection identifier 1.
Now let us consider what happens if H3 also wants to establish a connection to H2.
It chooses connection identifier 1 (because it is initiating the connection and this is its
only connection) and tells the subnet to establish the virtual circuit. This leads to the
second row in the tables.
Note that we have a conflict here because although A can easily distinguish
connection 1 packets from H1 from connection 1 packets from H3, C cannot do this.
For this reason, A assigns a different connection identifier to the outgoing traffic for
the second connection. Avoiding conflicts of this kind is why routers need the ability
to replace connection identifiers in outgoing packets.
In some contexts, this is called label switching. Services Provided to the Transport
Layer
The network layer provides services to the transport layer at the network
layer/transport layer interface.
The network layer services have been designed with the following goals in mind. o
The services should be independent of the router technology. o The transport layer
should be shielded from the number, type, and topology of the routers present. o The
network addresses made available to the transport layer should use a uniform
numbering plan, even across LANs and WANs.
2. Discuss about different routing algorithms in detail
ROUTING ALGORITHMS
The main function of the network layer is routing packets from the source machine to the
destination machine.
In most subnets, packets will require multiple hops to make the journey. The only notable
exception is for broadcast networks, but even here routing is an issue if the source and
destination are not on the same network.
The algorithms that choose the routes and the data structures that they use are a major area
of network layer design.
The routing algorithm is that part of the network layer software responsible for deciding
which output line an incoming packet should be transmitted on.
If the subnet uses datagrams internally, this decision must be made anew for every arriving
data packet since the best route may have changed since last time.
If the subnet uses virtual circuits internally, routing decisions are made only when a new
virtual circuit is being set up. Thereafter, data packets just follow the previouslyestablished
route. This is sometimes called session routing because a route remains in force for an entire
user session.
Router perform two tasks o Routing: Making the decision which routes to use. o Forwarding:
Looking up the outgoing line to use for it in the routing tables.
Properties of routing algorithms:
o Correctness
o Simplicity o Robustness
o Stability
o Fairness, and
o Optimality
Routing algorithms can be grouped into two major classes:
1. Non-adaptive Algorithms : Static and offline. They will not work if there is any failure of link
or modification of the subnet. Here the path is calculated prior to the data transmission. Non-
adaptive algorithms do not base their routing decisions on measurements or estimates of the
current traffic and topology. This procedure is sometimes called static routing. Examples:
Shortest path routing and Flooding
2. Adaptive algorithms: Dynamic and online. These algorithms change their routing decisions
to reflect changes in the topology, and usually the traffic as well. Adaptive algorithms differ in
where they get their information (e.g., locally, from adjacent routers, or from all routers),
when they change the routes (e.g., every T sec, when the load changes or when the topology
changes), and what metric is used for optimization (e.g., distance, number of hops, or
estimated transit time).
Optimality principle: It states that if router J is on the optimal path from router I to router K,
then the optimal path from J to K also falls along the same route.
3. Describe Dijkstra shortest path algorithm. Also show working of Dijkstra algorithm with
the help of an example.
ALGORITHM:
Dijkstra's Let the node at which we are starting be called the initial node. Let the distance of
node Y be the distance from the initial node to Y. Dijkstra's algorithm will assign some initial
distance values and will try to improve them step by step.
1. Assign to every node a tentative distance value: set it to zero for our initial node and to
infinity for all other nodes.
2. Mark all nodes unvisited. Set the initial node as current. Create a set of the unvisited nodes
called the unvisited set consisting of all the nodes except the initial node.
3. For the current node, consider all of its unvisited neighbours and calculate their tentative
distances. For example, if the current node A is marked with a distance of 6, and the edge
connecting it with a neighbor B has length 2, then the distance to B (through A) will be 6+2=8.
If this distance is less than the previously recorded tentative distance of B, then overwrite that
distance. Even though a neighbor has been examined, it is not marked as "visited" at this time,
and it remains in the unvisited set.
4. When we are done considering all of the neighbors of the current node, mark the current
node as visited and remove it from the unvisited set. A visited node will never be checked
again.
5. If the destination node has been marked visited (when planning a route between two
specific nodes) or if the smallest tentative distance among the nodes in the unvisited set is
infinity (when planning a complete traversal), then stop. The algorithm has finished.
6. Select the unvisited node that is marked with the smallest tentative distance, and set it as
the new "current node" then go back to step 3.
Example:
4. Explain distance vector routing algorithm
This updating process is illustrated in the above figure. Part (a) shows a subnet. The first four
columns of part (b) show the delay vectors received from the neighbours of router J.
A claims to have a 12-msec delay to B, a 25-msec delay to C, a 40-msec delay to D, etc.
Suppose that J has measured or estimated its delay to its neighbors, A, I, H, and K as 8, 10, 12,
and 6 msec, respectively.
Consider how J computes its new route to router G. It knows that it can get to A in 8 msec,
and A claims to be able to get to G in 18 msec, so J knows it can count on a delay of 26 msec
to G if it forwards packets bound for G to A. Similarly, it computes the delay to G via I, H, and
K as 41 (31 + 10), 18 (6 + 12), and 37 (31 + 6) msec, respectively. The best of these values is
18, so it makes an entry in its routing table that the delay to G is 18 msec and that the route
to use is via H. The same calculation is performed for all the other destinations, with the new
routing table shown in the last column of the figure.
Flooding
In this, every incoming packet is sent out on every outgoing line except the one it arrived on.
Flooding obviously generates vast numbers of duplicate packets, in fact, an infinite number
unless some measures are taken to damp the process.
One such measure is to have a hop counter contained in the header of each packet, which
is decremented at each hop, with the packet being discarded when the counter reaches zero.
Ideally, the hop counter should be initialized to the length of the path from source to
destination.
If the sender does not know how long the path is, it can initialize the counter to the worst
case, namely, the full diameter of the subnet.
An alternative technique for damming the flood is to keep track of which packets have been
flooded, to avoid sending them out a second time. achieve this goal is to have the source
router put a sequence number in each packet it receives from its hosts. Each router then needs
a list per source router telling which sequence numbers originating at that source have already
been seen. If an incoming packet is on the list, it is not flooded.
Selective flooding is the variant of flooding. In this algorithm the routers do not send every
incoming packet out on every line, only on those lines that are going approximately in the
right direction.
Flooding is used in military applications, distributed database applications.
Flooding always chooses the shortest path because it chooses every possible path in parallel.
QoS Specification
Delay
Delay Variation(Jitter)
Throughput
Error Rate
IPv4
IPv4 addresses consist of two things: the network address and the host address. It stands
for Internet Protocol version four. It was introduced in 1981 by DARPA and was the first
deployed version in 1982 for production on SATNET and on the ARPANET in January 1983.
IPv4 addresses are 32-bit integers that have to be expressed in Decimal Notation. It is
represented by 4 numbers separated by dots in the range of 0-255, which have to be
converted to 0 and 1, to be understood by Computers. For Example, An IPv4 Address can be
written as 189.123.123.90.
What is IPv6?
IPv6 is based on IPv4 and stands for Internet Protocol version 6. It was first introduced in
December 1995 by Internet Engineering Task Force. IP version 6 is the new version of Internet
Protocol, which is way better than IP version 4 in terms of complexity and efficiency. IPv6 is
written as a group of 8 hexadecimal numbers separated by colon (:). It can be written as 128
bits of 0s and 1s.
IPv6 Address Format
IPv6 Address Format is a 128-bit IP Address, which is written in a group of 8 hexadecimal
numbers separated by colon (:).
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It can generate 4.29×10 9 address The address space of IPv6 is quite large it can
space produce 3.4×10 38 address space
The Security feature is dependent IPSEC is an inbuilt security feature in the IPv6
on the application protocol
In IPv4 Packet flow identification is In IPv6 packet flow identification are Available and
not available uses the flow label field in the header
IPv4 has a header of 20-60 bytes. IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consists of 4 fields which are IPv6 consists of 8 fields, which are separated by a
separated by addresses dot (.) colon (:)
IPv4 IPv6
Example of IPv6:
Example of IPv4: 66.94.29.13
2001:0000:3238:DFE1:0063:0000:0000:FEFB
Hierarchical Routing
As networks grow in size, the router routing tables grow proportionally.
There are some problems with the increase in network size
When hierarchical routing is used, the routers are divided into regions, with each router
knowing all the details about how to route packets to destinations within its own region, but
knowing nothing about the internal structure of other regions.
When different networks are interconnected, it is natural to regard each one as a separate
region in order to free the routers in one network from having to know the topological
structure of the other ones.
For huge networks, a two-level hierarchy may be insufficient; it may be necessary to group
the regions into clusters, the clusters into zones, the zones into groups, and so on, until we
run out of names for aggregations.
Example:
o The below figure (a) gives an example of routing in a two-level hierarchy with five regions.
o The full routing table for router 1A has 17 entries, as shown in Figure (b)
o When routing is done hierarchically, as in Figure (c) there are entries for all the local routers
as before, but all other regions have been condensed into a single router, so all traffic for
region 2 goes via the 1B -2A line, but the rest of the remote traffic goes via the 1C -3B line.
o Hierarchical routing has reduced the table from 17 to 7 entries.
o As the ratio of the number of regions to the number of routers per region grows, the savings
in table space increase.
o For example, consider a subnet with 720 routers. If there is no hierarchy, each router needs
720 routing table entries. If the subnet is partitioned into 24 regions of 30 routers each, each
router needs 30 local entries plus 23 remote entries for a total of 53 entries. If a three-level
hierarchy is chosen, with eight clusters, each containing 9 regions of 10 routers, each router
needs 10 entries for local routers, 8 entries for routing to other regions within its own cluster,
and 7 entries for distant clusters, for a total of 25 entries.
o Kamoun and Kleinrock (1979) discovered that the optimal number of levels for an N router
subnet is ln N, requiring a total of e ln N entries per router.
o They have also shown that the increase in effective mean path length caused by hierarchical
routing is sufficiently small that it is usually acceptable.
RARP stands for Reverse Address Resolution Protocol. RARP works opposite of ARP. Reverse
Address Resolution Protocol is used to convert MAC address ie. physical address into IP
address ie. logical address. RARP provides with a feature for the systems and applications to
get their own IP address from a DNS( Domain Name System) or router. This type of
resolution is required for various tasks such as executing reverse DNS lookup. As Reverse
Address Resolution Protocol works at low level it requires direct network addresses. The
reply from the server mostly carries a small information but the 32 bit internet address is
used and it does not exploit the full potential of a network such as ethernet.
How Does RARP Work?
Data is sent between two places in a network using the RARP, which is on the
Network Access Layer.
Every user on the network has two distinct addresses: their MAC (physical) address
and their IP (logical) address.
Software assigns the IP address, and the hardware then builds the MAC address into
the device.
Any regular computer connected to the network can function as the RARP server,
answering to RARP queries. It must, however, store all of the MAC addresses’
associated IP addresses. Only these RARP servers are able to respond to RARP
requests that are received by the network. The information package must be
transmitted over the network’s lowest tiers.
Using both its physical address and Ethernet broadcast address, the client transmits
a RARP request. In response, the server gives the client its IP address.
ICMP
ICMP stands for Internet Control Message Protocol. ICMP is a part of IP protocol suite. ICMP
is an error reporting and network diagnostic protocol. Feedback in the network is reported
to the designated host. Meanwhile, if any kind of error occur it is then reported to ICMP.
ICMP protocol consists of many error reporting and diagnostic messages. ICMP protocol
handles various kinds of errors such as time exceeded, redirection, source quench,
destination unreachable, parameter problems etc. The messages in ICMP are divided into
two types. They are given below:
Error Message: Error message states about the issues or problems that are faced by
the host or routers during processing of IP packet.
Query Message: Query messages are used by the host in order to get information
from a router or another host.
How Does ICMP Work?
The main and most significant protocol in the IP suite is called ICMP. However, unlike
TCP and UDP, ICMP is a connectionless protocol, meaning it doesn’t require a
connection to be established with the target device in order to transmit a message.
TCP and ICMP operate differently from one another; TCP is a connection-oriented
protocol, while ICMP operates without a connection. Every time a connection is
made prior to a message being sent, a TCP Handshake is required of both devices.
Datagrams including an IP header containing ICMP data are used to transmit ICMP
packets. An independent data item like a packet is comparable to an ICMP datagram.
b. Port Addressing
c. Reliable delivery
d. Flow control
e. Multiplexing
2. What are the four aspects related to the reliable delivery of data?
4. What is UDP?
The basic idea of UDP is for a source process to send a message to a port
and for the destination process to receive the message from
a port.
Source Port Address Destination Port Address
16 bits 16 bits
UDP is very useful for audio or video delivery which does not need
acknowledgement. It is useful in the transmission of multimedia data. Connection
Establishment delay will occur in TCP.
TCP UDP
It provides connection‐ Provides connectionless service.
oriented service
Connection Establishment No connectionestablishment
delay will be there and no delay
Provides reliable service Provides unreliable, but fast
Service
12. List the services of TCP from the application program point of
view.
The services of TCP from the application program point of view are
a. Process‐to‐process communication
b. Stream delivery service
c. Sending and receiving buffers
d. Segments
e. Full‐duplex communication.
The standard protocols used by Transport Layer to enhance it’s functionalities are :
4. Congestion Control :–
Congestion is a situation in which too many sources over a network attempt to send
data and the router buffers start overflowing due to which loss of packets occur.
As a result retransmission of packets from the sources increase the
congestion further.
In this situation Transport layer provides Congestion Control in different
ways.
It uses open loop congestion control (Retransmission Policy , Window
Policy , Acknowledgment Policy etc..) to prevent the congestion and
closed loop congestion(Backpressure , Choke Packet Technique etc..)
control to remove the congestion in a network once it occurred.
TCP provides AIMD‐ Additive Increase Multiplicative Decrease,
Leaky bucket technique for congestion control.
5. Data integrity and Error Correction
Transport layer checks for errors in the messages coming from application layer by
using error detection codes, computing checksums, it checks whether the received data
is not corrupted and uses the ACK and NACK services to inform the sender if the data is
arrived or not and checks for the integrity of data.
6. Flow control :–
Transport layer provides a flow control mechanism between the adjacent
layers of the TCP/IP model.
TCP also prevents the data loss due to a fast sender and slow receiver by
imposing some flow control techniques.
It uses the method of sliding window protocol which is accomplished
by receiver by sending a window back to the sender informing the size of
data it can receive.
This establishment protocol involves one peer checking with the other that
the connection request is indeed current. Host 1 chooses a sequence
number, x , and sends a CONNECTION REQUEST segment containing it to
host 2. Host 2 replies with an ACK segment acknowledging x and
announcing its own initial sequence number, y.
Finally, host 1 acknowledges host 2’s choice of an initial sequence number in
the first data segment that it sends
In fig (B) the first segment is a delayed duplicate CONNECTION REQUEST from
an old connection.
This segment arrives at host 2 without host 1’s knowledge. Host 2 reacts to
this segment by sending host1an ACK segment, in effect asking for
verification thathost 1 was indeed trying to set up a new connection.
The worst case is when both a delayed CONNECTION REQUEST and an ACK
are floating around in the subnet.
In fig (C) previous example, host 2 gets a delayed CONNECTION REQUEST and
replies to it.
At this point, it is crucial to realize that host 2 has proposed using y as the
initial sequence number for host 2 to host 1 traffic, knowing full well that no
segments containing sequence number y or acknowledgements to y are still
Fig‐(a) Fig‐(b) Fig‐(c) Fig‐(d)
One of the user sends a Initial process is done
If the second DR is Same as in fig‐(
DISCONNECTION lost,
in the same way as in the user c) except that all
REQUEST TPDU in fig‐(a). initiating the repeated attempts
order to initiate connection disconnection will not
If the final ACK‐TPDU to retransmit the
receive the expected
release. is lost, the situation is DR is assumed to
response, and will
When it arrives, the saved by the timer. timeout and starts all be failed due to
recipient over again.
sends back a DR‐TPDU, too, When the timer is lost TPDUs.
and starts a timer. expired, the After ‘N’ entries,
connection
When this DR arrives, the is released. the sender just
original sender sends back an gives up and
ACK‐ TPDU and releases the Releases
connection. connection.
Finally, when the ACK‐
TPDU arrives,
the
receiver also
releases
theconnection.
in existence.
When the second delayed segment arrives at host 2, the fact that z has been
acknowledged rather than y tells host 2 that this, too, is an old duplicate.
The important thing to realize here is that there is no combination of old
segments that can cause the protocol to fail and have a connection set up by
accident when no one wants it.
CONNECTION RELEASE:
Source port: 16 Bit number which identifies the Source Port number (Sending
Computer's TCP Port).
Destination port: 16 Bit number which identifies the Destination Port number
(Receiving Port).
Sequence number: 32 Bit number used for byte level numbering of TCP
segments. If you are using TCP, each byte of data is assigned a sequence number.
If SYN flag is set (during the initial three way handshake connection initiation), then
this is
the initial sequence number. The sequence number of the actual first data byte
will then be this sequence number plus 1. For example, let the first byte of data
by a device in a particular TCP header will have its sequence number in this field
50000.
If this packet has 500 bytes of data in it, then the next packet sent by this device
will have the sequence number of 50000 + 500 + 1 = 50501.
Acknowledgment Number: 32 Bit number field which indicates the next sequence
number that the sending device is expecting from the other device.
Header Length: 4 Bit field which shows the number of 32 Bit words in the header. Also
known as the Data Offset field. The minimum size header is 5 words (binary pattern is
0101).
Reserved: Always set to 0 (Size 6 bits).
Control Bit Flags: We have seen before that TCP is a Connection Oriented Protocol.
The meaning of Connection Oriented Protocol is that, before any data can be
transmitted, a reliable connection must be obtained and acknowledged.
Control Bits govern the entire process of connection establishment, data transmissions
and connection termination. The control bits are listed as follows: They are:
ACK: Acknowledgement.
PSH: This flag means Push function. Using this flag, TCP allows a sending application to
specify that the data must be pushed immediately. When an application requests the
TCP to push data, the TCP should send the data that has accumulated without waiting
to fill the segment.
RST: Reset the connection. The RST bit is used to RESET the TCP connection due to
unrecoverable errors. When an RST is received in a TCP segment, the receiver must
respond by immediately terminating the connection. A RESET causes both sides
immediately to release the connection and all its resources. As a result, transfer of data
ceases in both directions, which can result in loss of data that is in transit. A TCP RST
indicates an abnormal termination of the connection.
SYN: This flag means synchronize sequence numbers. Source is beginning a new
counting sequence. In other words, the TCP segment contains the sequence number
of the first sent byte (ISN).
FIN: No more data from the sender. Receiving a TCP segment with the FIN flag does not
mean that transferring data in the opposite direction is not possible. Because TCP is a
fully duplex connection, the FIN flag will cause the closing of connection only in one
direction. To close a TCP connection gracefully, applications use the FIN flag.
Window: indicates the size of the receive window, which specifies the number of bytes
beyond the sequence number in the acknowledgment field that the receiver is currently
willing to receive.
Checksum: The 16‐bit checksum field is used for error‐checking of the header and
data.
Urgent Pointer: Shows the end of the urgent data so that interrupted data streams can
continue. When the URG bit is set, the data is given priority over other data streams
(Size 16 bits).
UNIT - V
Application Layer –Domain name system, SNMP, Electronic Mail; the
World WEB, HTTP, Streaming audio and video.
1. Why do we need a Domain Name System? What role does the DNS
Resolver play in the DNS system?
Domain Name System can map a name to an address and conversely an
address to name. The Domain Name System converts domain names into IP
numbers. IP numbers uniquely identify hosts on the Internet.
8. What are the four groups of HTTP Headers? What are the two methods of
HTTP?
The four groups of HTTP headers are
• General headers
• Entity Headers
• Request Headers
• Response Headers.
Two methods of HTTP are Get Method( ) Post Method( )
9. Define SNMP.
Simple Network Management Protocol (SNMP) is an "Internet- standard protocol
for managing devices on IP networks". Devices that typically support SNMP include
routers, switches, servers, workstations, printers, & modem. It is used mostly in
network management systems to monitor network-attached devices for
conditions that warrant administrative attention.
PART B
12. What is DNS? What are the services provided by DNS and explain
how it works.
An application layer protocol defines how the application processes
running on different systems, pass the messages to each other.
Country Domain
The format of country domain is same as a generic domain, but it uses two-
character country abbreviations (e.g., us for the United States) in place of
three character organizational abbreviations.
Inverse Domain
The inverse domain is used for mapping an address to a name. When the
server has received a request from the client, and the server contains the files
of only authorized clients. To determine whether the client is on the
authorized list or not, it sends a query to the DNS server and ask for mapping
an address to the name.
Working of DNS
DNS is a client/server network communication protocol. DNS clients
send requests to the. server while DNS servers send responses to the
client.
Client requests contain a name which is converted into an IP address
known as a forward DNS lookups while requests containing an IP
address which is converted into a name known as reverse DNS lookups.
DNS implements a distributed database to store the name of all the
hosts available on the internet.
If a client like a web browser sends a request containing a hostname,
then a piece of software such as DNS resolver sends a request to the
DNS server to obtain the IP address of a hostname.
If DNS server does not contain the IP address associated with a
hostname, then it forwards the request to another DNS server.
If IP address has arrived at the resolver, which in turn completes the
request over the internet protocol.
SMI
Each agent has its own MIB, which is a collection of all the objects
that the manager can manage. MIB is categorized into eight groups:
system, interface, address translation, ip, icmp, tcp, udp, and egp.
These groups are under the mib object.
SNMP
Trap: The Trap message is sent from an agent to the manager to report an
event. For example, if the agent is rebooted, then it informs the manager as
well as sends the time of rebooting.
Email consists of two kinds of subsystems: the user agents, which allow
people to read and send email, and the message transfer agents, which
move the messages from the source to the destination. We will also refer
to message transfer agents informally as mail servers.
The message transfer agents are typically system processes. They run
in the background on mail server machines and are intended to be always
available. Their job is to automatically move email through the system
from the originator to the recipient with SMTP (Simple Mail Transfer
Protocol). This is the message transfer step.
SMTP was originally specified as RFC 821 and revised to become the
current RFC 5321.
SMTP stands for Simple Mail Transfer Protocol.
the message, creates the envelope and then puts the message in the envelope. The
mail transfer agent (MTA) transfers this mail across the internet.
SMTP allows a more complex system by adding a relaying system.
Instead of just having one MTA at sending side and one at receiving
side, more MTAs can be added, acting either as a client or server to
relay the email.
IMAP stands for Internet Message Access Protocol. IMAP shares many
similar features with POP3. It, too, is a protocol that an email client can use
to download email from an email server. However, IMAP includes many
more features than POP3.
MIME is specified in six linked RFC memoranda: RFC 2045, RFC 2046, RFC
2047, RFC 4288, RFC 4289 and RFC 2049; with the
integration with SMTP email specified in detail in RFC1521 and RFC 1522.
Although MIME was designed mainly for SMTP, the content types
defined by MIME standards are also of importance outside of email, such
as in communication protocols likeHTTP for the World Wide Web. Servers
insert the MIME header at the beginning of any Web transmission.
Clients use this content type or Internet media type header to select an
appropriate "player" application for the type of data the header indicates.
Some of these players are built into the Web client or browser (for
example, almost all browsers come with GIF and JPEG image players as
well as the ability to handle HTML files);