Unit 1- Data Communication Components & Network Basics
Unit 1- Data Communication Components & Network Basics
4. What is Congestion?
● Occurs when demand > network capacity → packet loss, delays.
● Causes: Too many packets, slow routers.
Control Mechanisms:
● TCP Congestion Control: Slow Start, Congestion Avoidance
● Queue Management: RED (Random Early Detection)
2. TELNET vs FTP
Feature TELNET FTP
Use Remote login File transfer
Port 23 21
Security Insecure (plaintext) Insecure (unless FTPS/
SFTP used)
3. Email Protocols
Protocol Function
SMTP Sends email from client to server
POP3 Downloads emails (no sync)
IMAP Syncs email across devices
SMTP for sending, POP3/IMAP for receiving.
4. HTTP vs HTTPS
Feature HTTP HTTPS
Port 80 443
Security None SSL/TLS encryption
Usage General browsing Banking, secure
transactions
6. Bluetooth Architecture
● Piconet: Master + slaves
● Scatternet: Multiple interconnected piconets
● Uses: Wireless headsets, IoT devices, smartwatches
7. Firewall
● A security device/software that controls traffic flow.
● Types:
○ Packet Filtering
○ Proxy Firewall
○ Stateful Inspection
● Blocks unauthorized access while allowing safe communication.
8. Cryptography Basics
Concept Description
Symmetric Same key for encryption/decryption
(e.g., AES)
Asymmetric Public/private key pairs (e.g., RSA)
Asymmetric is slower but used in
key exchange (e.g., HTTPS).
TCP vs UDP
Feature TCP UDP
Reliability Reliable (ACK, error Unreliable
recovery)
Speed Slower due to overhead Faster
Order Maintains order May arrive out of order
Usage Web, Email, File Transfer Streaming, DNS, VoIP
Multiplexing Techniques
Type Advantage Disadvantage
FDM Multiple signals Interference, needs
simultaneously filters
TDM Efficient use of channel Idle slots possible
WDM High bandwidth (optical) Expensive equipment
Question 8
(a) Private IP Address
● Private IPs are reserved for local networks; not routable on the internet.
● Ranges:
○ 10.0.0.0 – 10.255.255.255
○ 172.16.0.0 – 172.31.255.255
○ 192.168.0.0 – 192.168.255.255
● Why needed?
○ IP address conservation
○ Internal network communication
○ Used with NAT to access the internet
Question 10
(a) Packet Filter Firewall
● Filters traffic based on:
○ IP address
○ Port number
○ Protocol
● Stateless: Each packet is inspected independently.
Working:
. Packet arrives → Check rules
. If matches → ALLOW or DENY
Limitation: Can't inspect payload, vulnerable to spoofing.
Question 11
(a) Two-Node Instability in Distance Vector Routing
● If Node A and Node B are only connected to each other and a link breaks, they may
repeatedly advertise wrong routes to each other.
● Causes routing loops and infinite updates.
(b) Solutions
. Split Horizon: Don’t advertise route back to the source.
. Poison Reverse: Advertise unreachable routes with ∞ distance.
. Hold-Down Timer: Wait before accepting bad updates.