0% found this document useful (0 votes)
5 views4 pages

Unit 3

The document provides an overview of transport and application layers in networking, detailing key concepts such as TCP, congestion, QoS, and various protocols like SMTP and HTTP. It explains functions of the transport layer, including multiplexing and de-multiplexing, and discusses the roles of application layer protocols in facilitating communication. Additionally, it covers aspects of network security, congestion management techniques, and the importance of port numbers in data transmission.

Uploaded by

24ecet02
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

Unit 3

The document provides an overview of transport and application layers in networking, detailing key concepts such as TCP, congestion, QoS, and various protocols like SMTP and HTTP. It explains functions of the transport layer, including multiplexing and de-multiplexing, and discusses the roles of application layer protocols in facilitating communication. Additionally, it covers aspects of network security, congestion management techniques, and the importance of port numbers in data transmission.

Uploaded by

24ecet02
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

UNIT 3 TRANSPORT AND APPLICATION LAYERS

1. What is TCP?

TCP provides a connection oriented, reliable byte stream service. The connection oriented means the
two applications using TCP must establish a TCP connection with each other before they can exchange data.

2. Define congestion
When too many packets rushing to a node or a part of network ,the network performance degrades.
This situation is called as congestion.

3. List the flag used in TCP header.


TCP header contains six flags. They are URG, ACK, PSH,RST, SYN,FIN

4. Give the approaches to improve the QoS.


Fine grained approaches, which provide QoS to individual applications or flows. Integrated services,
QoS architecture developed in the IETE and often associated with RSVP.

5. What do you mean by QoS?


Quality of Service is used in some organizations to help provide an optimal end user experience for audio
and video communications. QoS is most commonly used on networks where bandwidth is limited with a large
number of network packets competing for a relatively small amount of available and width.

6. What is multiplexing?
The job of gathering data chunks at the sources host from different sockets, encapsulating each data
chunks with header information to create segments, and passing the segments to the network layer is called
multiplexing.

7. What is de-multiplexing?
The job of delivering the data in a transport layer segment to the correct socket is called de-
multiplexing.

8. What is congestion?
When load on network is greater than its capacity, there is congestion of data Packets. Congestion occurs
because routers and switches have queues or buffers.

9. List the services of end to end services.


 Guarantee message delivery.
 Delivery messages in the same order they are sent.
 Deliver at most one copy of each message.
 Support arbitrarily large message.
 Support synchronization.

10. What are the functions of transport layer?


 Breaks messages into packets.
 Connection control.
 Addressing.
 Provide reliability.

11. What are the types of QoS tools?


Classification Congestion management,
 Congestion avoidance
 Shaping/policing
 Link efficiency
12. List some ways to deal with congestion
 Packet elimination
 Flow control
 Buffer allocation
 Choke packets

13. Define network congestion?


When two or more nodes would simultaneously try to transmit packets to one node there is a high
probability that the number of packets would exceed the packet handling capacity of the network and lead to
congestion.

14. What is the flow characteristics related to QoS?


The flow characteristics related to QoS are
 Reliability
 Delay
 Jitter
 bandwidth

15. What is DNS?


DNS is a client/server application that identifies each host on the internet with a unique user friendly name.

16. What is SMTP?


SimpleMailTransferProtocolisastandardandreliablehosttohostmailtransportprotocolthatoperatesover the TCP
port 25.
17. What are the four main properties of HTTP?
 Global Uniform Resource Identifier
 Request response exchange.
 Statelessness.
 Resource metadata

18. What is SMTP used for?
SMTP is used when email is delivered from an email client, such as Outlook Express, to an email
server or when email is delivered from one email server to another.

19. Define WWW?


It is an internet application that allows users to view web pages and move from one web page to another.

20. What is the web browser?


Web browser is a software program that interprets and displays the contents of HTML web pages.

21. What is URL?


URL is a string identifier that identifies a page on the World Wide Web.

22. What do you mean by TELNET?


TELNET is used to connect remote computers and issue commands on those computers.

23. What are the responsibilities of Application Layer?


The Application Layer enables the user, whether human or software, to access the network. It
provides user interfaces and support for services such as e-mail, shared database management and other
types of distributed information services
a. Network virtual Terminal,
b. File transfer ,access and Management(FTAM),
c. Mail services,
d. Directory Services
24. What is simple mail transfer protocol?
The TCP/IP protocol that supports electronic mail on the internet is called Simple Mail Transfer Protocol
(SMTP). It is a system for sending messages to other computer users based on email addresses.

25. What do you mean by File transfer protocol?


It is a standard mechanism provided by the internet for copying a file from one host to another.

26.What are the two types of connections in FTP?


The two types of connections in FTP are
Control connection
Open connection

27.Define HTTP.
It is used mainly to access data on the World Wide Web. The protocol transfers data in the form
of plaintext, hypertext, audio, video and soon.

28.What are the types of messages in HTTP transaction?


The types of messages in HTTP transaction are
1) Request messages
2) Response messages

29.What are the parts of a browser?


The parts of a browser are
A. A controller
B. A client program
C. Interpreter

30.Name the four aspects of security.


I. Privacy
II. Authentication
III. Integrity
IV. Non-repudiation

31.What is POP?
Post Office Protocol, version3 (POP3) and Internet Mail Access Protocol version4 (IMAP4) are
protocol used by a mail server in conjunction with SMTP to receive and hold mail for hosts.

32.What is the function of SMTP?


The TCP/IP protocol supports electronic mail on the Internet is called Simple Mail Transfer (SMTP).It is
a system for sending messages to other computer users based on email addresses. SMTP provides mail
exchange between users on the same or different computers.

33.How does MIME enhance SMTP?


MIME is a supplementary protocol that allows non-ASCII data to be sent through SMTP. MIME
transforms non-ASCII data at the sender site to NVT ASCII data and deliverers it to the client SMTP to be
sent through the Internet. The server SMTP at the receiving side receives the NVT ASCII data and delivers
it to MIME to be transforming feed back to the original data.

34.Why is an application such as POP needed for electronic messaging?


Workstations interact with the SMTP host, which receives the mail on behalf of every host in the
organization, to retrieve messages by using a client-server protocol such as Post Office Protocol, version
3(POP3). Although POP3 is used to download messages from the server, the SMTP client still needed on the
desktop to forward messages from the workstation user to its SMTP mail server.
35.What are the techniques to improve QoS?
The techniques to improve QoS are
1. Scheduling
2. Traffic shaping
3. Resource reservation
4. Admission control

36.Define Socket address.


The combination of IP address and port address is called Socket address.

37.What are the two types of protocols used in Transport layer?


The two types of protocols used in Transport layer are
1. TCP
2. UDP

38.Define Throughput.
It is defines as a number of packets passing through the network in a unit of time.

39.Define UDP
User data gram protocol is a Unreliable, connectionless protocol, used along with
the IP protocol.

40.What is the need of port numbers?


Port numbers are used as an addressing mechanism in transport layer.

41.What are the types of port numbers used in transport layer?


c. Well-known port
d. Registered port
e. Dynamic port

42.Why TCP services are called Stream delivery services?


TCP allows the sending process to deliver data as a stream of bytes and the
receiving process to deliver data as a stream of bytes. So it is called as stream of bytes.

43.Define jitter
Jitter is defined as a variation in the delay of received packets. The sending
side transmits packets in a continuous stream and spaces them evenly apart. Because of
network congestion, improper queuing, or configuration errors, the delay between
packets can vary instead of remaining constant.

44.Compare connection less service & connection oriented service


In connection less service there is no connection between transmitter & receiver Ex:UDP
In connection oriented service there is a connection between transmitter &receiver
Ex:TCP

45. What are the responsibilities of Data Link Layer?


The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable
link and is responsible for node-node delivery. Framing Physical Addressing Flow
Control Error Control Access Control

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy