Académique Documents
Professionnel Documents
Culture Documents
PART A
1. What are the three criteria necessary for an effective and efficient network?
The most important criteria are performance, reliability and security. Performance of the
network depends on number of users, type of transmission medium, and the capabilities of
Reliability is measured by frequency of failure, the time it takes a link to recover from the
Security issues include protecting data from unauthorized access and viruses.
Physical, data link and network layers are the network support layers; they deal with the physical aspects of
moving data from one device to another. Session, presentation and application layers are the user support layers;
they allow interoperability among unrelated software systems.
3. What are header and trailers and how do they get added and removed?
Each layer in the sending machine adds its own information to the message it receives from the layer just above
it and passes the whole package to the layer just below it. This information is added in the form of headers or
trailers. Headers are added to the message at the layers 6,5,4,3, and 2. A trailer is added at layer2. At the
receiving machine, the headers or trailers attached to the data unit at the corresponding sending layers are
removed, and actions appropriate to that layer are taken.
In networks, communication occurs between the entities in different systems. Two entities cannot just send bit
streams to each other and expect to be understood. For communication, the entities must agree on a protocol. A
protocol is a set of rules that govern data communication.
Service interface
Peer interface
Service interface- defines the operations that local objects can perform on the protocol.
Peer interface- defines the form and meaning of messages exchanged between protocol peers to implement the
communication service.
Mention the different physical media?
Optical fiber(the medium most commonly used for high-bandwidth, long-distance links)
Space(the stuff that radio waves, microwaves and infra red beams propagate through)
Define Signals?
Signals are actually electromagnetic waves traveling at the speed of light. The speed of light is,
however, medium dependent-electromagnetic waves traveling through copper and fiber do so at
about two-thirds the speed of light in vacuum.
The distance between a pair of adjacent maxima or minima of a wave, typically measured
Modulation -varying the frequency, amplitude or phase of the signal to effect the transmission of
information. A simple example of modulation is to vary the power (amplitude) of a single
wavelength.
What is CODEC?
A device that encodes analog voice into a digital ISDN link is called a CODEC, for
coder/decoder.
13. What is spread spectrum and explain the two types of spread spectrum?
Spread spectrum is to spread the signal over a wider frequency band than normal in such a way
as to minimize the impact of interference from other devices.
NRZ
NRZI
In the NRZ-L sequence, positive and negative voltages have specific meanings: positive for 0
and negative for 1. in the NRZ-I sequence, the voltages are meaningless.
Instead, the receiver looks for changes from one level to another as its basis for recognition of 1s.
Byte-Oriented Protocols(PPP)
Bit-Oriented Protocols(HDLC)
Clock-Based Framing(SONET)
Distinguish between peer-to-peer relationship and a primary-secondary relationship. peer -to- peer
relationship: All the devices share the link equally.
Primary-secondary relationship: One device controls traffic and the others must transmit
through it.
Single-bit error.
Burst-bit error.
Single bit error: The term single bit error means that only one bit of a given data unit (such as byte
character/data unit or packet) is changed from 1 to 0 or from 0 to 1.
Burst error: Means that 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.
20. List out the available detection methods.
Checksum.
The most common and least expensive mechanism for error detection is the vertical redundancy check (VRC)
often called a parity check. In this technique a redundant bit called a
parity bit, is appended to every data unit so parity bit) becomes even.
In longitudinal redundancy check (LRC), a block of bits is divided into rows and a redundant row of bits is
added to the whole block.
The third and most powerful of the redundancy checking techniques is the cyclic redundancy checks (CRC)
CRC is based on binary division. Here a sequence of redundant bits, called the CRC remainder is appended to
the end of data unit.
24. Write short notes on CRC checker.
A CRC checker functions exactly like a generator. After receiving the data appended with
the CRC it does the same modulo-2 division. If the remainder is the data accepted. Otherwise, the received
stream of bits is discarded and the dates are resent.
The error detection method used by the higher layer protocol is called checksum. Checksum is based on the
concept of redundancy.
The sender follows these steps a) the units are divided into k sections each of n bits. b)
All sections are added together using 2s complemented and become the checksum. d) The checksum is sent
with the data.
.Error correction is the mechanism to correct the errors and it can be handled in 2 ways.
When an error is discovered, the receiver can have the sender retransmit the entire data unit.
A receiver can use an error correcting coder, which automatically corrects certain errors.
A hamming code can be designed to correct burst errors of certain lengths. So the simple strategy used by the
hamming code to correct single bit errors must be redesigned to be applicable for multiple bit correction.
It is the error detecting mechanism, which means a shorter group of bits or extra bits may be appended at the
destination of each unit.
Flow control refers to a set of procedures used to restrict the amount of data. The sender can send before waiting
for acknowledgment.
32. Mention the categories of flow control?
There are 2 methods have been developed to control flow of data across communication links. a) Stop and
wait- send one from at a time.
What is a buffer?
Each receiving device has a block of memory called a buffer, reserved for storing incoming data until they
are processed.
For communication to occur between two devices, they must be connected to the same link at the same time.
There are two possible types of line configurations or connections. These connections are.
1. Point-to-point connection.
2. Multipoint connection.
Error control is the response when a receiver detects an error. The three basic forms of error control are Do
nothing, return an error message to transmitter, or correct the error with no further information from
transmitter.
Bit stuffing is the insertion of one or more bits into a transmission unit as a way to provide signaling
information to a receiver. The receiver knows how to detect and remove or disregard the stuffed bits.X
What is the use of two dimensional parity in error detection? (Nov/Dec 2012)
Framing
Error control
Flow control
Path determination: Route taken by packets from source to destination using routing algorithms.
Switching: Move a packet from routers input
Call Setup: Some network architectures require router call setup along path before data flows.
41. What are the two different types of errors occurred during data transmission?
(May/June 2012)
Burst Errors
The purpose of layering is to separate functional components that interact in some sequential and
hierarchical way, with each layer usually having an interface only to the layer above it and the
layer below it.
43. Mention the advantage and disadvantage of error correction by receiver, as compared
to error detection. (May/June 2013)
Advantage:
Original data can be obtained through error correction.
Disadvantage:
Extra redundant bits are used.
If the storage is the only source of data (e.g. disk or DRAM)then we want a error-correction to avoid crashing of
programs.
A point-to-point connection between two computers or devices consists of a wire in which data is
transmitted as a stream of bits. However, these bits must be framed into discernible blocks of
information. Framing is a function of the data link layer which provides a way for a sender to
transmit a set of bits that are meaningful to the receivers. Framing separates a message from one
source to a destination from other messages.
46. What is the difference between port address, logical address and physical address?
(May/June 2014)
Logical Address:
An IP address of the system is called logical address. This address is the combnation of Net ID
and Host ID. This address is used by network layer to identify a particular network (source to
destination) among the networks. This address can be changed by changing the host position on
the network. So it is called logical address.
Physical address: Each system having a NIC (Network Interface Card) through which two
systems physically connected with each other with cables. The address of the NIC is called
Physical address or mac address. This is specified by the manufacture company of the card. This
address is used by data link layer. Port Address: There are many applications running on the
computer. Each application run with a port no.(logically) on the computer. This port no. is called
port address.
47. What will be the maximum number of frames sent but unacknowledged for a sliding
window of size n-1 ( n is the sequence number)? (May/June 2014)
The maximum number of frames sent but unacknowledged for a sliding window of size n-1 is n.
Error detection and correction or error control are techniques that enable reliable delivery of
digital data over unreliable communication channels.
Flow control is the management of data flow between computers or devices or between nodes in
a network so that the data can be handled at an efficient pace. Too much data arriving before a
device can handle it causes data overflow, meaning the data is either lost or must be
retransmitted.
PART B
1. Explain in detail the error detection and error corrections.(NOV 2010) &
(MAY/JUNE 2012)
Discuss in detail about the layers of OSI model. (NOV 2010) & (NOV2011) &
(MAY/JUNE 2012)
Compare Stop and Wait ARQ scheme with sliding window ARQ scheme.
(i)
PPP
(5)
(ii)
HDLC
(5)
(iii)
SONET
(6)
(NOV/DEC 2012)
14 (i) Discuss the framing technique used in HDLC. What is the effect of errors on this Framing?
(ii) The message 11001001 is to be transmitted, using CRC Error Detection algorithm. Assuming
3
the CRC polynomial to be x + 1,determine the message that should be transmitted . If the
second left most bit is corrupted, show that it is detected by the receiver. (8)
15(i) Discuss the principle of stop and wait flow control algorithm. Draw time line diagrams
and explain how loss of a frame and loss of an ACK are handled. What is the effect of delay-
bandwidth product on link utilisation? (8) (May/June 2013)
(ii) Assume that a frame consists of 6 characters encoded in 7-bit ASCII. Attach a parity bit
for every character to maintain even parity. Also attach a similar parity bit for each bit
position across each of the bytes in the frame. Show that such a 2-dimensional parity scheme can
detect all 1-bit, 2-bit and 3-bit errors and can correct a single brit error. (8)
(ii) Suppose we want to transmit the message 11001001 and protect it from errors using the CRC
3
polynomial x + 1. Use polynomial long division to determine the message that should be
transmitted.(12)(NOV/DEC 2013)
18. Given a remainder of 111, a data unit of 10110011 and a divisor of 1001,is there an error in
the data unit. Justify your answer with necessary principles.(MAY/JUNE 2014)
How is frame order and flow control achieved using the data link layer?(MAY/JUNE 2014)
21.What is the need for error detection? Explain with typical examples. Explain methods used
for error detection and error correction.(16) (MAY/JUNE 2015)
Media access control - Ethernet (802.3) - Wireless LANs 802.11 Bluetooth - Switching and
bridging Basic Internetworking (IP, CIDR, ARP, DHCP,ICMP )
PART A
MAC sub layer resolves the contention for the shared media. It contains synchronization, flag, flow and error
control specifications necessary to move information from one place to another, as well as the physical address
of the next station to receive and route a packet.
The IEEE project 802 models take the structure of an HDLC frame and divides it into 2 sets of functions. One
set contains the end user portion of the HDLC frame the logical address, control information, and data. These
functions are handled by the IEEE 802.2 logical link control (LLC) protocol.
3. What is Ethernet?
Ethernet is a multiple-access network, meaning that a set of nodes send and receive frames over a shared link.
All the nodes can distinguish between idle and a busy-link and collision that a node listens as it transmits
and can therefore detect when a frame it is transmitting has
5. Define Repeater?
A repeater is a device that forwards digital signals, much like an amplifier forwards analog signals. However,
no more than four repeaters may be positioned between any pairs of hosts, meaning that an Ethernet has a total
reach of only 2,500m.
In Ethernet, all these hosts are competing for access to the same link, and as a consequence, they are said to be
in the same collision detection.
idle.
Once an adaptor has detected a collision and stopped its transmission, it waits a certain amount of time and
tries again. Each time it tries to transmit but fails, the adaptor doubles the amount of time it waits before trying
again. This strategy of doubling the delay interval between each transmission attempt is a general technique
known as exponential back off.
Synchronous
Asynchronous
Bluetooth
WiMAX(802.16)
Bluetooth fills the niche of very short-range communication between mobile phones, PDAs,
notebook computers, and other personal or peripheral devices. For example, Bluetooth can be
used to connect mobile phones to a headset, or a notebook computer to a printer.
If the phone is involved in a call at the time , the call must be transferred to the new base station
in what is called a hand off.
Satphones use communication satellites as base stations, communicating on frequency bands that
have been reserved internationally for satellite use.
Ethernet,token ring, and several wireless protocols. Ethernet and token ring media access
protocols have no central arbitrator of access. Media access in wireless networks is made more
complicated by the fact that some nodes may be hidden from each other due to range limitations
of radio transmission.
It collects and processes the data they receive from neighboring nodes, and then transmit the
processed data. By processing the data incrementally, instead of forwarding all the raw data to
the base station, the amount of traffic in the network is reduced.
It is used to forward the packets between shared media LANs such as Ethernet. Such switches
are sometimes known by the obvious name of LAN switches.
It is a collection of LANs connected by one or more bridges is usually said to form an extended
LAN. In their simplest variants, bridges simply accept LAN frames on their inputs and forward
them out on all other outputs.
It is for the bridges to select the ports over which they will forward frames.
The ID for what the sending bridge believes to the root bridge.
The distance, measured in hops, from the sending bridge to the root bridge.
What is broadcast?
Broadcast is simple each bridge forwards a frame with a destination broadcast address out on
each active (selected) port other than the one on which the frame was received.
It can be implemented with each host deciding for itself whether or not to accept the message.
How does a given bridge learn whether it should forward a multicast frame over a given
port?
It learns exactly the same way that a bridge learns whether it should forward a unicast frame over
a particular port- by observing the source addresses that it receives over that port.
scale
heterogeneity
A network bridge, also known as a layer 2 switch, is a hardware device used to create a
connects two segments of a network together. The segments are no independent entities, but are
owned and managed by the same organization.
28. What is the advantage of FDDI over a basic token ring? (NOV/DEC 2010)
Token ring uses priority and reservation bits, but the priority operation of the FDDI ring uses a principle that is
based on a parameter known as the Token Rotation Time or TRT. FDDI uses dual rings. When one ring fails,
second ring performs data transfer process.
Detects when line is idle and drives signal when host is transmitting
Each node is ensured of having the buffers it needs to queue the packets that arrive on that circuit. This basic
strategy is usually called hop-by-hop flow control.
If something goes wrong and the packet gets lost, corrupted, misdelivered, or in any way fails to reach its
intended destination, the network does nothing.
It is the process of building up the tables that allow the collect output for a packet to be determined.
Internet Control Message Protocol is a collection of error messages that are sent back to the source host
whenever a router or host is unable to process an IP datagram successfully.
Subnetting provides an elegantly simple way to reduce the total number of network numbers that are assigned.
The idea is to take a single IP network number and allocate the IP address with that network to several physical
networks, which are now referred to as subnets.
The Dynamic Host Configuration Protocol (DHCP) is a network protocol used to configure devices that are
connected to a network (known as hosts) so they can communicate on that network using the Internet Protocol
(IP). It involves clients and a server operating in a client- server model.X
Subnetting changes the subnet mask of the local network number to produce an even number of
smaller network numbers, each with a corresponding range of IP addresses. Subnetting is
required when one network number needs to be distributed across multiple LAN segments.
The address resolution protocol (arp) is a protocol used by the Internet Protocol (IP), to map IP network addresses
to the hardware addresses used by a data link protocol. X
The protocol operates below the network layer as a part of the interface between the OSI network and OSI link layer.
Fast Ethernet Network was developed as an upgrade to traditional Ethernet networking. Fast
Ethernet improved traditional Ethernet by increasing transfer rates 10 times, from 10 Megabit to
100 Megabit speed.
Gigabit Ethernet Network is an upgrade on Fast Ethernet Network equivalent to Fast Ethernet
Networks improvement over Fast Ethernet Network, offering speeds of 1000 Megabits (1
Gigabit)
41. What is the difference between switch and Hub? (Nov/Dec 2012)
Hub:
Many kinds of nodes can be connected to the hub with networking cable.
All hubs can be uplinked together, either with straight-through cable or cross-over cable,
depending on whether or not the hub has an uplink port.
Switches have many features that make them different than hubs. The most reason to choose a
switch rather than a hub is bandwidth. When a 100Mbps hub has five workstations, each receives
20Mbps of bandwidth. When a 10/100Mbps switch is used, each workstation receives 100Mbps
of bandwidth, dramatically increasing the speed of the connection.
42. List out any four IEEE 802 standards with its name.(MAY/JUNE 2012)
Standard
Description
802.1
Internetworking
802.2
Logical link control
802.3
Ethernet
802.4
Token bus
802.5
Token ring
802.6
Metropolitan area network (MAN)
How does an FDDI node determine whether it can send asynchronous traffic and
synchronous traffic? (May/June 2013)
Synchronous traffic can consume a portion of the 100-Mbps total bandwidth of an FDDI
network, while asynchronous traffic can consume the rest. Synchronous bandwidth is allocated
to those stations requiring continuous transmission capability. Such capability is useful for
transmitting voice and video information. Other stations use the remaining bandwidth
asynchronously.
A bridge is a device to join two network segments. The advantage is it's cheap,easy, doesn't
require routing. The disadvantages are it doesn't supportrouting and most bridges don't support
any kind of traffic filtering. Bridges aren't much used any more on physical LANS, but are
important on virtual LANS and in wireless.
WiMAX(802.16)
Wi-Fi
Bluetooth
What is the network Address in a class A subnet with the IP address of one of the hosts as
25.34.12.56 and mask 255.255.0.0? (May/June 2014)
Forward
filtering
learning
PART B
1. Name the four basic network topologies and explain them giving all the relevant features.
(NOV/DEC 2010)
Explain in detail about token ring and its frame format .(NOV/DEC 2011)
(i) Explain how bridges run a distributed spanning tree algorithm(April/May 2011)
Explain the physical properties of Ethernet 802.3 with necessary diagram of Ethernet transceiver
and adapter.(NOV/DEC 2012)
(ii) Routers.
11.Discuss in detail the various aspects of IPV6& its new features (NOV/DEC 2010) &
(MAY/JUNE 2012)
Discuss the spanning tree algorithm in detail. What are the limitations of bridges?
ARP
RARP
(i) Explain in detail about Address Resolution Protocol. (NOV/DEC 2012) (ii) What is
subnetting? Explain.
What is the need for ICMP? Mention any four ICMP messages and their purpose. (6)
(May/June 2013)
20. (i) How does a bridge come to learn on which port the various host reside? Explain with an
21.Explain the physical properties and medium access protocol of Ethernet. (MAY/JUNE 2012)
22 (i) An IEEE 802.5 token ring has 5 stations and a total wire length of 230 m. How many bits
of delay must the monitor insert into the ring? Calculate this for both 4 Mbps and 16 Mbps rings.
8
The propagation speed may be assumed to be 2.3 X 10 m/s. (6) (May/June 2013)
(ii) Discuss the problems encountered in applying CSMA/CD algorithm to wireless LANs.
(ii) Determine the maximum distance between any pair of stations in a CSMA/CD network with
a data rate of 10 Mbps, for the correct operation of collision detection process, assuming the
minimum frame size to be 512 bits. What should be the maximum distance if the data rate is
increased to 1 Gbps? 2 stations A and B, connected to the opposite ends of a 10-Mbps
CSMA/CD network, start transmission of long frames at times tl = 0 and t2= 3s respectively.
Determine the instants when A hears the collision and B hears the collision, Signal propagation
8
speed may be assumed as 2 X 10 m/s. (10)
24.(i)Describe the transmitter algorithm implemented at the sender side of the Ethernet protocol.
Why should Ethernet frame should be 512 bytes long? (10) (NOV/DEC 2013)
(ii) Explain how the hidden node and exposed node problem is addressed in 802.11? (6)
26. Describe the CSMA/CD protocol and comment on its performance for medium access.
(MAY/JUNE 2014)
27.Write short notes on: (MAY/JUNE 2014)
(i)
FDDI
(8)
(ii)
Bridges and Switches
(8)
29.Explain in detail about the access method and frame format used in Ethernet and
(MAY/JUNE 2015)
30.Discuss the MAC layer functions of IEEE802.11(8) (MAY/JUNE 2015) 31.Briefly define key
requirements of wireless LAN(8) (MAY/JUNE 2015)
Routing (RIP, OSPF, metrics) Switch basics Global Internet (Areas, BGP, IPv6), Multicast
addresses multicast routing (DVMRP, PIM)
PART A
A packet switch is a device with several inputs and outputs leading to and from the hosts that the
switch interconnects.
A logical circuit made between the sending and receiving computers. The connection is made
after both computers do handshaking. After the connection, all packets follow the same route and
arrive in sequence.
In datagram approach, each packet is treated independently from all others. Even when one
packet represents just a place of a multi packet transmission, the network treats it although it
existed alone. Packets in this technology are referred to as datagram.
Switched virtual circuit format is comparable conceptually to dial-up line in circuit switching. In
this method, a virtual circuit is created whenever it is needed and exits only for the duration of
specific exchange.
A Virtual Circuit Identifier that uniquely identifies the connection at this switch, and which will
be carried inside the header of the packets that belongs to this connection.
How the packet cost referred in distance vector and link state routing?
In distance vector routing, cost refer to hop count while in case of link state routing, cost is a
weighted value based on a variety of factors such as security levels, traffic or the state of the link.
10. Define Reliable flooding?
It is the process of making sure that all the nodes participating in the routing protocol get a copy
of the link state information from all the other nodes.
Additional hierarchy.
Load balancing.
Stub AS
Multi homed AS
Transit AS
What is an Area?
An Area is a set of routers that are administratively configured to exchange link-state information
with each other. There is one special area- the backbone area, also known as area 0.
SSM , a receiving host specifies both a multicast group and a specific host .the receiving host
would then receive multicast addressed to the specified group, but only if they are from the
special sender.
15. What is meant by congestion?
Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network
resources.
Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.
The bytes in the IP address that corresponds to 255 in the mask will be repeated in the sub network address
The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the sub network address
What is LSP?
In link state routing, a small packet containing routing information sent by a router to all other router by a
packet called link state packet.
21. List the difference between Circuit switching Packet switching (April/May 2011) & May/June 2014)
Circuit switching is done at physical layer whereas datagram switching is generally done at network layer.
Circuit switching requires the resources to be reserved before the transmission of data but datagram switching
doesnt require such rese
In circuit switching, whole of the data travels along a single dedicated path between the
two terminals whereas in datagram switching data is divided into packets and each of these packets are treated
indepently and travel along different paths, source and destination being the same.
Many-to-Many
Many-to-One
What are the applications of Multicasting?(MAY/JUNE 2012)
Teleconferencing
Video-on-demand
Compare circuit switching and virtual circuit based packet switching, in respect of queueing and
forwarding delays.
Queueing delay of a packet is the waiting time in the output buffers (input queue in some case)
In Virtual Circuit networks, Queueing delay is variable, i.e., it depends on the backlog in the node due to other
traffic.
Differentiate between connection less operation and connection oriented operation. (MAY/JUNE 2013)
Feature
Connectionless
Connection-oriented
no
yes
virtual circuit: yes
yes
no
yes without virtual circuit: no
no
What
is impact
of node/switch
crash?
lost
virtual
circuit:
a virtual
circuit
What
addressing
information is
number
destination address
without
virtual
circuit: full
source
and destination address
hard to do
to network congestion?
buffers allocated without virtual
26. What are the salient features of IPV6?(Nov/Dec 2012)
Extensibility
A bridge is a product that connects a local area network (LAN) to another local area network
that uses the same protocol (for example, Ethernet or Token Ring). A router is a device or, in
some cases, software in a computer, that determines the next network point to which a packet
should be forwarded toward its destination. The router is connected to at least two networks and
decides which way to send each information packet based on its current understanding of the
state of the networks it is connected to. A router is located at any gateway (where one network
meets another), including each point-of-presence on the Internet.X
Routing metric is calculated by routing algorithms when determining the optimal route for
sending network traffic. Metrics are assigned to each different route available in the routing table
and are calculated using many different techniques and methods based on the routing algorithms
in use. Some of the parameters used for calculating a routing metric are as follows:
Hop count
Path reliability
Path speed
Load
Bandwidth
Latency
Maximum transmission unit
PART-B
What are the different approaches in Packet Switching? Explain them in detail.
What is internetworking? Explain its service model, global address and datagram forwarding.
(April/May 2011)
Explain Distance Vector routing in detail with examples. (16) (NOV/DEC 2013)
i.Broadcasting
Multicasting
(May/June 2013)
Discuss the principles of reliable flooding and its advantages and applications. (6)
(i) For the following network, develop the datagram forwarding table
for all the nodes. The links are labeled with relative costs. The tables should forward
each packet via the least cost path to destination. (May/June 2013)
10
A
B
1
D
(i) Suppose hosts A and B have been assigned the same IP address on the same Ethernet, on
which ARP is used. B starts up after A. Wh Explain -ARPhow selfmight help with(NOV/DECthis2013)
problem. (
(ii) Describe with example how CIDR addresses the two scaling concerns in the Internet.(12)
10. Explain the RIP algorithm with a simple example of your choice. (MAY/JUNE 2014)
Discuss the notation, representation and address space of IPv6. (NOV/DEC 2011)
Explain the distance vector routing algorithm. Mention the limitations of the same.(16)
(MAY/JUNE 2015)
Explain the shortest path algorithm with suitable illustrations.(16) (MAY/JUNE 2015)
UNIT IV
PART A
1. Explain the main idea of UDP?
The basic idea is for a source process to send a message to a port and for the destination process
to receive the message from a port.
Protocol number
Source IP address
Destination IP addresses.
TCP guarantees the reliable, in order delivery of a stream of bytes. It is a full-duplex protocol,
meaning that each TCP connection supports a pair of byte streams, one flowing in each direction.
It involves preventing too much data from being injected into the network, thereby causing
switches or links to become overloaded. Thus flow control is an end to an end issue, while
congestion control is concerned with how hosts and networks interact.
At the sending and receiving end of the transmission, TCP divides long transmissions into
smaller data units and packages each into a frame called a segment.
When the size of the data unit received from the upper layer is too long for the network layer
datagram or data link layer frame to handle, the transport protocol divides it into smaller usable
blocks. The dividing process is called segmentation.
The size of the data unit belonging to single sessions are so small that several can fit together
into a single datagram or frame, the transport protocol combines them into a single data unit. The
combining process is called concatenation.
Rate- based design, in which the receiver tells the sender the rate-expressed in either bytes or
packets per second at which it is willing to accept incoming data.
A device used to connect two separate networks that use different communication protocols.
User Oriented
Network Oriented
User related attributes are SCR Sustainable Cell Rate PCR Peak Cell Rate MCR-Minimum
Cell Rate CVDT Cell Variation Delay Tolerance.
The network related attributes are, Cell loss ratio (CLR) Cell transfer delay (CTD) Cell delay
variation (CDV) Cell error ratio (CER).
Random Early Detection in each router is programmed to monitor its own queue length and
when it detects that congestion is imminent, to notify the source to adjust its congestion window.
Connection establishment
Data transfer
Connection release
A router is a device that forwards data packets between computer networks, creating an overlay
internetwork. A router is connected to two or more data lines from different networks. When a
data packet comes in one of the lines, the router reads the address information in the packet to
determine its ultimate destinationX
What are the advantages of using UDP over TCP? (NOV/DEC 2010)
No connection establishment
No connection state
Congestion control is a mechanism that controls data flow when congestion actually occurs. It controls data
entering in to a network such that the network can handle the traffic within the network.
QoS can be improved with traffic shaping techniques such as packet prioritization, application classification
and queuing at congestion points.X
A Port is a virtual data connection that can be used by programs to exchange data directly, instead of going
through a file or other temporary storage location. The most common of these are TCP and UDP ports which are
used to exchange data between computers on the Internet. Port 505/udp uses the mailbox-lm protocol for
service type mailbox-lm. A malformed request to port 505/udp is known to cause denial of service attacks.
22. List out the various features of sliding window protocol. (Nov/Dec 2012)
A sliding window protocol is a feature of packet based data transmission protocols. They are used where
reliability in order to delivery of packet is required.
Each position of the transmission (packets) is assigned a unique consecutive sequence number and the receiver
uses the numbers to place receive packets in correct order.
Discarding duplicate packets
Identifying the missing packets
24. Why is UDP pseudo header included in UDP checksum calculation? What is the effect of an invalid
checksum at the receiving UDP?(May/June 2013)
In addition to UDP header and data, the UDP checksum includes the source and the destination IP address in
order to prevent misrouting. Suppose that the destination IP address in
IP header was corrupted, i.e. changed to som discovered by the IP checksum test. Consequently, the UDP
datagram would arrive to the wrong
IP address. Effect of an invalid checksum: The Transport Layer on the other hand, might drop it on receiving
this packet because of the wrong check sum.
25. How can the effect of jitter be compensated? What type of applications requires this
compensation? (May/June 2013)
Jitter is defined as a variation in the delay of received packets.Jitter can be compensated by using
play out delay buffers.The play out delay buffer must buffer these packets and then play them out
in a steady stream .Application : Real time control systems
QoS (Quality of Service) is the idea that transmission rates, error rates, and other characteristics
can be measured, improved, and, to some extent, guaranteed in advance. QoS is of particular
concern for the continuous transmission of high- bandwidth video and multimedia information.X
End-to-end delay is the time it takes a packet to travel across the network from source to destination.
Delay jitter is the fluctuation of end-to-end delay from packet to the next packet.
Slow-start algorithm is part of the congestion control in TCP, designed to avoid sending more
data than the network is capable of transmitting. Slow-start algorithm works by increasing the
TCP Window by one segment for each acknowledged segment.
29.List some of the Quality of Service parameters of transport layer. (May/June 2015)
Throughput
Transit delay
Protection
Priority
Resilence.
Receiver assumes that ACK is lost and sends ACK for the duplicate
Sender must not get confused with multiple ACKs for the same segment
Sequence number space must be large enough in order not to cycle within maximum lifetime of a
segment (see the next slide for an example case why this is needed)
PART B
Explain adaptive flow control in detail and its uses. (NOV/DEC 2010)
With neat architecture, explain UDP and its packet format. (NOV/DEC 2011)
(i) With the help of a network diagram, Explain how TCP messages a byte stream. Give an
example. (NOV/DEC 2012)
(i) Explain the Additive increase/multiplicative decrease methods used in TCP for congestion
control. (NOV/DEC 2012)
DECbit
RED
(i) Suppose TCP operates over a 1-Gbps link, utilising the full bandwidth continuously. How
long will it take for the sequence numbers to wrap around completely? Suppose an added
32bit timestamp field increments 1000 times during this wrap around time, how long will
it take for the timestamp filed to wrap around? (8) (MAY/JUNE 2013)
(i) A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps network that has a 10-ms one-way
delay. What is the throughput achievable? What is the efficiency of transmission? How many bits are needed in
the Advertised window field of a proposed reliable byte stream protocol (like TCP) running over the above
network, for achieving
(ii) Illustrate the features of TCP that can be used by the sender to insert record boundaries into the byte stream.
Also mention their original purpose. (8)
15. (i) Describe how reliable and ordered delivery is achieved through TCP. (8) (ii)Why does TCP uses an
adaptive retransmission and describes its mechanism.(8)
(NOV/DEC 2013)
16.Explain the principles of congestion control in TCP.(MAY/JUNE 2014) 17.Discuss the Random Early Detection
mechanism and derive the expression for drop
probability.(MAY/JUNE 2014)
18. Explain the various fields of the TCP header and the working of the TCP protocol.(16)
(MAY/JUNE 2015)
Explain the three way handshake protocol to establish the transport level connection.(8)
(MAY/JUNE 2015)
(MAY/JUNE 2015)
Traditional applications -Electronic Mail (SMTP, POP3, IMAP, MIME) HTTP Web Services
DNS - SNMP
PART A
The TCP/IP protocol supports electronic mail on the Internet is called Simple Mail Transfer (SMTP). It is a
system for sending messages to other computer users based
on e-mail addresses. SMTP provides mail exchange between users on the same or different computers.
2. What is the difference between a user agent (UA) and a mail transfer agent (MTA)?
The UA prepares the message, creates the envelope, and puts the message in the envelope. The
MTA transfers the mail across the Internet.
MIME is a supplementary protocol that allows non-ASCII data to be sent through SMTP. MIME
transforms non-ASCII data at the sender site to NVT ASCII data and deliverers it to the client
SMTP to be sent through the Internet. The server SMTP at the receiving side receives the NVT
ASCII data and delivers it to MIME to be transformed back to the original data.
Workstations interact with the SMTP host, which receives the mail on behalf of every host in the
organization, to retrieve messages by using a client-server protocol such as Post Office Protocol,
version 3(POP3). Although POP3 is used to download messages from the server, the SMTP
client still needed on the desktop to forward messages from the workstation user to its SMTP
mail server.
Domain Name System can map a name to an address and conversely an address to name.
Domain name space is divided into three different sections: generic domains, country domains &
inverse domain.
Generic domain: Define registered hosts according to their generic behavior, uses generic
suffixes.
Country domain: Uses two characters to identify a country as the last suffix. Inverse domain:
Finds the domain name given the IP address.
The client has three components: the user interface, the client control process, and the client data transfer
process. The server has two components: the server control process and the server data transfer process. The
control connection is made between the control processes. The data connection is made between the data
transfer processes.
Integrity: The data must arrive at the receiver exactly as it was sent.
Non-Reputation: The receiver must able to prove that a received message came from a specific sender.
In secret key, the same key is used by both parties. The sender uses this key and an encryption algorithm to
encrypt data; the receiver uses the same key and the corresponding decryption algorithm to decrypt the data. In
public key, there are two keys: a private key and a public key. The private key is kept by the receiver. The public
key is announced to the public.
13. What are the advantages & disadvantages of public key encryption?
Advantages:
a) Remove the restriction of a shared secret key between two entities. Here each entity can create a pair of keys,
keep the private one, and publicly distribute the other one.
b) The no. of keys needed is reduced tremendously. For one million users to communicate, only two million
keys are needed.
Disadvantage:
If you use large numbers the method to be effective. Calculating the cipher text using the long keys takes a lot
of time. So it is not recommended for large amounts of text.
14. What are the advantages & disadvantages of secret key encryption?
Advantage:
Secret Key algorithms are efficient: it takes less time to encrypt a message. The reason is that the key is usually
smaller. So it is used to encrypt or decrypt long messages.
Disadvantages:
Each pair of users must have a secret key. If N people in world want to use this method, there
needs to be N (N-1)/2 secret keys. For one million people to communicate, a half-billion secret
keys are needed.
Straight permutation: The no. of bits in the input and output are preserved. Compressed
permutation: The no. of bits is reduced (some of the bits are dropped). Expanded permutation:
The no. of bits is increased (some bits are repeated).
Transposition: A Character level encryption in which the characters retain their plaintext but the
position of the character changes.
CGI is a standard for communication between HTTP servers and executable programs. It is used
in crating dynamic documents.
What are the requests messages support SNMP and explain it?
GET
SET
The former is used to retrieve a piece of state from some node and the latter is used to store a
new piece of state in some node.
Pretty Good Privacy is used to provide security for electronic mail. It provides authentication,
confidentiality, data integrity, and non repudiation.
Secure Shell is used to provide a remote login, and used to remotely execute commands and
transfer files and also provide strong client/server authentication / message integrity.
Telnet is a network protocol used on the Internet or local area networks to provide a
bidirectional interactive text-oriented communication facility using a virtual terminal
connection. User data is interspersed in-band with Telnet control information in an 8-bit byte
oriented data connection over the Transmission Control Protocol (TCP).X
SNMP is the protocol that allows an SNMP manager (the controller) to control an SNMP agent
(the controlee) by exchanging SNMP messages.The main purpose of an SNMP message is to
control (set) or monitor (get) parameters on an SNMP agent. In SNMP, a parameter is an instance
of a more generic object.
SMTP stands for Simple Mail Transfer Protocol. SMTP is a standard network protocol for
transmitting messages to an email server on the Internet.X
All modern email client programs support SMTP. Web-based clients embed the address of an
SMTP server inside their configuration, while PC clients provide SMTP settings that allow users
to specify their own server of choice. Because SMTP handles outgoing messages and not
incoming ones, email clients require addresses of both an SMTP server and another server that
processes inbound messages (usually, POP or IMAP).
Advanced middleware solutions offer centralized naming services with some level of
distribution. The issues are the same as those associated with DNS on the Internet or NDS on
NetWare. A new frontier in middleware support for naming is in supporting more dynamic
configurations, where redundant services must be targeted with load balancing and fault
tolerance.
POP3 is used to receive email messages via a TCP/IP connection; a client establishes a
connection with a POP3 server at PORT 110
28. Define SNMP. (MAY/JUNE 2012)
Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managing devices on
IP networks". Devices that typically support SNMP include routers, switches, servers, workstations, printers,
modem racks, and more.[1] It is used mostly in network management systems to monitor network-attached
devices for conditions that warrant administrative attention.X
What DNS cache issues are involved in changing the IP address of web server host name?(Nov/Dec
2013)
it may cause some issues such as some website and web pages not loading or cannot be contacted and
connected when browsing, causing by changing of IP address or nameservers that
(May/June 2013)
By opening and closing fewer TCP connections, CPU time is saved in routers and hosts (clients, servers,
proxies, gateways, tunnels, or caches), and memory used for TCP protocol control blocks can be saved in
hosts.
HTTP requests and responses can be pipelined on a connection. Pipelining allows a client to make multiple
requests without waiting for each response, allowing a single TCP connection to be used much more
efficiently, with much lower elapsed time.
Network congestion is reduced by reducing the number of packets caused by TCP opens, and by allowing
TCP sufficient time to determine the congestion state of the network.
Is a cryptographic hash function, an irreversible mapping? Justify your answer. (May/June 2013)
Yes. A hash function is irreversible. Therefore, it can be used to prove knowledge of a secret without
revealing it.
An application program (sometimes shortened to application) is any program designed to perform a specific
function directly for the user or, in some cases, for another application program. Examples of application
programs include word processors, database programs, Web browsers; X
Application programs use the services of the computer's operating system and other supporting programs. X
An application layer protocol defines how an application processes, running on different end systems, pass
messages to each other.Eg :SMTP for electronic mail. HTTP for Web application.
SMTP is part of the application layer of the TCP/IP protocol. Using a process called "store and forward,"
SMTP moves your email on and across networks. It works closely with something called the Mail Transfer
Agent (MTA) to send your communication to the right computer and email inbox.
32. What are the groups of HTTP header? (MAY/JUNE 2015)
Request message
Response message
Request-header: These header fields have applicability only for request messages.
Response-header: These header fields have applicability only for response messages
PART B
Explain the SMTP and HTTP. Give their uses, state strengths and weaknesses.( NOV 2010)
Discuss in detail about DNS and its frame format. (NOV/DEC 2011)
(i)Explain the various process involved after typing the URL in the task bar. (ii)Write short notes
on TELNET. (NOV/DEC 2012)
HTTP
Discuss the need for name resolution. Illustrate the domain name hierarchy and the steps in
resolution. (MAY/JUNE 2013)
(i) lllustrate the features of FTP and its operation. (8) (MAY/JUNE 2013)
Illustrate the features of TELNET. What is the need for network virtual terminal? (8)
Describe the message format and the message transfer and the underlying protocol involved
FTP
Web services(8)
SNMP (8)
Explain the final delivery of email to the end user using POP3 (8)(MAY/JUNE 2015)
Explain the message transfer using Simple Mail Transfer Protocol (8) (MAY/JUNE 2015)