SlideShare una empresa de Scribd logo
1 de 21
February 2011
Bachelor of Science in Information Technology (BScIT) – Semester 2/
          Diploma in Information Technology (DIT) – Semester 2
                  BT0072 – Computer Networks – 4 Credits
                                      (Book ID: B0956)
                             Assignment Set – 1 (60 Marks)


Answer all questions                                           10 x 6 = 60
   1. Write about ISO OSI model.


Ans:- The layered model that dominated data communications and networking literature before
1990 was the Open Systems Interconnection (OSI) model. Everyone believed that the OSI
model would become the ultimate standard for data communications, but this did not happen.
The TCP / IP protocol suite became the dominant commercial architecture because it was used
and tested extensively in the Internet; the OSI model was never fully implemented.

Established in 1947, the International Standards Organization (ISO) is a multinational body
dedicated to worldwide agreement on International standards. An ISO standard that covers all
aspects of network communications is the OSI model, which was first introduced in 1970s.

Open System: A set of protocols that allows any two different systems to communicate
regardless of their underlying architecture.

Purpose of OSI Model: It shows how to facilitate communication between different systems
without requiring changes to the logic of underlying hardware and software.

The OSI model is not a protocol; it is a model for understanding and designing a network
architecture that is flexible, robust, and interoperable. The OSI Model is a layered framework
for the design of network systems that allows communication between all types of computer
systems. It consists of seven separate but related layers, each of which defines a part of the
process of moving information across a network.

Layered Architecture:
The OSI Model is composed of seven ordered layers:

· Layer 1 – The Physical Layer

· Layer 2 – The Data Link Layer

· Layer 3 – The Network Layer

· Layer 4 – The Transport Layer

· Layer 5 – The Session Layer

· Layer 6 – The Presentation Layer

· Layer 7 – The Application Layer

In modeling the OSI model, the designers distilled the process of transmitting data to its most
fundamental elements. They identified which networking functions had related uses and
collected those functions into discrete groups that became the layers. Each layer defines a
family of functions distinct from those of the other layers. By defining and localizing the
functionality in this fashion, the designers created an architecture that is both comprehensive
and flexible.

Within a single machine, each layer calls upon the services of the layer below it. Between
machines, layer x on one machine communicates with layer x on another machine. This
communication is governed by an agreed-upon series of rules and conventions called
protocols. The processes on each machine that communicates at a given layer are called peer-
to-peer processes. Communication between machines is therefore a peer-to-peer process using
the protocols appropriate to a given layer.

   2. Describe the architecture and usage of ISDN.


Ans:- ISDN is developed by ITU-T in 1976. It is a set of protocols that combines digital
telephony and data transport services. The whole idea is to digitize the telephone network to
permit the transmission of audio, video, and text over existing telephone lines.

ISDN is an effort to standardize subscriber services, provide user/network interfaces, and
facilitate the internetworking capabilities of existing voice and data networks.
The goal of ISDN is to form a wide area network that provides universal end-to-end
connectivity over digital media. This can be done by integrating all of the separate transmission
services into one without adding new links or subscriber lines.

The purpose of ISDN is to provide fully integrated digital services to users. These services fall
into three categories:-

1. Bearer Services: These services provide the means to transfer information (voice, data, and
video) between users without the network manipulating the content of that information. The
network does not need to process the information and therefore does not change the content.
Bearer services belong to the first three layers of OSI model and are well defined in the ISDN
standard.

2. Tele Services: In this service, the network may change or process the contents of the data.
These services correspond to layers 4-7 of the OSI model. Teleservices rely on the facilities of
the bearer services and are designed to accommodate complex user needs without the user
having to be aware of details of the process. Teleservices include telephony, teletex, videotext,
telex, and teleconferencing.

3. Supplementary Services: These services provide additional functionality to the bearer and
teleservices. Example: Reverse charging, call waiting, and message handling.

Principles of ISDN:- Standards for ISDN have been defined by ITU-T (formerly CCITT).
ISDN relates standards states the principles of ISDN from the point of view of CCITT.



   3. Discuss various LAN protocols.

Ans:- With slotted ALOHA, the best channel utilization that can be achieved is 1 / e. This is
hardly surprising since with stations transmitting at will, without paying attention to what other
stations are doing, there are bound to be many collisions. In LANs, it is possible to detect what
other stations are doing, and adapt their behavior accordingly. These networks can achieve a
better utilization than 1 / e.
CSMA Protocols:- Protocols in which stations listen for a carrier (a transmission) and act
accordingly are called Carrier Sense Protocols. "Multiple Access" describes the fact that
multiple nodes send and receive on the medium. Transmissions by one node are generally
received by all other nodes using the medium. Carrier Sense Multiple Access (CSMA) is a
probabilistic Media Access Control (MAC) protocol in which a node verifies the absence of
other traffic before transmitting on a shared physical medium, such as an electrical bus, or a
band of electromagnetic spectrum.

The following three protocols discuss the various implementations of the above discussed
concepts:
   i)     Protocol 1. 1-persistent CSMA:
   ii)    Protocol 2. Non-persistent CSMA:
   iii)   Protocol 3. p – persistent CSMA


CSMA/CD Protocol:- In computer networking, Carrier Sense Multiple Access with Collision
Detection is a network control protocol in which a carrier sensing scheme is used. A
transmitting data station that detects another signal while transmitting a frame, stops
transmitting that frame, transmits a jam signal, and then waits for a random time interval. The
random time interval also known as "backoff delay" is determined using the truncated binary
exponential backoff algorithm. This delay is used before trying to send that frame again.
CSMA/CD is a modification of pure Carrier Sense Multiple Access Collision detection is used
to improve CSMA performance by terminating transmission as soon as a collision is detected,
and reducing the probability of a second collision on retry. Methods for collision detection are
media dependent, but on an electrical bus such as Ethernet, collisions can be detected by
comparing transmitted data with received data. If they differ, another transmitter is overlaying
the first transmitter’s signal (a collision), and transmission terminates immediately. Here the
collision recovery algorithm is nothing but an binary exponential algorithm that determines the
waiting time for retransmission. If the number of collisions for the frame hits 16 then the frame
is considered as not recoverable.

CSMA/CD can be in anyone of the following three states

1. Contention period

2. transmission period

3. Idle period
4. Explain the concept of framing in Data Link Layer and its importance in data

       communication.


Ans:- Data transmission in the physical layer means moving bits in the form of a signal from
the source to destination. The physical layer provides bit synchronization to ensure that the
sender and receiver use the same bit durations and timing.

The data link layer on the other hand needs to pack bits into frames, so that each frame is
distinguishable from another.

Framing in the data link layer separates a message from one source to a destination, or from
other messages to other destinations, by adding a sender address and a destination address. The
destination address defines where the packet is to go; the sender address helps the recipient
acknowledge the receipt.

Although the whole message could be packed into one frame, it is not normally done. When a
message is carried in one very large frame, even a single – bit error would require the
retransmission of the whole message. When a message is divided into smaller frames, a single-
bit error affects only that small frame.

Fixed-Size Framing In this, there is no need for defining the boundaries of the frames; the size
itself can be used as a delimiter. Example: The ATM WAN, which uses frames of fixed size
called cells

Variable Size Framing This type of framing is prevalent in LANs. In this, we need a way to
define the end of the frame and the beginning of the next. Two approaches are sued for this
purpose: a character-oriented approach and a bit oriented approach.

Character Oriented Protocols In these protocols, data to be carried out are 8-bit characters
from a coding system such as ASCII.

he DLL translates the physical layer’s raw bit stream into discrete units (messages) called
frames. That is because the physical layer just accepts a raw bit stream and to deliver it to the
destination. This bit stream is not guaranteed to be error free. The number of bits received may
be less than, equal to, or more than the number of bits transmitted. They may also have
different values. It is up to the DLL to detect and if necessary correct errors. If not correct at
least detect errors and take proper action like ask for retransmission etc. The usual approach of
DLL is to break the bit stream up into discrete frames and then for the purpose of error
detection or correction, it uses some coding technique that finds some checksum for each
frame. When a frame arrives at the destination, the checksum is recomputed. If the newly
computed checksum is different from the one contained in the frame, the DLL knows that an
error has occurred and takes steps to deal with it. All this is importance work of data link layer.

   5. Discuss the IEEE 802.11 Standard.


Ans:- EEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers
the physical and data link layers.

Architecture: The standard defines two kinds of services: the basic service set (BSS) and the
extended service set (ESS).

Basic Service Set: It is made of stationary or mobile wireless stations and an optional central
base station, known as the access point (AP)

Extended Service Set: It is made up of two or more BSSs with APs. In this case, the BSSs are
connected through a distribution system, which is usually a wired LAN. The distribution
system connects the APs in the BSSs. IEEE 802.11 does not restrict the distribution system; it
can be any IEEE LAN such as an Ethernet. The extended service set uses two types of stations:
Mobile and Stationary. The mobile stations are normal stations inside a BSS. The stationary
stations are AP stations that are part of wired LAN.

When BSSs are connected, the stations within reach of one another can communicate without
the use of an AP. However, communication between two stations in two different BSSs occur
via two APs. The idea is similar to communication in a cellular network if we consider each
BSS to be a cell and each AP to be a base station. Note that a mobile station can belong to more
than one BSS at the same time.



   6. Write about TCP/IP Protocol suite.

Ans:- The TCP/IP protocol suite, also referred to as the Internet protocol suite, is the set of
communications protocols that implements the protocol stack on which the Internet and most
commercial networks run. It is named after the two most important protocols in the suite: the
Transmission Control Protocol (TCP) and the Internet Protocol (IP). The TCP/IP protocol suite
—like the OSI reference model—is defined as a set of layers. Upper layers are logically closer
to the user and deal with more abstract data, relying on lower layer protocols to translate data
into forms that are transmitted physically over the network.The TCP/IP protocol is the primary
focus of this tutorial.
TCP/IP Model and the OSI Reference Model
The TCP/IP protocol suite was developed before the OSI reference model. As such, it does not
directly map to the 7-layer OSI reference model. The TCP/IP protocol stack has only layers that
can be loosely mapped to the OSI protocol stack, as shown
in Figure 1-2.
Application Layer
The application layer of the TCP/IP model corresponds to the application layer of the OSI
reference model. Some well known examples of application level entities within the
TCP/IP domain are:
• FTP/Telnet/SSH
• HTTP/Secure HTTP (SHTTP)
• POP3/SMTP
• SNMP

Transport Layer:- The transport layer of the TCP/IP model maps fairly closely to the transport
layer of the OSI model. Two commonly used transport layer entities are TCP and User
Datagram Protocol (UDP)
Internet Layer:- The Internet layer of the TCP/IP model maps to the network layer of the OSI
model. Consequently, the Internet layer is sometimes referred to as the network layer. The
primary component of the Internet layer is the Internet Protocol (IP).Many of the TCP/IP
routing protocols are also classified as part of the Internet layer.
Network Access Layer:- The lowest layer of the TCP/IP protocol stack is the network access
layer. The network access layer contains two sublayers, the media access control (MAC)
sublayer and the physical sublayer. The MAC sublayer aligns closely with the data link layer of
the OSI model, and is sometimes referred to by that name. The physical sublayer aligns with
the physical layer of the OSI model.
Examples of the network access layer that will be discussed in this tutorial include:
• Ethernet
• Wireless Fidelity (Wi-FI)/WiMAX
• PPP, PPP over Ethernet (PPPoE)
• ATM/Frame Relay

   7. Discuss various transmission and switching techniques.


Ans:- Optical fiber transmits a signal encoded beam of light by means of total internal
reflection. Total internal reflection can occur in any transparent medium that has a higher index
of refraction than the surrounding medium. The principle is described in Figure 2.22. In effect,
the optical fiber acts as a waveguide for frequencies in the range of about 1014 to 1015 Hz.
This covers portions of infrared and visible spectra.

Light from a source enters the cylindrical glass or plastic core. Rays at shallow angles are
reflected and propagated along the fiber; other rays are absorbed by the surrounding material.
This form of propagation is called Step-index multimode referring to the variety of angles that
will reflect.

With multimedia transmission, multiple propagation paths exist, each with a different path
length and hence time to traverse the fiber. This causes signal elements (light pulses) to spread
out in time, which limits the rate at which data can be accurately received. In other words, the
need to leave spacing between the pulses limits data rate. This type of fiber is best suited for
transmission over very short distances. When the fiber core radius is reduced, fewer angles will
reflect. By reducing the radius of the core to the order of a wavelength, only a single angle or
mode can pass: the axial ray. This single mode propagation provides superior performance for
the following reason, because there is a single transmission path with single mode transmission.
The distortion found in multimode cannot occur. Single-mode is typically used for long
distance applications, including telephone and cable television.

Finally, by varying the index of refraction of the core, a third type of transmission, known as
graded index multimode, is possible. This type is intermediate between the other two in
characteristics. The higher refractive index at the center makes the light rays moving down the
axis advance more slowly than those curves helically because of the graded index, reducing its
travel distance. The shortened path and higher speed allows light at the periphery to arrive at a
receiver at about the same time as the straight rays in the core axis. Graded index fibers are
often used in LANs.

Long-haul transmission:-It is becoming increasingly common in the telephone network.
Long-haul routes average about 1500kms in length and offer higher capacity (typically 20,000
to 60,000 voice channels). These systems compete economically with microwave. Undersea
optical fiber cables also enjoy increasing use.

Switching:- For transmission of data beyond local area, communication is typically achieved
by transmitting data from source to destination through a network of intermediate switching
nodes. The switching nodes are not concerned with the content of data. Rather their purpose is
to provide a switching facility that will move the data from node to node until it reaches the
destination.
8. Discuss IEEE 802 standards for LANs.


Ans:- IEEE 802 standards for LANs:-IEEE has standardized a number of LAN’s and MAN’s
under the name of IEEE 802. Few of the standards are listed in figure 3.6. The most important
of the survivor’s are 802.3 (Ethernet) and 802.11 (wireless LAN). Both these two standards
have different physical layers and different MAC sub layers but converge on the same logical
link control sub layer so they have same interface to the network layer.

Ethernet was originally based on the idea of computers communicating over a shared coaxial
cable acting as a broadcast transmission medium. The methods used show some similarities to
radio systems, although there are major differences, such as the fact that it is much easier to
detect collisions in a cable broadcast system than a radio broadcast. The common cable
providing the communication channel was likened to the ether and it was from this reference
the name "Ethernet" was derived.

From this early and comparatively simple concept, Ethernet evolved into the complex
networking technology that today powers the vast majority of local computer networks. The
coaxial cable was later replaced with point-to-point links connected together by hubs and/or
switches in order to reduce installation costs, increase reliability, and enable point-to-point
management and troubleshooting. Star LAN was the first step in the evolution of Ethernet from
a coaxial cable bus to a hub-managed, twisted-pair network.

Above the physical layer, Ethernet stations communicate by sending each other data packets,
small blocks of data that are individually sent and delivered. As with other IEEE 802 LANs,
each Ethernet station is given a single 48-bit MAC address, which is used both to specify the
destination and the source of each data packet. Network interface cards (NICs) or chips
normally do not accept packets addressed to other Ethernet stations. Adapters generally come
programmed with a globally unique address, but this can be overridden, either to avoid an
address change when an adapter is replaced, or to use locally administered addresses.




   9. Discuss the concept of Error Detection and Correction techniques.
Ans:- Whenever bits flow from one point to another, they are subject to unpredictable changes
because of interference. This interference can change the shape of the signal. In a single-bit
error, a 0 is changed to a 1 or a 1 to a 0. In a burst error, multiple bits are changed.

Detection Versus Correction:- The correction of errors is more difficult than detection. In
error detection, we are looking only to see if any error has occurred. The answer is a simple yes
or no. In error correction, we need to know the exact number of bits that are corrupted and
more importantly, their location in the message. The number of errors and the size of message
are important.

Forward Error Correction Versus Retransmission:- There are two main methods of error
correction. Forward error correction is the process in which the receiver tries to guess the
message by using redundant bits. This is possible if the number of errors is small. Correction by
retransmission is a technique in which the receiver detects the occurrence of an error and asks
the sender to resend the message. Resending is repeated until a message arrives that the
receiver believes to be error-free.

Coding:- Redundancy is achieved through various coding schemes. The sender adds redundant
bits through a process that creates a relationship between the redundant bits and the actual data
bits. The receiver checks the relationships the two sets of bits to detect or correct the errors.
The ratio of redundant bits to the data bits and the robustness of the process are important
factors in any coding scheme. Coding schemes can be divided into two broad categories: Block
Coding and Convolution Coding. We concentrate on Block Coding; Convolution Coding is
beyond the scope in this book.

   10. Write about the Point to Point Protocol.

Ans:- The Point-to-Point Protocol (PPP) originally emerged as an encapsulation protocol for
transporting IP traffic over point-to-point links. PPP also established a standard for the
assignment and management of IP addresses, asynchronous (start/stop) and bit-oriented
synchronous encapsulation, network protocol multiplexing, link configuration, link quality
testing, error detection, and option negotiation for such capabilities as network layer address
negotiation and data-compression negotiation. PPP supports these functions by providing an
extensible Link Control Protocol (LCP) and a family of Network Control Protocols (NCPs) to
negotiate optional configuration parameters and facilities. In addition to IP, PPP supports other
protocols, including Novell's Internetwork Packet Exchange (IPX) and DE Cnet.
PPP provides a method for transmitting datagram’s over serial point-to-point links. PPP
contains three main components:
• A method for encapsulating datagram’s over serial links. PPP uses the High-Level Data Link
Control(HDLC) protocol as a basis for encapsulating datagram’s over point-to-point links. (See
Chapter 16,“Synchronous Data Link Control and Derivatives,” for more information on
HDLC.)
• An extensible LCP to establish, configure, and test the data link connection.
• A family of NCPs for establishing and configuring different network layer protocols. PPP is
designed to allow the simultaneous use of multiple network layer protocols.
General Operation:- To establish communications over a point-to-point link, the originating
PPP first sends LCP frames to configure and (optionally) test the data link. After the link has
been established and optional facilities have been negotiated as needed by the LCP, the
originating PPP sends NCP frames to choose and configure one or more network layer
protocols. When each of the chosen network layer protocols has been configured, packets from
each network layer protocol can be sent over the link. The link will remain configured for
communications until explicit LCP or NCP frames close the link, or until some external event
occurs.
February 2011
Bachelor of Science in Information Technology (BScIT) – Semester 2/
          Diploma in Information Technology (DIT) – Semester 2
                   BT0072 – Computer Networks – 4 Credits
                                       (Book ID: B0956)
                              Assignment Set – 2 (60 Marks)


Answer all questions                                              10 x 6 = 60
   1. Define the term routing. Differentiate static and dynamic routing.


Ans:- Routing:-Routing of packets across the subnet is considered the most important function
of the network layer. Two basic types of routing static and dynamic are discussed in this unit.
Static routing is also referred to as non-adaptive and dynamic is also referred to as Adaptive
routing methods. Between the two approaches the former one has an advantage of simplicity
but performs poorly when the traffic or the topology of the subnet changes. Some of the well
known routing techniques is shortest path routing, flooding, flow based, hierarchical, etc.

Congestion control:- An important problem that any subnet faces is the congestion because of
heavy traffic in the subnet than the load that it can handle. The subnet gets increasingly loaded
with packets causing increase in delay in the delivery of packets, which can lead to more
retransmission, and ultimately increasing more and more traffic.

Internetworking:- A subnet can be considered as an interconnection of multiple subnets. The
network layer now has to perform a job of internetworking among the subnets. That is a task of
interconnecting all the subnets with the help of various networking devices like repeaters,
bridges, routers and gateways

Static:- Routing algorithms do not base their routing decisions on measurements or estimates
of the current traffic and topology. The choice of the route to use to get from source to
destination or from one node to other is computed in advance. It is done off-line, and
downloaded to the routers when the network is booted.

Dynamic:- or adaptive Routing algorithms in contrast change their routing decisions to reflect
changes in topology and usually the traffic as well. Dynamic routing attempts to solve this
problem by constructing routing tables automatically, based on information carried by routing
protocols, and allowing the network to act nearly autonomously in avoiding network failures
and blockages.

   2. Differentiate IPv4 and IPv6 addressing schemes.

Ans:- Differentiate between IPv4 and IPv6.




   3. Describe the following:

          a. Congestion

          b. Congestion Control


Ans:- Congestion:- An important issue in packet switched network is congestion. Congestion
in a network may occur if the load on the network – the number of packets sent to the network
0 is greater than the capacity of the network – the number of packets a network can handle.
Congestion Control refers to the mechanisms and techniques to control the congestion and keep
the load below the capacity.
Congestion happens in any system that involves waiting. For example, congestion happens on a
freeway because any abnormality in the flow, such an accident in the rush hour, creates
blockage. Congestion in a network or internetwork occurs because routers and switches have
queues – buffers that hold packets before and after processing. A router, for example, has an
input queue for each interface. When a packet arrives at the incoming interface, it undergoes
three steps before departing as shown below:

1. The packet is put at the end of the input queue while waiting to be checked.

2. The processing module of the router removes the packet from the input queue once it reaches
the front of the queue and uses its routing table and the destination address to find its route. The
packet is put in the appropriate output queue and waits for its turn to be sent. We need to be
aware of two issues. First, if the rate of packet arrival is higher than the packet processing rate,
the input queues become longer and longer. Second, if the packet departure rate is less than the
packet processing rate, the output queues become longer and longer.

Congestion Control:- It refers to the techniques and mechanisms that can either prevent
congestion, before it happens, or remove congestion, after it has happened. The congestion
control mechanisms can be divided into two categories: Open-Loop congestion control and
Closed-Loop congestion control .

   1.   Open Loop Congestion Control
   2.   Retransmission Policy
   3.   Window Policy
   4.   Acknowledgement Policy
   5.   Discarding Policy
   6.   Admission Policy.
   4. Discuss the Remote Procedure Calls and their importance in Session Layer.


Ans:- Remote Procedure Calls:-The primary concern of the session layer is managing the
dialog and dealing with errors occurring above the transport layer. There has been considerable
research at universities and in industries on a radically different model for dialog and error
control based on the connectionless model. This work, which goes under the name RPC
(Remote procedure Call), has been widely used in networks and (especially) distributed
systems. RPC does not fit into the OSI Reference Model especially well. It has been designed
to be fast, and therefore does not contain a multilayer structure.

The Client – Server Model:- Until now it is assumed that the two processes communicating
over a session or transport connection are symmetric. In practice, this assumption is frequently
violated. A common example is a network of diskless personal computers or workstations,
called clients, that are communicating over a network with a file server having a disk on which
all the files are stored. In this system, clients access their data by sending requests to the server,
which carries out the work and sends back the replies. Communication always takes place in
the form of request-reply pairs, always initiated by clients, never by the server. This model is
called the Client-Server Model.




The beauty of this scheme is that client-server communication now takes the form of procedure
calls instead of I/O commands. All the details of how the network works can be hidden from
the application program by putting them in the local procedures such as read. These procedures
are called Stubs.

   5. Discuss Simple Mail Transfer Protocol in detail.


Ans:- Simple Mail Transfer Protocol (SMTP):- The basic Internet mail protocols provide
mail (note) and message exchange between TCP/IP hosts, but generally require that data be
represented as 7-bit ASCII text. Because this can be restrictive, facilities have been added for
the transmission of data that cannot be represented in this manner. Originally, there were three
standard protocols that apply to mail of this kind. The term Simple Mail Transfer Protocol
(SMTP) is frequently used to refer to the combined set of protocols because they are so closely
interrelated. Strictly speaking, however, SMTP is just one of the three. Those three standards
were:

· A standard for the exchange of mail between two computers (STD 10/RFC 821), which
specified the protocol used to send mail between TCP/IP hosts. This standard was SMTP itself.

· A standard (STD 11) on the format of the mail messages, contained in two RFCs. RFC 822
described the syntax of mail header fields and defined a set of header fields and their
interpretation. RFC 1049 described how a set of document types other than plain text ASCII
can be used in the mail body. The official protocol name for this standard was MAIL.

· A standard for the routing of mail using the Domain Name System, described in RFC 974.
The official protocol name for this standard was DNS-MX.

Common SMTP header fields:-
6. Explain any two static routing algorithms.

Ans:-

   7. Discuss IPv4 addressing schemes.

Ans:- An IP address is an identifier that is assigned at the Internet layer to an interface or a set
of interfaces. Each IP address can identify the source or destination of IP packets. For IPV4,
every node on a network has one or more interfaces, and you can enable TCP/IP on each of
those interfaces. When you enable TCP/IP on an interface, you assign it one or more logical
IPV4 addresses, either automatically or manually. The IPV4 address is a logical address
because it is assigned at the Internet layer and has no relation to the addresses that are used at
the Network Interface layer. IPV4 addresses are 32 bits long.

IPV4 Address Syntax:-If network administrators expressed IPV4 addresses using binary
notation, each address would appear as a 32-digit string of 1s and 0s. Because such strings are
cumbersome to express and remember, administrators use dotted decimal notation, in which
periods (or dots) separate four decimal numbers (from 0 to 255). Each decimal number, known
as an octet, represents 8 bits (1 byte) of the 32-bit address.

When referring to an IPV4 address, use the notation w.x.y.z. shows the IPV4 address structure.
To become adept at moving between binary and decimal formats, you can review the binary
and decimal numbering systems and how to convert between them. Although you can use the
calculator in the Microsoft Windows Server 2003 or Windows XP operating systems to convert
between decimal and binary, you will better understand the conversions if you can do them
manually.


   8. Discuss Congestion Avoidance in Transport Layer.


Ans:- Congestion avoidance:-The assumption of the algorithm is that packet loss caused by
damage is very small. Therefore, the loss of a packet signals congestion somewhere in the
network between the source and destination. There are two indications of packet loss:

· A timeout occurs.

· Duplicate ACKs are received.

Congestion avoidance and slow start are independent algorithms with different objectives. But
when congestion occurs, TCP must slow down its transmission rate of packets into the network
and invoke slow start to get things going again. In practice, they are implemented together.
Congestion avoidance and slow start require that two variables be maintained for each
connection:

· A congestion window, cwnd

· A slow start threshold size, ssthresh

The combined algorithm operates as follows:
1. Initialization for a given connection sets cwnd to one segment and ssthresh to 65535 bytes.

2. The TCP output routine never sends more than the lower value of cwnd or the receiver’s
advertised window.

3. When congestion occurs (timeout or duplicate ACK), one-half of the current window size is
saved in ssthresh. Additionally, if the congestion is indicated by a timeout, cwnd is set to one
segment.

4. When new data is acknowledged by the other end, increase cwnd, but the way it increases
depends on whether TCP is performing slow start or congestion avoidance. If cwnd is less than
or equal to ssthresh, TCP is in slow start; otherwise, TCP is performing congestion avoidance.

Slow start and congestion avoidance behavior in action:




Fast retransmit:-Fast retransmit avoids having TCP wait for a timeout to resend lost segments
Fast recovery:- After fast retransmit sends what appears to be the missing segment, congestion
avoidance, but not slow start, is performed. This is the fast recovery algorithm. It is an
improvement that allows high throughput under moderate congestion, especially for large
windows.

   9. Discuss various design issues of Session Layer.


Ans:- Design Issues:- The Session, Presentation and Application layers form the upper layers
in the OSI model. These upper layers are concerned with providing user-oriented services.
They take the bare-bones, error-free channel provide by the transport layer and add additional
features that are useful to a wide variety of applications, so that the writers of these applications
will not each have to re-implement these features over and over as part of each separate
program.

The design issues of the session layer include:

· Dialog Management

· Synchronization

· Activity Management

The Session layer provides services to the Presentation layer. The service access points are
called Session Service Access Points (SSAPs) and the protocol data units are called Session
Protocol Data Units (SPDUs). The main function of the session layer is to provide a way for the
session users to establish connections, called sessions, and transfer data over them in an orderly
way. A session might be used for a remote login from a terminal to a distant computer, or for a
file transfer, or for any many other purposes. Although connectionless primitives are available
in the session layer, a connectionless session cannot make any use of the user-oriented features
for which the session layer was designed. For this reason, we will focus on the connection-
oriented model.

A session bears a close resemblance to a transport connection, but the two are not identical.
Usually, when a request comes into the session layer to establish a session, a transport
connection must be established to carry the connection. When the session is terminated, the
transport connection is released. It is not permitted to multiplex several sessions onto a single
transport connection simultaneously the way the transport layer can multiplex several transport
connections onto a network connection. At any instant of time, each transport connection
carries at most one session.

   10. Describe the Multipurpose Internet Mail Extensions.


Ans:- Multipurpose Internet Mail Extensions:- Electronic mail is probably the most widely
used TCP/IP application. However, SMTP is limited to 7-bit ASCII text, with a maximum line
length of 1000 characters. This results in a number of limitations, including:

· SMTP cannot transmit executable files or other binary objects. There are ad hoc methods of
encapsulating binary items in SMTP mail items, such as:

– Encoding the file as pure hexadecimal

– The UNIX uuencode and uudecode utilities, used to encode binary data in the UNIX-to-
UNIX Copy (UUCP) mailing system

However, none of these can be described as a de facto standard (though uuencode/uudecode is
perhaps the most pervasive, due to the pioneering role of UNIX systems in the Internet).

· SMTP cannot transmit text data that includes national language characters, because these are
represented by code points with a value of 128 (decimal) or higher in all character sets based on
ASCII.

· SMTP servers might reject mail messages over a certain size. Any given server can have
permanent or transient limits, or both, on the maximum amount of mail data it can accept from
a client at any given time.
· SMTP gateways that translate from ASCII to EBCDIC and vice versa do not use a consistent
set of code page mappings, resulting in translation problems.

· Some SMTP implementations or other mail transport agents (MTAs) in the Internet do not
adhere completely to the SMTP standards defined in RFC 2821. Common problems include:

– Removal of trailing white-space characters (tabs and spaces).

– Addition of white-space characters to make all lines in a message the same length.

– Wrapping of lines longer than 76 characters.

– Changing of new line sequences between different conventions. (For example, <CRLF>
characters might be converted to <CR> or <LF> sequences.)

– Conversion of tab characters to multiple spaces.

MIME can be described in five parts:

· Protocols for including objects other than US ASCII text mail messages within the bodies of
messages conforming to RFC 2822. These are described in RFC 2045.

· General structure of the MIME media typing system, which defines an initial set of media
types. This is described in RFC 2046.

· A protocol for encoding non-U.S. ASCII text in the header fields of mail messages
conforming to RFC 2822. This is described in RFC 2047.

· Various IANA registration procedures for MIME-related facilities. This is described in RFC
2048.

· MIME conformance criteria. This is described in RFC 20410.

Más contenido relacionado

La actualidad más candente

Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocolsJaleel James
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
 
Osi protocols
Osi protocolsOsi protocols
Osi protocolsAli Usman
 
Networking Standards and Protocols Project
Networking Standards and Protocols ProjectNetworking Standards and Protocols Project
Networking Standards and Protocols ProjectYonathan G. Negash
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI modelManoj Kumar
 
Communication Networks 2 marks q &answers
Communication Networks  2 marks q &answersCommunication Networks  2 marks q &answers
Communication Networks 2 marks q &answersRaja Madhuvanthi
 
Protocol
ProtocolProtocol
ProtocolShi Na
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vSURESHA V
 
osi model
osi modelosi model
osi modelfaizan
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi modelNaiyan Noor
 
Complete Osi Model Explained
Complete Osi Model ExplainedComplete Osi Model Explained
Complete Osi Model ExplainedVivek chan
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
Computer Network Notes UNIT II
Computer Network Notes UNIT IIComputer Network Notes UNIT II
Computer Network Notes UNIT IINANDINI SHARMA
 
Networking Models
Networking ModelsNetworking Models
Networking ModelsAftab Mirza
 

La actualidad más candente (20)

Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocols
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 
Osi protocols
Osi protocolsOsi protocols
Osi protocols
 
Networking Standards and Protocols Project
Networking Standards and Protocols ProjectNetworking Standards and Protocols Project
Networking Standards and Protocols Project
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Communication Networks 2 marks q &answers
Communication Networks  2 marks q &answersCommunication Networks  2 marks q &answers
Communication Networks 2 marks q &answers
 
Protocol
ProtocolProtocol
Protocol
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha v
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
osi model
osi modelosi model
osi model
 
Network Models in Networking.
Network Models in Networking.Network Models in Networking.
Network Models in Networking.
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 
OSI model
OSI modelOSI model
OSI model
 
Computer network suggestion
Computer network suggestionComputer network suggestion
Computer network suggestion
 
Complete Osi Model Explained
Complete Osi Model ExplainedComplete Osi Model Explained
Complete Osi Model Explained
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Computer Network Notes UNIT II
Computer Network Notes UNIT IIComputer Network Notes UNIT II
Computer Network Notes UNIT II
 
Networking Models
Networking ModelsNetworking Models
Networking Models
 

Similar a Bt0072 (20)

Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Network
NetworkNetwork
Network
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
1_introduction.ppt
1_introduction.ppt1_introduction.ppt
1_introduction.ppt
 
Osi model
Osi model Osi model
Osi model
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
introduction to data comunication
introduction to data comunicationintroduction to data comunication
introduction to data comunication
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
 
Osi model
Osi modelOsi model
Osi model
 
Networks Basics
Networks BasicsNetworks Basics
Networks Basics
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
OSI Model
OSI ModelOSI Model
OSI Model
 

Más de Simpaly Jha (13)

Bt0071
Bt0071Bt0071
Bt0071
 
Bt0070
Bt0070Bt0070
Bt0070
 
Bt0068
Bt0068Bt0068
Bt0068
 
Shree Ganesh
Shree GaneshShree Ganesh
Shree Ganesh
 
B T0066
B T0066B T0066
B T0066
 
B T0065
B T0065B T0065
B T0065
 
B T0064
B T0064B T0064
B T0064
 
B T0062
B T0062B T0062
B T0062
 
Bt0064
Bt0064Bt0064
Bt0064
 
Bt0062
Bt0062Bt0062
Bt0062
 
Bt0066
Bt0066Bt0066
Bt0066
 
Bt0065
Bt0065Bt0065
Bt0065
 
Shree Ganesha!!!!!!!!!!!!!!!!!
Shree Ganesha!!!!!!!!!!!!!!!!!Shree Ganesha!!!!!!!!!!!!!!!!!
Shree Ganesha!!!!!!!!!!!!!!!!!
 

Último

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Bt0072

  • 1. February 2011 Bachelor of Science in Information Technology (BScIT) – Semester 2/ Diploma in Information Technology (DIT) – Semester 2 BT0072 – Computer Networks – 4 Credits (Book ID: B0956) Assignment Set – 1 (60 Marks) Answer all questions 10 x 6 = 60 1. Write about ISO OSI model. Ans:- The layered model that dominated data communications and networking literature before 1990 was the Open Systems Interconnection (OSI) model. Everyone believed that the OSI model would become the ultimate standard for data communications, but this did not happen. The TCP / IP protocol suite became the dominant commercial architecture because it was used and tested extensively in the Internet; the OSI model was never fully implemented. Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on International standards. An ISO standard that covers all aspects of network communications is the OSI model, which was first introduced in 1970s. Open System: A set of protocols that allows any two different systems to communicate regardless of their underlying architecture. Purpose of OSI Model: It shows how to facilitate communication between different systems without requiring changes to the logic of underlying hardware and software. The OSI model is not a protocol; it is a model for understanding and designing a network architecture that is flexible, robust, and interoperable. The OSI Model is a layered framework for the design of network systems that allows communication between all types of computer systems. It consists of seven separate but related layers, each of which defines a part of the process of moving information across a network. Layered Architecture:
  • 2. The OSI Model is composed of seven ordered layers: · Layer 1 – The Physical Layer · Layer 2 – The Data Link Layer · Layer 3 – The Network Layer · Layer 4 – The Transport Layer · Layer 5 – The Session Layer · Layer 6 – The Presentation Layer · Layer 7 – The Application Layer In modeling the OSI model, the designers distilled the process of transmitting data to its most fundamental elements. They identified which networking functions had related uses and collected those functions into discrete groups that became the layers. Each layer defines a family of functions distinct from those of the other layers. By defining and localizing the functionality in this fashion, the designers created an architecture that is both comprehensive and flexible. Within a single machine, each layer calls upon the services of the layer below it. Between machines, layer x on one machine communicates with layer x on another machine. This communication is governed by an agreed-upon series of rules and conventions called protocols. The processes on each machine that communicates at a given layer are called peer- to-peer processes. Communication between machines is therefore a peer-to-peer process using the protocols appropriate to a given layer. 2. Describe the architecture and usage of ISDN. Ans:- ISDN is developed by ITU-T in 1976. It is a set of protocols that combines digital telephony and data transport services. The whole idea is to digitize the telephone network to permit the transmission of audio, video, and text over existing telephone lines. ISDN is an effort to standardize subscriber services, provide user/network interfaces, and facilitate the internetworking capabilities of existing voice and data networks.
  • 3. The goal of ISDN is to form a wide area network that provides universal end-to-end connectivity over digital media. This can be done by integrating all of the separate transmission services into one without adding new links or subscriber lines. The purpose of ISDN is to provide fully integrated digital services to users. These services fall into three categories:- 1. Bearer Services: These services provide the means to transfer information (voice, data, and video) between users without the network manipulating the content of that information. The network does not need to process the information and therefore does not change the content. Bearer services belong to the first three layers of OSI model and are well defined in the ISDN standard. 2. Tele Services: In this service, the network may change or process the contents of the data. These services correspond to layers 4-7 of the OSI model. Teleservices rely on the facilities of the bearer services and are designed to accommodate complex user needs without the user having to be aware of details of the process. Teleservices include telephony, teletex, videotext, telex, and teleconferencing. 3. Supplementary Services: These services provide additional functionality to the bearer and teleservices. Example: Reverse charging, call waiting, and message handling. Principles of ISDN:- Standards for ISDN have been defined by ITU-T (formerly CCITT). ISDN relates standards states the principles of ISDN from the point of view of CCITT. 3. Discuss various LAN protocols. Ans:- With slotted ALOHA, the best channel utilization that can be achieved is 1 / e. This is hardly surprising since with stations transmitting at will, without paying attention to what other stations are doing, there are bound to be many collisions. In LANs, it is possible to detect what other stations are doing, and adapt their behavior accordingly. These networks can achieve a better utilization than 1 / e. CSMA Protocols:- Protocols in which stations listen for a carrier (a transmission) and act accordingly are called Carrier Sense Protocols. "Multiple Access" describes the fact that multiple nodes send and receive on the medium. Transmissions by one node are generally received by all other nodes using the medium. Carrier Sense Multiple Access (CSMA) is a probabilistic Media Access Control (MAC) protocol in which a node verifies the absence of
  • 4. other traffic before transmitting on a shared physical medium, such as an electrical bus, or a band of electromagnetic spectrum. The following three protocols discuss the various implementations of the above discussed concepts: i) Protocol 1. 1-persistent CSMA: ii) Protocol 2. Non-persistent CSMA: iii) Protocol 3. p – persistent CSMA CSMA/CD Protocol:- In computer networking, Carrier Sense Multiple Access with Collision Detection is a network control protocol in which a carrier sensing scheme is used. A transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval. The random time interval also known as "backoff delay" is determined using the truncated binary exponential backoff algorithm. This delay is used before trying to send that frame again. CSMA/CD is a modification of pure Carrier Sense Multiple Access Collision detection is used to improve CSMA performance by terminating transmission as soon as a collision is detected, and reducing the probability of a second collision on retry. Methods for collision detection are media dependent, but on an electrical bus such as Ethernet, collisions can be detected by comparing transmitted data with received data. If they differ, another transmitter is overlaying the first transmitter’s signal (a collision), and transmission terminates immediately. Here the collision recovery algorithm is nothing but an binary exponential algorithm that determines the waiting time for retransmission. If the number of collisions for the frame hits 16 then the frame is considered as not recoverable. CSMA/CD can be in anyone of the following three states 1. Contention period 2. transmission period 3. Idle period
  • 5. 4. Explain the concept of framing in Data Link Layer and its importance in data communication. Ans:- Data transmission in the physical layer means moving bits in the form of a signal from the source to destination. The physical layer provides bit synchronization to ensure that the sender and receiver use the same bit durations and timing. The data link layer on the other hand needs to pack bits into frames, so that each frame is distinguishable from another. Framing in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address. The destination address defines where the packet is to go; the sender address helps the recipient acknowledge the receipt. Although the whole message could be packed into one frame, it is not normally done. When a message is carried in one very large frame, even a single – bit error would require the retransmission of the whole message. When a message is divided into smaller frames, a single- bit error affects only that small frame. Fixed-Size Framing In this, there is no need for defining the boundaries of the frames; the size itself can be used as a delimiter. Example: The ATM WAN, which uses frames of fixed size called cells Variable Size Framing This type of framing is prevalent in LANs. In this, we need a way to define the end of the frame and the beginning of the next. Two approaches are sued for this purpose: a character-oriented approach and a bit oriented approach. Character Oriented Protocols In these protocols, data to be carried out are 8-bit characters from a coding system such as ASCII. he DLL translates the physical layer’s raw bit stream into discrete units (messages) called frames. That is because the physical layer just accepts a raw bit stream and to deliver it to the destination. This bit stream is not guaranteed to be error free. The number of bits received may be less than, equal to, or more than the number of bits transmitted. They may also have different values. It is up to the DLL to detect and if necessary correct errors. If not correct at least detect errors and take proper action like ask for retransmission etc. The usual approach of DLL is to break the bit stream up into discrete frames and then for the purpose of error
  • 6. detection or correction, it uses some coding technique that finds some checksum for each frame. When a frame arrives at the destination, the checksum is recomputed. If the newly computed checksum is different from the one contained in the frame, the DLL knows that an error has occurred and takes steps to deal with it. All this is importance work of data link layer. 5. Discuss the IEEE 802.11 Standard. Ans:- EEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Architecture: The standard defines two kinds of services: the basic service set (BSS) and the extended service set (ESS). Basic Service Set: It is made of stationary or mobile wireless stations and an optional central base station, known as the access point (AP) Extended Service Set: It is made up of two or more BSSs with APs. In this case, the BSSs are connected through a distribution system, which is usually a wired LAN. The distribution system connects the APs in the BSSs. IEEE 802.11 does not restrict the distribution system; it can be any IEEE LAN such as an Ethernet. The extended service set uses two types of stations: Mobile and Stationary. The mobile stations are normal stations inside a BSS. The stationary stations are AP stations that are part of wired LAN. When BSSs are connected, the stations within reach of one another can communicate without the use of an AP. However, communication between two stations in two different BSSs occur via two APs. The idea is similar to communication in a cellular network if we consider each BSS to be a cell and each AP to be a base station. Note that a mobile station can belong to more than one BSS at the same time. 6. Write about TCP/IP Protocol suite. Ans:- The TCP/IP protocol suite, also referred to as the Internet protocol suite, is the set of communications protocols that implements the protocol stack on which the Internet and most commercial networks run. It is named after the two most important protocols in the suite: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). The TCP/IP protocol suite —like the OSI reference model—is defined as a set of layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data
  • 7. into forms that are transmitted physically over the network.The TCP/IP protocol is the primary focus of this tutorial. TCP/IP Model and the OSI Reference Model The TCP/IP protocol suite was developed before the OSI reference model. As such, it does not directly map to the 7-layer OSI reference model. The TCP/IP protocol stack has only layers that can be loosely mapped to the OSI protocol stack, as shown in Figure 1-2. Application Layer The application layer of the TCP/IP model corresponds to the application layer of the OSI reference model. Some well known examples of application level entities within the TCP/IP domain are: • FTP/Telnet/SSH • HTTP/Secure HTTP (SHTTP) • POP3/SMTP • SNMP Transport Layer:- The transport layer of the TCP/IP model maps fairly closely to the transport layer of the OSI model. Two commonly used transport layer entities are TCP and User Datagram Protocol (UDP) Internet Layer:- The Internet layer of the TCP/IP model maps to the network layer of the OSI model. Consequently, the Internet layer is sometimes referred to as the network layer. The primary component of the Internet layer is the Internet Protocol (IP).Many of the TCP/IP routing protocols are also classified as part of the Internet layer. Network Access Layer:- The lowest layer of the TCP/IP protocol stack is the network access layer. The network access layer contains two sublayers, the media access control (MAC) sublayer and the physical sublayer. The MAC sublayer aligns closely with the data link layer of the OSI model, and is sometimes referred to by that name. The physical sublayer aligns with the physical layer of the OSI model. Examples of the network access layer that will be discussed in this tutorial include: • Ethernet • Wireless Fidelity (Wi-FI)/WiMAX • PPP, PPP over Ethernet (PPPoE) • ATM/Frame Relay 7. Discuss various transmission and switching techniques. Ans:- Optical fiber transmits a signal encoded beam of light by means of total internal reflection. Total internal reflection can occur in any transparent medium that has a higher index of refraction than the surrounding medium. The principle is described in Figure 2.22. In effect,
  • 8. the optical fiber acts as a waveguide for frequencies in the range of about 1014 to 1015 Hz. This covers portions of infrared and visible spectra. Light from a source enters the cylindrical glass or plastic core. Rays at shallow angles are reflected and propagated along the fiber; other rays are absorbed by the surrounding material. This form of propagation is called Step-index multimode referring to the variety of angles that will reflect. With multimedia transmission, multiple propagation paths exist, each with a different path length and hence time to traverse the fiber. This causes signal elements (light pulses) to spread out in time, which limits the rate at which data can be accurately received. In other words, the need to leave spacing between the pulses limits data rate. This type of fiber is best suited for transmission over very short distances. When the fiber core radius is reduced, fewer angles will reflect. By reducing the radius of the core to the order of a wavelength, only a single angle or mode can pass: the axial ray. This single mode propagation provides superior performance for the following reason, because there is a single transmission path with single mode transmission. The distortion found in multimode cannot occur. Single-mode is typically used for long distance applications, including telephone and cable television. Finally, by varying the index of refraction of the core, a third type of transmission, known as graded index multimode, is possible. This type is intermediate between the other two in characteristics. The higher refractive index at the center makes the light rays moving down the axis advance more slowly than those curves helically because of the graded index, reducing its travel distance. The shortened path and higher speed allows light at the periphery to arrive at a receiver at about the same time as the straight rays in the core axis. Graded index fibers are often used in LANs. Long-haul transmission:-It is becoming increasingly common in the telephone network. Long-haul routes average about 1500kms in length and offer higher capacity (typically 20,000 to 60,000 voice channels). These systems compete economically with microwave. Undersea optical fiber cables also enjoy increasing use. Switching:- For transmission of data beyond local area, communication is typically achieved by transmitting data from source to destination through a network of intermediate switching nodes. The switching nodes are not concerned with the content of data. Rather their purpose is to provide a switching facility that will move the data from node to node until it reaches the destination.
  • 9. 8. Discuss IEEE 802 standards for LANs. Ans:- IEEE 802 standards for LANs:-IEEE has standardized a number of LAN’s and MAN’s under the name of IEEE 802. Few of the standards are listed in figure 3.6. The most important of the survivor’s are 802.3 (Ethernet) and 802.11 (wireless LAN). Both these two standards have different physical layers and different MAC sub layers but converge on the same logical link control sub layer so they have same interface to the network layer. Ethernet was originally based on the idea of computers communicating over a shared coaxial cable acting as a broadcast transmission medium. The methods used show some similarities to radio systems, although there are major differences, such as the fact that it is much easier to detect collisions in a cable broadcast system than a radio broadcast. The common cable providing the communication channel was likened to the ether and it was from this reference the name "Ethernet" was derived. From this early and comparatively simple concept, Ethernet evolved into the complex networking technology that today powers the vast majority of local computer networks. The coaxial cable was later replaced with point-to-point links connected together by hubs and/or switches in order to reduce installation costs, increase reliability, and enable point-to-point management and troubleshooting. Star LAN was the first step in the evolution of Ethernet from a coaxial cable bus to a hub-managed, twisted-pair network. Above the physical layer, Ethernet stations communicate by sending each other data packets, small blocks of data that are individually sent and delivered. As with other IEEE 802 LANs, each Ethernet station is given a single 48-bit MAC address, which is used both to specify the destination and the source of each data packet. Network interface cards (NICs) or chips normally do not accept packets addressed to other Ethernet stations. Adapters generally come programmed with a globally unique address, but this can be overridden, either to avoid an address change when an adapter is replaced, or to use locally administered addresses. 9. Discuss the concept of Error Detection and Correction techniques.
  • 10. Ans:- Whenever bits flow from one point to another, they are subject to unpredictable changes because of interference. This interference can change the shape of the signal. In a single-bit error, a 0 is changed to a 1 or a 1 to a 0. In a burst error, multiple bits are changed. Detection Versus Correction:- The correction of errors is more difficult than detection. In error detection, we are looking only to see if any error has occurred. The answer is a simple yes or no. In error correction, we need to know the exact number of bits that are corrupted and more importantly, their location in the message. The number of errors and the size of message are important. Forward Error Correction Versus Retransmission:- There are two main methods of error correction. Forward error correction is the process in which the receiver tries to guess the message by using redundant bits. This is possible if the number of errors is small. Correction by retransmission is a technique in which the receiver detects the occurrence of an error and asks the sender to resend the message. Resending is repeated until a message arrives that the receiver believes to be error-free. Coding:- Redundancy is achieved through various coding schemes. The sender adds redundant bits through a process that creates a relationship between the redundant bits and the actual data bits. The receiver checks the relationships the two sets of bits to detect or correct the errors. The ratio of redundant bits to the data bits and the robustness of the process are important factors in any coding scheme. Coding schemes can be divided into two broad categories: Block Coding and Convolution Coding. We concentrate on Block Coding; Convolution Coding is beyond the scope in this book. 10. Write about the Point to Point Protocol. Ans:- The Point-to-Point Protocol (PPP) originally emerged as an encapsulation protocol for transporting IP traffic over point-to-point links. PPP also established a standard for the assignment and management of IP addresses, asynchronous (start/stop) and bit-oriented synchronous encapsulation, network protocol multiplexing, link configuration, link quality testing, error detection, and option negotiation for such capabilities as network layer address negotiation and data-compression negotiation. PPP supports these functions by providing an extensible Link Control Protocol (LCP) and a family of Network Control Protocols (NCPs) to negotiate optional configuration parameters and facilities. In addition to IP, PPP supports other protocols, including Novell's Internetwork Packet Exchange (IPX) and DE Cnet.
  • 11. PPP provides a method for transmitting datagram’s over serial point-to-point links. PPP contains three main components: • A method for encapsulating datagram’s over serial links. PPP uses the High-Level Data Link Control(HDLC) protocol as a basis for encapsulating datagram’s over point-to-point links. (See Chapter 16,“Synchronous Data Link Control and Derivatives,” for more information on HDLC.) • An extensible LCP to establish, configure, and test the data link connection. • A family of NCPs for establishing and configuring different network layer protocols. PPP is designed to allow the simultaneous use of multiple network layer protocols. General Operation:- To establish communications over a point-to-point link, the originating PPP first sends LCP frames to configure and (optionally) test the data link. After the link has been established and optional facilities have been negotiated as needed by the LCP, the originating PPP sends NCP frames to choose and configure one or more network layer protocols. When each of the chosen network layer protocols has been configured, packets from each network layer protocol can be sent over the link. The link will remain configured for communications until explicit LCP or NCP frames close the link, or until some external event occurs.
  • 12. February 2011 Bachelor of Science in Information Technology (BScIT) – Semester 2/ Diploma in Information Technology (DIT) – Semester 2 BT0072 – Computer Networks – 4 Credits (Book ID: B0956) Assignment Set – 2 (60 Marks) Answer all questions 10 x 6 = 60 1. Define the term routing. Differentiate static and dynamic routing. Ans:- Routing:-Routing of packets across the subnet is considered the most important function of the network layer. Two basic types of routing static and dynamic are discussed in this unit. Static routing is also referred to as non-adaptive and dynamic is also referred to as Adaptive routing methods. Between the two approaches the former one has an advantage of simplicity but performs poorly when the traffic or the topology of the subnet changes. Some of the well known routing techniques is shortest path routing, flooding, flow based, hierarchical, etc. Congestion control:- An important problem that any subnet faces is the congestion because of heavy traffic in the subnet than the load that it can handle. The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. Internetworking:- A subnet can be considered as an interconnection of multiple subnets. The network layer now has to perform a job of internetworking among the subnets. That is a task of interconnecting all the subnets with the help of various networking devices like repeaters, bridges, routers and gateways Static:- Routing algorithms do not base their routing decisions on measurements or estimates of the current traffic and topology. The choice of the route to use to get from source to destination or from one node to other is computed in advance. It is done off-line, and downloaded to the routers when the network is booted. Dynamic:- or adaptive Routing algorithms in contrast change their routing decisions to reflect changes in topology and usually the traffic as well. Dynamic routing attempts to solve this
  • 13. problem by constructing routing tables automatically, based on information carried by routing protocols, and allowing the network to act nearly autonomously in avoiding network failures and blockages. 2. Differentiate IPv4 and IPv6 addressing schemes. Ans:- Differentiate between IPv4 and IPv6. 3. Describe the following: a. Congestion b. Congestion Control Ans:- Congestion:- An important issue in packet switched network is congestion. Congestion in a network may occur if the load on the network – the number of packets sent to the network 0 is greater than the capacity of the network – the number of packets a network can handle. Congestion Control refers to the mechanisms and techniques to control the congestion and keep the load below the capacity.
  • 14. Congestion happens in any system that involves waiting. For example, congestion happens on a freeway because any abnormality in the flow, such an accident in the rush hour, creates blockage. Congestion in a network or internetwork occurs because routers and switches have queues – buffers that hold packets before and after processing. A router, for example, has an input queue for each interface. When a packet arrives at the incoming interface, it undergoes three steps before departing as shown below: 1. The packet is put at the end of the input queue while waiting to be checked. 2. The processing module of the router removes the packet from the input queue once it reaches the front of the queue and uses its routing table and the destination address to find its route. The packet is put in the appropriate output queue and waits for its turn to be sent. We need to be aware of two issues. First, if the rate of packet arrival is higher than the packet processing rate, the input queues become longer and longer. Second, if the packet departure rate is less than the packet processing rate, the output queues become longer and longer. Congestion Control:- It refers to the techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened. The congestion control mechanisms can be divided into two categories: Open-Loop congestion control and Closed-Loop congestion control . 1. Open Loop Congestion Control 2. Retransmission Policy 3. Window Policy 4. Acknowledgement Policy 5. Discarding Policy 6. Admission Policy. 4. Discuss the Remote Procedure Calls and their importance in Session Layer. Ans:- Remote Procedure Calls:-The primary concern of the session layer is managing the dialog and dealing with errors occurring above the transport layer. There has been considerable research at universities and in industries on a radically different model for dialog and error control based on the connectionless model. This work, which goes under the name RPC (Remote procedure Call), has been widely used in networks and (especially) distributed systems. RPC does not fit into the OSI Reference Model especially well. It has been designed to be fast, and therefore does not contain a multilayer structure. The Client – Server Model:- Until now it is assumed that the two processes communicating over a session or transport connection are symmetric. In practice, this assumption is frequently
  • 15. violated. A common example is a network of diskless personal computers or workstations, called clients, that are communicating over a network with a file server having a disk on which all the files are stored. In this system, clients access their data by sending requests to the server, which carries out the work and sends back the replies. Communication always takes place in the form of request-reply pairs, always initiated by clients, never by the server. This model is called the Client-Server Model. The beauty of this scheme is that client-server communication now takes the form of procedure calls instead of I/O commands. All the details of how the network works can be hidden from the application program by putting them in the local procedures such as read. These procedures are called Stubs. 5. Discuss Simple Mail Transfer Protocol in detail. Ans:- Simple Mail Transfer Protocol (SMTP):- The basic Internet mail protocols provide mail (note) and message exchange between TCP/IP hosts, but generally require that data be represented as 7-bit ASCII text. Because this can be restrictive, facilities have been added for the transmission of data that cannot be represented in this manner. Originally, there were three standard protocols that apply to mail of this kind. The term Simple Mail Transfer Protocol (SMTP) is frequently used to refer to the combined set of protocols because they are so closely interrelated. Strictly speaking, however, SMTP is just one of the three. Those three standards were: · A standard for the exchange of mail between two computers (STD 10/RFC 821), which specified the protocol used to send mail between TCP/IP hosts. This standard was SMTP itself. · A standard (STD 11) on the format of the mail messages, contained in two RFCs. RFC 822 described the syntax of mail header fields and defined a set of header fields and their interpretation. RFC 1049 described how a set of document types other than plain text ASCII can be used in the mail body. The official protocol name for this standard was MAIL. · A standard for the routing of mail using the Domain Name System, described in RFC 974. The official protocol name for this standard was DNS-MX. Common SMTP header fields:-
  • 16. 6. Explain any two static routing algorithms. Ans:- 7. Discuss IPv4 addressing schemes. Ans:- An IP address is an identifier that is assigned at the Internet layer to an interface or a set of interfaces. Each IP address can identify the source or destination of IP packets. For IPV4, every node on a network has one or more interfaces, and you can enable TCP/IP on each of those interfaces. When you enable TCP/IP on an interface, you assign it one or more logical IPV4 addresses, either automatically or manually. The IPV4 address is a logical address because it is assigned at the Internet layer and has no relation to the addresses that are used at the Network Interface layer. IPV4 addresses are 32 bits long. IPV4 Address Syntax:-If network administrators expressed IPV4 addresses using binary notation, each address would appear as a 32-digit string of 1s and 0s. Because such strings are cumbersome to express and remember, administrators use dotted decimal notation, in which periods (or dots) separate four decimal numbers (from 0 to 255). Each decimal number, known as an octet, represents 8 bits (1 byte) of the 32-bit address. When referring to an IPV4 address, use the notation w.x.y.z. shows the IPV4 address structure.
  • 17. To become adept at moving between binary and decimal formats, you can review the binary and decimal numbering systems and how to convert between them. Although you can use the calculator in the Microsoft Windows Server 2003 or Windows XP operating systems to convert between decimal and binary, you will better understand the conversions if you can do them manually. 8. Discuss Congestion Avoidance in Transport Layer. Ans:- Congestion avoidance:-The assumption of the algorithm is that packet loss caused by damage is very small. Therefore, the loss of a packet signals congestion somewhere in the network between the source and destination. There are two indications of packet loss: · A timeout occurs. · Duplicate ACKs are received. Congestion avoidance and slow start are independent algorithms with different objectives. But when congestion occurs, TCP must slow down its transmission rate of packets into the network and invoke slow start to get things going again. In practice, they are implemented together. Congestion avoidance and slow start require that two variables be maintained for each connection: · A congestion window, cwnd · A slow start threshold size, ssthresh The combined algorithm operates as follows:
  • 18. 1. Initialization for a given connection sets cwnd to one segment and ssthresh to 65535 bytes. 2. The TCP output routine never sends more than the lower value of cwnd or the receiver’s advertised window. 3. When congestion occurs (timeout or duplicate ACK), one-half of the current window size is saved in ssthresh. Additionally, if the congestion is indicated by a timeout, cwnd is set to one segment. 4. When new data is acknowledged by the other end, increase cwnd, but the way it increases depends on whether TCP is performing slow start or congestion avoidance. If cwnd is less than or equal to ssthresh, TCP is in slow start; otherwise, TCP is performing congestion avoidance. Slow start and congestion avoidance behavior in action: Fast retransmit:-Fast retransmit avoids having TCP wait for a timeout to resend lost segments
  • 19. Fast recovery:- After fast retransmit sends what appears to be the missing segment, congestion avoidance, but not slow start, is performed. This is the fast recovery algorithm. It is an improvement that allows high throughput under moderate congestion, especially for large windows. 9. Discuss various design issues of Session Layer. Ans:- Design Issues:- The Session, Presentation and Application layers form the upper layers in the OSI model. These upper layers are concerned with providing user-oriented services. They take the bare-bones, error-free channel provide by the transport layer and add additional features that are useful to a wide variety of applications, so that the writers of these applications will not each have to re-implement these features over and over as part of each separate program. The design issues of the session layer include: · Dialog Management · Synchronization · Activity Management The Session layer provides services to the Presentation layer. The service access points are called Session Service Access Points (SSAPs) and the protocol data units are called Session Protocol Data Units (SPDUs). The main function of the session layer is to provide a way for the
  • 20. session users to establish connections, called sessions, and transfer data over them in an orderly way. A session might be used for a remote login from a terminal to a distant computer, or for a file transfer, or for any many other purposes. Although connectionless primitives are available in the session layer, a connectionless session cannot make any use of the user-oriented features for which the session layer was designed. For this reason, we will focus on the connection- oriented model. A session bears a close resemblance to a transport connection, but the two are not identical. Usually, when a request comes into the session layer to establish a session, a transport connection must be established to carry the connection. When the session is terminated, the transport connection is released. It is not permitted to multiplex several sessions onto a single transport connection simultaneously the way the transport layer can multiplex several transport connections onto a network connection. At any instant of time, each transport connection carries at most one session. 10. Describe the Multipurpose Internet Mail Extensions. Ans:- Multipurpose Internet Mail Extensions:- Electronic mail is probably the most widely used TCP/IP application. However, SMTP is limited to 7-bit ASCII text, with a maximum line length of 1000 characters. This results in a number of limitations, including: · SMTP cannot transmit executable files or other binary objects. There are ad hoc methods of encapsulating binary items in SMTP mail items, such as: – Encoding the file as pure hexadecimal – The UNIX uuencode and uudecode utilities, used to encode binary data in the UNIX-to- UNIX Copy (UUCP) mailing system However, none of these can be described as a de facto standard (though uuencode/uudecode is perhaps the most pervasive, due to the pioneering role of UNIX systems in the Internet). · SMTP cannot transmit text data that includes national language characters, because these are represented by code points with a value of 128 (decimal) or higher in all character sets based on ASCII. · SMTP servers might reject mail messages over a certain size. Any given server can have permanent or transient limits, or both, on the maximum amount of mail data it can accept from a client at any given time.
  • 21. · SMTP gateways that translate from ASCII to EBCDIC and vice versa do not use a consistent set of code page mappings, resulting in translation problems. · Some SMTP implementations or other mail transport agents (MTAs) in the Internet do not adhere completely to the SMTP standards defined in RFC 2821. Common problems include: – Removal of trailing white-space characters (tabs and spaces). – Addition of white-space characters to make all lines in a message the same length. – Wrapping of lines longer than 76 characters. – Changing of new line sequences between different conventions. (For example, <CRLF> characters might be converted to <CR> or <LF> sequences.) – Conversion of tab characters to multiple spaces. MIME can be described in five parts: · Protocols for including objects other than US ASCII text mail messages within the bodies of messages conforming to RFC 2822. These are described in RFC 2045. · General structure of the MIME media typing system, which defines an initial set of media types. This is described in RFC 2046. · A protocol for encoding non-U.S. ASCII text in the header fields of mail messages conforming to RFC 2822. This is described in RFC 2047. · Various IANA registration procedures for MIME-related facilities. This is described in RFC 2048. · MIME conformance criteria. This is described in RFC 20410.