Unit 1
Unit 1
Data Communication - Networks – Network Types – Protocol Layering – TCP/IP Protocol suite –
OSI Model – Introduction to Sockets - Application Layer protocols: HTTP – FTP – Email protocols
(SMTP - POP3 - IMAP - MIME) – DNS – SNMP
PART – A
Univ QP (Month/
S.No. Question and Answer CO
Year)
1 Why do we need a Domain Name System? What role does the
DNS Resolver play in the DNS system?
Domain Name System can map a name to an address and
conversely an address to name. The Domain Name System converts
domain names into IP numbers. IP numbers uniquely identify hosts
on the Internet: however they are difficult to remember. We CO1 (NOV 2014)
therefore need a memorable way of identifying hosts. A DNS
Resolver is responsible for making requests of the local DNS server
in behalf of clients. A DNS Resolver must know the IP address of at
least one DNS server. It uses this address to start the DNS Lookup
process.
2 What are the four main properties of HTTP?
• Global Uniform Resource Identifier.
(NOV 2016, APR
• Request-response exchange. CO1
2018)
• Statelessness.
• Resource metadata.
3 What is WWW and SMTP?
World Wide Web is an internet application that allows user to view
pages and move from one web page to another.
(Nov 10,15)
It helps to store and share data across varied distances. The TCP/IP
CO1 ( May 15)
protocol that supports electronic mail on the Internet is called
Simple Mail Transfer (SMTP).
It is a system for sending messages to other computer users based on
e-mail addresses.
4
What are the four groups of HTTP Headers? What are the two
methods of HTTP?
1 Explain the SMTP and HTTP. Give their uses, state strengths
and weaknesses.
SMTP and HTTP are both network layer protocols that are used to
transfer information between hosts. SMTP is used to transfer emails
between mail servers, while HTTP is used to transfer data from a
web server to a web client.
The SMTP is a protocol used to transfer e-mail messages and
attachments. SMTP is used to transmit e-mail between e-mail
servers and from e-mail clients (such as Microsoft Outlook or UNIX
and Linux's send mail) to e-mail servers (such as Microsoft
Exchange).
HTTP and SMTP are two completely different protocols, used for
different purpose with different clients. SMTP stands for Simple (APR/MAY 2015)
Mail Transfer Protocol, and as far as I remember is much older than (MAY/JUN 2016)
CO1
HTTP. SMTP as you can understand was used primarily for (NOV/DEC 2015)
exchanging electronic mail using a TCP connection.
Benefits or advantages of HTTP
➨It offers lower CPU and memory usage due to less simultaneous
connections.
➨It enables HTTP pipelining of requests/responses.
➨It offers reduced network congestion as there are fewer TCP
connections. ➨Handshaking is done at the initial connection
establishment stage.
HTTP is considered less secure than HTTPS. HTTP transfers data in
plain text, making it easy for attackers to intercept and read the data.
This can include sensitive information such as passwords and credit
card numbers.
2 Explain the role of a DNS on a computer network.
The purpose of DNS is to translate a domain name into
the appropriate IP address. This is done by looking up
the dns records of the requested domain. There are
typically eight steps in this DNS lookup process that
follow the information path from the originating web
browser to the DNS server and back again.
Domain Name System (DNS) is one of the industry- (NOV/DEC 2015)
standard suite of protocols that comprise TCP/IP, and CO1
together the DNS Client and DNS Server provide
computer name-to-IP address mapping name resolution
services to computers and users.
The DNS name space is the set of all domain names
that are registered in the DNS. These domain names are
organized into a tree-like structure, with the top of the
tree being the root domain. Below the root domain,
there are a number of top-level domains, such as .com, .
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY
Simplex Communication
Half Duplex communication
Full-duplex communication
7 Write short notes on IMAP CO1 (APR 2018)
Internet Message Access Protocol (IMAP) is an application layer
protocol that operates as a contract for receiving emails from the
mail server. It was designed by Mark Crispin in 1986 as a remote
access mailbox protocol, the current version of IMAP is IMAP4. It
is used as the most commonly used protocol for retrieving emails.
This term is also known as Internet mail access protocol, Interactive
mail access protocol, and Interim mail access protocol.
Features of IMAP:
• It is capable of managing multiple mailboxes and
organizing them into various categories.
• Provides adding of message flags to keep track of
which messages are being seen.
• It is capable of deciding whether to retrieve email
from a mail server before downloading.
• It makes it easy to download media when multiple
files are attached.
Working of IMAP :
IMAP follows Client-server Architecture and is the
most commonly used email protocol. It is a combination
of client and server process running on other computers
that are connected through a network. This protocol
resides over the TCP/IP protocol for communication.
Once the communication is set up the server listens on
port 143 by default which is non-encrypted. For the
secure encrypted communication port, 993 is used.
POP3
Post Office Protocol 3, or POP3, is the most
commonly used protocol for receiving email over the
internet. This standard protocol, which most email
servers and their clients support, is used to receive
emails from a remote server and send to a local client.
POP3 is a one-way client-server protocol in which
email is received and held on the email server. The "3"
refers to the third version of the original POP protocol.
A recipient or their email client can download mail
periodically from the server using POP3. Thus, POP3
offers a means of downloading email from a server to
the client so the recipient can view the email offline.
POP3 can be thought of as a "store-and-forward"
service.
Once the email is on the client, POP3 then deletes it
from the server. With some implementations, users or
an administrator can specify that mail be saved for some
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY
(ii) Suppose Host A wants to send a large file to Host B. The path
from Host A to Host B has three links, of rates R1 = 500 kbps, (7)
R2 = 2 Mbps, and R3 = 1 Mbps. Assuming no other traffic in the
network,
Suppose Host A wants to send a large file to Host B. The path from
Host A to Host B has three links, of rate R1=500kbps, R2=2Mbps,
and R3=1Mbps. throughput for the file transfer? Ans: 500kpbs.
(1) What is the throughput for the file transfer?
In data transmission, network throughput is the amount of data
moved successfully from one place to another in a given time
period. Network throughput is typically measured in bits per second
(bps), as in megabits per second (Mbps) or gigabits per second
(Gbps).
Types of throughput
Historically, throughput has been a measure of the comparative
effectiveness of large commercial computers that run many
programs concurrently. Throughput metrics have adapted with the
evolution of computing, using various benchmarks to measure
throughput in different use cases.
Batches per day and teraflops
An early throughput measure was the number of batch jobs
completed in a day. More recent measures assume either a more
complicated mixture of work or focus on a particular aspect of
computer operation. Units like trillion floating-point operations per
second (teraflops) provide a metric to compare the cost of raw
computing over time or by manufacturer.
(2) Suppose the file is 4 million bytes roughly how long will it
take to transfer the file to Host B from Host A?
(b) Divide the size of the file by the throughput to get approximate
time to transfer to B.
t=4∗106∗8500∗103=64sec.
(c) R2 being reduced to 100 kbps, so throuhput is now 100 kbps.
Time to transfer t=4∗106∗8100∗103=320sec.
The links R1, R2 and R3 are connected sequentially, so the whole
transfer has to wait for the slowest link. That is why we do not
consider individual transfer times.
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY
2 Discuss the architecture of WWW and describe the concepts of CO1 NOV/DEC 2022
hypertext and hypermedia
The WWW is mainly a distributed client/server service where a
client using the browser can access the service using a server. The
Service that is provided is distributed over many different locations
commonly known as sites/websites.
SystemArchitecture:
From the user’s point of view, the web consists of a vast, worldwide
connection of documents or web pages. Each page may contain
links to other pages anywhere in the world. The pages can be
retrieved and viewed by using browsers of which internet explorer,
Netscape Navigator, Google Chrome, etc are the popular ones. The
browser fetches the page requested interprets the text and formatting
commands on it, and displays the page, properly formatted, on the
screen.
The basic model of how the web works are shown in the figure
below. Here the browser is displaying a web page on the client
machine. When the user clicks on a line of text that is linked to a
page on the abd.com server, the browser follows the hyperlink by
sending a message to the abd.com server asking it for the page.
Working of WWW:
The World Wide Web is based on several different technologies:
Web browsers, Hypertext Markup Language (HTML) and Hypertext
Transfer Protocol (HTTP).
A Web browser is used to access web pages. Web browsers can be
defined as programs which display text, data, pictures, animation
and video on the Internet. Hyperlinked resources on the World Wide
Web can be accessed using software interfaces provided by Web
browsers. Initially, Web browsers were used only for surfing the
Web but now they have become more universal. Web browsers can
be used for several tasks including conducting searches, mailing,
transferring files, and much more. Some of the commonly used
browsers are Internet Explorer, Opera Mini, and Google Chrome.
Features of WWW:
• HyperText Information System
• Cross-Platform
• Distributed
• Open Standards and Open Source
• Uses Web Browsers to provide a single interface for
many services
• Dynamic, Interactive and Evolving.
• “Web 2.0”
Components of the Web: There are 3 components of the web:
1. Uniform Resource Locator (URL): serves as a
system for resources on the web.
2. HyperText Transfer Protocol (HTTP): specifies
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY
Working of SMTP
1. Composition of Mail: A user sends an e-mail by composing
an electronic mail message using a Mail User Agent (MUA). Mail
User Agent is a program which is used to send and receive mail. The
message contains two parts: body and header. The body is the main
part of the message while the header includes information such as
the sender and recipient address. The header also includes
descriptive information such as the subject of the message. In this
case, the message body is like a letter and header is like an envelope
that contains the recipient's address.
2. Submission of Mail: After composing an email, the mail
client then submits the completed e-mail to the SMTP server by
using SMTP on TCP port 25.
3. Delivery of Mail: E-mail addresses contain two parts:
username of the recipient and domain name. For example,
[email protected], where "vivek" is the username of the recipient
and "gmail.com" is the domain name.
If the domain name of the recipient's email address is different from
the sender's domain name, then MSA will send the mail to the Mail
Transfer Agent (MTA). To relay the email, the MTA will find the
target domain. It checks the MX record from Domain Name System
to obtain the target domain. The MX record contains the domain
name and IP address of the recipient's domain. Once the record is
located, MTA connects to the exchange server to relay the message.
4. Receipt and Processing of Mail: Once the incoming message
is received, the exchange server delivers it to the incoming server
(Mail Delivery Agent) which stores the e-mail where it waits for the
user to retrieve it.
5. Access and Retrieval of Mail: The stored email in MDA can
be retrieved by using MUA (Mail User Agent). MUA can be
accessed by using login and password.
iii)SNMP
o SNMP stands for Simple Network Management Protocol.
o SNMP is a framework used for managing devices on the
internet.
o It provides a set of operations for monitoring and managing
the internet.