0% found this document useful (0 votes)
29 views19 pages

Unit 1

The document provides an overview of key concepts in data communication and networking including network types, protocol layering, TCP/IP protocol suite, OSI model, sockets, and several important application layer protocols like HTTP, FTP, email protocols, DNS, and SNMP. It then presents 17 questions related to these topics along with their answers. The questions cover topics such as the role of DNS, properties of HTTP, definitions of WWW and SMTP, HTTP headers and methods, PGP, FTP transmission modes, applications of POP and IMAP, digital signatures, URLs, web browsers, rlogin, cyber squatting, and the division of domain name space.

Uploaded by

mentalinside
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views19 pages

Unit 1

The document provides an overview of key concepts in data communication and networking including network types, protocol layering, TCP/IP protocol suite, OSI model, sockets, and several important application layer protocols like HTTP, FTP, email protocols, DNS, and SNMP. It then presents 17 questions related to these topics along with their answers. The questions cover topics such as the role of DNS, properties of HTTP, definitions of WWW and SMTP, HTTP headers and methods, PGP, FTP transmission modes, applications of POP and IMAP, digital signatures, URLs, web browsers, rlogin, cyber squatting, and the division of domain name space.

Uploaded by

mentalinside
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

UNIT I - INTRODUCTION AND APPLICATION LAYER

Data Communication - Networks – Network Types – Protocol Layering – TCP/IP Protocol suite –
OSI Model – Introduction to Sockets - Application Layer protocols: HTTP – FTP – Email protocols
(SMTP - POP3 - IMAP - MIME) – DNS – SNMP
PART – A
Univ QP (Month/
S.No. Question and Answer CO
Year)
1 Why do we need a Domain Name System? What role does the
DNS Resolver play in the DNS system?
Domain Name System can map a name to an address and
conversely an address to name. The Domain Name System converts
domain names into IP numbers. IP numbers uniquely identify hosts
on the Internet: however they are difficult to remember. We CO1 (NOV 2014)
therefore need a memorable way of identifying hosts. A DNS
Resolver is responsible for making requests of the local DNS server
in behalf of clients. A DNS Resolver must know the IP address of at
least one DNS server. It uses this address to start the DNS Lookup
process.
2 What are the four main properties of HTTP?
• Global Uniform Resource Identifier.
(NOV 2016, APR
• Request-response exchange. CO1
2018)
• Statelessness.
• Resource metadata.
3 What is WWW and SMTP?
World Wide Web is an internet application that allows user to view
pages and move from one web page to another.
(Nov 10,15)
It helps to store and share data across varied distances. The TCP/IP
CO1 ( May 15)
protocol that supports electronic mail on the Internet is called
Simple Mail Transfer (SMTP).
It is a system for sending messages to other computer users based on
e-mail addresses.
4
What are the four groups of HTTP Headers? What are the two
methods of HTTP?

The four groups of HTTP headers are (May15) (Nov 15)


• General headers (NOV 2016, APR
CO1 2018)
• Entity Headers
• Request Headers
• Response Headers. Two methods of HTTP are
• GetMethod( )
• PostMethod( )
5 What is PGP? (Nov10, May 12) CO1 (April/May-2011 ,
Pretty Good Privacy (PGP) is used to provide security for May 2019)
electronic mail. It provides authentication, confidentiality, data
integrity, and non-repudiation. It is a program using public key
encryption popularly used with email.Pretty Good Privacy uses a
variation of the public key system. In this system, each user has an
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

encryption key that is publicly known and a private key that is


known only to that user.PGP comes in two
public key versions -- Rivest-Shamir-Adleman (RSA) and Diffie-
Hellman.
6 What are the transmission modes of FTP?
• Stream mode: Default mode and data is delivered from
FTP to TCP as a continuous stream of data.
• Block mode: Data is delivered from FTP to TCP in terms of (APR 2013,
CO1
blocks. Each data block follows the three byte header. NOV 2018)
• Compressed mode: File is compressed before transmitting if
size is big. Run length
encoding method is used for compression.
7 Why is an application such as POP needed for electronic
messaging? (May 12)
Workstations interact with the SMTP host, which receives the mail
on behalf of every host in the organization, to retrieve messages by
using a client-server protocol such as Post Office Protocol. CO1 (MAY 2019)
Although POP3 is used to download messages from the server, the
SMTP client still needed on the desktop to forward messages from
the workstation user to its SMTP
mail server.
8 What are the TCP connections needed in FTP?
FTP establishes two connections between the hosts. One
connection is used for data transfer, the other for control
information. (Apr 2019)
CO1
The control connection uses very simple rules of communication. The
data connection
needs more complex rules due to the variety of data types
transferred.
9 Compare the HTTP and FTP.
FTP HTTP
FTP transfers the file HTTP transfer the file
from client to server and from server to client.(i.e.
server to client. web pages)
It uses two different port HTTP use only one port
connections. (i.e. port 20 connection. (i.e. Port 80) CO1 (JUN 2016 )
and port 21)
FTP uses two parallel It also uses TCP
TCP connections to protocol.
transfer a file. They are
Control Connection
and Data connection.
10 What is the use of MIME Extension?
Multipurpose Internet Mail Extensions (MIME) is a supplementary
protocol that allows non-ASCII data to be sent through SMTP. MIME
transforms non-ASCII data at the sender site to NVT ASCII data and CO1 (JUN 2013)
deliverers it to the client SMTP to be sent through the Internet. MIME
converts binary files, executed files into text files. Then only it can be
transmitted using SMTP
11 Which protocol support email and give details about that CO1 NOV 2017
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

protocol? What are the basic functions of e-mail?


SMTP is a standard protocol for transferring mails using TCP/IP
• SMTP standardization for message character is 7 bit ASCII
• SMTP adds log info to the start (i.e.) path of the message.
• Basic functions of e-mail: composition, Transfer, Reporting,
Displaying, and Disposition.
12 What is POP3?
POP3 (Post Office Protocol 3) is the most recent version of a standard
protocol for receiving e-mail. POP3 is a client/server protocol in
which e-mail is received and held for you by your Internet server. POP CO1 (NOV 2013)
and IMAP deal with the receiving of e-mail and are not to be confused
with the Simple Mail Transfer Protocol (SMTP), a protocol for
transferring e-mail across the Internet.
13 What is IMAP?
Internet Message Access Protocol (IMAP) is a
standard protocol for accessing e-mail from your
local server. IMAP is a client/server protocol in
CO1 (NOV 2018)
which e-mail is received and held for you by your
Internet server. MAP can be thought of as a remote
file server. POP3 can be thought of as a "store-and-
forward" service.
14 What is use of digital signature?
Digital signature is a method to authenticate the sender of a
message. It is similar to that of signing transactions documents when
you do business with a bank. In network transactions, one can create
CO1
an equivalent of an electronic or digital signature by the way you
send data. Data appended to, or a data unit that allows a recipient of
the data unit to prove the source and integrity if the data unit and
protect against forgery.
15 What is a URL, web browser and rlogin?(May 2016)
• Uniform Resource Locator is a string
identifier that identifies a page on the World
Wide Web.
• Web browser is a software program CO1
that interprets and displays the contents of
HTML web pages.
• Remote login or rlogin is used to login
into remote system and access its contents.
16 Explain Cyber Squatting.
The practice of registering a domain only to turn around and sell it off
to an interested CO1
party at a much higher price even has a name. It is called cyber
squatting.
17 Discuss the three main division of the domain name space.
Domain name space is divided into three different sections: generic
domains, country domains & inverse domain.
 Generic domain: Define registered hosts according to their
(May 12)
generic behavior, uses generic suffixes. CO1
 Country domain: Uses two characters to identify a country
as the last suffix.
 Inverse domain: Finds the domain name given the IP
address.
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

18 Name four factors needed for a secure network?


Privacy: The sender and the receiver expect confidentiality.
Authentication: The receiver is sure of the sender’s identity and that
an imposter has not sent the message. CO1
Integrity: The data must arrive at the receiver exactly as it was sent.
Non-Reputation: The receiver must able to prove that a received
message came from a specific sender.
19 Define SNMP.
 Simple Network Management Protocol (SNMP) is an
"Internet-standard protocol for managing devices on IP networks".
 Devices that typically support SNMP include routers, CO1
(May 12)
(NOV 2017)
switches, servers, workstations, printers, & modem. It is used
mostly in network management systems to monitor network-
attached devices for conditions that warrant administrative attention.
20 Define Name Resolution.
To improve reliability, some of the name servers can be located
CO1
outside the zone. The process of looking up a name and finding an
address is called name resolution.
21 Explain Email.
E-mail (electronic mail) is the exchange
of computer-stored messages by
telecommunication. Email messages are usually encoded in ASCII
text. CO1
The architecture of the email system consists of two kinds of
subsystems: the user agents, which allow people to read and send
email, and the message transfer agents, which move the messages
from the source to the destination.
22 What is Telnet?
A Telnet is a Transmission Control Protocol (TCP). Connection
used to transmit data with interspersed Telnet Control Information.
The Telnet Protocol is built upon three main ideas:
CO1 (APR 2022)
• The concept of a network virtual terminal
• The principle of negotiated options
• A symmetric view of terminals and processes.
Telnet is the standard TCP/IP protocol for virtual terminal service.
23 Describe why HTTP is defined as a stateless protocol.
Maintaining state across request – Response connections
significantly increases the initial interactions in a connections since
the identity of each party needs to be established and any saved CO1 (Nov 2019)
state much be retrieved. HTTP is therefore stateless to ensure that
internet is scalable since state is not contained in a HTTP request /
response pairs by default.
24 List the two types of DNS message.
There are two types of DNS messages,
• Query
(May 16)
• Response CO1
(APR 2018 / 2022)
Query message – consists of the header and question records.
Response message – consists of header, question record,
authoritative record and additional record.
25 Define TELNET. CO1 (MAY 2017)
Telnet is a user command and an underlying TCP/IP protocol
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

for accessing remote computers. Through Telnet, an administrator or


another user can access someone else's computer remotely. On the
Web, HTTP and FTP protocols allow you to request specific files
from remote computers, but not to actually be logged on as a user of
that computer. With Telnet, you log on as a regular user with
whatever privileges you may have been granted to the specific
application and data on that computer.

1 Explain the SMTP and HTTP. Give their uses, state strengths
and weaknesses.
SMTP and HTTP are both network layer protocols that are used to
transfer information between hosts. SMTP is used to transfer emails
between mail servers, while HTTP is used to transfer data from a
web server to a web client.
The SMTP is a protocol used to transfer e-mail messages and
attachments. SMTP is used to transmit e-mail between e-mail
servers and from e-mail clients (such as Microsoft Outlook or UNIX
and Linux's send mail) to e-mail servers (such as Microsoft
Exchange).
HTTP and SMTP are two completely different protocols, used for
different purpose with different clients. SMTP stands for Simple (APR/MAY 2015)
Mail Transfer Protocol, and as far as I remember is much older than (MAY/JUN 2016)
CO1
HTTP. SMTP as you can understand was used primarily for (NOV/DEC 2015)
exchanging electronic mail using a TCP connection.
Benefits or advantages of HTTP
➨It offers lower CPU and memory usage due to less simultaneous
connections.
➨It enables HTTP pipelining of requests/responses.
➨It offers reduced network congestion as there are fewer TCP
connections. ➨Handshaking is done at the initial connection
establishment stage.
HTTP is considered less secure than HTTPS. HTTP transfers data in
plain text, making it easy for attackers to intercept and read the data.
This can include sensitive information such as passwords and credit
card numbers.
2 Explain the role of a DNS on a computer network.
The purpose of DNS is to translate a domain name into
the appropriate IP address. This is done by looking up
the dns records of the requested domain. There are
typically eight steps in this DNS lookup process that
follow the information path from the originating web
browser to the DNS server and back again.
Domain Name System (DNS) is one of the industry- (NOV/DEC 2015)
standard suite of protocols that comprise TCP/IP, and CO1
together the DNS Client and DNS Server provide
computer name-to-IP address mapping name resolution
services to computers and users.
The DNS name space is the set of all domain names
that are registered in the DNS. These domain names are
organized into a tree-like structure, with the top of the
tree being the root domain. Below the root domain,
there are a number of top-level domains, such as .com, .
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

3 Explain Email protocols in detail.


Email protocols define how the email message has to be encoded,
how it needs to be sent, received, rendered, and so on, and hence
they are essential. While email protocols make the process behind
emails a bit complex, the protocols ensure that email is a standard,
reliable, and universal mode of communication.
Given the critical role email plays in business, it is important to
protect your domain/s from cyber-attacks. If key email protocols
are not in place an attacker could impersonate your organization to
coerce others into providing data, credentials, or financial
information.
(NOV/DEC 2015)
SSL/TLS Protocols CO1
SSL (the Secure Sockets Layer) is the predecessor of TLS (the
Transport Layer Security). Both are application layer protocols that
provide the security framework that works with SMTP to keep
your emails safe.
Features of email
automatic reply to messages.
auto-forward and redirection of messages.
facility to send copies of a message to many people.
automatic filing and retrieval of messages.
addresses can be stored in an address book and retrieved instantly.
notification if a message cannot be delivered.
4 Explain in detail about web services.
A web service is a software system that supports interoperable
machine-to-machine interaction over a network. It has an interface
described in a machine-process able format (specifically, web
Service Definition Language, or WSDL). web services fulfill a
specific task or a set of tasks.
A web service is a set of open protocols and standards that allow
data to be exchanged between different applications or systems.
Web services can be used by software programs written in a variety
of programming languages and running on a variety of platforms to
exchange data via computer networks such as the Internet in a
similar way to inter-process communication on a single computer.
Any software, application, or cloud technology that uses
standardized web protocols (HTTP or HTTPS) to connect,
interoperate, and exchange data messages – commonly XML
CO1 (MAY/JUN 2016)
(Extensible Markup Language) – across the internet is considered a
web service.
Components of Web Service
XML and HTTP is the most fundamental web services platform.
The following components are used by all typical web services:
SOAP (Simple Object Access Protocol)
SOAP stands for “Simple Object Access Protocol.” It is a
transport-independent messaging protocol. SOAP is built on
sending XML data in the form of SOAP Messages. A document
known as an XML document is attached to each message. Only the
structure of the XML document, not the content, follows a pattern.
The best thing about Web services and SOAP is that everything is
sent through HTTP, the standard web protocol.
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

5 Discuss SNMP and Telnet in detail.


Simple Network Management Protocol (SNMP) is an internet
standard protocol used to monitor and manage network devices
connected over an IP. SNMP is used for communication between
routers, switches, firewalls, load balancers, servers, CCTV
cameras, and wireless devices.
SNMP consists of three key components: managed devices, agents,
and the network management station (NMS).
Simple Network Management Protocol (SNMP) is an application-
layer protocol for monitoring and managing network devices on a CO1 (APR/MAY 2015)
local area network (LAN) or wide area network (WAN).
The purpose of SNMP is to provide network devices, such as
routers, servers and printers, with a common language for sharing
information with a network management system (NMS).
SNMP's client-server architecture has the three following
components:
an SNMP manager;
an SNMP agent; and
a management information base (MIB).
6 Describe in details about Data Communication. CO1 (NOV 2019)
Human beings are the only creatures on the earth who are able to
communicate with each other through the medium of language. But
humans take this gift to another extent. Distance, time, and physical
existence of the person don’t matter in communication these days
because they build a communication system through which they can
communicate or share data like images, videos, text, files, etc with
their loved ones anytime anywhere. Communication is defined as a
process in which more than one computer transfers information,
instructions to each other and for sharing resources.
Components of Data Communication
A communication system is made up of the following components:
Message: A message is a piece of information that is to be
transmitted from one person to another. It could be a text file, an
audio file, a video file, etc.
Sender: It is simply a device that sends data messages. It can be a
computer, mobile, telephone, laptop, video camera, or workstation,
etc.
Receiver: It is a device that receives messages. It can be a computer,
telephone mobile, workstation, etc.
Transmission Medium / Communication Channels: Communication
channels are the medium that connect two or more workstations.
Workstations can be connected by either wired media or wireless
media.
Set of rules (Protocol): When someone sends the data (The sender),
it should be understandable to the receiver also otherwise it is
meaningless. For example, Sonali sends a message to Chetan. If
Sonali writes in Hindi and Chetan cannot understand Hindi, it is a
meaningless conversation.
Type of data communication
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

Simplex Communication
Half Duplex communication
Full-duplex communication
7 Write short notes on IMAP CO1 (APR 2018)
Internet Message Access Protocol (IMAP) is an application layer
protocol that operates as a contract for receiving emails from the
mail server. It was designed by Mark Crispin in 1986 as a remote
access mailbox protocol, the current version of IMAP is IMAP4. It
is used as the most commonly used protocol for retrieving emails.
This term is also known as Internet mail access protocol, Interactive
mail access protocol, and Interim mail access protocol.
Features of IMAP:
• It is capable of managing multiple mailboxes and
organizing them into various categories.
• Provides adding of message flags to keep track of
which messages are being seen.
• It is capable of deciding whether to retrieve email
from a mail server before downloading.
• It makes it easy to download media when multiple
files are attached.
Working of IMAP :
IMAP follows Client-server Architecture and is the
most commonly used email protocol. It is a combination
of client and server process running on other computers
that are connected through a network. This protocol
resides over the TCP/IP protocol for communication.
Once the communication is set up the server listens on
port 143 by default which is non-encrypted. For the
secure encrypted communication port, 993 is used.
POP3
Post Office Protocol 3, or POP3, is the most
commonly used protocol for receiving email over the
internet. This standard protocol, which most email
servers and their clients support, is used to receive
emails from a remote server and send to a local client.
POP3 is a one-way client-server protocol in which
email is received and held on the email server. The "3"
refers to the third version of the original POP protocol.
A recipient or their email client can download mail
periodically from the server using POP3. Thus, POP3
offers a means of downloading email from a server to
the client so the recipient can view the email offline.
POP3 can be thought of as a "store-and-forward"
service.
Once the email is on the client, POP3 then deletes it
from the server. With some implementations, users or
an administrator can specify that mail be saved for some
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

time, allowing users to download email as many times


as they wish within the specified period.
POP3 and email applications
8 Justify how MIME is used in E-Mail application.
Multipurpose Internet Mail Extension (MIME) is a standard that was
proposed by Bell Communications in 1991 in order to expand the
limited capabilities of email.
MIME is a kind of add-on or a supplementary protocol that allows
non-ASCII data to be sent through SMTP. It allows the users to
exchange different kinds of data files on the Internet: audio, video,
images, application programs as well.
Why do we need MIME?
Limitations of Simple Mail Transfer Protocol (SMTP):
SMTP has a very simple structure
Its simplicity however comes with a price as it only sends messages
in NVT 7-bit ASCII format.
It cannot be used for languages that do not support 7-bit ASCII
format such as French, German, Russian, Chinese and Japanese, etc.
so it cannot be transmitted using SMTP. So, in order to make SMTP CO1
more broad, we use MIME.
It cannot be used to send binary files or video or audio data.
Purpose and Functionality of MIME
Growing demand for Email Messages as people also want to express
themselves in terms of Multimedia. So, MIME another email
application is introduced as it is not restricted to textual data.
MIME transforms non-ASCII data at the sender side to NVT 7-bit
data and delivers it to the client SMTP. The message on the receiver
side is transferred back to the original data. As well as we can send
video and audio data using MIME as it transfers them also in 7-bit
ASCII data.
MIME is a kind of add-on or a supplementary protocol that allows
non-ASCII data to be sent through SMTP. It allows the users to
exchange different kinds of data files on the Internet: audio, video,
images, application programs as well.
9 Write short notes on REST and how it helps in web services. CO1
REST stands for Representational State Transfer. REST is web
standards based architecture and uses HTTP Protocol. It revolves
around resource where every component is a resource and a resource
is accessed by a common interface using HTTP standard methods.
REST was first introduced by Roy Fielding in 2000.
In REST architecture, a REST Server simply provides access to
resources and REST client accesses and modifies the resources.
Here each resource is identified by URIs/ global IDs. REST uses
various representation to represent a resource like text, JSON, XML.
JSON is the most popular one.
HTTP methods

Following four HTTP methods are commonly used in REST based


architecture.
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

GET − Provides a read only access to a resource.

POST − Used to create a new resource.

DELETE − Used to remove a resource.

PUT − Used to update a existing resource or create a new


resource.
10 Explain in detail about the four network topologies. CO1 (Nov 2016)
A computer network is a group of computers linked to each other
that enables the computer to communicate with another computer
and share their resources, data, and applications.
A computer network can be categorized by their size. A computer
network is mainly of four types:
• LAN(Local Area Network)
• PAN(Personal Area Network)
• MAN(Metropolitan Area Network)
• WAN(Wide Area Network)
LAN(Local Area Network)
• Local Area Network is a group of computers
connected to each other in a small area such as building,
office.
• LAN is used for connecting two or more personal
computers through a communication medium such as
twisted pair, coaxial cable, etc.
• It is less costly as it is built with inexpensive
hardware such as hubs, network adapters, and ethernet
cables.
• The data is transferred at an extremely faster rate in
Local Area Network.
• Local Area Network provides higher security.
PAN(Personal Area Network)
• Personal Area Network is a network arranged
within an individual person, typically within a range of
10 meters.
• Personal Area Network is used for connecting the
computer devices of personal use is known as Personal
Area Network.
• Thomas Zimmerman was the first research scientist
to bring the idea of the Personal Area Network.
• Personal Area Network covers an area of 30 feet.
• Personal computer devices that are used to develop
the personal area network are the laptop, mobile phones,
media player and play stations.
MAN(Metropolitan Area Network)
• A metropolitan area network is a network that
covers a larger geographic area by interconnecting a
different LAN to form a larger network.
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

• Government agencies use MAN to connect to the


citizens and private industries.
• In MAN, various LANs are connected to each other
through a telephone exchange line.
• The most widely used protocols in MAN are RS-
232, Frame Relay, ATM, ISDN, OC-3, ADSL, etc.
• It has a higher range than Local Area
Network(LAN).
WAN(Wide Area Network)
• A Wide Area Network is a network that extends
over a large geographical area such as states or
countries.
• A Wide Area Network is quite bigger network than
the LAN.
• A Wide Area Network is not limited to a single
location, but it spans over a large geographical area
through a telephone line, fibre optic cable or satellite
links.
• The internet is one of the biggest WAN in the
world.
A Wide Area Network is widely used in the field of
Business, government, and education.
11 Draw the OSI network architecture and explain the CO1 ( MAY 2017,
functionalities of each layer in detail. NOV 2018 )
OSI Model
OSI stands for Open System Interconnection is a reference model
that describes how information from a software application in one
computer moves through a physical medium to the software
application in another computer.
OSI consists of seven layers, and each layer performs a particular
network function.
OSI model was developed by the International Organization for
Standardization (ISO) in 1984, and it is now considered as an
architectural model for the inter-computer communications.
OSI model divides the whole task into seven smaller and
manageable tasks. Each layer is assigned a particular task.
Each7 Layers of OSI Model
There are the seven OSI layers. Each layer has different functions. A
list of seven layers are given below:
Physical Layer
Data-Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer layer is self-contained, so that task assigned to
each layer can be performed independently.
Functions of a Physical layer:
Line Configuration: It defines the way how two or more devices
can be connected physically.
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

Data Transmission: It defines the transmission mode whether it is


simplex, half-duplex or full-duplex mode between the two devices
on the network.
Topology: It defines the way how network devices are arranged.
Signals: It determines the type of the signal used for transmitting
the information.
The two protocols used in this layer are:
Transmission Control Protocol
It is a standard protocol that allows the systems to
communicate over the internet.
It establishes and maintains a connection between hosts.
When data is sent over the TCP connection, then the TCP
protocol divides the data into smaller units known as segments.
Each segment travels over the internet using multiple routes, and
they arrive in different orders at the destination. The transmission
control protocol reorders the packets in the correct order at the
receiving end.
User Datagram Protocol
User Datagram Protocol is a transport layer protocol.
It is an unreliable transport protocol as in this case receiver
does not send any acknowledgment when the packet is received, the
sender does not wait for any acknowledgment. Therefore, this
makes a protocol unreliable.
12 Discuss in detail about the Internet Architecture
Internet architecture is a meta-network, which refers to a
congregation of thousands of distinct networks interacting with a
common protocol. In simple terms, it is referred as an internetwork
that is connected using protocols. Protocol used is TCP/IP.
CO1
P2P or peer-to-peer and client/server architectures are the two types
of network architecture that frames the communication or
transmission of data between systems. Network performance and
ability differs between the two network architectures and each offer
different use cases.
PART C
1 (a) (i) For each of the following four networks, discuss the CO1
consequences if a connection fails.

(1) Five devices arranged in a mesh topology


(2) Five devices arranged in a star topology (not counting the hub)
(3) Five devices arranged in a bus topology
(4) Five devices arranged in a ring topology
a. Five devices arranged in a mesh topology
If one connection fails, the other connections will still be working.
b. Five devices arranged in a star topology (not counting the hub)
The other devices will still be able to send data throughthe hub;
there will be no access to the device which has the failed connection
to the hub.

c. Five devices arranged in a bus topology


AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

All transmission stops if the failure is in the bus. If the drop-line


fails, only the corresponding device cannot operate.

d. Five devices arranged in a ring topology


The failed connection may disable the whole network unless it is a
dual ring or there is a by-pass mechanism.

(ii) Suppose Host A wants to send a large file to Host B. The path
from Host A to Host B has three links, of rates R1 = 500 kbps, (7)
R2 = 2 Mbps, and R3 = 1 Mbps. Assuming no other traffic in the
network,
Suppose Host A wants to send a large file to Host B. The path from
Host A to Host B has three links, of rate R1=500kbps, R2=2Mbps,
and R3=1Mbps. throughput for the file transfer? Ans: 500kpbs.
(1) What is the throughput for the file transfer?
In data transmission, network throughput is the amount of data
moved successfully from one place to another in a given time
period. Network throughput is typically measured in bits per second
(bps), as in megabits per second (Mbps) or gigabits per second
(Gbps).
Types of throughput
Historically, throughput has been a measure of the comparative
effectiveness of large commercial computers that run many
programs concurrently. Throughput metrics have adapted with the
evolution of computing, using various benchmarks to measure
throughput in different use cases.
Batches per day and teraflops
An early throughput measure was the number of batch jobs
completed in a day. More recent measures assume either a more
complicated mixture of work or focus on a particular aspect of
computer operation. Units like trillion floating-point operations per
second (teraflops) provide a metric to compare the cost of raw
computing over time or by manufacturer.

(2) Suppose the file is 4 million bytes roughly how long will it
take to transfer the file to Host B from Host A?

(a) Throughput is limited by the minimum of the capacity of the


links. Here, minimum is R1. So throuhput is 500 kbps.

(b) Divide the size of the file by the throughput to get approximate
time to transfer to B.
t=4∗106∗8500∗103=64sec.
(c) R2 being reduced to 100 kbps, so throuhput is now 100 kbps.
Time to transfer t=4∗106∗8100∗103=320sec.
The links R1, R2 and R3 are connected sequentially, so the whole
transfer has to wait for the slowest link. That is why we do not
consider individual transfer times.
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

2 Discuss the architecture of WWW and describe the concepts of CO1 NOV/DEC 2022
hypertext and hypermedia
The WWW is mainly a distributed client/server service where a
client using the browser can access the service using a server. The
Service that is provided is distributed over many different locations
commonly known as sites/websites.
SystemArchitecture:
From the user’s point of view, the web consists of a vast, worldwide
connection of documents or web pages. Each page may contain
links to other pages anywhere in the world. The pages can be
retrieved and viewed by using browsers of which internet explorer,
Netscape Navigator, Google Chrome, etc are the popular ones. The
browser fetches the page requested interprets the text and formatting
commands on it, and displays the page, properly formatted, on the
screen.
The basic model of how the web works are shown in the figure
below. Here the browser is displaying a web page on the client
machine. When the user clicks on a line of text that is linked to a
page on the abd.com server, the browser follows the hyperlink by
sending a message to the abd.com server asking it for the page.

Working of WWW:
The World Wide Web is based on several different technologies:
Web browsers, Hypertext Markup Language (HTML) and Hypertext
Transfer Protocol (HTTP).
A Web browser is used to access web pages. Web browsers can be
defined as programs which display text, data, pictures, animation
and video on the Internet. Hyperlinked resources on the World Wide
Web can be accessed using software interfaces provided by Web
browsers. Initially, Web browsers were used only for surfing the
Web but now they have become more universal. Web browsers can
be used for several tasks including conducting searches, mailing,
transferring files, and much more. Some of the commonly used
browsers are Internet Explorer, Opera Mini, and Google Chrome.
Features of WWW:
• HyperText Information System
• Cross-Platform
• Distributed
• Open Standards and Open Source
• Uses Web Browsers to provide a single interface for
many services
• Dynamic, Interactive and Evolving.
• “Web 2.0”
Components of the Web: There are 3 components of the web:
1. Uniform Resource Locator (URL): serves as a
system for resources on the web.
2. HyperText Transfer Protocol (HTTP): specifies
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

communication of browser and server.


Hyper Text Markup Language (HTML): defines the structure,
organisation and content of a webpage.
3 b) Explain the following: CO1
i)HTTP.
HTTP stands for HyperText Transfer Protocol. It is invented by Tim
Berner. HyperText is the type of text which is specially coded with
the help of some standard coding language called HyperText
Markup Language (HTML). HTTP/2 is the successor version of
HTTP, which was published on May 2015. HTTP/3 is the latest
version of HTTP, which is published in 2022.

1. HTTP version 0.9 –


This was first version of HTTP which was introduced in 1991.
2. HTTP version 1.0 –
In 1996, RFC 1945 (Request For Comments) was introduced in
HTTP version 1.0.
3. HTTP version 1.1 –
In January 1997, RFC 2068 was introduced in HTTP version 1.1.
Improvements and updates to HTTP version 1.1 standard were
released under RFC 2616 in June 1999.
4. HTTP version 2.0 –
The HTTP version 2.0 specification was published as RFC 7540 on
May 14, 2015.
5. HTTP version 3.0 –
HTTP version 3.0 is based on previous RFC draft. It is renamed as
HyperText Transfer Protocol QUIC which is a transport layer
network protocol developed by Google.

Characteristics of HTTP: HTTP is IP based


communication protocol which is used to deliver data
from server to client or vice-versa.
1. Server processes a request, which is raised by client
and also server and client knows each other only during
current request and response period.
2. Any type of content can be exchanged as long as
server and client are compatible with it.
3. Once data is exchanged then servers and client are
no more connected with each other.
Advantages :
• Memory usage and CPU usage are low because of
less simultaneous connections.
• Since there are few TCP connections hence network
congestion are less.
• Since handshaking is done at initial connection
stage, then latency is reduced because there is no further
need of handshaking for subsequent requests.
Disadvantages :
• HTTP requires high power to establish
communication and transfer data.
• HTTP is less secure, because it does not uses any
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

encryption method like https use TLS to encrypt normal


http requests and response.
• HTTP is not optimized for cellular phone and it is
too gabby.
ii)SMTP
SMTP stands for Simple Mail Transfer Protocol. SMTP is a set of
communication guidelines that allow software to transmit an
electronic mail over the internet is called Simple Mail Transfer
Protocol. It is a program used for sending messages to other
computer users based on e-mail addresses.

Working of SMTP
1. Composition of Mail: A user sends an e-mail by composing
an electronic mail message using a Mail User Agent (MUA). Mail
User Agent is a program which is used to send and receive mail. The
message contains two parts: body and header. The body is the main
part of the message while the header includes information such as
the sender and recipient address. The header also includes
descriptive information such as the subject of the message. In this
case, the message body is like a letter and header is like an envelope
that contains the recipient's address.
2. Submission of Mail: After composing an email, the mail
client then submits the completed e-mail to the SMTP server by
using SMTP on TCP port 25.
3. Delivery of Mail: E-mail addresses contain two parts:
username of the recipient and domain name. For example,
[email protected], where "vivek" is the username of the recipient
and "gmail.com" is the domain name.
If the domain name of the recipient's email address is different from
the sender's domain name, then MSA will send the mail to the Mail
Transfer Agent (MTA). To relay the email, the MTA will find the
target domain. It checks the MX record from Domain Name System
to obtain the target domain. The MX record contains the domain
name and IP address of the recipient's domain. Once the record is
located, MTA connects to the exchange server to relay the message.
4. Receipt and Processing of Mail: Once the incoming message
is received, the exchange server delivers it to the incoming server
(Mail Delivery Agent) which stores the e-mail where it waits for the
user to retrieve it.
5. Access and Retrieval of Mail: The stored email in MDA can
be retrieved by using MUA (Mail User Agent). MUA can be
accessed by using login and password.
iii)SNMP
o SNMP stands for Simple Network Management Protocol.
o SNMP is a framework used for managing devices on the
internet.
o It provides a set of operations for monitoring and managing
the internet.

o SNMP has two components Manager and agent.


o The manager is a host that controls and monitors a set of
agents such as routers.
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

o It is an application layer protocol in which a few manager


stations can handle a set of agents.
o The protocol designed at the application level can monitor the
devices made by different manufacturers and installed on different
physical networks.Managers & Agents
o A manager is a host that runs the SNMP client program while
the agent is a router that runs the SNMP server program.
o Management of the internet is achieved through simple
interaction between a manager and agent.
o The agent is used to keep the information in a database while
the manager is used to access the values in the database. For
example, a router can store the appropriate variables such as a
number of packets received and forwarded while the manager can
compare these variables to determine whether the router is
congested or not.Management with SNMP has three basic ideas:
o A manager checks the agent by requesting the information
that reflects the behavior of the agent.
o A manager also forces the agent to perform a certain function
by resetting values in the agent database.An agent also contributes
to the management process by warning the manager regarding an
unusual condition.
4 Compare and Contrast the TCP/IP and OSI Reference Model CO1 NOV/DEC 2022
with the key factors of TCP/IP Protocol suite.
OSI refers to Open Systems Interconnection, whereas TCP/IP
refers to Transmission Control Protocol. OSI follows a vertical
approach, whereas TCP/IP follows a horizontal approach. OSI
model, the transport layer, is only connection-oriented,
whereas the TCP/IP model is both connection-oriented and
connectionless.
• OSI has 7 layers, whereas TCP/IP has 4 layers.
• The OSI Model is a logical and conceptual model that
defines network communication used by systems open to
interconnection and communication with other systems. On
the other hand, TCP/IP helps you to determine how a specific
computer should be connected to the internet and how you can
be transmitted between them.
• OSI header is 5 bytes, whereas TCP/IP header size is
20 bytes.
• OSI refers to Open Systems Interconnection, whereas
TCP/IP refers to Transmission Control Protocol.
• OSI follows a vertical approach, whereas TCP/IP
follows a horizontal approach.
• OSI model, the transport layer, is only connection-
oriented, whereas the TCP/IP model is both connection-
oriented and connectionless.
• OSI model is developed by ISO (International Standard
Organization), whereas TCP Model is developed by
ARPANET (Advanced Research Project Agency Network).
• OSI model helps you to standardize router, switch,
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

motherboard, and other hardware, whereas TCP/IP helps you


to establish a connection between different types of computers.
Characteristics of the OSI Model
Here are some important characteristics of the OSI model:
• A layer should only be created where the definite
levels of abstraction are needed.
• The function of each layer should be selected as per the
internationally standardized protocols.
• The number of layers should be large so that separate
functions should not be put in the same layer. At the same
time, it should be small enough so that architecture doesn’t
become very complicated.
• In the OSI model, each layer relies on the next lower
layer to perform primitive functions. Every level should able
to provide services to the next higher layer.
• Changes made in one layer should not need changes in
other lavers.
Characteristics TCP/IP Model
Here are the essential characteristics of the TCP/IP protocol:
• Support for a flexible architecture
• Adding more systems to a network is easy.
• In TCP/IP, the network remains intact until the source
and destination machines were functioning properly.
• TCP is a connection-oriented protocol.
• TCP offers reliability and ensures that data which
arrives out of sequence should put back into order.
• TCP allows you to implement flow control, so the
sender never overpowers a receiver with data.
• Difference between TCP/IP and OSI Model
• Here are some important differences between the OSI
and TCP/IP model:
OSI Model TCP/IP Model
It is developed by ISO (International Standard Organization)
It is developed by ARPANET (Advanced Research
Project Agency Network).
OSI model provides a clear distinction between interfaces,
services, and protocols. TCP/IP doesn’t have any clear
distinguishing points between services, interfaces, and
protocols.
OSI refers to Open Systems Interconnection.TCP refers to
Transmission Control Protocol.
OSI uses the network layer to define routing standards and
protocols. TCP/IP uses only the Internet layer.
OSI follows a vertical approach. TCP/IP follows a
horizontal approach.
Advantages of the OSI Model
Here are the major benefits/pros of using the OSI model:
AKSHAYA COLLEGE OF ENGINEERING AND TECHNOLOGY

• It helps you to standardize router, switch, motherboard,


and other hardware
• Reduces complexity and standardizes interfaces
• Facilitates modular engineering
• Helps you to ensure interoperable technology
Advantages of TCP/IP
Here, are pros/benefits of using the TCP/IP model:
• It helps you to establish/set up a connection between
different types of computers.
• It operates independently of the operating system.
• It supports many routing-protocols.
• It enables the internetworking between the
organizations.
Disadvantages of OSI Model
Here are some cons/ drawbacks of using OSI Model:
• Fitting of protocols is a tedious task.
• You can only use it as a reference model.
• It doesn’t define any specific protocol.
Disadvantages of TCP/IP
Here, are few drawbacks of using the TCP/IP model:
• TCP/IP is a complicated model to set up and manage.
• The shallow/overhead of TCP/IP is higher-than IPX
(Internetwork Packet Exchange).
• In this, model the transport layer does not guarantee
delivery of packets.

You might also like