0% found this document useful (0 votes)
18 views10 pages

Iat 1 Set A Answer Script

Uploaded by

Shruthi S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views10 pages

Iat 1 Set A Answer Script

Uploaded by

Shruthi S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

P.S.

V COLLEGE OF ENGINEERING AND TECHNOLOGY


(Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai)
Accredited by the NAAC with ‘A’ Grade
(Inclusion Under Section 2(f) & 12(B) of the UGC Act, 1956)
(An ISO 9001: 2015 Certified Institution)
Bangalore –Chennai Highway (NH-46)
Mittapalli, Balinayanapalli Post, Krishnagiri-635108

INTERNAL ASSESSMENT TEST- I


ANSWER KEY

SUBJECT : CS3591 – Computer Networks SEM/DEPT : V/IT


DURATION : 3 Hours (01:30 PM-4:30 PM) TOTAL MARKS : 100

PART A

1) Explain the purpose of protocol layering


The basic idea of a layered architecture is to divide the design into small pieces. That is, we may need to divide the
task between different layers, in which cas we need a protocol at each layer called protocol layering.
2) A source socket address is a combination of an IP address and a post number. Explain what each section
identifies.
A source socket address is a combination of an IP address and a port number. The IP address identifies the host or
computer on a network, while the port number identifies a specific process or service running on that host
3) Identify the difference between fully qualified and partially qualified domain name.
Fully Qualified Domain Name (FQDN): A FQDN is a domain name consisting of labels begins with the full name of
the host (challenger) and going back through each level to the root node. Example: challenger.atc.fhda.edu.
Partially Qualified Domain Name (PODN): A PQDN is a domain name that does not include all the levels between
the host and the root node. Example: challenger. (google search) The DNS client adds the suffix atc.fhda.edu., before
passing the address to the DNS serve
4) Summarize the idea of UDP
User datagram protocol (UDP) is a connectionless and unreliable TCP/P transport layer protocol. It does not add
anything to the services (flow &error control) of IP exXcept to provide process-t0-process communication instead of
host-to-host communication. Also, it performs very limited error checking using the checksum. UDP allow computers
to send data without needing to establish a virtual connection. The UDP packet is called a User datagram (or) UDP
segment.
5) Identify the techniques used to improve QOS in process-to-process delivery
The following techniques are used for achieving good quality of service,
() Packet scheduling.
(i) Traffic shaping.
(ii) Admission control.
(iv) Resource reservation.
6) List out the four basic network topologies
The four basic network topologies are
(i) Mesh. (ii) Star. (iii) Bus. (iv) Ring.
7) Why do we need POP3 or IMAP4 for E-mail?
SMTP is a push protocol: it pushes the messages fromn the client (user) to the server. n the final step, the user must
actually retrieve his or her messages from the mailbox, read them, reply to them, and possibly save a copy for future
reference. For an user to perform all these actions, he needs a pull protocol; the client must pull messages from the
server. Post Office Protocol, version 3 (POP3) and Internet Mail Access Protocol. version 4 (IMAP 4) are message
access protocols used for pulling messages from a mail server to client.
8) What is the need of congestion control?
Congestion control refers to the techniques and mechanisms that can either prevent congestion, before it happens or
remove congestion, after it has happened in a network. It maintains the load below the capacity.
9) Show how do fast retransmit mechanism of TCP works?
Fast retransmit is a modification to the congestion avoidance algorithm. As in Jacobson's fast retransmit
algorithm, when the sender receives 3rd duplicate ACK, it assumes that the packet is lost and retransmit that packet
without waiting for a retransmission timer to expire.
10) Classify the three-way handshaking?
A three-way handshake is a method used in a TCP/IP network to create a connection between a local host/client and
server. It is a three-step method that requires both the client and server to exchange SYN and ACK (acknowledgment)
packets before actual data communication begins.

PART B
11)a) Survey about the network types With neat sketch

A computer network is a group of computers linked to each other that enables the computer to communicate with another
computer and share their resources, data, and applications.

A computer network can be categorized by their size. A computer network is mainly of four types:

o LAN(Local Area Network)


o PAN(Personal Area Network)
o MAN(Metropolitan Area Network)
o WAN(Wide Area Network)

11)b) Classify the complexities in HTTP with suitable examples

o HTTP stands for Hypertext Transfer Protocol.


o It is a protocol used to access the data on the World Wide Web (www).
o The HTTP protocol can be used to transfer the data in the form of plain text, hypertext, audio, video, and so on.
Features of HTTP:
o Connectionless protocol: HTTP is a connectionless protocol. HTTP client initiates a request and waits for a
response from the server. When the server receives the request, the server processes the request and sends back
the response to the HTTP client after which the client disconnects the connection. The connection between client
and server exist only during the current request and response time only.
o Media independent: HTTP protocol is a media independent as data can be sent as long as both the client and
server know how to handle the data content. It is required for both the client and server to specify the content type
in MIME-type header.
o Stateless: HTTP is a stateless protocol as both the client and server know each other only during the current
request. Due to this nature of the protocol, both the client and server do not retain the information between various
requests of the web pages.

HTTP Transactions

o The above figure shows the HTTP transaction between client and server. The client initiates a transaction by
sending a request message to the server. The server replies to the request message by sending a response message.

Messages

HTTP messages are of two types: request and response. Both the message types follow the same message format.
Request Message: The request message is sent by the client that consists of a request line, headers, and sometimes a
body.

Response Message: The response message is sent by the server to the client that consists of a status line, headers,
and sometimes a body.

12.a) List the TCP/IP protocol suite with neat sketches


Functions of TCP/IP layers:
Following are the protocols used in this layer are:

IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire TCP/IP suite.

ARP Protocol

o ARP stands for Address Resolution Protocol.


o ARP is a network layer protocol which is used to find the physical address from the IP address.

ICMP Protocol

o ICMP stands for Internet Control Message Protocol.


o It is a mechanism used by the hosts or routers to send notifications regarding datagram problems back to the
sender.

Transport Layer

 The transport layer is responsible for the reliability, flow control, and correction of data which is being sent over
the network.
 The two protocols used in the transport layer are
 User Datagram protocol and Transmission control protocol.

Application Layer

o HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the data over the world
wide web. It transfers the data in the form of plain text, audio, video. It is known as a Hypertext transfer protocol
as it has the efficiency to use in a hypertext environment where there are rapid jumps from one document to
another.
o SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used for managing the
devices on the internet by using the TCP/IP protocol suite.
o SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that supports the e-mail is known as
a Simple mail transfer protocol. This protocol is used to send the data to another e-mail address.
o DNS: DNS stands for Domain Name System. An IP address is used to identify the connection of a host to the
internet uniquely. But, people prefer to use the names instead of addresses. Therefore, the system that maps the
name to the address is known as Domain Name System.
o TELNET: It is an abbreviation for Terminal Network. It establishes the connection between the local computer
and remote computer in such a way that the local terminal appears to be a terminal at the remote system.
o FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for transmitting the files
from one computer to another computer.

12. b) Define the working of E-mail in detail

E mail messages include three components, which are as follows:

o Message envelope: It depicts the email's electronic format.


o Message header: It contains email subject line and sender/recipient information.
o Message body: It comprises images, text, and other file attachments.

To send an email:
1. Compose a new message in your email client.
2. Enter the recipient’s email address in the “To” field.
3. Add a subject line to summarize the content of the message.
4. Write the body of the message.
5. Attach any relevant files if needed.
6. Click “Send” to deliver the message to the recipient’s email server.
7. Emails can also include features such as cc (carbon copy) and bcc (blind carbon copy) to send copies of the
message to multiple recipients, and reply, reply all, and forward options to manage the conversation.
The basic components of an email system are : User Agent (UA), Message Transfer Agent (MTA), Mail Box, and
Spool file. These are explained as following below.
1. User Agent (UA) : The UA is normally a program which is used to send and receive mail. Sometimes, it is called
as mail reader. It accepts variety of commands for composing, receiving and replying to messages as well as for
manipulation of the mailboxes.
2. Message Transfer Agent (MTA) : MTA is actually responsible for transfer of mail from one system to another.
To send a mail, a system must have client MTA and system MTA. It transfer mail to mailboxes of recipients if
they are connected in the same machine. It delivers mail to peer MTA if destination mailbox is in another
machine. The delivery from one MTA to another MTA is done by Simple Mail Transfer Protocol.

13) a) Briefly explain the DNS protocol with example.


o DNS stands for Domain Name System.
o DNS is a directory service that provides a mapping between the name of a host on the network and its numerical
address.
o DNS is required for the functioning of the internet.

DNS is a TCP/IP protocol used on different platforms. The domain name space is divided into three different sections:
generic domains, country domains, and inverse domain.

Label Description

com Commercial Organizations

edu Educational institutions

gov Government institutions

org Nonprofit Organizations


o Generic Domains
o Country Domain
o Inverse Domain
Working of DNS
o DNS is a client/server network communication protocol. DNS clients send requests to the. server while DNS
servers send responses to the client.
o Client requests contain a name which is converted into an IP address known as a forward DNS lookups while
requests containing an IP address which is converted into a name known as reverse DNS lookups.
o DNS implements a distributed database to store the name of all the hosts available on the internet.
o If a client like a web browser sends a request containing a hostname, then a piece of software such as DNS
resolver sends a request to the DNS server to obtain the IP address of a hostname. If DNS server does not contain
the IP address associated with a hostname, then it forwards the request to another DNS server. If IP address has
arrived at the resolver, which in turn completes the request over the internet protocol.

13. b) What are the role of POP3 in Electronic mail applications?

The POP protocol stands for Post Office Protocol. As we know that SMTP is used as a message transfer agent. When the
message is sent, then SMPT is used to deliver the message from the client to the server and then to the recipient server.
But the message is sent from the recipient server to the actual server with the help of the Message Access Agent. The
Message Access Agent contains two types of protocols, i.e., POP3 and IMAP.

How is mail transmitted?

What is POP3?

The POP3 is a simple protocol and having very limited functionalities. In the case of the POP3 protocol, the POP3 client
is installed on the recipient system while the POP3 server is installed on the recipient's mail server.

Let's understand the working of the POP3 protocol.


14)a) Explain the services offered by TCP to process at the application layer.

In TCP, the connection is established by using three-way handshaking. The client sends the segment with its sequence
number. The server, in return, sends its segment with its own sequence number as well as the acknowledgement sequence,
which is one more than the client sequence number. When the client receives the acknowledgment of its segment, then it
sends the acknowledgment to the server. In this way, the connection is established between the client and the server.

14)b) Plan in detail about Destination experiencing congestion (DEC) bit congestion avoidance
mechanism with neat sketch.
Dec Bit - Destination Experiencing Congestion Bit
➢ The first mechanism developed for use on the Digital Network Architecture (DNA).
➢ The idea is to evenly split the responsibility for congestion control between the routers and the end nodes.
➢ Each router monitors the load it is experiencing and explicitly notifies the end nodes when congestion is about to
occur.
➢ This notification is implemented by setting a binary congestion bit in the packets that flow through the router; hence
the name DECbit.
➢ The destination host then copies this congestion bit into the ACK it sends back to the source.
➢ The Source checks how many ACK has DEC bit set for previous window packets.
➢ If less than 50% of ACK have DEC bit set, then source increases its congestion window by 1 packet
➢ Otherwise, decreases the congestion window by 87.5%.
➢ Finally, the source adjusts its sending rate so as to avoid congestion.
Average queue length is measured over a time interval that includes the last busy + last idle cycle + current busy cycle. ➢
It calculates the average queue length by dividing the curve area with time interval.

15. a) Illustrate and explain UDP and its packet format.


The UDP is a connectionless protocol as it does not require any virtual circuit to transfer the data.
UDP also provides a different port number to distinguish different user requests and also provides the checksum capability
to verify whether the complete data has arrived or not; the IP layer does not provide these two services.

Features of UDP protocol


o Transport layer protocol
o Connectionless

In UDP, the header size is 8 bytes, and the packet size is upto 65,535 bytes. But this packet size is not possible as the data
needs to be encapsulated in the IP datagram, and an IP packet, the header size can be 20 bytes; therefore, the maximum of
UDP would be 65,535 minus 20. The size of the data that the UDP packet can carry would be 65,535 minus 28 as 8 bytes
for the header of the UDP packet and 20 bytes for IP header.

The UDP header contains four fields:


o Source port number: It is 16-bit information that identifies which port is going t send the packet.
o Destination port number: It identifies which port is going to accept the information. It is 16-bit information
which is used to identify application-level service on the destination machine.
o Length: It is 16-bit field that specifies the entire length of the UDP packet that includes the header also. The
minimum value would be 8-byte as the size of the header is 8 bytes.
o Checksum: It is a 16-bits field, and it is an optional field. This checksum field checks whether the information is
accurate or not as there is the possibility that the information can be corrupted while transmission. It is an optional
field, which means that it depends upon the application, whether it wants to write the checksum or not. If it does
not want to write the checksum, then all the 16 bits are zero; otherwise, it writes the checksum. In UDP, the
checksum field is applied to the entire packet, i.e., header as well as data part whereas, in IP, the checksum field is
applied to only the header field.

15)b) Explain congestion avoidance using random early detection in transport layer with an example.

The second mechanism of congestion avoidance is called as Random Early Detection (RED).
➢ Each router is programmed to monitor its own queue length, and when it detects that there is congestion, it notifies the
source to adjust its congestion window.
➢ RED differs from the DEC bit scheme by two ways:
a. In DECbit, explicit notification about congestion is sent to source, whereas RED implicitly notifies the source by
dropping a few packets.
b. DECbit may lead to tail drop policy, whereas RED drops packet based on drop probability in a random manner. Drop
each arriving packet with some drop probability whenever the queue length exceeds some drop level. This idea is called
early random drop.

PART C
16. Draw the OSI network architecture and explain the functionalities of each layer in detail.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization (ISO) in 1984, and it is now
considered as an architectural model for the inter-computer communications.

There are the seven OSI layers. Each layer has different functions. A list of seven layers are given below:

1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

16)b) How is congestion controlled? Explain in detail about congestion control technique in transport
layer.

Additive Increase/Multiplicative Decrease

TCP maintains a new state variable for each connection, called CongestionWindow , which is used by the source to limit
how much data it is allowed to have in transit at a given time. The congestion window is congestion control’s counterpart
to flow control’s advertised window. TCP is modified such that the maximum number of bytes of unacknowledged data
allowed is now the minimum of the congestion window and the advertised window.

Increment = MSS x (MSS/CongestionWindow)


CongestionWindow += Increment

slow Start

The additive increase mechanism just described is the right approach to use when the source is operating close to the
available capacity of the network, but it takes too long to ramp up a connection when it is starting from scratch. TCP
therefore provides a second mechanism, ironically called slow start, which is used to increase the congestion window
rapidly from a cold start. Slow start effectively increases the congestion window exponentially, rather than linearly.
Fast Retransmit and Fast Recovery

The idea of fast retransmit is straightforward. Every time a data packet arrives at the receiving side, the receiver responds
with an acknowledgment, even if this sequence number has already been acknowledged. Thus, when a packet arrives out
of order—when TCP cannot yet acknowledge the data the packet contains because earlier data has not yet arrived—TCP
resends the same acknowledgment it sent the last time. This second transmission of the same acknowledgment is called
a duplicate ACK. When the sending side sees a duplicate ACK, it knows that the other side must have received a packet
out of order, which suggests that an earlier packet might have been lost. Since it is also possible that the earlier packet has
only been delayed rather than lost, the sender waits until it sees some number of duplicate ACKs and then retransmits the
missing packet. In practice, TCP waits until it has seen three duplicate ACKs before retransmitting the packet.

You might also like