Iat 1 Set A Answer Script
Iat 1 Set A Answer Script
PART A
PART B
11)a) Survey about the network types With neat sketch
A computer network is a group of computers linked to each other that enables the computer to communicate with another
computer and share their resources, data, and applications.
A computer network can be categorized by their size. A computer network is mainly of four types:
HTTP Transactions
o The above figure shows the HTTP transaction between client and server. The client initiates a transaction by
sending a request message to the server. The server replies to the request message by sending a response message.
Messages
HTTP messages are of two types: request and response. Both the message types follow the same message format.
Request Message: The request message is sent by the client that consists of a request line, headers, and sometimes a
body.
Response Message: The response message is sent by the server to the client that consists of a status line, headers,
and sometimes a body.
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire TCP/IP suite.
ARP Protocol
ICMP Protocol
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data which is being sent over
the network.
The two protocols used in the transport layer are
User Datagram protocol and Transmission control protocol.
Application Layer
o HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the data over the world
wide web. It transfers the data in the form of plain text, audio, video. It is known as a Hypertext transfer protocol
as it has the efficiency to use in a hypertext environment where there are rapid jumps from one document to
another.
o SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used for managing the
devices on the internet by using the TCP/IP protocol suite.
o SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that supports the e-mail is known as
a Simple mail transfer protocol. This protocol is used to send the data to another e-mail address.
o DNS: DNS stands for Domain Name System. An IP address is used to identify the connection of a host to the
internet uniquely. But, people prefer to use the names instead of addresses. Therefore, the system that maps the
name to the address is known as Domain Name System.
o TELNET: It is an abbreviation for Terminal Network. It establishes the connection between the local computer
and remote computer in such a way that the local terminal appears to be a terminal at the remote system.
o FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for transmitting the files
from one computer to another computer.
To send an email:
1. Compose a new message in your email client.
2. Enter the recipient’s email address in the “To” field.
3. Add a subject line to summarize the content of the message.
4. Write the body of the message.
5. Attach any relevant files if needed.
6. Click “Send” to deliver the message to the recipient’s email server.
7. Emails can also include features such as cc (carbon copy) and bcc (blind carbon copy) to send copies of the
message to multiple recipients, and reply, reply all, and forward options to manage the conversation.
The basic components of an email system are : User Agent (UA), Message Transfer Agent (MTA), Mail Box, and
Spool file. These are explained as following below.
1. User Agent (UA) : The UA is normally a program which is used to send and receive mail. Sometimes, it is called
as mail reader. It accepts variety of commands for composing, receiving and replying to messages as well as for
manipulation of the mailboxes.
2. Message Transfer Agent (MTA) : MTA is actually responsible for transfer of mail from one system to another.
To send a mail, a system must have client MTA and system MTA. It transfer mail to mailboxes of recipients if
they are connected in the same machine. It delivers mail to peer MTA if destination mailbox is in another
machine. The delivery from one MTA to another MTA is done by Simple Mail Transfer Protocol.
DNS is a TCP/IP protocol used on different platforms. The domain name space is divided into three different sections:
generic domains, country domains, and inverse domain.
Label Description
The POP protocol stands for Post Office Protocol. As we know that SMTP is used as a message transfer agent. When the
message is sent, then SMPT is used to deliver the message from the client to the server and then to the recipient server.
But the message is sent from the recipient server to the actual server with the help of the Message Access Agent. The
Message Access Agent contains two types of protocols, i.e., POP3 and IMAP.
What is POP3?
The POP3 is a simple protocol and having very limited functionalities. In the case of the POP3 protocol, the POP3 client
is installed on the recipient system while the POP3 server is installed on the recipient's mail server.
In TCP, the connection is established by using three-way handshaking. The client sends the segment with its sequence
number. The server, in return, sends its segment with its own sequence number as well as the acknowledgement sequence,
which is one more than the client sequence number. When the client receives the acknowledgment of its segment, then it
sends the acknowledgment to the server. In this way, the connection is established between the client and the server.
14)b) Plan in detail about Destination experiencing congestion (DEC) bit congestion avoidance
mechanism with neat sketch.
Dec Bit - Destination Experiencing Congestion Bit
➢ The first mechanism developed for use on the Digital Network Architecture (DNA).
➢ The idea is to evenly split the responsibility for congestion control between the routers and the end nodes.
➢ Each router monitors the load it is experiencing and explicitly notifies the end nodes when congestion is about to
occur.
➢ This notification is implemented by setting a binary congestion bit in the packets that flow through the router; hence
the name DECbit.
➢ The destination host then copies this congestion bit into the ACK it sends back to the source.
➢ The Source checks how many ACK has DEC bit set for previous window packets.
➢ If less than 50% of ACK have DEC bit set, then source increases its congestion window by 1 packet
➢ Otherwise, decreases the congestion window by 87.5%.
➢ Finally, the source adjusts its sending rate so as to avoid congestion.
Average queue length is measured over a time interval that includes the last busy + last idle cycle + current busy cycle. ➢
It calculates the average queue length by dividing the curve area with time interval.
In UDP, the header size is 8 bytes, and the packet size is upto 65,535 bytes. But this packet size is not possible as the data
needs to be encapsulated in the IP datagram, and an IP packet, the header size can be 20 bytes; therefore, the maximum of
UDP would be 65,535 minus 20. The size of the data that the UDP packet can carry would be 65,535 minus 28 as 8 bytes
for the header of the UDP packet and 20 bytes for IP header.
15)b) Explain congestion avoidance using random early detection in transport layer with an example.
The second mechanism of congestion avoidance is called as Random Early Detection (RED).
➢ Each router is programmed to monitor its own queue length, and when it detects that there is congestion, it notifies the
source to adjust its congestion window.
➢ RED differs from the DEC bit scheme by two ways:
a. In DECbit, explicit notification about congestion is sent to source, whereas RED implicitly notifies the source by
dropping a few packets.
b. DECbit may lead to tail drop policy, whereas RED drops packet based on drop probability in a random manner. Drop
each arriving packet with some drop probability whenever the queue length exceeds some drop level. This idea is called
early random drop.
PART C
16. Draw the OSI network architecture and explain the functionalities of each layer in detail.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization (ISO) in 1984, and it is now
considered as an architectural model for the inter-computer communications.
There are the seven OSI layers. Each layer has different functions. A list of seven layers are given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
16)b) How is congestion controlled? Explain in detail about congestion control technique in transport
layer.
TCP maintains a new state variable for each connection, called CongestionWindow , which is used by the source to limit
how much data it is allowed to have in transit at a given time. The congestion window is congestion control’s counterpart
to flow control’s advertised window. TCP is modified such that the maximum number of bytes of unacknowledged data
allowed is now the minimum of the congestion window and the advertised window.
slow Start
The additive increase mechanism just described is the right approach to use when the source is operating close to the
available capacity of the network, but it takes too long to ramp up a connection when it is starting from scratch. TCP
therefore provides a second mechanism, ironically called slow start, which is used to increase the congestion window
rapidly from a cold start. Slow start effectively increases the congestion window exponentially, rather than linearly.
Fast Retransmit and Fast Recovery
The idea of fast retransmit is straightforward. Every time a data packet arrives at the receiving side, the receiver responds
with an acknowledgment, even if this sequence number has already been acknowledged. Thus, when a packet arrives out
of order—when TCP cannot yet acknowledge the data the packet contains because earlier data has not yet arrived—TCP
resends the same acknowledgment it sent the last time. This second transmission of the same acknowledgment is called
a duplicate ACK. When the sending side sees a duplicate ACK, it knows that the other side must have received a packet
out of order, which suggests that an earlier packet might have been lost. Since it is also possible that the earlier packet has
only been delayed rather than lost, the sender waits until it sees some number of duplicate ACKs and then retransmits the
missing packet. In practice, TCP waits until it has seen three duplicate ACKs before retransmitting the packet.