0% found this document useful (0 votes)
5 views

Module - 4 VIVA

Uploaded by

vsonavane614
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Module - 4 VIVA

Uploaded by

vsonavane614
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Module_4 VIVA

Q1] TCP and UDP


Ans.
● TCP Definition:
○ Transmission Control Protocol (TCP) focuses on establishing a connection
before sending data packets (datagrams) & guaranteeing delivery.

● UDP Definition:
○ User Datagram Protocol (UDP) focuses on sending data packets
(datagrams) quickly without establishing a connection beforehand or
guaranteeing delivery.
○ UDP prioritises speed over reliability

● UDP (Analogy):

○ You write your message on a piece of paper (data) and put it in a box
(datagram).
○ You address the box to your friend's house (destination IP address and
port) and toss it over the fence (send the datagram without a handshake).
○ You don't wait for confirmation that your friend received it (no guaranteed
delivery).
● TCP (Analogy for comparison):

○ You call your friend (establish a connection) and ask for their address
(confirm destination).
○ You carefully pack your message in a box (data in datagram) and wrap it
securely (guaranteed delivery).
○ You hand-deliver the box to your friend's door (send the datagram with a
handshake) and wait for confirmation (receive acknowledgement).

Key Characteristics of UDP | Key Characteristics of UDP

1. Connectionless | 1. Connection oriented


2. Unreliable | 2. Reliable
3. Faster | 3. Slower
4. Lower Overhead | 4. Higher Overhead
Q2] Explain TCP Error Control, TCP Congestion Control & TCP Timers
Ans.
1. TCP Error Control:

TCP focuses on detecting and correcting errors that may occur during data
transmission. Here's how it works:

● Checksum: Each TCP segment (data packet) includes a checksum calculated


by the sender. The receiver recalculates the checksum and compares it. Any
mismatch indicates data corruption.
● Sequence Numbers: Each segment carries a unique sequence number,
allowing the receiver to identify missing segments and reassemble data in the
correct order.
● Acknowledgments (ACKs): The receiver sends ACKs to confirm successful
reception of segments. If a segment is missing or corrupt, no ACK is sent.
● Negative Acknowledgments (NACKs): Not explicitly used in TCP. However, the
absence of an ACK for a specific sequence number implies a missing segment,
triggering retransmission.

2. TCP Congestion Control:

The internet is a shared resource, and congestion can occur when too much data floods
the network. TCP congestion control mechanisms aim to prevent network overload and
maintain efficient data flow. Here are the key strategies:

● Slow Start: When a connection is established, TCP starts slowly, sending a


limited number of segments. It gradually increases the sending rate as long as
ACKs are received without timeouts.
● Congestion Window: This window dynamically adjusts the amount of data the
sender can transmit without waiting for ACKs. Initially small, it grows with
successful transmissions but shrinks when congestion is detected.
● Congestion Detection: TCP infers congestion based on timeouts (no ACK
received within a time limit) or receiving multiple duplicate ACKs (indicating
dropped packets).

3. TCP Timers:

TCP relies on various timers to manage data transmission and retransmission:

● Retransmission Timer (RTO - Retransmission Timeout): This timer starts


when a segment is sent. If no ACK is received within the RTO interval, the
segment is considered lost and retransmitted. The RTO value is dynamic and
adapts based on network conditions.
● Persist Timer: Ensures that the sender keeps sending window size information
periodically, even if there's no data to transmit. This prevents the receiver's
window from shrinking to zero and stalling communication.
● KeepAlive Timer: Used to detect a crashed or unresponsive receiver. The
sender sends periodic keep-alive probes. If no response is received after a
predefined time, the connection is terminated.

In conclusion, TCP's combination of error control, congestion control, and timers


guarantees reliable and efficient data delivery over often unreliable networks.

Q3] Session Layer protocol - Remote Procedure Call (RPC)

Ans

● RPC, or Remote Procedure Call, is a session layer protocol that lets programs on
different computers talk to each other like they're on the same one.
● Imagine you're at a restaurant (client) and want to order food (use a service) from
the kitchen (server). You don't yell your order across the room. Instead, you tell
the waiter (RPC) what you want. The waiter relays your order (arguments) to the
kitchen (server) and brings back your food (return value).

You might also like