0% found this document useful (0 votes)
22 views5 pages

Acn W

Uploaded by

aayushsawant511
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views5 pages

Acn W

Uploaded by

aayushsawant511
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Acn w-22:

1. Explain type of timer in tcp ?


Ans: Tcp uses Several timer to ensure Excessive Delays are not encountered during communication
Sever these timer are elegant and handling problem:
Retransmission Timer :
To retransmit lost segment tcp uses retransmission timeout when tcp send a segment he timer start
to stop acknowledgement is received it the timer expires time out occurs and the segment is
retransmitted

Presistance Timer:
To deal with zero window size deadlock situation tcp uses presistance timer when a sending tcp
received an acknowledgment with a window size of zero when a presistance timer goes off the
sending tcp sends a special segment called a probe

Keepalive :
A keepalive timer is used to prevent a long idle connection between tcp if a client open a tcp
connection to a server transfer some data and become silent the client will crash in that case the
connectionn remain forever so a keepalive timer is used

Time wait :
These timer is used during connecction termination the timer start after sending the last ack for 2nd fin
and closing the connection

2. Draw and explain tcp segment structure ?


Ans: Source address : These 16 bit field hold the port address of application that is sending data
segment
Destination address : These 16 bit field hold the port address of application that is Receiving data
Segment
Sequence Number:These 32 bit field hold the sequence number I.e the byte number of first byte that
is send to a perticular segment
Acknowledgement no:These 32 bit field hold the acknowledgement I.e it is an acknowledgement of
the previous bytes being received sucessfully
Hardware Length:These 4 bit field defines the length of the tcp header
Reserved: these 6 bit field reserved for future used
Control flag:
Window Size: this field define the window size of tcp in bytess
Checksum : this field hold checksum for error detection and it is and mandatory in tcp
Urgent pointer : this field is used to point data that are urgently required that need to reach the
receiving process at the earliest
Option:this 40 byte of optional info in the tcp header

Define www? Explain the static and dynamic web document ?


An www is an collection of millions of files stored on thousands of server all over the world
These files represents as document , picture ,video, sound and program
A document on web is called as webpages and identified by and unique address called url
The web pages is also know as html document There are two types of document :
Static and dynamic
Static document:
The content of static document are fixed these content are created and stored in the server
If required the client can get and copy of static document
The content of static document are determined when it is created
User cannot do any modification or interaction with info of static web pages

Dynamic Web pages : is an web pages which web content varies based on the parameter provide by
the user or a computer
Whenever a request arrives the web server run an application program or a script that create and
dynamic document

Explain the working of ssh?


Ans:Ssh is the most popular remote login application ssh Is more secure and provide more services
than telnet
Ssh is cryptograhic network protocol for operating network services securely over an unsecured
network
Ssh used client server architecture in its implementation a ssh server can deployed and allow serveral
ssh client to connect to it
SSh provide a secure channel over unsecured network in a client server architecture connnecting ssh
client application with ssh server there protocol has two version ssh -1 and ssh-2
Ssh protocol is a specification of how to conduct secure communication over a network the ssh
protocol cover authentication , encryption ,and integrity of data transmitted

Describe email security over non-secure technique?


An email is perhaps the most popular used system for exchanging business information over internet
The basic level email process are divided into two principle:
Mail server: Which are host that diliver , forward , and store -email
Mail client: A interface with user an allow user to read ,compose ,send and store email

Mail server and user workstation running mail client are frequently targeted by atttacker because the
computer and networking technology is well understood by many attacker and devlop attack method
to exploid security weaknesses
Mail server are also get targeted because they communicate with some third party application
Additionally mail client have been targeted as effective menas of inserting malware into machnie and
propagating the code to another machine as a result mail server ,mail client and network
infrasturcture that are supported them must be protected

There are three principle that are directly apply on email security:
Confidentiality : Of mail making sure it is protected from unauthorized access
Integrity : of mail involves a gurantee that is has not been modified or destroyed by an unauthorized
indiviual
Availablity of email: Involves esnsuring that the mail server remain on line and able to services user
community

Explain the bgp3 in detail?


Bgp is an exterior gateway protocol for communication between router in different as bgp is based
on routing method called path vector
Bgp is an Inter domain routing protocol using path vector routing the current version of bgp is version
4
Any exchange of routing information between two router in different routing domain know as a.s take
place in session a session is a connection establishment between two bgp router only for sake of
exchanging routing info
There are mainly two type of session of two types:
External
Internal

External session in bgp is used to exchange info between two speaker node belonging two different as

Internal session in bgp is used to excahnge info inside two speaker node belonging to diffentn as
Packet format

Type: This field is a 8 bit long and it state what is the type of packet and what type of info contained in
the packet there are five different types of message define by interenet engineering task for are 1-
opne 2-update 3:notification 4 :keepalive

Length: This field is 2 byte long show the total length of bgp message including the bgp header

Marker: The remaining 16 byte of bgp header is marker field this is used to authenticate bgp if no
authentication info is assigned or contained in the field then the marker set all ones

Message:
Open message: after the transport protocol connection is establish the first message sent by each side
is an open message if a open message is acceptable a keep alive message confirming the open is send
back once open is confirm update, keepalive , and notificaton message

Update message: update message is used to transfer routing info between peer

Notification message: a notification message is sent when a error condition is detected

Keepalive message: Bgp does not use any transport based keepalive to determine if peer are
rechangeable instead keepalive messge are exchange between peer often

List intra domain multicast protocol expalin any one?


Ans : the following three protocol play major roles in establishment of multicast connection :
1. Multicast distance vector
2. Multicast link state
3. Protocol independent multicast

Multicast distance vector:


Distance vector routing when extended to support multicast is called as distance vector multicast
routing protocol
The dvmrp is an multicast routing protocol that takes the routing decision based upon the source
address of the packet this algorithm consturct a routing tree for a network

The dvmrp protocol must achieve the following task


It must prevent the formation of loop in a network
It must prevent the formation of duplicate packet
It should provide dynamic membership

Describe the flow control of sctp ?


Ans : Flow control is similar to that of tcp we,need to deal with the unit of data the byte while while in
sctp we need to handle two unit of data the byte and chunks

Reciever Side:
In sctp the reciever has one queue and three variable The queue hold the received data chunks that
has not been read by the queue process

The first variable hold the last tsn received cumTsn the second variable hold the available Queue size ,
winsize the third vairable hold the last acknowledgement , lastACK

Sender Side:
The sender has three variable curtsn , rwnd , and transit variable and one queue as show in the
diagram
The queue carrries the chunks generated by a process which have ready to be send or have send

The first variable carries curtsn which is refer to next chunks which is to be send the second variable
rwnd contain the last advertised value by a reciever in byte the transit hold number of byte in transit

What is mobile Ip? List and explain compononent of mobile ip ?


Mobile ip is an communication protocol that allow user to move from one network to another with
the same ip address mobile ip was designed to allow mobile device to move from one network to
another while maintaining a permanent ip

Component of Mobile Ip:

Mobile node(MN): Mobile node is an hand held communication device these device such as cell
phones pd or laptop whose software enable network roaming capablities

Home Agent(HA): It is an router on a home network serving as an anchor point for communication
mobile node it tunnel packet from a device on internet to a roaming mobile node

Foreign Agent(FA):it is an router that may function a point of attachment for mobile node when it
roam into foreign network dilivering packet form home agent to mobile node

Corresponding Node : Corresponding node is an device on the internet to communication to a mobile


node

Give the used of ospf with its reason?


Ans:Link state routing protocol like ospf is that complete knowledge of an topology all router to
calculate route that satisfy perticular critiria this can be usefull for traffic engineering purpose where
router can be contrained to meet perticular quality of service requirement

To handle routing efficiently and on time , this protocol divides autonomous system into area

Area identification : It define the area within the routing takes places

Ospf calculate the shortest route to a destination through network based on an algorithm it uses
dijiksha algorithm to calculate short path

State the significance of followig related ipv6??

Autoconfiguration:
Nodes that are connect to a network and automatically generate global ipv6 address without need for
manaul configuration

When a host ipv6 join a network it can configure itself using a following step :
Generate link local address: The host create and address with specfic prefix and 64 bit identifier from
its hardware
Test Uniqueness: it check for uniqueness using neighbour solication message
Assign address: if unique it assign the link local address for local communication
Contact router : the host listen or request guidance from the router
Configure global address: the host form a global address with router specific prefix
Renumbering :

You might also like