Cse 325
Cse 325
CHAPTER:1
1. Definition:
● TDM- A technique that divides time into slots and assigns each channel
a unique time slot, allowing multiple signals to share the same media
sequentially.
● Loss- refers to the dropping of packets that are queued in a router’s
buffer while awaiting transmission. Packet loss occurs when the queue
length increases because the arrival rate of packets exceeds the
oservice rate.
● Delay: is the total time taken for a packet to travel from the source to
the destination.
● Throughput:is the rate at which data (in bits per time unit) is
successfully sent from the sender to the receiver over a network.
● IP spoofing: when someone sends data over the internet using a fake
IP address to hide their identity or pretend to be someone else.
1. Connection setup: One person calls, and the other picks up and says
"Hello" — similar to the TCP handshake.
2. Data exchange: They start talking back and forth, taking turns — like
exchanging packets in TCP.
3. Connection termination: When finished, they say "Goodbye" and hang
up — like the TCP connection teardown.
Coaxial Cable:
Coaxial cable consists of two concentric copper conductors, with one acting
as the core and the other as a surrounding shield. This design allows for
bidirectional communication and supports broadband transmission, where
multiple frequency channels can be transmitted over the same cable. Coaxial
cables are capable of delivering hundreds of Mbps per channel, making them
suitable for cable television and internet connections.
Fiber optic cables use glass fibers to carry data as light pulses, where each
pulse represents a bit. They support high-speed, point-to-point
transmission at speeds of tens to hundreds of Gbps. Fiber optic cables also
have a low error rate, as they can be spaced far apart with minimal need for
repeaters, and they are immune to electromagnetic interference, making
them ideal for long-distance and high-speed data transmission.
4. What is store and forwarding in packet switch?
Store and Forwarding in packet switching means a router must receive and
store the entire packet before forwarding it to the next link.
● Application Layer:
The Application Layer provides network services to user
applications, managing protocols like HTTP and FTP. It
handles data formatting, encryption, and session
management to ensure user-friendly communication.
● Transport Layer:
The Transport Layer ensures reliable end-to-end
communication by segmenting data into packets and
providing error detection and correction. It uses
protocols such as TCP for reliability and UDP for
faster, connectionless communication.
● Network Layer:
The Network Layer determines the best path for data transmission,
managing IP addressing and routing between networks. It is
responsible for packet forwarding and fragmentation to efficiently
reach the destination.
● Data Link Layer:
The Data Link Layer facilitates node-to-node data transfer, ensuring
error detection and correction over a link. It frames data into packets
called frames and manages access to the physical medium, using MAC
addressing for correct delivery.
● Physical Layer:
The Physical Layer transmits raw bitstreams over physical media,
defining the electrical, optical, or radio signals used. It specifies
hardware standards, including voltage levels and connectors, to enable
data transmission between devices.
11.What is an application-layer message? A transport-layer segment? A
network-layer datagram? A link-layer frame?
The transport layer takes the application message M and adds a transport
header Htto it, forming a segment [Ht∣M]
1. Details
Client-Server Architecture
Characteristics:
Cookies
Cookies are small data files stored on a client’s device by a web server to
maintain state across HTTP sessions. They enable functionalities like
authentication, shopping carts, and personalized experiences by retaining
information about user interactions. However, cookies also raise privacy
concerns, especially with third-party tracking cookies, which can collect data
across multiple sites.
Web Caches
Non-Persistent HTTP:
Persistent HTTP:
Mail Servers
SMTP uses ASCII commands and server responses include status codes,
ensuring clear and reliable email transmission.
BitTorrent
BitTorrent is a popular P2P protocol for sharing large files by dividing them
into smaller pieces, or "chunks," that peers can download from each other
simultaneously. Peers obtain a list of available chunks from a central tracker,
and as they download chunks, they also share them with others. This
collaborative distribution reduces strain on individual servers and speeds up
file-sharing processes.
CDNs are networks of distributed servers that store and deliver web
content to users from locations closer to them geographically. This
minimizes latency and increases the speed of content delivery, making CDNs
ideal for video streaming and web traffic management for services like
Netflix and YouTube, especially at scale.
Video Streaming
Netflix works by storing copies of content (like "Mad Men") on its global
OpenConnect Content Delivery Network (CDN) nodes. When a subscriber
requests a show or movie, Netflix provides a manifest file that lists available
sources for the requested content. The client device uses this manifest to
retrieve content at the highest quality that the network can support. If the
network path is congested, the client may select a different bitrate or even
a different copy of the content from another server, ensuring smooth
playback.
CDN Challenges
Solutions
Streaming stored video faces several challenges, especially given that video
streaming accounts for around 80% of Internet traffic. The main issues are:
When Alice sends an email to Bob, she uses her User Agent (UA) to compose
the message and sends it to her mail server via SMTP, placing it in the
message queue. Alice's mail server then establishes a TCP connection to
Bob's mail server, transmitting the message using SMTP. Bob's mail server
receives the email and stores it in Bob's mailbox. Later, Bob uses his own UA
to retrieve and read the email. This process demonstrates the SMTP
protocol's role in transferring emails between servers.
10.Components of Email
1. User Agents: Applications (e.g., Outlook, iPhone mail) that allow users
to compose, edit, and read emails. They manage the user's mailbox for
incoming and outgoing messages.
2. Mail Servers: Servers that store incoming messages in user mailboxes
and manage outgoing messages in a queue. They facilitate email
transmission.
3. Simple Mail Transfer Protocol (SMTP): A protocol used by mail
servers to send emails, enabling communication between the sending
and receiving servers.
11.
12. Write down how web caches work. Why we need web caching?
1. Client Request: The client sends an HTTP request to the web cache
instead of the origin server.
2. Cache Check:
○ If the resource is cached, the cache serves the stored content
directly to the client.
○ If not, the cache forwards the request to the origin server.
3. Origin Server Response: The origin server sends the response back to
the cache, which stores it for future requests and relays it to the
client.
4. Subsequent Requests: Future requests for the same resource are
served directly from the cache.
13.. What cookies can be used for? Why people don’t want to accept
cookies from unknown websites.
Cookies are small pieces of data stored on a user's device by a web browser,
and they serve several purposes, including authorization, managing shopping
carts, providing personalized recommendations, and maintaining user session
states (such as for web email). However, many people are hesitant to accept
cookies from unknown websites due to privacy concerns. Cookies can enable
websites to gather extensive information about users’ browsing habits, and
third-party persistent cookies (tracking cookies) can track user identities
across multiple sites, raising issues related to data privacy and security.