Computer Networks
Computer Networks
MCQ’S
Syntax(Y)
Semantics(N)
Formatting(N)
Automatic(N)
Half-duplex(N)
Communication between a
computer and a keyboard
2
defines ______________ Full-duplex(N)
transmission.
Simplex(Y)
Path(N)
Medium(Y)
Route(N)
Protocols(Y)
A _________ defines a set of
4 rules that governs data
communication.
Standards(N)
RFCs(N)
Servers(N)
Unipoint(N)
Multipoint(Y)
Simplex(N)
computer network(N)
distributed system(Y)
When collection of various
computers seems a single
6
coherent system to its client, networking system(N)
then it is stated as _________
mail system(N)
broadcast network(Y)
unicast network(N)
Communication channel is
9 shared by all the machines on
the network in ________ multicast network(N)
anycast network(N)
bridge(N)
A __________ is stated as a
firewall(N)
device that forwards packets
between networks by
10
processing the routing
information included in the router(Y)
packet.
hub(N)
5(Y)
7(N)
10(N)
Application layer(N)
Presentation layer(N)
Which of the following layers is
14 an addition to OSI model when
compared with TCP IP model?
Session layer(N)
NIC(N)
Packet Transport(N)
Data compression(N)
Data encryption(N)
Application layer(N)
Session layer(Y)
Link layer(N)
Added(N)
Rearranged(N)
Randomized(N)
session layer(Y)
transport layer(N)
network layer(N)
network layer(N)
transport layer(Y)
State the layer that is
responsible for process to
22
process delivery in a general session layer(N)
network model?
physical address(N)
logical address(N)
specific address(N)
network layer(N)
physical layer(Y)
transport layer(N)
bit-by-bit delivery(Y)
digital modulation(Y)
amplitude modulation(N)
phase modulation(N)
analog modulation(N)
digital modulation(N)
A single channel is shared by
multiple signals by the
28
mechanism stated as multiplexing(Y)
____________
phase modulation(N)
radio waves(N)
Wireless transmission of
29 signals can be done via
___________
microwaves(N)
infrared(N)
network layer(N)
The physical layer translates
logical communication
30
requests from the ______ into transport layer(N)
hardware specific operations.
application layer(N)
CDMA(N)
collision detection(Y)
Star(N)
Mesh(N)
Bus(Y)
LAN(Y)
WAN(N)
Data communication system
spanning states, countries, or
35
the whole world is stated as MAN(N)
________
PAN(N)
Seconds(N)
Bits(N)
FDM(Y)
TDM(N)
_____ states the multiplexing
technique that shifts each
37
signal to a different carrier Both FDM and TDM(N)
frequency.
PDM(N)
32kbps(Y)
500bps(N)
If link transmits 4000frames per
second, and each slot has 8
38 bits, the transmission rate of
circuit this TDM is recorded as 500kbps(N)
_________
32bps(N)
Greater than(Y)
Lesser than(N)
In TDM, the transmission rate
of a multiplexed path is always
39 _______ the sum of the
transmission rates of the Equal to(N)
signal sources.
Transmission delay(N)
3.2(Y)
320(N)
Processing delay(Y)
Queuing delay(N)
The time required to examine
the packet’s header and
42
determine where to direct the Transmission delay(N)
packet is part of __________
Propagation delay(N)
50Mbps(N)
Packet length(N)
Bandwidth of medium(N)
Packet length(N)
Transmission rate(N)
network layer(Y)
physical layer(N)
The data link layer takes the
packets from _________ and
46
encapsulates them into frames transport layer(N)
for transmission.
application layer(N)
framing(N)
Predict the following tasks is
47
not done by data link layer?
error control(N)
flow control(N)
channel coding(Y)
synchronization bytes(N)
addresses(N)
burst error(Y)
When 2 or more bits in a data
unit has been changed during
51
the transmission,the error inverted error(N)
reported as ____________
double error(N)
ethernet(N)
CSMA/CD(N)
CSMA/CA(N)
Select the one from the
following as the multiple
53
access protocol for channel Both CSMA/CD & CSMA/CA(Y)
access control?
HDLC(N)
piggybacking(Y)
Packet is lost(N)
Packet is corrupted(N)
Retransmission of packets
must not be done when
56
_______. Predict the correct Packet is needed(N)
option.
Packet is error-free(Y)
Closed-Loop control
Prevent before congestion occurs(N)
mechanisms try to report
_________
Pure ALOHA(N)
Slotted ALOHA(Y)
Select the multiple access
protocol that uses time slots to
60
divide the transmission time CSMA/CD(N)
into fixed intervals?
CSMA/CA(N)
Hamming code(N)
Parity bit(N)
Hamming code(N)
Parity bit(N)
Stop-and-Wait ARQ(N)
Go-Back-N ARQ(N)
Identify the error control
protocol that retransmits only
66
the packets that are corrupted Selective Repeat ARQ(Y)
or lost during transmission?
Sliding Window(N)
Pure ALOHA(N)
Select the medium access
68 protocol that is commonly
used in Ethernet networks? Slotted ALOHA(N)
CSMA/CD(Y)
CSMA/CA(N)
Hamming code(Y)
CRC(N)
Parity bit(N)
Stop-and-Wait ARQ(N)
Go-Back-N ARQ(N)
Sliding Window(Y)
75 Pure ALOHA(Y)
Slotted ALOHA(N)
CSMA/CA(N)
Simpler implementation(N)
Error reporting(Y)
Flags(N)
Offset(N)
Identifier(N)
TCP(N)
UDP(Y)
If the value in protocol field is
17, the transport layer protocol
81
used is estimated as
_____________ ICMP(N)
IGMP(N)
is connectionless(N)
complicates routers(N)
Ips(N)
Blocks(Y)
Sizes(N)
Class Network(N)
Organization(Y)
Codes(N)
Organized(N)
Blocked(N)
Communicated(N)
Routing(N)
Mask(N)
Classless Addressing(N)
4 bytes(N)
128 bits(Y)
100 bits(N)
broadcast(Y)
IPv6 does not use _________
89 type of address. Select the
correct answer. multicast(N)
anycast(N)
unicast(N)
Fragmentation(N)
Header checksum(N)
Anycast address(Y)
Isolated router(N)
Isolated mask(N)
Isolated net(N)
255.255.255.252(N)
255.255.255.255(N)
If you wanted to have 12
subnets with a Class C network
95
ID, Select the subnet mask 255.255.255.240(Y)
would you use?
255.255.255.248(N)
Host number(N)
Static subnetting(Y)
Dynamic subnetting(N)
Ethernet(N)
Gigabyte Ethernet(N)
ii only(N)
14(N)
30(Y)
255.255.255.192(N)
255.255.255.224(Y)
You need to subnet a network
into 5 subnets, each with at
101 least 16 hosts. Select the
255.255.255.240(N)
classful subnet mask would
you use?
255.255.255.248(N)
4(N)
5(Y)
172.16.112.0(Y)
172.16.0.0(N)
If an Ethernet port on a router
were assigned an IP address of
103 172.16.112.1/25, what would be
the valid subnet address of this 172.16.96.0(N)
host?
172.16.255.0(N)
6(Y)
32(N)
172.16.36.0(N)
172.16.0.0(N)
60(Y)
90(N)
30(N)
EIGRP(N)
Every 30 seconds(Y)
Every 60 seconds(N)
Show IP route(N)
Debug IP rip(Y)
Debug IP route(N)
0(N)
90(N)
1(Y)
IEGRP(N)
RIP(Y)
IP(N)
0(N)
116
90(N)
130(N)
Connection-oriented(N)
Unreliable(Y)
Stream of bytes(Y)
Sequence of characters(N)
Packets(N)
Packets(N)
Buffers(Y)
TCP process may not write and
read data at the same speed.
121
So we need __________ for Segments(N)
storage.
Stacks(N)
Packet(N)
Buffer(N)
Stack(N)
Semi-duplex(N)
Byte by byte(N)
Packet(N)
Buffer(N)
To achieve reliable transport in
TCP, ___________ is used to
124
check the safe and sound Segment(N)
arrival of data.
Acknowledgment(Y)
Byte number(Y)
Buffer number(N)
Acknowledgment(N)
12001(N)
11001(N)
Fixed number(N)
16 and 32 bytes(N)
16 and 32 bits(N)
20 and 60 bits(N)
Forwarding(N)
Synchronization(N)
Active open(N)
Active close(N)
The server program tells its
TCP that it is ready to accept a
131
connection. This process is Passive close(N)
indicated as ___________
Passive open(Y)
Active open(Y)
Passive open(N)
Mutual open(N)
In Three-Way Handshaking
process, the situation where Mutual Close(N)
133
both the TCP’s issue an active
open is ___________
Simultaneous open(Y)
Simultaneous close(N)
Denial-of-service attack(N)
Active attack(N)
Denial-of-service attack(Y)
Sequence number(N)
Acknowledgment number(Y)
Identify the field that allows
TCP to detect lost segments
137 Checksum(N)
and in turn recover from that
loss?
Connection-oriented(Y)
Unreliable(N)
Low overhead(N)
String of characters(Y)
String of integers(N)
More overload(N)
Reliable(N)
Fast(N)
161(N)
123(N)
124(Y)
8 bytes(Y)
8 bits(N)
124 bytes(N)
NTP(N)
144
Echo(N)
Client(Y)
Only data(N)
udp header(N)
source port(N)
destination port(N)
AH(Y)
ESP(N)
SSL(N)
source authentication(N)
data integrity(N)
error control(Y)
confidentiality(N)
integrity(Y)
In computer security _______
express that computer system
150
assets can be modified only by availability(N)
authorized parities.
authenticity(N)
confidentiality(Y)
In computer security _______
151 express that the information in
a computer system only be
integrity(N)
accessible for reading by
authorized parities.
availability(N)
authenticity(N)
Bus Topology: Bus Topology is a network type in which every computer and network
device is connected to a single cable. It
is bi-directional. It is a multi-point
connection and a non-robust topology
because if the backbone fails the
topology crashes. In Bus Topology,
various MAC (Media Access Control)
protocols are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA,
Slotted Aloha, etc.
Text: Represented using encoding standards like ASCII or Unicode, which map
characters to numerical values. It ensures interoperability across different platforms
and languages.
Numbers: Represented in binary format using fixed or floating-point notation. Binary
encoding is critical for mathematical operations and efficient storage.
Images: Encoded in formats like JPEG, PNG, or GIF, using compression techniques
to reduce size while maintaining quality.
Audio: Represented as digital signals through sampling and quantization of analogy
sound waves. Common formats include MP3, WAV, and AAC, using codecs to
compress data.
Video: Combines image and audio data, represented as a sequence of frames with
synchronized audio. Formats like MP4, AVI, and MKV employ codecs like H.264 for
compression.
Structured Data: Includes formats like XML, JSON, or YAML, used for data exchange
between applications in a human-readable form.
Encrypted Data: Represented as ciphered text using encryption algorithms to ensure
data confidentiality during transmission.
Cyclic Redundancy Check (CRC) is a powerful error detection technique used in digital
networks and storage devices to ensure data integrity. It detects errors in data
transmission by comparing the transmitted data with a calculated checksum value.
Here's how CRC works step by step:
Acknowledgment (ACK) for Each Packet: Every packet sent by the sender is
acknowledged by the receiver.
Timeout and Retransmission: If the sender does not receive an acknowledgment
within a set timeout period, it assumes the packet was lost or corrupted and retransmits
the packet.
Error Detection: Although not directly part of the Stop-and-Wait protocol itself, error
detection mechanisms are typically used in conjunction with this protocol.
Flow Control: By sending one packet at a time and waiting for an acknowledgment
before sending the next, the protocol ensures that the receiver is not overwhelmed with
too much data at once. This helps manage data flow and prevents buffer overflow at
the receiver.
Error Detection: The minimum Hamming distance between any two valid codewords
in a code is an important metric for error detection. A larger Hamming distance allows
the detection of more errors.
Error Correction: The ability to correct errors is also determined by the Hamming
distance. A code with a minimum Hamming distance of d can correct up to (d - 1) / 2
errors.
Parity Check: A single parity bit is added to the data to ensure that the total number
of 1s is either even (even parity) or odd (odd parity).
Checksum: The data is divided into fixed-size blocks, and their sum is calculated. This
sum, called the checksum, is transmitted with the data.
Cyclic Redundancy Check (CRC): Treats the data as a binary number and divides it
by a fixed polynomial. The remainder (CRC) is appended to the data.
Longitudinal Redundancy Check (LRC): Data is organized in rows, and a parity bit
is calculated for each column. These parity bits form a separate row.
Hamming Code: Adds redundant parity bits to data, allowing detection and correction
of single-bit errors.
Path Lookup: The routing table contains entries specifying possible destinations
(network addresses) and the associated paths.
Decision-Making: The table lists several key attributes for each route.
Destination Network: The target network or host.
Next Hop: The IP address of the next router or gateway along the path.
Metric: A value indicating the cost or distance to the destination (e.g., hop
count, bandwidth).
Interface: The router's local interface to send the packet through. These details
help the router make informed forwarding decisions.
Efficient Traffic Flow: By maintaining up-to-date information about network topology,
the routing table ensures packets are forwarded efficiently, minimizing delays.
Dynamic Adaptability: In dynamic routing, protocols like OSPF or RIP update the
routing table in response to changes in the network topology.
Support for Multiple Routes: Routing tables support multiple routes to the same
destination.
Protocols like TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol) operate at this layer:
TCP: Ensures reliable, ordered delivery with acknowledgments, flow control, and
congestion management.
UDP: Provides faster, connectionless communication without reliability features,
suitable for real-time applications.
Limitations:
Single Path: TCP operates on a single path, which can be a limitation in networks with
multiple paths, as it cannot take advantage of alternative routes during congestion or
failure.
Suboptimal in Case of Path Failure: TCP cannot switch paths if the current path
becomes congested or fails, potentially causing delays and data loss.
Slow Recovery from High Loss: TCP’s congestion control can lead to slower
recovery from network congestion, as its window size is significantly reduced after a
packet loss.
Scenario-Based Suitability
Token Bucket Algorithm: A video conferencing application where bandwidth usage
fluctuates based on participants’ actions (e.g., speaking or screen sharing). The token
bucket allows bursts when required while maintaining an average rate to optimize
bandwidth.
Leaky Bucket Algorithm: A server sending large batch files to multiple clients. The
leaky bucket ensures a steady and predictable data flow, reducing the risk of
overwhelming intermediate network devices.
52. Explain the role of DNS (Domain Name System) in the
context of cybersecurity and how DNSSEC (DNS Security
Extensions) enhances the security of DNS.
The Domain Name System (DNS) is a critical component of the Internet, translating
human-readable domain names (e.g., www.example.com) into IP addresses that
computers use to locate and connect to resources. In the context of cybersecurity,
DNS has dual roles:
Enabler of Connectivity: It ensures seamless user access to online resources by
resolving domain names efficiently.
Potential Security Vulnerability: Since DNS is essential for web traffic, attackers
often exploit it for malicious activities like DNS spoofing, DNS cache poisoning, and
DDoS attacks.
How DNSSEC Enhances DNS Security
Authentication of DNS Records: DNSSEC ensures that DNS responses come from
the authoritative source, preventing attacks like DNS spoofing.
Data Integrity: By signing DNS records with cryptographic keys, DNSSEC ensures
that DNS data has not been tampered with during transmission.
Chain of Trust: DNSSEC establishes a trust hierarchy from the DNS root to lower-
level domains, ensuring end-to-end security.
Protection Against Cache Poisoning: DNS resolvers validate responses using
DNSSEC signatures, rejecting tampered or forged data.
53. Discuss the differences between Telnet and SSH in terms
of security and authentication mechanisms. Provide examples
of scenarios where one is preferred over the other.
Scenarios for Preference
Telnet: A developer working in a private, isolated test environment may use Telnet for
simple remote device configuration or debugging tasks where security is not a priority.
SSH: A system administrator managing servers over the Internet needs secure
communication to protect sensitive credentials and data.
Guided transmission media refers to the physical channels through which signals are directed
along a defined path. This includes cables and optical fibers that guide electromagnetic or light
signals from one point to another.
Twisted-Pair Cables are cables consisting of two insulated conductor wires (typically copper)
wound and twisted together arranged in a regular spiral pattern. One wire carries the signal to
the receiver, and the other is used as a ground reference. The receivers use the difference
between the two to interpret signals.
UTP stands for Unshielded Twisted Pair cable. UTP cable is a 100-ohm copper cable that
consists of 2 to 1800 unshielded twisted pairs surrounded by an outer jacket. They do not have
any metallic shield.
STP stands for Shielded Twisted Pair cable. STP Cabling is twisted-pair cabling with additional
metal foil covering to reduce crosstalks and other forms of electromagnetic interference (EMI)
Coaxial Cable
Coaxial cable, also known as coax, consists of an inner conductor surrounded by a concentric
conducting shield. Coaxial Cables have an outer plastic covering containing an insulation layer
made of PVC or Teflon and two parallel conductors, each having a separate insulated
protection cover.
Coaxial cables are also classified into two types:
This is a 50 ohm (Ω) coaxial cable used for digital transmission. It is mainly used for Local Area
Net. Baseband transmits one signal at a time at a very high speed. The major drawback with
this is that it needs amplification after every 1000 feet.
This is accomplished by using analog transmission over conventional cable television wiring. It
sends several signals at the same time at various frequencies. When compared to Baseband
Coaxial Cable, it covers a larger region.
A fiber optic cable is a cable that uses electrical signals for communication. A fiber optic is a
cable that holds the optical fibers coated in plastic used to send the data by light pulses. The
plastic coating protects the optical fibers from heat, cold, and electromagnetic interference
from other types of wiring.
Unguided transmission media refer to communication channels that do not rely on physical
cables or wires to transmit signals. Instead, they use electromagnetic waves that propagate
through free space, such as air, vacuum, or water. These media are widely used in wireless
communication systems.
1. Radio Waves:
o Frequency Range: 3 kHz to 1 GHz.
o Applications: AM/FM radio, television broadcasts, cellular networks, and long-distance
communication.
o Advantages:
Long-distance coverage.
Can penetrate buildings and obstacles.
o Disadvantages:
Susceptible to interference.
Limited bandwidth in certain frequency bands.
2. Microwaves:
o Frequency Range: 1 GHz to 300 GHz.
o Applications: Satellite communication, mobile phones, and point-to-point
communication.
o Advantages:
High data transmission rates.
Suitable for line-of-sight communication.
o Disadvantages:
Requires unobstructed paths (line of sight).
Affected by weather conditions (e.g., rain).
3. Infrared Waves:
o Frequency Range: 300 GHz to 400 THz.
o Applications: Remote controls, wireless keyboards, and short-range communication.
o Advantages:
Secure communication as it does not penetrate walls.
Free from electromagnetic interference.
o Disadvantages:
Limited range.
Requires a direct line of sight.
A Wide Area Network (WAN) is a telecommunications network that extends over a large
geographical area, often spanning cities, countries, or even continents. WANs connect multiple
smaller networks (such as LANs and MANs) to enable communication and resource sharing
over vast distances. The Internet is the most prominent example of a WAN.
Advantages of WAN:
1. Global Coverage:
o Allows businesses, individuals, and organizations to communicate and access
resources worldwide.
2. Centralized Data and Resources:
o Enables centralized data storage, making it accessible to users across different
locations.
3. Resource Sharing:
o Facilitates sharing of software, hardware, and data across connected systems.
4. Remote Work Enablement:
o Supports telecommuting and remote access to enterprise systems.
5. Improved Communication:
o Enables seamless communication through email, video conferencing, VoIP, etc.
6. Scalability:
o Easy to expand to include new locations as businesses grow.
Disadvantages of WAN:
It is horizontally
It is vertically approached
Approach approached
Error Built into Data Link and Transport Built into protocols like
Handling layers TCP
Parameters OSI Model TCP/IP Model
A hybrid topology combines two or more different types of network topologies (e.g., star, bus,
ring) to create a customized network. It is commonly used in large organizations because it
allows flexibility and scalability while leveraging the strengths of individual topologies.
1. Flexibility:
o Allows customization to meet specific organizational needs by combining different
topologies.
2. Scalability:
o Easy to add new nodes or networks without affecting existing systems.
3. Reliability:
o Failures in one segment do not necessarily affect the entire network, as multiple
topologies are used.
4. Optimized Performance:
o Individual segments can use the topology best suited for their requirements, ensuring
optimal performance.
5. Efficient Troubleshooting:
o Errors are easier to locate and fix because of the segmented structure.
The Presentation Layer is the 6th layer of the OSI (Open Systems Interconnection) model
and acts as a translator between the application layer and the lower layers. Its primary function
is to ensure that the data sent from the application layer of one system is readable by the
application layer of another, regardless of differences in data representation or format.
1. Data Translation:
o Converts data into a format that the application layer can understand.
o Example: ASCII (text encoding) to EBCDIC or vice versa.
2. Data Encryption and Decryption:
o Ensures secure transmission of data by encrypting it before transmission and
decrypting it upon reception.
o Example: HTTPS uses SSL/TLS protocols for encryption at this layer.
3. Data Compression:
o Reduces the size of data to minimize transmission time and optimize network
resources.
o Example: Compression formats like JPEG (images) or MP3 (audio).
4. Character Encoding:
o Standardizes character sets to ensure data integrity.
o Example: Converting characters to UTF-8 or Unicode.
5. Syntax and Semantics Handling:
o Resolves syntax differences between systems.
o Example: Differentiating between little-endian and big-endian formats in data
representation.
6. Data Formatting:
o Converts data into structured formats like XML, JSON, or HTML that applications can
process efficiently.
7. Graphics Translation:
o Handles image format conversions for compatibility.
o Example: Converting BMP to JPEG or PNG.
Bandwidth:
The maximum amount of data that can be transferred over a network in a specific time period,
usually measured in bits per second (bps).
Latency:
The time it takes for a data packet to travel from one point to another on a network, often
referred to as "lag".
Throughput:
The actual rate at which data is successfully transmitted over a network, considering factors
like network congestion and packet loss.
Packet loss:
The percentage of data packets that fail to reach their destination, causing retransmissions
and impacting performance.
Jitter:
The variation in delay between data packets, which can affect the quality of real-time
applications like video calls.
Error rate:
The percentage of data packets that are corrupted during transmission, indicating potential
issues with signal quality.
Availability:
Network congestion:
A situation where too much data is trying to traverse a network simultaneously, leading to
delays and packet loss
Attenuation:
Signal weakening as it travels through the transmission medium, causing a decrease in
amplitude.
Factors include cable length, signal frequency, and medium type.
Can be mitigated by using amplifiers to boost signal strength
Distortion:
Alteration of the signal waveform, causing different frequencies within the signal to travel at
different speeds, leading to signal shape changes.
Can be caused by imperfections in the transmission medium, such as non-linear
characteristics.
Types include:
Intermodulation distortion: When different signals mix in a non-linear device, creating new
unwanted frequencies.
Amplitude distortion: Unequal amplification of different frequencies.
Phase distortion: Different phases of frequencies traveling at different speeds
Noise:
Random electrical signals that interfere with the transmitted signal, originating from various
sources like electrical equipment, atmospheric conditions, and other devices.
Types include:
Thermal noise: Random electrical noise generated by the thermal agitation of electrons
in a conductor.
Impulse noise: Sudden, short-duration bursts of electrical energy, often caused by
switching operations.
Crosstalk: Interference from signals on adjacent wires in a cable.
11. A data link layer protocol uses a sliding window with a sender window size of 8 frames.
If the sender has sent frames 1 to 10, and the acknowledgment for frame 4 is lost,
calculate how many frames the sender will retransmit before it can proceed with new
frames.
Given:
Assumptions:
1. Protocol Used: Selective Repeat ARQ (commonly assumed for sliding window problems
unless stated otherwise).
2. The receiver uses cumulative acknowledgments unless otherwise specified.
In Go-Back-N ARQ, the sender retransmits frame 4 and all subsequent frames in the sender
window.
The sender cannot proceed with new frames until it retransmits frames 4 to 10.
Retransmissions: 7 frames (frames 4 to 10).
Answer:
12. In a selective repeat ARQ protocol, the sender sends a window of 10 frames, and the
receiver has a buffer of 20 frames. If the sender sends frames 1 to 10, and frame 5 gets
lost in transit, calculate the number of acknowledgments the receiver will send before it
can successfully receive all frames.
In a Selective Repeat ARQ protocol, when a frame is lost, the receiver does the following:
3. Can buffer out-of-order frames while waiting for the lost frame to be retransmitted
2. Frame 5 is lost
- Receiver sends a SNAK (Selective Negative Acknowledgment) for frame 5
3. Frames 6, 7, 8, 9, 10 arrive
Calculation of acknowledgments:
13. In a CRC calculation, the sender generates a 16-bit checksum for a data frame. If the
received frame has an error, what is the probability that the error will go undetected?
For any given data frame with an error, there's a one in 65,536 chance that the incorrect frame
will generate the same CRC value as the correct frame, leading to an undetected error.
Therefore, the probability that an error will go undetected in a 16-bit CRC is:
1/216 =1/65536≈0.0000152588
14. You receive a data message with a CRC value of 1010. After transmitting the message
over a network, the CRC value at the receiver's end is calculated as 1110. Determine if
there is an error in the received message.
To determine whether there is an error in the received message, compare the Cyclic
Redundancy Check (CRC) values at the sender and receiver ends:
Given Data:
Explanation:
The CRC is a mechanism used to detect errors in data transmission. The value at the receiver
end should match the value sent by the sender. If there is a mismatch, it indicates an error
occurred during transmission.
Analysis:
Since the CRC values do not match, it confirms that there is an error in the received message.
Conclusion: Yes, there is an error in the received message, as the CRC value has changed
during transmission.
In this Aloha, any station can In this, any station can transmit the data at
transmit the data at any time. the beginning of any time slot.
In this, the time is continuous and not In this, the time is discrete and globally
globally synchronized. synchronized.
= 18.4% = 36.8%
Refer to 3 marks
17. Explain Block Coding Scheme. Illustrate the error detection in Block Coding.
Block Coding is a method used in digital communication to ensure data integrity by encoding
data into blocks before transmission. It helps in detecting and correcting errors that may occur
during data transmission.
Message Division: The original data is divided into fixed-sized blocks of bits (called data
words), each of size k bits.
Encoding: Each data word is mapped to a larger codeword of size n bits using an encoding
rule, where 𝑛>𝑘.
The difference (𝑛−𝑘) represents the redundant bits, which are added for error detection or
correction.
Decoding: At the receiver, the received codeword is checked for errors using predefined rules.
If errors are detected, appropriate actions (e.g., retransmission requests) are taken.
Error detection is achieved by examining the redundant bits. Here’s how it works:
Parity Check: The simplest form of block coding adds a parity bit to each dataword.
Example: If the dataword is 1011 and even parity is used, the parity bit added would make the
total number of 1's even. The resulting codeword would be 10110.
Syndrome Decoding: The receiver applies a decoding algorithm to the received codeword to
compute a syndrome (a value that indicates the presence of errors).
If a single bit is flipped during transmission (e.g., the received codeword is 10111), the receiver
detects the error because the parity condition is violated.
18. Compare and contrast SNMP (Simple Network Management Protocol) and HTTP
(Hypertext Transfer Protocol) in terms of their applications and how they are used for
managing network devices and services.
19. Explain the concept of Dynamic DNS (DDNS) and its significance in managing domain
names. Provide examples of situations where DDNS is particularly useful.
Dynamic DNS (DDNS) is a service that automatically updates the Domain Name System
(DNS) records when an IP address associated with a domain changes. It is especially useful in
environments where IP addresses are dynamically assigned, such as residential or small
business networks.
1. A device (e.g., a router or computer) with a dynamically assigned IP address notifies the
DDNS service whenever its IP changes.
2. The DDNS service updates the DNS records to associate the domain name with the new IP
address.
3. This ensures that users can consistently access the device using its domain name, regardless
of IP changes.
Significance of DDNS:
1. Maintains Accessibility: Ensures a consistent domain name for devices with dynamic IPs.
2. Cost-Effective: Avoids the need for costly static IP addresses.
3. Simplifies Management: Automatically updates DNS records when IP changes.
20. Analyze the security vulnerabilities associated with the File Transfer Protocol (FTP) and
propose advanced security measures to mitigate these vulnerabilities in modern FTP
implementations.
FTP or File Transfer Protocol is said to be one of the earliest and also the most common forms
of transferring files on the internet. Located in the application layer of the OSI model, FTP is a
basic system that helps in transferring files between a client and a server. It is what makes the
FTP unique that the system provides a reliable and efficient means of transferring files from
one system to another even if they have different file structures and operating systems.
Information could not go across a secure tunnel since FTP was not intended to do so. Thus,
encryption is not present. A hacker would not need to struggle with encryption to access or
alter data that is usable if they could intercept an FTP transaction.
Even with FTP cloud storage, data can still be intercepted and misused if the service provider’s
system is attacked.
As a result, data sent via FTP is a target for spoofing, sniffing, brute force, and other types of
attacks that move somewhat slowly. A hacker might examine an FTP transmission and try to
take advantage of any flaws by simply port scanning.
The fact that FTP uses clear-text passwords—passwords that haven’t been encrypted—is one
of its main security flaws. Put differently, “Jerry1992” appears exactly like “Jerry1992.” The real
password is hidden via an algorithm in more secure protocols.
Require strong passwords with complexity rules (length, special characters, etc.).
Implement multi-factor authentication (MFA) for an added layer of security.
3. Restrict Access
21. Evaluate the role of firewalls in network security. Discuss the differences between
packet-filtering, stateful, and application-layer firewalls, and provide examples of
scenarios where each type is most effective.
A firewall can be defined as a special type of network security device or a software program
that monitors and filters incoming and outgoing network traffic based on a defined set of
security rules. It acts as a barrier between internal private networks and external sources (such
as the public Internet).
22. Assess the security risks and challenges in using Bluetooth technology for wireless
communication. Propose strategies and best practices to enhance the security of
Bluetooth-enabled devices and networks.
Bluetooth technology, while convenient, comes with several security risks and challenges:
1. Keep Devices Updated: Regularly update the firmware and software of Bluetooth devices to
patch vulnerabilities.
2. Turn Off Bluetooth When Not in Use: Disable Bluetooth when it's not needed to reduce the
risk of unauthorized access.
3. Use Secure Pairing Methods: Employ secure pairing methods such as PIN codes or secure
simple pairing (SSP).
4. Avoid Public Pairing: Do not pair devices in public places where attackers might exploit the
pairing process.
5. Set Devices to Non-Discoverable: Keep devices in non-discoverable mode to prevent them
from being detected by unauthorized devices.
6. Limit Pairing Attempts: Set a limit on the number of pairing attempts to prevent brute force
attacks.
7. Use Strong Authentication: Implement strong authentication mechanisms for Bluetooth
connections.
1. Version (4 bits): This field specifies the version of the IP protocol being used, which is IPv4 in
this case.
2. Header Length (4 bits): The header length field indicates the length of the IPv4 header in 32-
bit words. Since the header is a fixed size of 20 bytes, the value of this field is typically 5.
3. Type of Service (8 bits): This field is used to define the quality of service (QoS) for the
packet, including priorities and other parameters for routing and processing.
4. Total Length (16 bits): The total length field specifies the length of the entire IPv4 packet,
including both the header and the data, in bytes.
5. Identification (16 bits): The identification field is used for packet fragmentation and
reassembly. It helps in grouping fragments of a larger packet together.
6. Flags (3 bits): These bits are used for controlling and identifying packet fragmentation. The
flags include the "Don't Fragment" (DF) and "More Fragments" (MF) flags.
7. Fragment Offset (13 bits): The fragment offset field specifies the position of the fragment
within the original packet. It is used to reassemble fragmented packets correctly.
8. Time to Live (TTL) (8 bits): The TTL field represents the maximum number of hops (routers
or network segments) that the packet can traverse before it is discarded. Each router
decrements this value by one.
9. Protocol (8 bits): This field indicates the type of protocol used in the data portion of the
packet, such as TCP, UDP, ICMP, or others.
10. Header Checksum (16 bits): The header checksum field is used to verify the integrity of the
IPv4 header during transmission. Routers and devices recalculate this checksum to check for
errors.
11. Source IP Address (32 bits): This field contains the IP address of the sender or source of the
packet.
12. Destination IP Address (32 bits): This field holds the IP address of the recipient or
destination of the packet.
ARP stands for “Address Resolution Protocol”. It is a network protocol used to determine the
MAC address (hardware address) from any IP address.
In other words, ARP is used to mapping the IP Address into MAC Address. When one device
wants to communicate with another device in a LAN (local area network) network, the ARP
protocol is used.
Hardware Type: The size of this field is 2 bytes. This field defines what type of Hardware is
used to transmit the message. The most common Hardware type is Ethernet. The value of
Ethernet is 1.
Protocol Type: This field tells which protocol has been used to transmit the message.
substantially the value of this field is 2048 which indicates IPv4.
Hardware Address Length: It shows the length of the tackle address in bytes. The size of
Ethernet MAC address is 6 bytes.
Protocol Address Length: It shows the size of the IP address in bytes. The size of IP
address is 4 bytes.
OP law: This field tells the type of message. If the value of this field is 1 also it's a request
message and if the value of this field is 2 also it's a reply message.
Sender Hardware Address: This field contains the MAC address of the device transferring
the message.
Sender Protocol Address: This field contains the IP address of the device transferring the
message.
Target Hardware Address: This field is empty in the request message. This field contains the
MAC address of the entering device.
Target Protocol Address: This field contains the IP address of the entering device.
25. Describe the importance of switching and the different types of switching techniques.
Switching is process to forward packets coming in from one port to a port leading towards the
destination. When data comes on a port it is called ingress, and when data leaves a port or
goes out it is called egress.
Message Switching: This is an older switching technique that has become obsolete. In
message switching technique, the entire data block/message is forwarded across the
entire network thus, making it highly inefficient.
Circuit Switching: In this type of switching, a connection is established between the source
and destination beforehand. This connection receives the complete bandwidth of the network
until the data is transferred completely.
This approach is better than message switching as it does not involve sending data to the
entire network, instead of its destination only.
Packet Switching: This technique requires the data to be broken down into smaller
components, data frames, or packets. These data frames are then transferred to their
destinations according to the available resources in the network at a particular time.
This switching type is used in modern computers and even the Internet. Here, each data frame
contains additional information about the destination and other information required for proper
transfer through network components.
Importance of Switching
Connect devices
A switch connects devices like computers, printers, servers, and wireless access points to a
local area network (LAN).
Enable communication
A switch allows devices to share information and resources like internet access, file storage,
and printers.
Prevent interference
A switch prevents each device's traffic from interfering with other devices' traffic.
Identify devices
27. Explain the purpose of the RARP (Reverse ARP) protocol. How does it work, and in
what scenarios might it be used in a network?
The Reverse Address Resolution Protocol (RARP) is a networking protocol that is used to map
a physical (MAC) address to an Internet Protocol (IP) address. It is the reverse of the more
commonly used Address Resolution Protocol (ARP)
Working
1. Client Request:
o When a device (typically a diskless workstation) boots up, it sends a BOOTP Request
message to the network to get an IP address and configuration information. This
request is broadcasted to the network.
2. Server Response:
o A BOOTP Server listens for these requests. Once it receives a BOOTP Request, the
server looks up the client’s MAC address in its database and sends a BOOTP Reply.
o The reply contains the following information:
IP address assigned to the client.
Subnet mask.
Gateway IP address.
Other network-related configuration details (optional).
3. Client Configuration:
o The client uses the received configuration details to set up its IP address and network
settings, allowing it to communicate on the network.
29. Assess the scenarios when the logical and physical address of a system may change.
30. Discuss advanced techniques and strategies for EIGRP optimization, such as route
summarization, load balancing, and route filtering.
Enhanced Interior Gateway Routing Protocol (EIGRP) is a routing protocol that automates
network configuration and routing decisions. It's a distance-vector protocol that's used on
computer networks.
features of EIGRP:
Bandwidth saving: EIGRP saves bandwidth by sending partial updates instead of the entire
network prefixes.
Multiple network layer protocols: EIGRP can route IP, IPX, and AppleTalk.
Backward compatibility: EIGRP is backward compatible with IGRP.
Security: EIGRP over Secure Transport uses encryption to protect routing information.
Optimization:
1. Route Summarization
Route summarization reduces the size of routing tables by aggregating multiple routes into a
single summary route. This minimizes the amount of routing information exchanged between
routers, conserving bandwidth and improving convergence times.
2. Load Balancing
EIGRP supports both equal-cost load balancing and unequal-cost load balancing:
Equal-Cost Load Balancing: Distributes traffic evenly across multiple paths with the same
cost.
Unequal-Cost Load Balancing: Distributes traffic across paths with different costs, allowing
more efficient use of available bandwidth.
3. Route Filtering
Route filtering controls the information that enters or exits a router's routing table. This can be
used to optimize routing tables, manage network traffic, and prevent the propagation of
unwanted routes.
31. Your organization is expanding its network infrastructure, and you need to plan for IP
address allocation and management using DHCP. Describe a comprehensive DHCP
implementation strategy, including subnetting, lease times, and redundancy
considerations.
1. Subnetting
Subnetting is crucial for organizing and managing IP address allocation efficiently. Here's how
to approach it:
Assess Network Requirements: Understand the number of devices and future growth to
determine the number of subnets and IP addresses required.
Design Subnet Scheme: Create a subnet plan that logically separates different departments,
floors, or geographical locations. Use VLSM (Variable Length Subnet Masking) to allocate
addresses based on actual needs.
Example Subnetting Plan:
o Office A: 192.168.1.0/24
o Office B: 192.168.2.0/24
o Guest Network: 192.168.3.0/24
2. IP Address Allocation
Efficient allocation of IP addresses is essential for avoiding conflicts and ensuring optimal
network performance.
3. Lease Times
Lease times dictate how long a device can use an assigned IP address before it must renew
the lease.
Short Lease Times: Suitable for environments with a high turnover of devices, such as guest
networks or conference rooms. Example: 1 hour.
Medium Lease Times: Ideal for typical office environments where devices remain connected
for extended periods. Example: 8 hours to 24 hours.
Long Lease Times: Used for devices that rarely change, such as servers and infrastructure
equipment. Example: 7 days.
4. Redundancy Considerations
Ensuring high availability and reliability of the DHCP service is crucial for network stability.
DHCP Failover: Implement a failover system where two DHCP servers work together to
provide redundancy. If one server fails, the other can continue to provide IP address allocation
without disruption.
DHCP Clustering: Use clustering to distribute DHCP load across multiple servers, enhancing
performance and redundancy.
Backup and Recovery: Regularly back up DHCP server configurations and scopes to ensure
quick recovery in case of a failure.
5. Security Measures
Implementing security measures to protect the DHCP infrastructure from unauthorized access
and attacks is essential.
DHCP Snooping: Enable DHCP snooping on network switches to prevent rogue DHCP
servers from assigning IP addresses.
IP Address Conflicts: Monitor and resolve IP address conflicts promptly to ensure smooth
network operation.
Network Segmentation: Use VLANs to segment network traffic, enhancing security and
performance.
The Border Gateway Protocol (BGP) is a crucial routing protocol used to exchange routing
information between different autonomous systems (AS) on the internet.
Working
Session Establishment:
BGP routers establish TCP sessions (port 179) between peers (neighbors).
Sessions can be iBGP (within the same AS) or eBGP (between different ASes).
Exchanging Routes:
Route information includes path attributes like AS path, next hop, and origin.
Path Selection:
Policy Enforcement:
Administrators can filter routes and modify attributes (e.g., AS path, local preference) to control
routing behavior.
Route Propagation:
33. Suppose a network with IP Address 192.16.0.0 is divided into 2 subnets. Find the
number of hosts per subnet. Also, for the first subnet, estimate the Subnet Address,
First Host ID, Last Host ID, Broadcast Address.
34. In a class B network on the internet with a subnet mask of 255.255.240.0, estimate the
maximum number of hosts per subnet.
In a class B Network, out of 32 bits: 16 bits are reserved for Network ID and 16 bits are
available for Host Addresses.
No of subnets = 24 = 16
35. Consider we have a big single network with IP Address 200.1.2.0. We want to do
subnetting and divide this network into 4 subnets. Estimate the details of the
subnetworks.
36. Consider we have a big single network with IP Address 200.1.2.0. We want to do
subnetting and divide this network into 3 subnets. Estimate the details of the
subnetworks.
37. Explain the mechanism of the three-way handshake protocol for TCP.
TCP or (Transmission Control Protocol) needs to establish connection with the receiver for
ensuring data is delivered correctly between computers on an internet network. A three-way
handshake is a process that's used to initiate a connection in a transmission control
protocol/internet protocol (TCP/IP) network.
1. SYN: The initiating computer (or active client) sends a synchronize sequence number (SYN)
packet to the receiving computer (usually a server). The SYN packet value is set to an arbitrary
number (e.g. 100) to “ask” if any open connections are available.
2. SYN-ACK: If the receiving computer (also known as a passive client) has open ports that
can accept the connection, it sends back a synchronize-acknowledge (SYN-ACK) packet to
the initiating computer. The packet includes two numbers: the receiving computer’s own SYN,
which can be any arbitrary number as well (e.g. 200), and the ACK number, which is the
initiating computer’s SYN plus one (e.g. 101).
3. ACK: The initiating computer (active client) then sends an acknowledge sequence number
(ACK) packet back to the receiving computer. This ACK packet is acknowledgement of receipt
of the SYN-ACK packet. The packet value is set to the receiving computer’s SYN (sent in step
two) plus one again (e.g. 201). With this final step, the connection establishes, and data
transmission can begin.
Importance:
1. Reliable Connection Establishment: It ensures both the client and server are ready to
communicate before data is exchanged.
3. Flow and Congestion Control: It enables the exchange of parameters for managing data
flow and avoiding network congestion.
a) Same answer as 36
b) Congestion refers to a network state where-
The message traffic becomes so heavy that it slows down the network response time.
TCP congestion control refers to the mechanism that prevents congestion from happening
or removes it after congestion takes place.
When congestion takes place in the network, TCP handles it by reducing the size of the
sender’s window. The window size of the sender is determined by the following two factors:
Receiver window size
Congestion window size
Congestion Window
It is the state of TCP that limits the amount of data to be sent by the sender into the
network even before receiving the acknowledgment.
39. Discuss the various timers used by TCP to perform its various operations.
TCP (Transmission Control Protocol) uses several timers to manage and control its various
operations effectively. These timers ensure reliable data transmission and help in error
recovery, flow control, and connection management. Here are the key timers used by TCP:
1. Retransmission Timer
This is one of the most critical timers in TCP. It determines how long TCP should wait before
retransmitting an unacknowledged segment. If the acknowledgment (ACK) for a sent segment
is not received within this time, the segment is retransmitted. The timer's duration is calculated
based on the estimated round-trip time (RTT) and its variation.
2. Persist Timer
The persist timer prevents the TCP connection from becoming deadlocked when the receiver's
window size is zero. When the window size is zero, the sender periodically probes the receiver
to check if the window size has increased. If no response is received within the persist timer's
interval, the sender will retransmit the probe.
3. Keep-Alive Timer
The keep-alive timer is used to check if the other end of a connection is still reachable and
responsive. If no data or acknowledgment is received for a specified period, TCP sends keep-
alive probes to the idle connection. If a response is not received after a certain number of
probes, the connection is considered broken, and appropriate actions are taken.
4.TIME-WAIT Timer
This timer is used to ensure that the final acknowledgment for a connection termination is
properly received. When a TCP connection is closed, it enters the TIME-WAIT state for a
period (usually twice the maximum segment lifetime). This ensures that any delayed segments
are not misinterpreted as new data.
To improve performance, TCP does not always send an acknowledgment immediately after
receiving a segment. The delayed ACK timer is used to hold off the acknowledgment for a
short period (usually up to 200 milliseconds) to allow for possible piggybacking with data
segments. If no data segment is sent within this period, a standalone ACK is sent.
During the connection establishment phase, TCP uses a timer to control the duration for which
a SYN (synchronize) request is kept active. If the SYN-ACK response is not received within the
timer's interval, the SYN request is retransmitted or the connection attempt is aborted.
The transport layer, which is responsible for delivering data between hosts, can face several
performance issues that affect the efficiency and reliability of communication. Here are some
common performance issues:
1. Congestion Control
Congestion occurs when too much data is sent over a network, overwhelming the network's
capacity. This can lead to packet loss, increased latency, and reduced throughput. Effective
congestion control mechanisms are necessary to manage and alleviate congestion.
2. Latency
Latency refers to the delay between sending and receiving data. High latency can be caused
by factors such as long propagation delays, processing delays, and queuing delays. It impacts
real-time applications like VoIP and online gaming.
3. Throughput
Throughput is the rate at which data is successfully delivered over a network. Limited
bandwidth, high packet loss, and inefficient routing can negatively affect throughput, leading to
lower data transfer rates.
4. Packet Loss
Packet loss occurs when packets of data are lost in transit due to errors, congestion, or
network failures. It can lead to retransmissions and increased latency, degrading the overall
performance of the transport layer.
5. Jitter
Jitter is the variability in packet arrival times. It can cause problems for time-sensitive
applications like video streaming and online gaming, where consistent timing is crucial for
quality.
6.Fault Tolerance
The transport layer must handle network failures gracefully to ensure reliable data delivery.
Inadequate fault tolerance mechanisms can result in data loss and connection interruptions.
7. Security
Security measures, such as encryption and authentication, can introduce additional overhead
and processing delays. Balancing security and performance is a key challenge.
8. Scalability
As the number of users and devices on a network grows, the transport layer must scale to
handle increased traffic. Scalability issues can lead to performance degradation if the network
infrastructure cannot keep up with demand.
1. INIT:
o The client sends an INIT chunk to start the association.
2. INIT-ACK:
o The server responds with an INIT-ACK chunk, which includes a cookie (server-side
state is not yet allocated).
3. COOKIE-ECHO:
o The client responds with a COOKIE-ECHO chunk, including the server-provided cookie.
4. COOKIE-ACK:
o The server validates the cookie and completes the association by sending a COOKIE-
ACK.
SCTP's Mitigation:
Traffic Prioritization:
Marking packets: Assigning different priority levels to packets based on application
type (e.g., high priority for real-time video, medium for web browsing).
Class-based queuing: Creating separate queues for different traffic classes, allowing
high-priority packets to be processed first.
Resource Reservation:
Bandwidth allocation: Specifying a dedicated portion of network bandwidth for specific
applications or users.
Resource reservation protocol (RSVP): A signalling protocol that allows applications
to request specific network resources in advance.
Queuing Mechanisms:
First-In-First-Out (FIFO): Basic queuing where packets are processed in the order they
arrive.
Priority queuing: Packets with higher priority are processed first, regardless of arrival
time.
Weighted Fair Queuing (WFQ): Ensures fair allocation of bandwidth among different
traffic flows based on their priority.
Traffic Shaping/Policing:
Traffic shaping: Controlling the rate at which data is sent to the network to prevent
congestion.
Traffic policing: Dropping or delaying packets that exceed a predefined rate limit.
Congestion Management:
Active Queue Management (AQM): Algorithms that dynamically adjust queuing
behaviour to mitigate congestion.
Congestion avoidance mechanisms: Techniques to prevent network congestion by
dynamically adjusting transmission rates.
Response Message
A response message shares the same header and Queries with an
additional Answers section.
46. Distinguish the User agent in an E-mail system focusing on the services and its types.
A User Agent (UA) in an e-mail system is the software application or program used by the end-
user to access and manage their e-mails. It provides an interface for sending, receiving,
reading, and organizing e-mail messages. Here are the key points distinguishing the services
and types of User Agents:
1. Message Composition: Allows users to create new e-mail messages, including text
formatting, attachments, and multimedia content.
2. Message Sending: Facilitates the sending of e-mails to recipients using SMTP (Simple Mail
Transfer Protocol).
3. Message Reception: Retrieves e-mails from the mail server using protocols like POP3 (Post
Office Protocol 3) or IMAP (Internet Message Access Protocol).
4. Message Reading: Provides tools for viewing and reading received e-mails.
5. Message Organization: Offers features for sorting, labeling, and storing e-mails in folders or
categories.
6. Address Book: Maintains a list of contacts and their e-mail addresses.
7. Search Functionality: Allows users to search through their e-mails based on various criteria
like sender, subject, date, etc.
8. Spam Filtering: Helps in identifying and filtering out unwanted e-mails.
9. Encryption: Provides options for secure communication by encrypting e-mail content.
10. Calendar Integration: Syncs with calendars for managing events and schedules.
47. Distinguish the header format and the data types of MIME.
Multipurpose Internet Mail Extensions (MIME) is an internet standard that allows users to send
and receive emails with a variety of data types, including images, audio, video, and application
programs:
Data types
MIME allows users to send both ASCII text and non-ASCII data, such as graphics, audio, and
video files.
MIME Header
1. MIME Version
It defines the version of the MIME protocol. This header usually has a parameter value 1.0,
indicating that the message is formatted using MIME.
2. Content Type
It describes the type and subtype of information to be sent in the message. These messages
can be of many types such as Text, Image, Audio, Video, and they also have many subtypes
such that the subtype of the image can be png or jpeg. Similarly, the subtype of Video can be
WEBM, MP4 etc.
3. Content Type Encoding
In this field, it is told which method has been used to convert mail information into ASCII or
Binary number, such as 7-bit encoding, 8-bit encoding, etc.
4. Content Id
In this field, a unique "Content Id" number is appended to all email messages so that they can
be uniquely identified.
5. Content description
This field contains a brief description of the content within the email. This means that
information about whatever is being sent in the mail is clearly in the "Content Description". This
field also provides the information of name, creation date, and modification date of the file.
Simple Mail Transfer mechanism (SMTP) is a mechanism for exchanging email messages
between servers. It is an essential component of the email communication process and
operates at the application layer of the TCP/IP protocol stack. SMTP is a protocol for
transmitting and receiving email messages.
Components of SMTP
Mail User Agent (MUA): It is a computer application that helps you in sending and retrieving
mail. It is responsible for creating email messages for transfer to the mail transfer agent(MTA).
Mail Submission Agent (MSA): It is a computer program that receives mail from a Mail User
Agent(MUA) and interacts with the Mail Transfer Agent(MTA) for the transfer of the mail.
Mail Transfer Agent (MTA): It is software that has the work to transfer mail from one system
to another with the help of SMTP.
Mail Delivery Agent (MDA): A mail Delivery agent or Local Delivery Agent is basically a
system that helps in the delivery of mail to the local system.
Working:
Communication between the sender and the receiver: The sender’s user agent prepares
the message and sends it to the MTA. The MTA’s responsibility is to transfer the mail across
the network to the receiver’s MTA. To send mail, a system must have a client MTA, and to
receive mail, a system must have a server MTA.
Sending Emails: Mail is sent by a series of request and response messages between
the client and the server. The message which is sent across consists of a header and a body.
A null line is used to terminate the mail header and everything after the null line is considered
the body of the message, which is a sequence of ASCII characters. The message body
contains the actual information read by the receipt.
Receiving Emails: The user agent on the server-side checks the mailboxes at a particular
time of intervals. If any information is received, it informs the user about the mail. When the
user tries to read the mail it displays a list of emails with a short description of each mail in the
mailbox. By selecting any of the mail users can view its contents on the terminal.
Bluetooth is a wireless technology standard designed for exchanging data over short distances
using short-wavelength UHF radio waves. It has several key features that make it widely used
in various applications. Here are some notable features of Bluetooth:
Wireless Communication: Enables cable-free connections between devices.
Short Range: Typically operates within a 10-meter range.
Low Power Consumption: Suitable for battery-powered devices.
Data Transfer Speed: Supports up to 3 Mbps (24 Mbps for Bluetooth 5.0).
Secure Connections: Offers authentication and encryption.
Interoperability: Devices from different manufacturers can connect.
Simple Pairing: Easy and quick device pairing process.
Versatile Profiles: Supports various specific application profiles.
Backward Compatibility: Newer versions work with older devices.
Multi-Device Connectivity: Connects to multiple devices simultaneously.
Low Latency: Suitable for real-time applications.
Audio Quality: Supports high-quality audio streaming.
o Source port number: It is 16-bit information that identifies which port is going t send the
packet.
o Destination port number: It identifies which port is going to accept the information. It is 16-bit
information which is used to identify application-level service on the destination machine.
o Length: It is 16-bit field that specifies the entire length of the UDP packet that includes the
header also. The minimum value would be 8-byte as the size of the header is 8 bytes.
o Checksum: It is a 16-bits field, and it is an optional field. This checksum field checks whether
the information is accurate or not as there is the possibility that the information can be
corrupted while transmission.
UDP handles the sending and receiving of the UDP packets with the help of the following
components:
o Input queue: The UDP packets uses a set of queues for each process.
o Input module: This module takes the user datagram from the IP, and then it finds the
information from the control block table of the same port. If it finds the entry in the control block
table with the same port as the user datagram, it enqueues the data.
o Control Block Module: It manages the control block table.
o Control Block Table: The control block table contains the entry of open ports.
o Output module: The output module creates and sends the user datagram.
Electronic Mail (e-mail) is one of the most widely used services of the Internet. This service
allows an Internet user to send a message in a formatted manner (mail) to other Internet
users in any part of the world. Message in the mail not only contain text, but it also contains
images, audio and videos data. The person who is sending mail is called sender and person
who receives mail is called the recipient. It is just like postal mail service.
Format of E-mail :
An e-mail consists of three parts that are as follows :
1. Envelope:
The envelope part encapsulates the message. It contains all information that is required for
sending any e-mail such as destination address, priority and security level. The envelope is
used by MTAs for routing message.
2. Header :
The header consists of a series of lines. Each header field consists of a single line of ASCII
text specifying field name, colon and value. The main header fields related to message
transport are:
Header Meaning
To: E-mail address of primary receipt(s).
Cc: E-mail address of secondary receipt(s).
Bcc: E-mail address for blind carbon copies.
From: Person or people who have created a
message.
Sender: E-mail address of the actual sender.
Received: It is used to specify how to get back to the
sender.
Return-Path It can be used to identify a path back to the
sender
3. Body: The body of a message contains text that is the actual content/message that needs
to be sent, such as “Employees who are eligible for the new health care program should
contact their supervisors by next Friday if they want to switch.” The message body also
may include signatures or automatically generated text that is inserted by the sender’s
email system.