0% found this document useful (0 votes)
9 views1 page

7

The document outlines the processes of assigning and using IP addresses, including static and dynamic assignments, and highlights the role of Internet Control Protocols in network management. It discusses various aspects of TCP connection establishment, congestion control, and the importance of quality of service (QoS) in network performance. Additionally, it covers data analysis techniques and methodologies for big data, emphasizing the significance of predictive analytics and customer insights in business strategies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views1 page

7

The document outlines the processes of assigning and using IP addresses, including static and dynamic assignments, and highlights the role of Internet Control Protocols in network management. It discusses various aspects of TCP connection establishment, congestion control, and the importance of quality of service (QoS) in network performance. Additionally, it covers data analysis techniques and methodologies for big data, emphasizing the significance of predictive analytics and customer insights in business strategies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

process of assigning and using IP addresses in a network. purpose of Internet Control Protocols in the IP protocol suite.

ternet Control Protocols in the IP protocol suite. Practical Scenario: Telnet for Remote Access

1. Assigning IP Addresses. 1.1 Static Assignment. 1.2 Dynamic Assignment (via Error Reporting-> Diagnostics.-> Address Resolution 1 Network Configuration ->. Used to manage network devices, such as routers,
DHCP). 2. IP Address Usage. 2.1 Communication within the Same Network Routing. -> Flow Control -> Congestion Control remotely. 2 Tasks ->Modify settings, monitor status, and troubleshoot.
2.2 Communication between Different Networks 2.3 Address Resolution Protocol Network Management -> Configuration. -> Reliability 3 Telnet Command ->. Initiate with `telnet <IP_address>
(ARP). 3. IP Address Types. 3.1 Private and Public IPs. 3.2 IPv4 and IPv6 ____________________________________________________ 4 Security. -> Telnet transmits data in plaintext, making. it less secure than SSH.
4. Address Management. 4.1 Subnetting. 4.2 NAT (Network Address Translation) ip protocol in the network layer 5 Use Case. -> Suitable in environments where security is not a concern.
4.3 IP Address Allocation _______________________________________________________________
--------------------------------------------------------------------- Routing -> Determines the best path for data delivery. http in establishing secur and stable web scrpe
diffrence Addressing ->Provides unique IP addresses for devices.
Feature. UDP TCP Packet Fragmentation-> Breaks data into smaller packets 1 Request-Response Model ->. Client-server model for data exchange.
Connection Setup None (low latency)---Three-way handshake (adds latency) Encapsulation-> Adds headers for proper packet delivery 2 Stateless -> No session information retained between requests
Reliability. No (faster, lightweight) Yes (slower, ensures data integrity) Error Handling ->Supports error reporting via ICMP. 3 Scalability -> Handles multiple requests, supports load balancing.
Data Ordering Not guaranteed Guaranteed ____________________________________________________ 4 Security (HTTPS) -> SSL/TLS encryption for confidentiality, integrity, and
Overhead Low High modue 5 authentication. 5 Access Control -> Supports authentication mechanisms (OAuth,
Performance High speed Moderate speed Summarize the steps involved in TCP connection establishment and release. JWT). 6 Caching. -> Reduces server load and improves performance.
Use Cases -----Real-time, loss-tolerant application-------Critical, reliable, and ordered 7 CDN Integration ->. Content Delivery Networks improve speed and scalability
_____________________________________________________________ TCP Connection Establishment (Three-Way Handshake): __________________________________________________________________
flow control of tcp 1. SYN (Synchronize): 2 SYN-ACK (Synchronize-Acknowledge): module 3
Feature TCP Mechanism 3 ACK (Acknowledge) congestion prevention policies can reduce network congestion
Reliability-----------Sequence numbers, acknowledgments, retransmission, checksums TCP Connection Release (Four-Way Handshake):
Error Recovery---------------Timeout, duplicate ACK detection, retransmission 1. FIN (Finish): client server ||||||| ACK (Acknowledge): |||||. FIN (Finish) server clint 1 Purpose: Prevent system overloads and maintain stability.
Flow Control----------------------Advertised window, dynamic rate adjustment ACK (Acknowledge): client-> server 2 Network Context: Drop or delay data packets to manage congestion.
Order Guarantee------------------Sequence numbers and segment reassembly ________________________________________ 3 Power Systems: Temporarily cut power to areas to avoid grid collapse during peak
Buffer Management--------------Receiver-advertised window prevents overflow http protocol in world web demand.-----------4 Transport Systems: Reduce vehicle numbers to avoid traffic jams.
________________________________________________________ 5 Goal: Ensure system functionality and prevent complete failure during high demand
Analyze the importance of Internet Control Protocols in maintaining network stability Request-Response. -> Client-server communication or congestion.
and efficiency. Stateless -> No retained data between requests. ____________________________________________________________
Data Transfer -> Transmits web content (HTML, images) jitter control techniques to ensure smooth playback
ICMP Error reporting and diagnostics. Methods -> GET, POST, PUT, DELETE for actions
ARP Resolves IP to MAC addresses in local networks. Status Codes -> Indicates request outcomes 1Buffering: Store data ahead of time to absorb jitter and prevent interruptions.
DHCP Dynamically assigns IP addresses and configurations. Secure (HTTPS) ->Encryption for secure communication. 2Jitter Buffer: Adjust buffer size dynamically based on network conditions.
BGP. Manages routing between autonomous systems. _____________________________________________________________ 3Adaptive Bitrate Streaming: Switch between stream qualities based on available
SNMP. Monitors and manages network devices. tcp congestion control bandwidth. 4Packet Timestamping: Sync playback using timestamps to handle delay
TCP Ensures reliable, ordered data transmission variations. 5Forward Error Correction (FEC): Correct packet loss to prevent playback
________________________________________________________ 1 Slow Start ->Starts with a small CWND and increases disruption. 6Quality of Service (QoS): Prioritize streaming traffic to reduce jitter caused
exponentially until a threshold (ssthresh) is reached.
Services Provided by the Transport Layer to Upper Layers 2 Congestion Avoidance->Once CWND hits ssthresh
grows linearly, gradually probing for available bandwidth.
1End-to-End Communication 2Segmentation and Reassembly 3 Fast Retransmit->Triggered by 3 duplicate ACKs,
3Reliability 4Flow Control 5Congestion Control 4Multiplexing retransmits lost segments immediately.
6Connection-Oriented and 7Connectionless Communication 4 Fast Recovery ->After fast retransmit, CWND is
halvedand gradually increased to avoid further congestion.

3D Plots with Matplotlib and Seaborn


effectiveness of congestion prevention policies compared to reactive mportance and Insights from EDA Types
congestion control methods. Below is an example of visualizing 3D plots using a sample dataset with three
Prevention: Actively manages traffic, reducing the likelihood of congestion. Descriptive EDA: Summarizes data to give a quick overview. variables: X, Y, and Z. We’ll illustrate the following plots:
Reactive: Responds after congestion occurs, often causing delays and packet Univariate Analysis: Identifies variable-specific trends and anomalies. 1. 3D Scatter Plot: Visualizes data distribution in 3D space.
loss. Bivariate Analysis: Highlights relationships and dependencies. 2. 3D Surface Plot: Represents a surface defined by a function of two variables.
Prevention Effectiveness: Provides smoother performance with fewer Multivariate Analysis: Provides insights into complex interactions. 3. 3D Line Plot: Shows trends or patterns in 3D space.
disruptions. Textual EDA: Helps in understanding unstructured data like reviews or tweets. import numpy as np import pandas as pd
Reactive Effectiveness: Handles unexpected congestion but degrades Graphical EDA: Makes data interpretation intuitive and accessible to non- import matplotlib.pyplot as plt from mpl_toolkits.mplot3d import Axes3D
performance. technical stakeholders import seaborn as sns np.random.seed(42)
Prevention vs. Reactive: Prevention ensures stable performance, while reactive ____________________________________________ X = np.linspace(-10, 10, 100) Y = np.linspace(-10, 10, 100)
methods manage existing congestion. Significance of Big Data Z = np.sin(np.sqrt(X**2 + Y**2))
__________________________________________________ 1. Volume: Enables analysis of vast amounts of data from diverse sources (e.g., ___________________________________________
network requirements (e.g., delay, bandwidth) influence the choice of QoS social media, IoT devices, business transactions). Case Study: RealDirect
techniques. 2. Variety: Handles structured, semi-structured, and unstructured data types (e.g.,
text, images, videos). 3. Velocity: Facilitates real-time data processing and decision- RealDirect leverages predictive analytics, data-driven decision-making, and customer
Delay Sensitivity: Low delay requires prioritization (e.g., priority queuing, RSVP); making. 4. Veracity: Ensures accuracy and reliability of insights despite data insights to revolutionize real estate transactions.
high delay tolerance allows buffering and adaptive streaming. inconsistencies. 5. Value: Transforms raw data into actionable insights, driving Key Elements and Impact 1. Predictive Analytics
Bandwidth Requirements: High bandwidth needs use resource reservation; innovation and competitive advantage. • Application: Forecasts property values, optimal listing prices, and market demand.
limited bandwidth benefits from traffic shaping and adaptive bitrate. • Impact: Reduces time on the market and enhances investment decisions.
Traffic Type: Real-time traffic uses DiffServ or IntServ for prioritization; non-real- Analytic Techniques in Big Data 2. Data-Driven Decision-Making
time traffic uses packet marking and policing. 1. Descriptive Analytics • Application: Real-time data guides marketing, resource allocation, and operations.
Network Scalability: Large-scale networks benefit from DiffServ; small-scale • Definition: Summarizes historical data to identify trends and patterns. • Impact: Increases efficiency, improves targeting, and reduces costs.
networks can use IntServ for resource reservation. • Transformation: Provides better dashboards and visualizations for quick 3. Customer Insights • Application: Analyzes buyer/seller behavior, preferences, and
Packet Loss Tolerance: Low loss tolerance uses FEC and redundancy; high loss • Example: Retailers analyze past sales trends to predict future demand. trends. • Impact: Personalizes user experiences and improves customer satisfaction.
tolerance uses adaptive streaming and traffic shaping. 2. Predictive Analytics 4. Overall Strategy Impact • Faster transactions with better pricing strategies.
_____________________________________________________ • Definition: Uses statistical models and machine learning to forecast future outcomes. • Enhanced customer engagement through personalization.
steps involved in achieving good Quality of Service (QoS) using Integrated Services • Transformation: Introduces data-driven predictions over intuition-based forecasting. • Competitive advantage via data-centric innovation.
• Example: Banks predict loan defaults using customer credit histories. ______________________________________________________
1Traffic Classification: Identify and classify different traffic types for prioritization. 3. Prescriptive Analytics Stages of the Data Science Life Cycle
2Traffic Marking and Policing: Mark packets and enforce traffic limits for priority • Definition: Suggests actionable strategies based on data analysis and predictions. 1. Problem Definition: Clearly identify and align the problem with business objectives.
handling. • Transformation: Automates decision-making processes. 2. Data Collection: Gather relevant and high-quality data from diverse sources.
3Reservation of Resources: Use RSVP to reserve network resources for specific • Example: Logistics companies optimize delivery routes to save time and costs. 3. Data Preparation: Clean, preprocess, and transform data for analysis.
flows. 4. Exploratory Data Analysis (EDA): Analyze data patterns, trends, and relationships.
4Admission Control: Ensure sufficient resources before accepting new traffic flows. Methodologies Transforming Traditional Data Analysis 5. Model Building: Develop and train predictive or descriptive models.
5Packet Scheduling: Prioritize packets using scheduling algorithms based on traffic 1. Machine Learning (ML). • Transformation: Automates complex analyses and 6. Model Evaluation: Assess model performance using appropriate metrics.
needs. uncovers hidden patterns. • Example: Recommender systems for streaming platforms. 7. Deployment: Implement the model into production for real-world application.
6Traffic Policing and Shaping: Enforce traffic profiles and smooth out traffic 2. Natural Language Processing (NLP) • Transformation: Extracts insights from 8. Monitoring and Maintenance: Continuously monitor and update the model to ensure
7Flow Monitoring and Feedback: Continuously monitor and adjust traffic flow for QoS. unstructured text data. • Example: Sentiment analysis of product reviews. relevance.
Resource Deallocation: Release unused resources to optimize network efficiency. 3. Big Data Frameworks. • Transformation: Enables storage and processing of
massive datasets (e.g., Hadoop, Spark).

diffrent types of data


1. Qualitative Data (Categorical)
• Nominal: No order (e.g., gender, colors). Use frequency counts, mode, chi-square
tests.
• Ordinal: Ordered categories (e.g., education level). Use median, rank correlation,
non-parametric tests.

2. Quantitative Data (Numerical)


• Discrete: Countable values (e.g., number of cars). Use descriptive stats,
Poisson/Binomial distributions.
• Continuous: Measurable values (e.g., height, weight). Use mean, regression,
ANOVA, correlation.

3. Levels of Measurement
• Nominal: Categories with no order (e.g., colors). Use mode, chi-square.
• Ordinal: Ordered categories (e.g., rankings). Use median, rank tests.
• Interval: Equal intervals, no true zero (e.g., temperature). Use mean, standard
deviation.
• Ratio: Equal intervals, true zero (e.g., age, income). Use all statistical tests.

4. Time-Series Data
• Data over time (e.g., stock prices). Use trend analysis, forecasting, ARIMA.

5. Cross-Sectional Data
• Data from multiple subjects at one time (e.g., surveys). Use descriptive stats,
regression.

You might also like