0% found this document useful (0 votes)
10 views10 pages

Computer Network Module 4

The document discusses various protocols in the transport layer of the OSI model, focusing on UDP and TCP. UDP is a connectionless protocol with limited error checking, while TCP is connection-oriented and provides reliable data transmission through mechanisms like flow control and error control. Additionally, it covers FTP for file transfer, email architecture, congestion control mechanisms, and HTTP for web data access.

Uploaded by

ashtamia95
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views10 pages

Computer Network Module 4

The document discusses various protocols in the transport layer of the OSI model, focusing on UDP and TCP. UDP is a connectionless protocol with limited error checking, while TCP is connection-oriented and provides reliable data transmission through mechanisms like flow control and error control. Additionally, it covers FTP for file transfer, email architecture, congestion control mechanisms, and HTTP for web data access.

Uploaded by

ashtamia95
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

1. What is the role of transport layer?

The Transport layer is the fourth layer in the OSI model, which provides communication services
between the computers connected in the network. The transport layer is responsible for process-to-
process delivery of the entire message. The ultimate goal of the transport layer is to provide efficient,
reliable, and cost-effective data transmission service to its users. To achieve this, the transport layer
makes use of the services provided by the network layer.

2. Explain UDP
● UDP stands for User Datagram Protocol.
● UDP is a connectionless protocol.
● UDP has a very limited error checking capability.
● This type of protocol is used when reliability and security are less important than speed and size.
● The packet produced by the UDP protocol is known as a user datagram.

3. Explain UDP Packet format


The user datagram has a 16-byte header

● Source port address: It defines the address of the application process that has delivered
a message. The source port address is of 16 bits address.
● Destination port address: It defines the address of the application process that will receive
the message. The destination port address is of a 16-bit address.
● Total length: It defines the total length of the user datagram in bytes. It is a 16-bit field.
● Checksum: The checksum is a 16-bit field which is used in error detection.
Uses of UDP
● UDP protocol is suitable for multitasking.
● UDP is also applicable in the management processes.
● UDP is used to implement RIP (Routing Information Protocol).

4. What is TCP?

TCP stands for Transmission Control Protocol. TCP is a connection oriented protocol; it creates a
virtual connection between two TCPs to send data. In addition, TCP uses flow and error control
mechanisms at the transport level. In brief, TCP is called a connection-oriented, reliable transport
protocol.
5. Explain different TCP Services

1. Process-to-Process Communication: TCP provides process-to-process communication


using port numbers.
2. Stream Delivery Service: TCP allows the sending process to deliver data as a stream of
bytes and allows the receiving process to obtain data as a stream of bytes.
3. Sending and Receiving Buffers: TCP needs buffers for storage. There are two buffers, the
sending buffer and the receiving buffer, one for each direction.
4. TCP segments: At the transport layer, TCP groups a number of bytes together into a packet
called a segment. TCP adds a header to each segment and delivers the segment to the IP
layer for transmission. The segments are encapsulated in IP datagrams and transmitted.
5. Full-Duplex Communication: TCP offers full-duplex service, in which data can flow in
both directions at the same time.
6. Connection-Oriented Service: TCP is a connection-oriented protocol. When a process at
site A wants to send and receive data from another process at site B, the following occurs:
1. The two TCPs establish a connection between them. 2. Data are exchanged in both
directions. 3. The connection is terminated.
7. Reliable Service: TCP is a reliable transport protocol. It uses an acknowledgment
mechanism to check the safe and sound arrival of data.

6. Explain different features of TCP

1. Numbering System: There are two fields called the sequence number and the
acknowledgment number. These two fields refer to the byte number.
● Byte Number: The bytes of data being transferred in each connection are numbered by
TCP.
● Sequence Number: TCP assigns a sequence number to each segment that is being sent.
● Acknowledgment Number: The value of the acknowledgment field in a segment
defines the number of the next byte a party expects to receive.
2. Flow Control
TCP provides flow control. The receiver of the data controls the amount of data that are to be
sent by the sender.
3. Error Control: To provide reliable service, TCP implements an error control mechanism.
4. Congestion Control: The amount of data sent by a sender is not only controlled by the
receiver (flow control), but is also determined by the level of congestion in the network
7. Explain TCP segment format

TCP segment format


The segment consists of a 20- to 60-byte header, followed by data from the application program.

● Source port address. This is a 16-bit field that defines the port number of the application
program in the host that is sending the segment.
● Destination port address. This is a 16-bit field that defines the port number of the
application program in the host that is receiving the segment.
● Sequence number. This 32-bit field defines the number assigned to the first byte of data
contained in this segment.
● Acknowledgment number. This 32-bit field defines the byte number that the receiver of the
segment is expecting to receive from the other party.
● Data offset. The number of 32-bit words in the TCP header. It indicates where the data
begins.
● Reserved. This is a 6-bit field reserved for future use.
● Control. This field defines 6 different control bits or flags. These bits enable flow control,
connection establishment and termination, connection abortion, and the mode of data
transfer in TCP.
● Window size. This field defines the size of the window, in bytes, that the other party must
maintain. The maximum size of the window is 65,535 bytes.
● Checksum. This 16-bit field contains the checksum.
● Urgent pointer. This l6-bit field, which is valid only if the urgent flag is set, is used when the
segment contains urgent data.
● Options. There can be up to 40 bytes of optional information in the TCP header.
8. What is TCP Connection?

TCP is connection-oriented. A connection-oriented transport protocol establishes a virtual path between


the source and destination. All the segments belonging to a message are then sent over this virtual path.
Using a single virtual pathway for the entire message facilitates the acknowledgment process as well
as retransmission of damaged or lost frames.

9. Explain three way handshaking

In TCP, connection-oriented transmission requires three phases: connection establishment, data


transfer, and connection termination.
The connection establishment in TCP is called three way handshaking. The server program tells its
TCP that it is ready to accept a connection. This is called a request for a passive open.
The client program issues a request for an active open. A client that wishes to connect to an
open server tells its TCP that it needs to be connected to that particular server.
The three steps for Connection establishment using three-way handshaking.
1. The client sends the first segment, a SYN segment, in which only the SYN flag is set.
This segment is for synchronization of sequence numbers.
2. The server sends the second segment, a SYN +ACK segment.
3. The client sends the third segment. This is just an ACK segment. It acknowledges the
receipt of the second segment with the ACK flag and acknowledgment number field.
10. Explain FTP

File Transfer Protocol is a standard network protocol used to exchange and manipulate files
over a TCP/IP-based network, such as the Internet. FTP is built on client-server architecture and utilizes
separate control and data connections between the client and server applications. FTP is used with user-
based password authentication or with anonymous user access.
An FTP Server is a piece of software that is running on a computer and uses the File Transfer
Protocol to store and share files. The client has three components: user interface, client control process,
and the client data transfer process. The server has two components: the server control process and the
server data transfer process. The control connection is made between the control processes. The data
connection is made between the data transfer processes.
Control Connection
It is used to transfer control signals between the client and server. This connection is used by the control
process of client and server. FTP uses port number 21 for control connection. This control connection
remains connected during the entire interactive FTP session.
Data Connection
Data connection is used for actual data transfer. This connection is established between the Data
Transfer Process (DTP) of client and server. FTP uses port number 20 for data connection. The data
connection is opened and then closed for each file transferred. File transfer occurs over the data
connection under the control of the commands sent over the control connection.

FTP operations
When using FTP, the user performs some or all of the following operations:
● Connect to a remote host.
● Navigate and manipulate the directory structure.
● List files available for transfer.
● Define the transfer mode, transfer type, and data structure.
● Transfer data to or from the remote host.
● Disconnect from the remote host.

To use FTP, a user needs an account (user name) and a password on the remote server. Some sites
have a set of files available for public access, to enable anonymous FTP. To access these files, a user
does not need to have an account or password. Instead, the user can use anonymous as the user name
and guest as the password.
11. Explain the architecture of electronic

mail Architecture

a) User Agent
The first component of an electronic mail system is the user agent (VA). It provides service to
the user to make the process of sending and receiving a message easier. A user agent is a software
package (program) that composes reads, replies to, and forwards messages. It also handles mailboxes.
There are two types of user agents: command-driven and GUI-based.
Command-Driven Command-driven user agents belong to the early days of electronic mail. A
command-driven user agent normally accepts a one-character command from the keyboard to perform
its task.
GUI-Based Modern user agents are GUI-based. They contain graphical-user interface (GUI)
components that allow the user to interact with the software by using both the keyboard and the mouse.
MIME: - Multipurpose Internet Mail Extensions (MIME) is a supplementary protocol that allows non-
ASCII data to be sent through e-mail.
b) Message Transfer Agent: SMTP
The actual mail transfer is done through message transfer agents. To send mail, a system must have the
client MTA, and to receive mail, a system must have a server MTA. The formal protocol that defines
the MTA client and server in the Internet is called the Simple Mail Transfer Protocol (SMTP). SMTP
is used two times, between the sender and the sender's mail server and between the two mail servers.
SMTP simply defines how commands and responses must be sent back and forth.
SMTP uses commands and responses to transfer messages between an MTA client and an MTA server.
Commands are sent from the client to the server. It consists of a keyword followed by zero or more
arguments. SMTP defines 14 commands.
Responses are sent from the server to the client. A response is a three-digit code that may be followed
by additional textual information.
The process of transferring a mail message occurs in three phases: connection establishment, mail
transfer, and connection termination.
c) Message Access Agent: POP and IMAP
Currently two message access protocols are available: Post Office Protocol, version 3 (POP3) and
Internet Mail Access Protocol, version 4 (IMAP4).
POP3:- Post Office Protocol, version 3 (POP3) is simple and limited in functionality. Mail access starts
with the client when the user needs to download e-mail from the mailbox on the mail server. The client
opens a connection to the server on TCP port 110. It then sends its user name and password to access
the mailbox. The user can then list and retrieve the mail messages, one by one.
POP3 has two modes: the delete mode and the keep mode. In the delete mode, the mail is deleted
from the mailbox after each retrieval. In the keep mode, the mail remains in the mailbox after retrieval.
IMAP4:-Another mail access protocol is Internet Mail Access Protocol, version4 (IMAP4):- IMAP4
is similar to POP3, but it has more features;
IMAP4 provides the following extra functions
● A user can check the e-mail header prior to downloading.
● A user can search the contents of the e-mail for a specific string of characters prior to
downloading.
● A user can partially download e-mail.
● A user can create, delete, or rename mailboxes on the mail server.
● A user can create a hierarchy of mailboxes in a folder for e-mail storage.
12. What is Congestion in a network?

Congestion in a network may occur if the load on the network-the number of packets sent to the
network-is greater than the capacity of the network-the number of packets a network can
handle.

13. What is congestion control?

Congestion control refers to techniques and mechanisms that can either prevent congestion, before it
happens, or remove congestion, after it has happened. In general, we can divide congestion control
mechanisms into two broad categories: open-loop congestion control (prevention) and closed-loop
congestion control (removal)

14. Explain different categories of Congestion control mechanisms

⮚ Open-Loop Congestion Control


In open-loop congestion control, policies are applied to prevent congestion before it happens. In these
mechanisms, congestion control is handled by either the source or the destination.
● Retransmission Policy
Retransmission is sometimes unavoidable. If the sender feels that a sent packet is lost or corrupted, the
packet needs to be retransmitted. Retransmission in general may increase congestion in the network.
However, a good retransmission policy can prevent congestion.
● Window Policy
The type of window at the sender may also affect congestion. The Selective Repeat window is better
than the Go-Back-N window for congestion control. In the Go-Back-N window, several packets may
be resent. The Selective Repeat window, on the other hand, tries to send the specific packets that have
been lost or corrupted.
● Acknowledgment Policy
The acknowledgment policy imposed by the receiver may also affect congestion. If the receiver does
not acknowledge every packet it receives, it may slow down the sender and help prevent congestion.
● Discarding Policy
A good discarding policy by the routers may prevent congestion and at the same time may not harm
the integrity of the transmission.
● Admission Policy
An admission policy can also prevent congestion in virtual-circuit networks. If there is a chance of
congestion or there is congestion in the network, router should deny establishing a virtual network
connection to prevent further congestion.
⮚ Closed Loop Congestion Control
● Backpressure
Backpressure is a technique in which a congested node stops receiving packet from upstream node.
This may cause the upstream node or nodes to become congested and rejects receiving data from above
nodes. Backpressure is a node-to-node congestion control technique that propagates in the opposite
direction of data flow.
● Choke Packet Technique
A choke packet is a packet sent by a node to the source to inform it of congestion. Each router monitors
its resources whenever the resource utilization exceeds the router directly sends a choke packet to the
source giving it a feedback to reduce the traffic.
● Implicit Signaling
In implicit signaling, there is no communication between the congested nodes and the source. The
source guesses that there is congestion in a network.
● Explicit Signaling
In explicit signaling, if a node experiences congestion it can explicitly sends a packet to the source or
destination to inform about congestion.
✔ Forward Signaling: In forward signaling signal is sent in the direction of the
congestion. The destination is warned about congestion. The receiver in this case
adopt policies to prevent further congestion.
✔ Backward Signaling: In backward signaling signal is sent in the opposite direction
of the congestion. The source is warned about congestion and it needs to slow down.
15. What is HTTP?
The Hypertext Transfer Protocol (HTTP) is the main protocol used to access data on the World
Wide Web (WWW). HTTP uses a TCP connection to transfer files. An HTTP message is similar
in form to an SMTP message. The HTTP protocol can be used to transfer the data in the form of
plain text, hypertext, audio, video, and so on.
16. What are the Features of HTTP
o Connectionless protocol: HTTP is a connectionless protocol. HTTP client initiates a request and
waits for a response from the server. When the server receives the request, the server processes
the request and sends back the response to the HTTP client after which the client disconnects
the connection. The connection between client and server exist only during the current request
and response time only.
o Media independent: HTTP protocol is a media independent as data can be sent as long as both
the client and server know how to handle the data content. It is required for both the client and
server to specify the content type in MIME-type header.
o Stateless: HTTP is a stateless protocol as both the client and server know each other only during
the current request. Due to this nature of the protocol, both the client and server do not retain
the information between various requests of the web pages.

17. What is DNS?


DNS, or the Domain Name System, translates human readable domain names (for example,
www.amazon.com) to machine readable IP addresses (for example, 192.0.2.44). When we access a
website, we are using this service to locate the server where the domain’s website is located. This
conversion process is called a query.

18. What is DNS Resolver?


A DNS resolver, also called a recursive resolver, is a server designed to receive DNS queries from
web browsers and other applications. The resolver receives a hostname - for example,
www.example.com - and is responsible for tracking down the IP address for that hostname.

19. What are the different types of DNS server?

⮚ Root server
A root name server (also called a DNS root server or a root server for short) is responsible for
fundamental functions when it comes to translating domain names into IP addresses. The root name
server doesn’t execute the name resolution itself and instead informs the requesting client about which
other name server (DNS server) it can obtain further information from regarding the desired IP address.

⮚ TLD name server


A TLD nameserver maintains information for all the domain names that share a common domain
extension, such as .com, .net, or whatever comes after the last dot in a URL. The TLD Name Server
takes the domain name and provides the IP of an Authoritative Name Server.

The IANA breaks up the TLD servers into two main groups:
● Generic top-level domains: These are domains that are not country specific, some of
the best-known generic TLDs include .com, .org, .net, .edu, and .gov.
● Country code top-level domains: These include any domains that are specific to a
country or state. Examples include .uk, .us, .ru, and .jp
⮚ Authoritative nameserver
The authoritative nameserver contains information specific to the domain name. An authoritative
name server is a server that stores DNS records for domain names.
20. How Does DNS Work?
Each device connected to the internet is assigned a unique IP address which helps other computers
identify it. DNS or Domain Name System basically translates those domain names into IP addresses.
A domain name and its matching IP address are called a “DNS record”.

✔ Suppose you want to visit a site you open your browser and type site name in the address bar
and hit Enter on the keyboard.
✔ If the DNS records are found in your computer’s DNS cache it is resolved immediately.
✔ If no DNS records are found, then a query is sent to your local DNS server. Typically this is
your Internet provider’s server and is often called a “resolving nameserver”.
✔ If the records are not cached on the resolving nameserver, then the request is forwarded to
a “root nameserver”.
✔ The root server then responds to the resolver with the address of a Top Level Domain
(TLD) DNS server (such as .com or .net), which stores the information for its domains.
✔ The TLD server then responds with the IP address of the domain’s nameserver,
✔ Lastly The IP address is then returned to the resolver from the nameserver.

21. What is World Wide Web?


World Wide Web, which is also known as a Web, is a collection of websites or web pages stored
in web servers. These websites contain text pages, digital images, audios, videos, etc. Users can
access the content of these sites from any part of the world over the internet using their devices such
as computers, laptops, cell phones, etc. The World Wide Web (WWW) is a network of online
content that is formatted in HTML and accessed via HTTP. The term refers to all the interlinked
HTML pages that can be accessed over the Internet. The World Wide Web was originally designed
in 1991 by Tim Berners-Lee.

22. What is SNMP?


Simple Network Management Protocol (SNMP) is a standard protocol used for the communication and
management of network devices connected over an IP. SNMP collects data from different hardware
and software, organizes them, and aids in network fault detection and analysis.
23. What is SCTP?
Stream Control Transmission Protocol (SCTP) is a new reliable, message-oriented transport layer
protocol.
24. Briefly compare UDP, TCP, and SCTP
UDP is a message-oriented protocol. A process delivers a message to UDP, which is encapsulated in a
user datagram and sent over the network. UDP is unreliable UDP also lacks some other features, such
as congestion control and flow control.
TCP is a byte-oriented protocol. It receives a message or messages from a process, stores them as a
stream of bytes, and sends them in segments. TCP is a reliable protocol. TCP is a reliable protocol.
SCTP is a reliable message oriented protocol. It also has congestion control and flow control
mechanisms.
25. Explain different SCTP services
● Process-to- Process communication: -SCTP uses all important ports of TCP.
● Multi- Stream Facility: - SCTP provides multi-stream service to each connection, called as
association. If one stream gets blocked, then the other stream can deliver the data.
● Full- Duplex Communication: - SCTP provides full-duplex service (the data can flow in
both directions at the same time).
● Connection- Oriented Service: - The SCTP is a connection-oriented protocol it is
Called association in SCTP
● Reliability:-SCTP uses an acknowledgement mechanism to check the arrival of data.
26. Explain different features of SCTP
● Transmission Sequence Number (TSN)
The unit of data in SCTP is a data chunk. Data transfer in SCTP is controlled by numbering the data
chunks. In SCTP, TSN is used to assign the numbers to different data chunks.
● Stream Identifier (SI)
The SI is a 16 bit number and starts with 0. In SI, there are several streams in each association and it is
needed to identify them. Each data chunk needs to carry the SI in the header, so that it is properly
placed in its stream on arrival.
● Packets
In SCTP, the data is carried out in the form of data chunks and control information is carried
as control chunks. Data chunks and control chunks are packed together in the packet.
● Multihoming
Multihoming allows both ends (sender and receiver) to define multiple IP addresses for communication.
But, only one of these can be defined as primary address and the remaining can be used as alternative
addresses.

You might also like