UT Solution KEC-063
UT Solution KEC-063
SECTION A
1. Attempt all questions in brief
a) What are some common applications of computer networks?
Ans: Web Browsers, Email Clients, File Transfer Protocols, Messaging Apps, Video Conferencing
Tools, Remote Desktop Applications.
e) Compare the data rates for Standard Ethernet, Fast Ethernet, Gigabit Ethernet, and Ten-
Gigabit Ethernet.
Ans: Standard Ethernet can support data speeds up to 10 Mbps. Fast Ethernet can carry data at a
maximum speed of 100 Mbps. With Gigabit Ethernet, the data speeds reached a maximum speed of
1Gbps. 10-Gigabit-Ethernet can carry data at incredibly high speeds of 10 Gbps.
g) Change the following IPv4 addresses from dotted-decimal notation to binary notation (i)
111.56.45.78 (ii) 221.34.7.82
Ans: (i) 111.56.45.78 = 01101111.00111000.00101101.01001110
(ii) 221.34.7.82 = 11011101.00100010.00000111.01010010
SECTION-B
2(a) What are the similarities and differences between OSI and TCP/IP models?
Ans: Similarities between the TCP/IP model and the OSI model
1. Both are logical models.
2. Both define standards for networking.
3. Both provide a framework for creating and implementing networking standards and devices.
4. Both divide the network communication process into layers.
5. In both models, a single layer defines a particular functionality and sets standards for that
functionality only.
6. Both models allow a manufacturer to make devices and network components that can coexist
and work with the devices and components made by other manufacturers.
7. Both models simplify the troubleshooting process by dividing complex functions into simpler
components.
8. Instead of defining the already defined standards and protocols, both models referenced them.
Differences between the OSI model and the TCP/IP model
1. The OSI Layer model has seven layers while the TCP/IP model has four layers.
2. The OSI Layer model is no longer used while the TCP/IP is still used in computer networking.
3. To define the functionalities of upper layers, the OSI model uses three separate layers
(Application, Presentation, and Session) while the TCP/IP model uses a single layer
(Application).
4. Just like the upper layers, the OSI model uses two separate layers (Physical and Data-link) to
define the functionalities of the bottom layers while the TCP/IP uses a single layer (Link layer)
for the same.
5. To define the routing protocols and standards, the OSI model uses the Network layer while the
TCP/IP model uses the Internet layer.
6. The OSI model is well documented than the TCP/IP model.
7. The OSI model explains every standard and protocol in detail while the TCP/IP model provides
a summarized version of the same.
2(b) What are the advantages and disadvantages of using fiber optics cables?
Ans: A fibre optic cable is an advanced type of network cable offering a significantly
higher throughput than that of electrical communication cables. Made up of incredibly
thin strands of glass or plastic, known as optical fibres, these cables carry information
between two places using optical (light-based) technology
Advantages of Fibre Optic Cable
1. Greater Bandwidth: The most notable advantage of a fibre optic cable is that it
provides significantly improved performance when it comes to bandwidth. The
volume of data that can be transmitted is far greater than and is unrivalled by any
other type of cable-based communication.
2. Longer Distances: Fibre optic cables are designed to carry signals over much
longer distances than traditional cabling as they offer low power loss.
3. Thin & Lightweight: Optical fibres are much thinner and lighter than copper
wires, allowing them to be drawn into smaller diameters, making them more
suitable for places where space is restricted.
4. Superior Carrying Capacity: Due to how thin the fibres are, more of them can fit
into a given-diameter cable than copper wires.
5. Less Interference: As fibre optic cables don’t carry an electrical signal, they are
resistant to electromagnetic interference. Not only does this mean the rate of error
is low, but it also helps to enhance the cable’s ability to transfer data quickly over
longer distances without suffering considerable signal degradation. In addition,
unlike electrical signals, light signals from one fibre do not interfere with those of
other fibres.
6. High-Level Security: Fibre transmission offers a level of security that simply
cannot be matched by other materials. As they do not radiate electromagnetic
energy, it is extremely difficult to ‘listen’ in or tap. This makes it the most secure
medium available for carrying sensitive data.
7. Strong, Reliable & Flexible: Optic fibres possess greater tensile strength and
are sturdier than metal fibres of the same diameter, which means they’re less
likely to suffer damage. Fibre also isn’t as affected anywhere near as much by
weather, moisture or corrosive elements as metal wiring can be.
Disadvantages of Fibre Optic Cable
1. Production & Installation Cost: The cost to produce optic fibre cabling is higher
than that of copper. Installation is also more expensive as special test equipment is
usually required.
2. Fragility: As they are made of glass, fibre optic cables are more fragile than
electrical wires like copper cabling. If you bend them too much, they will break.
3. Splicing Difficulties: When deploying a new fibre optic network or expanding an
existing one, the fibres need to be properly sliced in order to avoid network
disruptions. This is a very delicate process – if the fibres are not properly
connected, the signal will suffer.
4. Installation & Construction Risk: Due to how small and compact the fibre optic
cable is, it is highly susceptible to becoming cut or damaged during installation or
any construction/renovation activities. It is therefore necessary to consider
restoration, backup and survivability.
5. Fibre Optic Cable Uses: Some of the most popular uses of fibre optic cables in
the UK include
6. Internet: Fibre optic cables are widely used in internet cables due to their ability
to transmit large amounts of data at very high speeds.
7. Computer Networking: Networking between computers in a single building is
made easier and faster with fibre optic cables. This helps to increase the
productivity and efficiency of a business as the time is takes to transfer files and
information is decreased.
8. Telephone: Fibre optic communication allows you to connect faster and have
clearer conversations both within and outside the country.
2(c ) Provide an overview of the IEEE 802.11 standard for wireless LANs. What are its different versions,
and how do they improve upon each other?
Ans:
Wireless communication is one of the fastest-growing technologies. The demand for connecting
devices without the use of cables is increasing everywhere. Wireless LANs can be found on
college campuses, in office buildings, and in many public areas. In this we concentrate on two
promising wireless technologies for LANs: IEEE 802.11 wireless LANs, sometimes called
wireless Ethernet, and Bluetooth, a technology for small wireless LANs. Although both
protocols need several layers to operate, we concentrate mostly on the physical and data link
layers.
IEEE 802.11
IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the
physical and data link layers.
A) ARCHITECTURE
The standard defines two kinds of services: the basic service set (BSS) and the extended service
set (ESS).
Basic Service Set
IEEE 802.11 defines the basic service set (BSS) as the building block of a wireless LAN. A
basic service set is made of stationary or mobile wireless stations and an optional central base
station, known as the access point (AP). Fig. 2 shows two sets in this standard. The BSS
without anAP is a stand-alone network and cannot send data to other BSSs. It is called an ad hoc
architecture. In this architecture, stations can form a network without the need of an AP; they
can locate one another and agree to be part of a BSS. A BSS with an AP is sometimes referred to as
an infrastructure network.
Fig. 2 Basic service sets (BSSs)
2(d) A router inside an organization receives the same packet with a destination address 190.240.
34.95. If the subnet mask is /19. Find the subnet address.
Ans: To find the subnet address given an IP address and a subnet mask, you need to perform a bitwise AND
operation between the IP address and the subnet mask.
Step-by-Step Calculation
1. Convert the IP address to binary:
a. 190.240.34.95
i. 190 = 101111101011111010111110
ii. 240 = 111100001111000011110000
iii. 34 = 001000100010001000100010
iv. 95 = 010111110101111101011111
b. IP address in binary: 10111110.11110000.00100010.01011111.
2. Convert the subnet mask to binary:
/19 means the first 19 bits are set to 1, and the remaining bits are set to 0
11111111.11111111.11100000.00000000
3. Perform a bitwise AND operation:
o IP address: 10111110.11110000.00100010.01011111
o Subnet mask: 11111111.11111111.11100000.00000000
o Subnet address (result of bitwise AND): 10111110.11110000.00100000.00000000
4. Convert the subnet address back to decimal:
o 10111110 = 190
o 11110000 = 240
o 00100000 = 32
o 00000000 = 0
So, the subnet address is: 190.240.32.0190.240.32.0190.240.32.0
SECTION C
3(a) Write short note on 1)Line coding 2) Switching Techniques 3) IEEE standard
Ans: 1) Line Coding: Line coding is a method used to convert digital data into a digital signal that can be
transmitted over a physical communication medium.
Key Types:
Unipolar: Uses a single voltage level to represent binary digits (e.g., 0s are represented by 0V, and 1s by a
positive voltage).
Polar: Utilizes two voltage levels, typically positive and negative, to represent binary digits.
o NRZ (Non-Return-to-Zero): Binary 0 and 1 are represented by different constant voltage levels
without returning to zero between bits.
o RZ (Return-to-Zero): Each bit returns to zero voltage in the middle of the bit interval.
o Manchester Encoding: Each bit has a transition in the middle; a low-to-high transition represents 0,
and a high-to-low transition represents 1.
o Differential Manchester: Each bit period is split into two halves, and a transition occurs at the start
of each bit period.
Purpose: Ensures proper synchronization, reduces bandwidth requirements, and mitigates issues such as
DC bias and baseline wander.
2) Switching Techniques: Switching techniques are methods used in telecommunications to route data
from the source to the destination across a network.
Types:
Circuit Switching: Establishes a dedicated communication path or circuit between two nodes for
the duration of the communication session.
o Example: Traditional telephone networks.
o Advantages: Guaranteed continuous transmission, low delay once the circuit is established.
o Disadvantages: Inefficient use of resources, setup time required.
Packet Switching: Data is divided into packets that are transmitted over shared network resources.
Each packet may take a different path to the destination.
o Example: Internet data transmission.
o Advantages: Efficient use of network resources, flexible, and scalable.
o Disadvantages: Potential for variable delays, packet loss, and reordering.
Message Switching: Entire messages are routed from one switch to another, with each switch
storing the message before forwarding it.
o Advantages: No need for a dedicated path, efficient for intermittent traffic.
o Disadvantages: Higher delay due to store-and-forward mechanism, requires large storage capacity at
switches.
3) IEEE Standard: IEEE (Institute of Electrical and Electronics Engineers) standards are a set of
guidelines and protocols established by the IEEE for various technologies and industries.
Key Areas:
Networking:
o IEEE 802: A family of standards for local area networks (LAN) and metropolitan area networks
(MAN).
IEEE 802.3: Ethernet standards.
IEEE 802.11: Wireless LAN (Wi-Fi) standards.
Electrical and Electronic Engineering:
o IEEE 1394: High-performance serial bus (FireWire).
Telecommunications:
o IEEE 802.15: Standards for wireless personal area networks (WPAN), including Bluetooth.
Purpose: Ensures compatibility, interoperability, and reliability of products and technologies across
different manufacturers and industries. It also promotes innovation and development by providing a
common framework for research and implementation.
3(b) Differentiate between Circuit Switching and Packet Switching with suitable diagram.
Ans: CIRCUIT SWITCHING: A circuit-switched network (as shown in Fig 4) consists of a set of
switches connected by physical links. A connection between two stations is a dedicated path made of one or
more links. Each connection uses only one dedicated channel on each link. Each link is normally
divided into n channels by using FDM or TDM. The link can be permanent (leased line) or temporary
(telephone).
In packet Switching, flow of data is not continuous rather it flows in the form of packets. The
size of the packet is determined by the network and the governing protocol. This type of
switching further classify into datagram networks and virtual circuit networks.
Datagram Networks: Data are transmitted in discrete units called packets. Size of the packet
depends on the protocol and network. Packets switched networks are connectionless, hence no
resource allocation. Connectionless means the switch does not keep information about the
connection state. Datagram switching is done at network layer as shown in Fig 6
Fig 6 Datagram Networks
A switch in a datagram network uses a routing table that is based on the destination address. The
destination address in the header of a packet in a datagram network remains the same during the
entire journey of the packet. The total delay is shown Fig 7.
The VCN behaves as if a circuit switched net because there is a setup phase to establish the VCI
entries in the switch table. There is also a data transfer phase and teardown phase. The total delay
in virtual circuit network is shown in Fig 9
4(a) What are the primary difference between guided and unguided transmission media?
Ans: Guided Media: Guided media, which are those that provide a conduit from one device to
another, include twisted-pair cable, coaxial cable, and fiber-optic cable.
Twisted Pair Cable: A twisted pair consists of two conductors (normally copper), each with its
own plastic insulation, twisted together. One of the wires is used to carry signals to the receiver,
and the other is used only as a ground reference. The receiver uses the difference between the
two. Twisted-pair cables are used in telephone lines to provide voice and data channels. The
local loop-the line that connects subscribers to the central telephone office commonly consists of
unshielded twisted-pair cables. The DSL lines that are used by the telephone companies to
provide high-data-rate connections also use the high-bandwidth capability of unshielded twisted-
pair cables
Coaxial Cable: Coaxial cable (or coax) carries signals of higher frequency ranges than those in
twisted pair cable, in part because the two media are constructed quite differently. Instead of
having two wires, coax has a central core conductor of solid or stranded wire (usually copper)
enclosed in an insulating sheath, which is, in turn, encased in an outer conductor of metal foil,
braid, or a combination of the two. The outer metallic wrapping serves both as a shield against
noise and as the second conductor, which completes the circuit. This outer conductor is also
enclosed in an insulating sheath, and the whole cable is protected by a plastic cover as shown in
figure below:
Coaxial cable was widely used in analog telephone networks where a single coaxial network
could carry 10,000 voice signals. Later it was used in digital telephone networks where a single
coaxial cable could carry digital data up to 600 Mbps. However, coaxial cable in telephone
networks has largely been replaced today with fiber-optic cable
Fiber Optic Cable: A fiber-optic cable is made of glass or plastic and transmits signals in the
form of light. To understand optical fiber, we first need to explore several aspects of the nature of
light. Light travels in a straight line as long as it is moving through a single uniform substance
Fiber-optic cable is often found in backbone networks because its wide bandwidth is cost-
effective. Today, with wavelength-division multiplexing (WDM), we can transfer data at a rate
of 1600 Gbps.
Unguided Media
Unguided media transport electromagnetic waves without using a physical conductor. This type
of communication is often referred to as wireless communication. Signals are normally broadcast
through free space and thus are available to anyone who has a device capable of receiving them.
Unguided signals can travel from the source to destination in several ways: ground propagation,
sky propagation, and line-of-sight propagation.
Radio Waves: Although there is no clear-cut demarcation between radio waves and microwaves,
electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are normally called
radio waves; waves ranging in frequencies between 1 and 300 GHz are called microwaves.
However, the behavior of the waves, rather than the frequencies, is a better criterion for
classification. Radio waves use omni-directional antennas that send out signals in all directions.
The omni-directional characteristics of radio waves make them useful for multicasting, in which
there is one sender but many receivers. AM and FM radio,television, cordless phones, and
paging are examples of multicasting.
Microwaves: Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves. Microwaves are unidirectional. When an antenna transmits microwave waves, they
can be narrowly focused. This means that the sending and receiving antennas need to be aligned.
The unidirectional property has an obvious advantage. A pair of antennas can be aligned without
interfering with another pair of aligned antennas. Microwaves, due to their unidirectional
properties, are very useful when unicast (one-to-one) communication is needed between the
sender and the receiver. They are used in cellular phones, satellites and wireless LANs.
Infrared: Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm
to 770 nm), can be used for short-range communication. Infrared waves, having high
frequencies, cannot penetrate walls. This advantageous characteristic prevents interference
between one system and another; a short-range communication system in one room cannot be
affected by another system in the next room. When we use our infrared remote control, we do not
interfere with the use of the remote by our neighbors. However, this same characteristic makes
infrared signals useless for long-range communication. In addition, we cannot use infrared waves
outside a building because the sun's rays contain infrared waves that can interfere with the
communication. The infrared band, almost 400 THz, has an excellent potential for data
transmission. Such a wide bandwidth can be used to transmit digital data with a very high data
rate. The Infrared Data Association (IrDA), an association for sponsoring the use of infrared
waves, has established standards for using these signals for communication between devices such
as keyboards, mice, PCs, and printers. For example, some manufacturers provide a special port
called the IrDA port that allows a wireless keyboard to communicate with a PC. The standard
originally defined a data rate of 75 kbps for a distance up to 8 m. The recent standard defines a
data rate of 4 Mbps.
4 (b) Compare and contrast HDLC and PPP in terms of their features, functionalities, and
suitability for different networking environments.
Ans: HDLC (High-Level Data Link Control) and PPP (Point-to-Point Protocol) are both data
link layer protocols used in networking, but they have different features, functionalities, and
suitability for various networking environments. Here's a comparison and contrast of the two:
Comparison
Feature/Functionality HDLC PPP
Standard ISO 13239 RFC 1661
Frame Structure Fixed-length Flexible
Feature/Functionality HDLC PPP
Error Detection CRC FCS
Error Correction Yes No
Flow Control Window-based No
Transmission Mode Bit-oriented Byte-oriented
Advanced link
Link Management Simple link management management
(LCP)
Multiprotocol Extensive (via
Limited
Support NCPs)
Authentication No Yes (PAP, CHAP)
WAN, Point-to-point,
Usage Environment synchronous/asynchronous internet access,
links WAN
5(a) Discuss the concept of quality of Service (QoS) in IEEE 802.11 Networks. How is QoS
implemented, and what benefits does it provide?
Ans: Quality of Service (QoS) in IEEE 802.11 networks is a set of technologies and mechanisms
that ensure the efficient management of network resources to meet the performance requirements
of different applications. QoS aims to prioritize certain types of traffic, reduce latency, and
ensure a consistent level of performance, which is particularly crucial for applications such as
voice over IP (VoIP), video streaming, and online gaming.
QoS in IEEE 802.11 Networks
IEEE 802.11e is the standard that defines enhancements for QoS in wireless networks. It
introduces mechanisms that prioritize traffic and manage bandwidth allocation to ensure that
critical applications receive the necessary network resources.
Implementation of QoS in IEEE 802.11 Networks
1. Enhanced Distributed Channel Access (EDCA):
o Traffic Categories (TCs): EDCA defines four access categories (ACs): Voice
(AC_VO), Video (AC_VI), Best Effort (AC_BE), and Background (AC_BK). Each
category has different priorities, with Voice and Video having the highest.
o Arbitration Interframe Space (AIFS): Different access categories have different
AIFS values, which determine the waiting time before a device can attempt to
access the medium. Higher priority traffic has shorter AIFS values.
o Transmission Opportunity (TXOP): Defines the maximum duration a device can
occupy the medium once it gains access. Higher priority traffic is allowed longer
TXOPs.
o Contention Window (CW): The contention window size varies based on the access
category. Higher priority traffic has smaller contention windows, reducing the
waiting time.
2. HCF Controlled Channel Access (HCCA):
o HCCA is a more centralized method compared to EDCA, where a Hybrid
Coordinator (HC) within the access point (AP) manages access to the medium. The
HC polls stations to allow transmission opportunities based on predefined schedules,
ensuring deterministic access for high-priority traffic.
o Traffic Specification (TSPEC): Devices can request specific QoS requirements
using TSPEC, which includes parameters like data rate, delay, and jitter. The HC
uses this information to allocate resources appropriately.
3. Block Acknowledgment:
o Reduces overhead by acknowledging a block of frames instead of individual frames,
enhancing throughput and reducing latency for high-priority traffic.
Benefits of QoS in IEEE 802.11 Networks
1. Prioritization of Critical Traffic:
o Ensures that time-sensitive applications like VoIP and video conferencing receive
the necessary bandwidth and low latency, improving the user experience.
2. Improved Network Efficiency:
o By managing bandwidth allocation and reducing collisions, QoS mechanisms
improve overall network efficiency and throughput.
3. Enhanced User Experience:
o Applications that require consistent performance, such as online gaming and video
streaming, benefit from reduced jitter and packet loss, leading to a smoother
experience.
4. Scalability:
o QoS mechanisms help in managing the increased load and diverse traffic types in
dense network environments, ensuring fair resource allocation.
5. Better Resource Management:
o QoS enables better management of network resources, ensuring that high-priority
traffic is serviced appropriately without being affected by lower-priority traffic.
Q5(b) How do you say collision detection is analog process? Why do we prefer CSMA over
ALOHA? Prove that maximum efficiency of ALOHA is 1/e.
Ans: Collision Detection as an Analog Process
Collision detection in networking, particularly in Ethernet (using CSMA/CD - Carrier Sense Multiple
Access with Collision Detection), is considered an analog process due to the following reasons:
1. Signal Analysis: Collision detection involves monitoring the voltage levels on the communication medium
(typically a cable) to identify interference patterns. This requires the ability to distinguish between valid
signals and noise, which is inherently an analog process.
2. Continuous Monitoring: The network interface card (NIC) continuously monitors the line for any changes
in signal amplitude that indicate a collision. The variations in signal strength and waveform are analyzed in
real-time.
3. Physical Layer Interaction: Collision detection happens at the physical layer of the OSI model, where
signals are represented as analog waveforms. The NIC uses this analog information to determine if multiple
devices are transmitting simultaneously.
Preference for CSMA over ALOHA
CSMA (Carrier Sense Multiple Access) is preferred over ALOHA for several reasons:
1. Reduced Collisions: In CSMA, devices sense the carrier (the communication medium) before transmitting. If
the medium is busy, they wait, significantly reducing the chances of collisions compared to ALOHA, where
devices transmit regardless of the state of the medium.
2. Higher Efficiency: CSMA's ability to detect a busy medium before transmitting leads to fewer
retransmissions and higher overall network efficiency.
3. Network Load Management: CSMA dynamically adapts to network load, as devices wait longer before
retransmitting if the medium is busy, preventing congestion and further reducing collisions.
4. Lower Latency: By reducing collisions and retransmissions, CSMA generally offers lower latency than
ALOHA, making it more suitable for time-sensitive applications.
6(a) why do we use subnet mask? Perform the sub netting of the following IP address 160.111.x.x;
Original subnet mask 255.255.0.0; amount of subnets 6.
Ans: A subnet mask is used in networking to divide an IP address into a network and host portion. This
process, called subnetting, allows for efficient utilization of IP addresses, improves network performance,
and enhances security. Here's why we use subnet masks:
1. Efficient IP Address Management: Subnetting divides a larger network into smaller, more
manageable sub-networks (subnets). This helps in efficient allocation of IP addresses and reduces
wastage.
2. Improved Network Performance: By segregating a large network into smaller subnets, broadcast
traffic is limited to within each subnet. This reduces congestion and improves overall network
performance.
3. Enhanced Security: Subnetting allows for the isolation of different segments of a network. This
isolation can prevent unauthorized access between subnets, improving security.
4. Simplified Network Management: Smaller subnets are easier to manage and troubleshoot.
Network administrators can pinpoint issues more quickly within a defined subnet.
Subnetting the IP Address 160.111.x.x
Given:
Original IP address: 160.111.x.x (Class B address)
Original subnet mask: 255.255.0.0 (/16)
Number of required subnets: 6
1. Determine the New Subnet Mask:
o To create 6 subnets, we need at least 3 additional bits (since 2^3 = 8 subnets, which is the next power
of 2 greater than 6).
o Original subnet mask: /16 (255.255.0.0)
o New subnet mask: /16 + 3 = /19 (255.255.224.0)
2. Calculate Subnet Addresses:
o The subnet increment is determined by the value of the last octet in the subnet mask. For /19, the
subnet mask in binary is 255.255.224.0:
o The increment is 2^{(8 - 3)} = 2^5 = 32This means subnets increase by 32 in the third octet.
3. List the Subnets:
o The subnets are formed by incrementing the value of the third octet by 32 each time:
Subnet 1: 160.111.0.0/19
Subnet 2: 160.111.32.0/19
Subnet 3: 160.111.64.0/19
Subnet 4: 160.111.96.0/19
Subnet 5: 160.111.128.0/19
Subnet 6: 160.111.160.0/19
Verification
Each subnet has a range of addresses, and the next subnet starts immediately after the previous one ends. For
instance, the first subnet (160.111.0.0/19) covers addresses from 160.111.0.0 to 160.111.31.255, the second
subnet (160.111.32.0/19) covers addresses from 160.111.32.0 to 160.111.63.255, and so on.
6(b) What are the difference between distance vector and link state routing protocol? Explain.
Ans: Routing protocols are essential for determining the best path for data to travel across a network. Two primary
types of routing protocols are Distance Vector and Link State. Each has distinct characteristics, advantages, and
disadvantages.
Comparison Table
Feature Distance Vector Link State
Routing Information Entire routing table to neighbors Link state information to all routers
Metric Distance (usually in hops) Cost based on various metrics
Algorithm Bellman-Ford Dijkstra’s
Convergence Speed Slow Fast
Complexity Simple Complex
Overhead Low High
Scalability Limited High
Example Protocols RIP, IGRP OSPF, IS-IS
Loop Prevention Prone to loops (count-to-infinity) Less prone due to complete topology
Resource Requirements Lower CPU and memory usage Higher CPU and memory usage
Bandwidth Usage Periodic updates Initial flooding, then event-triggered updates
Distance Vector and Link State routing protocols serve different needs and environments. Distance Vector protocols
are simpler and require less computational power, making them suitable for smaller networks. However, they suffer
from slower convergence and potential routing loops. On the other hand, Link State protocols provide faster
convergence and a more accurate network map, making them ideal for larger, more complex networks, albeit at the
cost of higher resource usage and complexity. Understanding these differences helps network administrators choose
the appropriate routing protocol for their specific network requirements.
7(b) Explain how does e-mail reaches to destination. Explain in brief SMTP emphasizing the role and
function of User Agent (UA) and Mail Transfer Agent (MTA).
Ans: Primarily the Simple Mail Transfer Protocol (SMTP), User Agent (UA), and Mail Transfer Agent (MTA).
Here’s a brief overview of the process:
1. Composition and Sending:
User Agent (UA): The UA is an email client like Outlook, Gmail, or Thunderbird, where the user
composes and sends the email. When the user clicks "send," the UA formats the email into a
standard format and sends it to the local Mail Transfer Agent (MTA).
2. Transfer:
Mail Transfer Agent (MTA): The MTA is responsible for transferring the email from the sender's
UA to the recipient's UA. It acts like a post office, routing the email through various servers until it
reaches its destination. MTAs use the Simple Mail Transfer Protocol (SMTP) to forward the email
between servers.
3. Routing:
The sending MTA queries the Domain Name System (DNS) to find the recipient's mail server (MX
record). The email is then routed through the internet, possibly passing through several intermediate
MTAs, until it reaches the recipient's mail server.
4. Delivery:
The recipient’s mail server receives the email and stores it until the recipient retrieves it. This server
typically uses protocols like Post Office Protocol (POP) or Internet Message Access Protocol
(IMAP) to deliver the email to the recipient’s UA.
5. Retrieval:
User Agent (UA): The recipient's UA checks the mail server for new messages and downloads them
to the user’s inbox.
Simple Mail Transfer Protocol (SMTP)
SMTP is the protocol used to send emails from one server to another. It operates on the principle of "store
and forward" and uses a process similar to the postal system. Here’s a breakdown of its roles and functions:
Role and Function:
SMTP establishes a connection between the sender’s and recipient’s MTAs.
It transfers the email data from the sender's MTA to the recipient's MTA.
It can relay messages through multiple MTAs if the recipient's MTA is not directly
reachable.
SMTP manages errors and notifications for undelivered emails.
User Agent (UA)
Role and Function:
The UA is the interface through which users interact with the email system.
Users create and send emails.
Users receive, read, and organize emails.
The UA formats the email into a standard format before sending.
Mail Transfer Agent (MTA)
Role and Function:
The MTA is responsible for transferring emails between servers.
It determines the best path to route the email to its destination.
It temporarily stores emails and forwards them to the next hop in the delivery process.
Ensures emails sent and received using the correct protocols (mainly SMTP).