CN Mid2 Answers
CN Mid2 Answers
Definition:
SNMP is a protocol used to monitor and manage devices on IP networks such as routers,
switches, servers, workstations, printers, and more. It belongs to the application layer of the OSI
model and enables network administrators to manage network performance, find and solve
network problems, and plan for network growth.
● GETNEXT: Retrieves the next object in the Management Information Base (MIB).
● TRAP: Sent from the agent to the manager to report an event or error.
Definition:
TELNET is a network protocol used to provide a command-line interface for communication with
a remote device or server over a TCP/IP network. It allows users to log in to remote systems
and control them as if they were local.
Purpose of TELNET
Telnet Commands
• DNS is a hierarchical and distributed database that translates human-readable domain names
into IP addresses.
• DNS is a core service of the internet, operating at the Application Layer of the OSI model.
This process involves three steps between two hosts (say, Host A and Host B):
1. SYN:
Host A sends a SYN (synchronize) packet to Host B to request a connection.
Example: SYN, Seq = x
2. SYN-ACK:
Host B responds with a SYN-ACK packet. This means it acknowledges Host A's
request and also initiates a connection back.
Example: SYN, ACK, Seq = y, Ack = x+1
3. ACK:
Host A responds with an ACK (acknowledgment), confirming the connection.
Example: ACK, Seq = x+1, Ack = y+1
Steps:
3. Each host receives the other's SYN and responds with SYN-ACK:
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It can generate 4.29 × 10⁹ address The address space of IPv6 is quite large; it can
space produce 3.4 × 10³⁸ address space
The Security feature is dependent IPSEC is an inbuilt security feature in the IPv6
on the application protocol
In IPv4, packet flow identification is In IPv6, packet flow identifications are available and
not available use the flow label field in the header
IPv4 has a header of 20–60 bytes IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consists of 4 fields which are IPv6 consists of 8 fields, which are separated by a
separated by dots (.) colon (:)
IPv4’s IP addresses are divided into IPv6 does not have any classes of the IP address
five different classes: Class A,
Class B, Class C, Class D, Class E
5. Explain about Sliding Window Protocol?
Ans: The Sliding Window Protocol is a method used in computer networks to ensure reliable
and efficient data transmission between a sender and a receiver. It is primarily used in the data
link layer and the transport layer (such as in TCP). The main idea of the protocol is to allow the
sender to send multiple frames before needing an acknowledgment for the first one, thus
improving bandwidth utilization and performance. The "window" refers to a set of frames that
can be sent without receiving an acknowledgment. As the sender receives acknowledgments
from the receiver, the window "slides" forward, allowing it to transmit more data.
Purpose
● Ensures efficient data transfer.
● Controls the number of frames a sender can send before waiting for an
acknowledgment (ACK).
● Sender sends one frame and waits for ACK before sending the next.
2. Go-Back-N ARQ
● If a frame is lost, all subsequent frames are resent (go back and resend from the lost
one).
● Like Go-Back-N but only the lost or erroneous frames are retransmitted.
● It provides a graphical interface for users to access web pages, enter URLs, and
interact with multimedia and web-based content.
● Email services (Gmail), social media (Facebook), e-commerce sites (Amazon), etc.
● It uses application-level protocols, mainly HTTP and HTTPS, to communicate with the
browser and web servers.
This layer ensures data is transmitted reliably between client and server.
● It uses protocols like TCP (Transmission Control Protocol) and UDP under the hood.
● Uses the IP (Internet Protocol) for addressing and delivering packets to the correct
destination.
This layer includes networking hardware that connects devices and routes traffic.
This is the lowest level, dealing with actual transmission of data in the form of electrical or
optical signals.
If a single frame is lost or has an error, all Only the erroneous or lost frames are
subsequent frames are resent. resent.
Can send multiple frames (N frames), but Can send multiple frames (typically up to
must wait for ACKs in order. N/2), and ACKs can be out of order.
Receiver accepts only in-order frames; Receiver buffers out-of-order frames and
out-of-order frames are discarded. reorders them after receiving the missing
ones.
Less efficient when errors occur due to More efficient as only the lost or corrupted
unnecessary retransmission of correct frames are retransmitted.
frames.
Suitable for networks with low error rates. Suitable for high-error networks where
efficiency is critical.
Ethernet, defined by the IEEE 802.3 standard, is the most widely used wired LAN (Local Area
Network) technology. It supports high-speed communication over physical cables such as
twisted pair, coaxial, or fiber optic.
Key Features
● Data Transfer Rates: 10 Mbps (original), 100 Mbps (Fast Ethernet), 1 Gbps (Gigabit
Ethernet), 10 Gbps and above.
● Topology: Star or bus (modern networks use star topology with switches).
● Frame Structure:
○ Preamble
○ Type/Length field
🔹 Advantages
● High data transfer speed and reliability.
🔹 Key Features
● Standard: IEEE 802.15.1 (Classic Bluetooth), IEEE 802.15.4 (Low Rate WPAN), IEEE
802.15.6 (Body Area Networks)
● Frequency Band: 2.4 GHz ISM band (Industrial, Scientific, and Medical)
● Data Rates:
○ Bluetooth 5.0: increased range and speed (up to 2 Mbps with BLE)
● Access Method: Frequency Hopping Spread Spectrum (FHSS) and Time Division
Duplex (TDD)
🔹 Advantages
● Eliminates the need for cables.
1. ALOHA Protocol
ALOHA was the earliest random access protocol, developed at the University of Hawaii.
🔸 Types:
● Pure ALOHA:
○ If a collision occurs, the sender waits for a random time and retransmits.
○ Efficiency: ~18% (i.e., only 18% of the channel capacity is used effectively).
● Slotted ALOHA:
○ Time is divided into slots; stations can only send at the beginning of a slot.
CSMA improves on ALOHA by sensing the channel before transmission to reduce the chance
of collisions.
🔸 Types of CSMA:
● 1-persistent CSMA:
● Non-persistent CSMA:
○ If the channel is busy, waits for a random time before trying again.
3. Collision-Free Protocols
🔸 Examples:
● Bit-Map Protocol:
○ Each router shares its routing table with its neighbors periodically.
○ Each router builds a map of the network and calculates the shortest path using
Dijkstra’s algorithm.
1. Admission Control
● Description: Before admitting new traffic into the network, the system checks whether
there is enough capacity to handle it.
● Purpose: Prevents overload by refusing new traffic that may cause congestion.
● Example: If a video stream request is made, the network checks if enough bandwidth is
available before allowing it.
● Token Bucket: Allows bursts of data but controls average rate over time.
● Purpose: Prevents sudden data bursts that could overwhelm the network.
● Purpose: Ensures that enough resources are available to handle traffic smoothly without
causing congestion.
● Techniques:
○ FIFO (First-In-First-Out)
● Purpose: Reduces congestion by controlling packet flow and prioritizing critical traffic.
🔹 5. Routing Algorithms
● Description: Smart routing can prevent congestion by dynamically selecting less
congested paths.
● Used in: TCP at the transport layer, but impacts the network layer indirectly.
● Not preventive by design, but can help protect the network from escalating congestion.