SlideShare ist ein Scribd-Unternehmen logo
1 von 7
MC0087-INTERNETWORKING WITH TCP/IP 
Que. 1 Discuss the functions of transport layer and Network Interface Layer? 
Ans 
Functions of transport layer: - 
Transport layer accepts data from session layer breaks it into packets and delivers these packets to 
the network layer. It is the responsibility of transport layer to guarantee successful arrival of data at 
the destination device. It provides an end-to-end dialog that is the transport layer at the source 
device directly communicates with transport layer at destination device. 
Message headers and control messages are used for this purpose. It separates the upper layers from 
the low level details of data transmission and makes sure an efficient delivery. 
OSI model provides connection-oriented service at transport layer. 
It is responsible for the determination of the type of service that is to be provided to the upper 
layer. Normally it transmits packets in the same order in which they are sent however it can also 
facilitate the transmission of isolated messages. There is no surety that these isolated messages are 
delivered to the destination devices in case of broadcast networks and they will be in the same 
order as were sent from the source. 
Applications 
Applications 
Transport 
TCP/UDP 
Internetwork 
IP 
ICMP 
ARP/RARP 
Network Interface 
And 
Hardware 
Network Interface 
And 
Hardware 
Functions of transport layer
Network Interface Layer: - 
The Network Interface Layer (also called the Network Access Layer) sends TCP/IP packets on the 
network medium and receives TCP/IP packets off the network medium. 
TCP/IP was designed to be independent of the network access method, frame format, and medium. 
Therefore, you can use TCP/IP to communicate across differing network types that use LAN 
technologies – such as Ethernet and 802.11 wireless LAN – and WAN technologies –such as Frame 
Relay and Asynchronous Transfer Mode (ATM). By being independent of any specific network 
technology, TCP/IP can be adapted to new technologies. 
The Network Interface layer of the DARPA model encompasses the Data Link and Physical layers of 
the OSI model. The Internet layer of DARPA model does not take advantage of sequencing and 
acknowledgment services that might be present in the Data Link layer of the OSI model. The 
Internet layer assumes an unreliable Network Interface layer and that reliable communication 
through session establishment and the sequencing and acknowledgment of packets is the 
responsibility of either the Transport layer or the Application layer.
Que. 2 Brief the following 
a) ISDN 
b) X.25 
Ans 
a) ISDN 
The ISDN Basic Rate Interface (BRI) usually supports two B-channels with a capacity of 64 kbps 
each, and a 16 kbps D-channel for control information. B-channels can be used for voice or data or 
just for data in a combined way. The ISDN Primary Rate Interface (PRI) can support many 
concurrent B-channel links and one 64 kbps D-channel. The PPP, LCP and NCP mechanisms are 
particularly useful in this situation in reducing or eliminating manual configuration and facilitating 
ease of communication between diverse implementations. The ISDN D-channel can also be use for 
sending PPP packets when suitably framed, but is limited in bandwidth and often restricts 
communication links to a local switch. PPP treats ISDN channels as bit- or octet-oriented 
synchronous links. These links must be full duplex, but can be either dedicated or circuit-switched. 
PPP presents an octet interface to the physical layer. There is no provision for sub-octets to be 
supplied or accepted. PPP does not impose any restrictions regarding transmission rate other than 
that of the particular ISDN channel interface. PPP does not require the use of control signals. When 
available, using such signals can allow greater functionality and performance. The D-channel 
interface requires NRZ encoding. 
b) X.25 
This topic describes the encapsulation of IP over X.25 networks, in accordance with ISO/IEC and 
CCITT standards. IP over X.25 networks is documented by RFC 1356 (which obsoletes RFC 877). 
RFC 1356 is a Draft Standard with a status of elective. The substantive change to the IP 
encapsulation over X.25 is an increase in the IP datagram MTU size, the X.25 maximum data packet 
size, the virtual circuit management, and the interoperable encapsulation over X.25 of protocols 
other than IP between multi-protocol routers and bridges. 
One or more X.25 virtual circuits are opened on demand when datagram arrive at the network 
interface for transmission. Protocol Data Units (PDUs) are sent as X.25 complete packet sequences. 
That is, PDUs begin on X.25 data packet boundaries and the M bit (more data) is used to fragment 
PDUs that are larger than one X.25 data packet in length. In the IP encapsulation, the PDU is the IP 
DATAGRAM. The first octet in the Call User Data (CUD) field (the first data octet in the call Request 
packet) is used for protocol de-multiplexing in accordance with Subsequent Protocol Identifier 
(SPI) in ISO/IEC TR 9577.
Que. 3 What are congestion? Mention two algorithms to overcome congestion? 
Ans. 
TCP is the popular transport protocol for best-effort traffic in Internet. However, TCP is not well-suited 
for many applications such as streaming multimedia, because TCP congestion control 
algorithms introduce large variations in the congestion window size (and corresponding large 
variations in the sending rate). Such variability in the sending rate is not acceptable to many 
multimedia applications. Hence, many multimedia applications are built over UDP and use no 
congestion control at all. 
The absence of congestion control in applications built over UDP may lead to congestion collapse on 
the Internet. In addition, the UDP flows may starve any competing TCP flows. To overcome these 
adverse effects, congestion control needs to be incorporated into all applications using the Internet, 
whether at the transport layer or provided by the application itself. Furthermore, the congestion 
control algorithms must be TCP-friendly, i.e. the TCP-friendly flows should not gain more 
throughput than competing TCP flows in the long run. Thus, in recent years, many researchers have 
focused on developing “TCP-friendly” transport protocols which are suitable for many applications 
that currently use UDP. 
The first step in answering these questions is to study the short-term and long-term behavior of 
these algorithms. Although the goal of all TCP-friendly algorithms is to emulate the behavior of TCP 
in the long term, these algorithms may have an adverse impact in the short-term on competing TCP 
flows. Since TCP-friendly algorithms are designed for smoother sending rates than TCP, these 
algorithms may react slowly to new connections that share a common bottleneck link. 
Such a slower response may have a deleterious effect on TCP flows. For example, a TCP connection 
suffering losses in its slow start phase may enter the congestion avoidance phase with a small 
window, and consequently obtain lesser throughput than other competing flows. 
In this paper, we analyze the reasons for this unfairness, and validate the analysis by simulations. 
The rest of the paper is organized as follows. In Section II, we briefly overview the various TCP-friendly 
congestion control algorithms proposed in literature. In Section III, we define the transient 
behaviors studied in this paper, and analyze the expected transient behaviors of the various TCP-friendly 
congestion control algorithms. 
Few algorithms to overcome congestion 
1) Transient behaviors evaluated in the paper 
2) Equation-Based Congestion Control Algorithm 
3) General AIMD-Based Congestion Control Algorithms 
4) Binomial Congestion Control Algorithm
Que. 4 Differentiate between permanent and transient host groups? 
Ans 
IP multicasting is defined as the transmission of an IP datagram to a "host group", a set of zero or 
more hosts identified by a single IP destination address. A multicast datagram is delivered to all 
members of its destination host group with the same "best-efforts" reliability as regular uncast IP 
datagram’s, i.e. the datagram is not guaranteed to arrive at all members of the destination group or 
in the same order relative to other datagram’s 
The membership of a host group is dynamic; that is, hosts may join and leave groups at any time. 
There is no restriction on the location or number of members in a host group, but membership in a 
group may be restricted to only those hosts possessing a private access key. A host may be a 
member of more than one group at a time. A host need not be a member of a group to send 
datagram’s to it. 
A host group may be permanent or transient. A permanent group has a well-known, 
administratively assigned IP address. It is the address, not the membership of the group that is 
permanent; at any time a permanent group may have any number of members, even zero. A 
transient group, on the other hand, is assigned an address dynamically when the group is created, 
at the request of a host. A transient group ceases to exist, and its address becomes eligible for 
reassignment, when its membership drops to zero. 
The creation of transient groups and the maintenance of group membership information is the 
responsibility of "multicast agents", entities that reside in internet gateways or other special-purpose 
hosts. There is at least one multicast agent directly attached to every IP network or sub 
network that supports IP multicasting. A host requests the creation of new groups, and joins or 
leaves existing groups, by exchanging messages with a neighboring agent. 
Multicast agents are also responsible for internetwork delivery of multicast IP datagram’s. When 
sending a multicast IP datagram, a host transmits it to a local network multicast address which 
identifies all neighboring members of the destination host group. If the group has members on 
other networks, a multicast agent becomes an additional recipient of the local multicast and relays 
the datagram to agents on each of those other networks, via the internet gateway system.
Que. 5 What is domain name resolution? Discuss the domain name resolution process? 
Ans 
Domain Name System: - 
DNS is a way to resolve meaningful and easy-to-remember names to IP addresses. Because millions 
of sites are connected to the Internet, maintaining one central list of the name to- IP-address 
relationships across the Internet is unrealistic. The DNS system was designed to coordinate and 
distribute the resolution load. 
The two major tasks that DNS provides are: - 
1) IP address resolution to hosts on the Internet, for local hosts 
2) IP address resolution to hosts on the local network, for other hosts on the Internet 
The domain name resolution process as under like: - 
1) A user program issues a request such as the get host by name () system call (this particular 
call asks for the IP address of a host by passing the host name) or the get host name () 
system call (which asks for a host name of a host by passing the IP address). 
2) The resolver formulates a query to the name server. (Full resolvers have a local name cache 
to consult first; stub revolvers do not. 
3) The name server checks to see if the answer is in its local authoritative database or cache, 
and if so, returns it to the client. Otherwise, it queries other available name servers, starting 
down from the root of the DNS tree or as high up the tree as possible. 
4) The user program is finally given a corresponding IP address (or host name, depending on 
the query) or an error if the query could not be answered. Normally, the program will not 
be given a list of all the name servers that have been consulted to process the query. Domain 
name resolution is a client/server process .The client function (called the resolver or name 
resolver) is transparent to the user and is called by an application to resolve symbolic high-level 
names into real IP addresses or vice versa. The name server (also called a domain 
name server) is the server application providing the translation between high- level 
machine names and the IP addresses. The query/reply messages can be transported by 
either UDP or TCP.
Que. 6 Differentiate between Simple Mail Transfer Protocol and Post Office Protocol? 
Ans 
Simple Mail Transfer Protocol: - 
SMTP is a core Internet protocol used to transfer e-mail messages between servers (first defined in 
RFC 821 in 1982) 
This contrasts with protocols such as POP3 and IMAP, which are used by messaging clients to 
retrieve e-mail. SMTP servers look at the destination address of a message and contact the target 
mail server directly. Of course, this means the Domain Name Service (DNS) has to be configured 
correctly otherwise mail could be handed to the wrong server - potentially a big problem because, 
unless you have encrypted your messages, your e-mail will be in plain text! 
SMTP was designed to be a reliable message delivery system. Reliable in this case means that a 
message handled by SMTP is intended to get to its destination or generate an error message 
accordingly. 
This is not the same as a guaranteed delivery service, it just does its best. To guarantee delivery 
requires all sorts of data exchanges that would add considerable communications overhead that 
would be pointless for everyday purposes. 
SMTP communications are transported by TCP to ensure reliable end-to-end transport. RFC 822 
defines the format of SMTP messages. 
Post Office Protocol: - 
POP is short for Post Office Protocol, a protocol used to retrieve e-mail from a mail server. 
Most e-mail applications (sometimes called an e-mail client) use the POP protocol, although some 
can use the newer IMAP (Internet Message Access Protocol). 
There are two versions of POP. The first called POP and second became a standard in the mid-80 s 
and requires SMTP to send messages. 
The newer version, POP3, can be used with or without SMTP. 
Pop is short for point of presence, an access point to the Internet. ISPs have typically multiple POPs. 
A point of presence is a physical location, either part of the facilities of a telecommunications 
provider that the ISP rents or a separate location from the telecommunications provider that 
houses servers, routers, ATM switches and digital/analog call aggregators. 
Pop is short for Programmed Operator (POP), a pseudo-opcode in a virtual machine language 
executed by an interpretive program. The Programmed Operator instructions provide the ability to 
define an instruction set for efficient encoding by calling subprograms into primary memory. 
POP is short for picture-outside-picture POP is a feature found on some televisions that allows the 
user to divide the screen into two same-size pictures, enabling you to view a second program. 
Compare with picture-in-picture (PIP).

Weitere ähnliche Inhalte

Was ist angesagt?

Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfIUA
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)maamir farooq
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing TechonologiesKathirvel Ayyaswamy
 
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdfPerformance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdfIUA
 
Implementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfImplementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfIUA
 
Transport services
Transport servicesTransport services
Transport servicesNavin Kumar
 
03 internetworking
03 internetworking03 internetworking
03 internetworkingbajulusiraj
 
Transport layer
Transport layerTransport layer
Transport layerM Sajid R
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sgDang Hop
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocolsBE Smârt
 

Was ist angesagt? (20)

Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdf
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
 
IJET-V2I6P7
IJET-V2I6P7IJET-V2I6P7
IJET-V2I6P7
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
 
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdfPerformance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
 
Implementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfImplementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdf
 
Chapter3 transport
Chapter3 transportChapter3 transport
Chapter3 transport
 
Transport services
Transport servicesTransport services
Transport services
 
03 internetworking
03 internetworking03 internetworking
03 internetworking
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transportlayer tanenbaum
Transportlayer tanenbaumTransportlayer tanenbaum
Transportlayer tanenbaum
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
Network Layer by-adeel
Network Layer by-adeelNetwork Layer by-adeel
Network Layer by-adeel
 

Ähnlich wie MC0087 Internal Assignment (SMU)

Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.pptmashiur
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptxmashiur
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkIRJET Journal
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1Techglyphs
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Chapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxChapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxGirT2
 
Networking questions
Networking questionsNetworking questions
Networking questionsrajujast
 
Ephemeral Performance of Choke
Ephemeral Performance of ChokeEphemeral Performance of Choke
Ephemeral Performance of Chokepaperpublications3
 
Frame relay
Frame relay Frame relay
Frame relay balub4
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfGandhibabu8
 

Ähnlich wie MC0087 Internal Assignment (SMU) (20)

Transport layer
Transport layer Transport layer
Transport layer
 
four
fourfour
four
 
Week10 transport
Week10 transportWeek10 transport
Week10 transport
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia Network
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 
Question
QuestionQuestion
Question
 
Computer Networks.pdf
Computer Networks.pdfComputer Networks.pdf
Computer Networks.pdf
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Chapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxChapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptx
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
 
Networking questions
Networking questionsNetworking questions
Networking questions
 
Ephemeral Performance of Choke
Ephemeral Performance of ChokeEphemeral Performance of Choke
Ephemeral Performance of Choke
 
Frame relay
Frame relay Frame relay
Frame relay
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
 

Kürzlich hochgeladen

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 

Kürzlich hochgeladen (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 

MC0087 Internal Assignment (SMU)

  • 1. MC0087-INTERNETWORKING WITH TCP/IP Que. 1 Discuss the functions of transport layer and Network Interface Layer? Ans Functions of transport layer: - Transport layer accepts data from session layer breaks it into packets and delivers these packets to the network layer. It is the responsibility of transport layer to guarantee successful arrival of data at the destination device. It provides an end-to-end dialog that is the transport layer at the source device directly communicates with transport layer at destination device. Message headers and control messages are used for this purpose. It separates the upper layers from the low level details of data transmission and makes sure an efficient delivery. OSI model provides connection-oriented service at transport layer. It is responsible for the determination of the type of service that is to be provided to the upper layer. Normally it transmits packets in the same order in which they are sent however it can also facilitate the transmission of isolated messages. There is no surety that these isolated messages are delivered to the destination devices in case of broadcast networks and they will be in the same order as were sent from the source. Applications Applications Transport TCP/UDP Internetwork IP ICMP ARP/RARP Network Interface And Hardware Network Interface And Hardware Functions of transport layer
  • 2. Network Interface Layer: - The Network Interface Layer (also called the Network Access Layer) sends TCP/IP packets on the network medium and receives TCP/IP packets off the network medium. TCP/IP was designed to be independent of the network access method, frame format, and medium. Therefore, you can use TCP/IP to communicate across differing network types that use LAN technologies – such as Ethernet and 802.11 wireless LAN – and WAN technologies –such as Frame Relay and Asynchronous Transfer Mode (ATM). By being independent of any specific network technology, TCP/IP can be adapted to new technologies. The Network Interface layer of the DARPA model encompasses the Data Link and Physical layers of the OSI model. The Internet layer of DARPA model does not take advantage of sequencing and acknowledgment services that might be present in the Data Link layer of the OSI model. The Internet layer assumes an unreliable Network Interface layer and that reliable communication through session establishment and the sequencing and acknowledgment of packets is the responsibility of either the Transport layer or the Application layer.
  • 3. Que. 2 Brief the following a) ISDN b) X.25 Ans a) ISDN The ISDN Basic Rate Interface (BRI) usually supports two B-channels with a capacity of 64 kbps each, and a 16 kbps D-channel for control information. B-channels can be used for voice or data or just for data in a combined way. The ISDN Primary Rate Interface (PRI) can support many concurrent B-channel links and one 64 kbps D-channel. The PPP, LCP and NCP mechanisms are particularly useful in this situation in reducing or eliminating manual configuration and facilitating ease of communication between diverse implementations. The ISDN D-channel can also be use for sending PPP packets when suitably framed, but is limited in bandwidth and often restricts communication links to a local switch. PPP treats ISDN channels as bit- or octet-oriented synchronous links. These links must be full duplex, but can be either dedicated or circuit-switched. PPP presents an octet interface to the physical layer. There is no provision for sub-octets to be supplied or accepted. PPP does not impose any restrictions regarding transmission rate other than that of the particular ISDN channel interface. PPP does not require the use of control signals. When available, using such signals can allow greater functionality and performance. The D-channel interface requires NRZ encoding. b) X.25 This topic describes the encapsulation of IP over X.25 networks, in accordance with ISO/IEC and CCITT standards. IP over X.25 networks is documented by RFC 1356 (which obsoletes RFC 877). RFC 1356 is a Draft Standard with a status of elective. The substantive change to the IP encapsulation over X.25 is an increase in the IP datagram MTU size, the X.25 maximum data packet size, the virtual circuit management, and the interoperable encapsulation over X.25 of protocols other than IP between multi-protocol routers and bridges. One or more X.25 virtual circuits are opened on demand when datagram arrive at the network interface for transmission. Protocol Data Units (PDUs) are sent as X.25 complete packet sequences. That is, PDUs begin on X.25 data packet boundaries and the M bit (more data) is used to fragment PDUs that are larger than one X.25 data packet in length. In the IP encapsulation, the PDU is the IP DATAGRAM. The first octet in the Call User Data (CUD) field (the first data octet in the call Request packet) is used for protocol de-multiplexing in accordance with Subsequent Protocol Identifier (SPI) in ISO/IEC TR 9577.
  • 4. Que. 3 What are congestion? Mention two algorithms to overcome congestion? Ans. TCP is the popular transport protocol for best-effort traffic in Internet. However, TCP is not well-suited for many applications such as streaming multimedia, because TCP congestion control algorithms introduce large variations in the congestion window size (and corresponding large variations in the sending rate). Such variability in the sending rate is not acceptable to many multimedia applications. Hence, many multimedia applications are built over UDP and use no congestion control at all. The absence of congestion control in applications built over UDP may lead to congestion collapse on the Internet. In addition, the UDP flows may starve any competing TCP flows. To overcome these adverse effects, congestion control needs to be incorporated into all applications using the Internet, whether at the transport layer or provided by the application itself. Furthermore, the congestion control algorithms must be TCP-friendly, i.e. the TCP-friendly flows should not gain more throughput than competing TCP flows in the long run. Thus, in recent years, many researchers have focused on developing “TCP-friendly” transport protocols which are suitable for many applications that currently use UDP. The first step in answering these questions is to study the short-term and long-term behavior of these algorithms. Although the goal of all TCP-friendly algorithms is to emulate the behavior of TCP in the long term, these algorithms may have an adverse impact in the short-term on competing TCP flows. Since TCP-friendly algorithms are designed for smoother sending rates than TCP, these algorithms may react slowly to new connections that share a common bottleneck link. Such a slower response may have a deleterious effect on TCP flows. For example, a TCP connection suffering losses in its slow start phase may enter the congestion avoidance phase with a small window, and consequently obtain lesser throughput than other competing flows. In this paper, we analyze the reasons for this unfairness, and validate the analysis by simulations. The rest of the paper is organized as follows. In Section II, we briefly overview the various TCP-friendly congestion control algorithms proposed in literature. In Section III, we define the transient behaviors studied in this paper, and analyze the expected transient behaviors of the various TCP-friendly congestion control algorithms. Few algorithms to overcome congestion 1) Transient behaviors evaluated in the paper 2) Equation-Based Congestion Control Algorithm 3) General AIMD-Based Congestion Control Algorithms 4) Binomial Congestion Control Algorithm
  • 5. Que. 4 Differentiate between permanent and transient host groups? Ans IP multicasting is defined as the transmission of an IP datagram to a "host group", a set of zero or more hosts identified by a single IP destination address. A multicast datagram is delivered to all members of its destination host group with the same "best-efforts" reliability as regular uncast IP datagram’s, i.e. the datagram is not guaranteed to arrive at all members of the destination group or in the same order relative to other datagram’s The membership of a host group is dynamic; that is, hosts may join and leave groups at any time. There is no restriction on the location or number of members in a host group, but membership in a group may be restricted to only those hosts possessing a private access key. A host may be a member of more than one group at a time. A host need not be a member of a group to send datagram’s to it. A host group may be permanent or transient. A permanent group has a well-known, administratively assigned IP address. It is the address, not the membership of the group that is permanent; at any time a permanent group may have any number of members, even zero. A transient group, on the other hand, is assigned an address dynamically when the group is created, at the request of a host. A transient group ceases to exist, and its address becomes eligible for reassignment, when its membership drops to zero. The creation of transient groups and the maintenance of group membership information is the responsibility of "multicast agents", entities that reside in internet gateways or other special-purpose hosts. There is at least one multicast agent directly attached to every IP network or sub network that supports IP multicasting. A host requests the creation of new groups, and joins or leaves existing groups, by exchanging messages with a neighboring agent. Multicast agents are also responsible for internetwork delivery of multicast IP datagram’s. When sending a multicast IP datagram, a host transmits it to a local network multicast address which identifies all neighboring members of the destination host group. If the group has members on other networks, a multicast agent becomes an additional recipient of the local multicast and relays the datagram to agents on each of those other networks, via the internet gateway system.
  • 6. Que. 5 What is domain name resolution? Discuss the domain name resolution process? Ans Domain Name System: - DNS is a way to resolve meaningful and easy-to-remember names to IP addresses. Because millions of sites are connected to the Internet, maintaining one central list of the name to- IP-address relationships across the Internet is unrealistic. The DNS system was designed to coordinate and distribute the resolution load. The two major tasks that DNS provides are: - 1) IP address resolution to hosts on the Internet, for local hosts 2) IP address resolution to hosts on the local network, for other hosts on the Internet The domain name resolution process as under like: - 1) A user program issues a request such as the get host by name () system call (this particular call asks for the IP address of a host by passing the host name) or the get host name () system call (which asks for a host name of a host by passing the IP address). 2) The resolver formulates a query to the name server. (Full resolvers have a local name cache to consult first; stub revolvers do not. 3) The name server checks to see if the answer is in its local authoritative database or cache, and if so, returns it to the client. Otherwise, it queries other available name servers, starting down from the root of the DNS tree or as high up the tree as possible. 4) The user program is finally given a corresponding IP address (or host name, depending on the query) or an error if the query could not be answered. Normally, the program will not be given a list of all the name servers that have been consulted to process the query. Domain name resolution is a client/server process .The client function (called the resolver or name resolver) is transparent to the user and is called by an application to resolve symbolic high-level names into real IP addresses or vice versa. The name server (also called a domain name server) is the server application providing the translation between high- level machine names and the IP addresses. The query/reply messages can be transported by either UDP or TCP.
  • 7. Que. 6 Differentiate between Simple Mail Transfer Protocol and Post Office Protocol? Ans Simple Mail Transfer Protocol: - SMTP is a core Internet protocol used to transfer e-mail messages between servers (first defined in RFC 821 in 1982) This contrasts with protocols such as POP3 and IMAP, which are used by messaging clients to retrieve e-mail. SMTP servers look at the destination address of a message and contact the target mail server directly. Of course, this means the Domain Name Service (DNS) has to be configured correctly otherwise mail could be handed to the wrong server - potentially a big problem because, unless you have encrypted your messages, your e-mail will be in plain text! SMTP was designed to be a reliable message delivery system. Reliable in this case means that a message handled by SMTP is intended to get to its destination or generate an error message accordingly. This is not the same as a guaranteed delivery service, it just does its best. To guarantee delivery requires all sorts of data exchanges that would add considerable communications overhead that would be pointless for everyday purposes. SMTP communications are transported by TCP to ensure reliable end-to-end transport. RFC 822 defines the format of SMTP messages. Post Office Protocol: - POP is short for Post Office Protocol, a protocol used to retrieve e-mail from a mail server. Most e-mail applications (sometimes called an e-mail client) use the POP protocol, although some can use the newer IMAP (Internet Message Access Protocol). There are two versions of POP. The first called POP and second became a standard in the mid-80 s and requires SMTP to send messages. The newer version, POP3, can be used with or without SMTP. Pop is short for point of presence, an access point to the Internet. ISPs have typically multiple POPs. A point of presence is a physical location, either part of the facilities of a telecommunications provider that the ISP rents or a separate location from the telecommunications provider that houses servers, routers, ATM switches and digital/analog call aggregators. Pop is short for Programmed Operator (POP), a pseudo-opcode in a virtual machine language executed by an interpretive program. The Programmed Operator instructions provide the ability to define an instruction set for efficient encoding by calling subprograms into primary memory. POP is short for picture-outside-picture POP is a feature found on some televisions that allows the user to divide the screen into two same-size pictures, enabling you to view a second program. Compare with picture-in-picture (PIP).