We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7
1. What is UDP ?
Write any 4 services provided by udp
UDP stands for User Datagram Protocol. UDP is a simple protocol and it provides non sequenced transport functionality. UDP is a connectionless protocol. Services of UDP protocol 1. Transport layer protocol 2. Connectionless 3. Ports 4. Faster transmission 2. State the use of telnet Telnet stands for the Teletype network. It helps in terminal emulation. It allows Telnet clients to access the resources of the Telnet server. Port number of telnet is 23. 3. State the use of 6 flags in TCP header There are total six types of flags in control field: URG: The URG field indicates that the data in a segment is urgent. ACK: When ACK field is set, then it validates the acknowledgement number. PSH: The PSH field is used to inform the sender that higher throughput is needed so if possible, data must be pushed with higher throughput. RST: The reset bit is used to reset the TCP connection when there is any confusion occurs in the sequence numbers. SYN: The SYN field is used to synchronize the sequence numbers in three types of segments: connection request, connection confirmation ( with the ACK bit set ), and confirmation acknowledgement. FIN: The FIN field is used to inform the receiving TCP module that the sender has finished sending data. It is used in connection termination in three types of segments: termination request, termination confirmation, and acknowledgement of termination confirmation. 4. Difference between FTP and TFTP
FTP TFTP
FTP stands for File Transfer TFTP stands for Trivial File Protocol Transfer Protocol
Establishes a connection Establishes a connection
between two computers, between two computers, but allowing for a more complex with a more limited set of set of commands and options commands and options Uses username and password Does not support authentication for authentication Encrypts data transfer Does not encrypt data transfer
5. Define the term multicast and its importance
Multicast is a method of group communication where the sender sends data to multiple receivers or nodes present in the network simultaneously. Multicasting is a type of one-to-many and many-to-many communication as it allows sender or senders to send data packets to multiple receivers at once across LANs or WANs. This process helps in minimizing the data frame of the network because at once the data can be received by multiple nodes. 6. List two protocols of Connection less and connection oriented Connection less: User Datagram Protocol (UDP), Internet Protocol (IP), Internet Control Message Protocol (ICMP). Connection Oriented: Transmission Control Protocol (TCP), FTP, DNS, Telnet. 7. State the transmission mode of FTP Block mode : Separates data into blocks, with each block preceded by a header that specifies its size. This mode is mainly used for transferring record-oriented files, but can also be used for stream-oriented text files. Stream mode: Transfers data as a continuous stream of characters or bytes. This mode relieves FTP of processing, leaving it to TCP instead. Compressed mode: Uses an algorithm to compress the data, typically using run-length encoding. This mode extends block mode with data compression.
8. Define the purpose of DNS Protocol
It stands for Domain Name System. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address The Port number for DNS is 53. 4 mks 1. Explain Distance Vector Routing with suitable example (refer from note book with example) 2. Describe SCTP packet format Explain SCTP association establishment process The Stream Control Transmission Protocol (SCTP) has a simpler basic packet structure than TCP. Each consists of two basic sections: 1. The common header, which occupies the first 12 bytes. In the adjacent diagram, this header is highlighted in blue. 2. The data chunks, which form the remaining portion of the packet. In the diagram, the first chunk is highlighted in green and the last of N chunks (Chunk N) is highlighted in red. There are several types, including payload data and different control messages All SCTP packets require the common header section (shown with a blue background). Source port This field identifies the sending port Destination port This field identifies the receiving port that hosts use to route the packet to the appropriate endpoint/application Verification tag A 32-bit random value created during initialization to distinguish stale packets from a previous connection. Checksum SCTP's original design catered for Adler-32; but RFC 3309 changed the protocol to use.
SCTP Association Two SCTP endpoints (servers) have an
SCTP association between them .An association has an association ID and includes multiple streams (unidirectional logical channels). An upper-layer SCTP protocol (such as Diameter, for example) initiates an SCTP association, which starts a four-way handshake.
3. Draw and explain TCP state transition diagram
( Refer your notes) 4. Describe E-mail security over non-secure channel Basically, Email security refers to the steps where we protect the email messages and the information that they contain from unauthorized access, and damage. It involves ensuring the confidentiality, integrity, and availability of email messages, as well as safeguarding against phishing attacks, spam, viruses, and another form of malware. It can be achieved through a combination of technical and non-technical measures 5. Define WWW dot explain static and dynamic web documents in details. The World Wide Web or Web is basically a collection of information that is linked together from points all over the world. It is also abbreviated as WWW. World Wide Web provides flexibility, portability, and user-friendly features. It mainly consists of a worldwide collection of electronic documents (i.e, Web Pages). It is basically a way of exchanging information between computers on the Internet. The WWW is mainly the network of pages consists of images, text, and sounds on the Internet which can be simply viewed on the browser by using the browser software. It was invented by Tim Berners-Lee. Static Web page Static Web pages are very simple. It is written in languages such as HTML, JavaScript, CSS, etc. For static web pages when a server receives a request for a web page, then the server sends the response to the client without doing any additional process. These web pages are seen through a web browser. In static web pages, Pages will remain the same until someone changes it manually.
Dynamic web page
Dynamic Web Pages are written in languages such as CGI, AJAX, ASP, ASP.NET, etc. In dynamic web pages, the Content of pages is different for different visitors. It takes more time to load than the static web page. Dynamic web pages are used where the information is changed frequently, for example, stock prices, weather information, etc.
6. Explain RIP with example
Refer notes 7.
Distance Vector Routing Link State Routing
Bandwidth required is less due to Bandwidth required is more due
local sharing, small packets and to flooding and sending of large no flooding. link state packets.
Based on local knowledge, since Based on global knowledge, it
it updates table based on have knowledge about entire information from neighbours. network.
Make use of Bellman Ford Make use of Dijakstra’s
Algorithm. algorithm.
Traffic is less. Traffic is more.
Distance Vector Routing Link State Routing
Converges slowly i.e, good news
spread fast and bad news spread Converges faster. slowly.
Count of infinity problem. No count of infinity problem.
8. Explain how TCP connecting are established using 3 way handshake