ACN_TS2_QB_24-25

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

COMPUTER ENGINEERING DEPARTMENT

Question Bank – TS2 2024-25


Subject: ACN Class: CO5I

Chapter 4

2 marks

∙ State any four features of TCP.

1) Connection Oriented Protocol

2) Reliable

3) Congestion Control

4) Full Duplex

5) Error Control and Recovery

6) Flow Control

∙ State different applications of UDP.

Lossless data transmission

UDP can be used in applications that require lossless data transmission. For example, an application
that is configured to manage the process of retransmitting lost packets and correctly arrange
received packets might use UDP. This approach can help to improve the data transfer rate of large
files compared to TCP.

Gaming, voice and video

UDP is an ideal protocol for network applications in which perceived latency is critical, such as in
gaming, voice and video communications.

Services that don't need fixed packet transmission

Faizan
UDP can also be used for applications that depend on the reliable exchange of information but
should have their own methods to answer packets.

Multicasting and routing update protocols

UDP can also be used for multicasting because it supports packet switching. In addition, UDP is used
for some routing update protocols, such as Routing Information Protocol (RIP).

∙ List different timers used in TCP.

1) Retransmission Timer:
2) 2) Persistent Timer:
3) 3) Keepalive Timer:
4) 4) Time Wait Timer:

∙ State the use of any four flags in TCP header.

There are 6, 1-bit control bits that control connection establishment, termination, abortion, flow
control etc..

1. URG: The urgent pointer is valid if it is 1.

2. ACK: ACK bit is set to 1 to indicate the acknowledgement member is valid.

3. PSH: The receiver should pass this data to application as soon as possible.

4. RST: This flag is used to reset connection.

5. SYN: Synchronize sequence number to initiate a connection.

6. FIN: It is used to release connection

4 marks

∙ List and explain, services provided by TCP (Transmission Control Protocol).

Transmission Control Protocol (TCP) to the processes at the application layer: • Stream Delivery
Service. • Full Duplex Service • Connection Oriented Service. • Reliable Service. Stream Delivery
Service TCP is a stream-oriented protocol. It enables the sending process to deliver dataas a stream
of bytes and the receiving process to acquire data as a stream of bytes. TCP creates a working
environment so that the sending and receiving procedures are connected by an imaginary "tube",
as shown in the figure below:

Faizan
Full-Duplex Service

TCP offers a full-duplex service where the data can flow in both directions simultaneously. Each TCP
will then have a sending buffer and receiving buffer. The TCP segments are sent in both directions.
Connection-Oriented Service We are already aware that the TCP is a connection-oriented protocol.
When a process wants to communicate (send and receive) with another process (process -2), the
sequence of operations is as follows: • TCP of process-1 informs TCP of process-2 and gets its
approval. • TCP of process-1 tells TCP of process-2 exchange data in both directions. • After
completing the data exchange, when buffers on both sides are empty, the two TCPs destroy their
buffers.

The type of connection in TCP is not physical, but it is virtual. The TCP segment encapsulated in an
IP datagram can be sent out of order. These segments can get lost or corrupted and may have to be
resend. Each segment may take a different path to reach the destination

Reliable Servic

TCP is a reliable transport protocol. It uses an acknowledgment mechanism for checking the safe
and sound arrival of data.

∙ Describe flow control under SCTP.

(Any other relevant explanation or example can be considered)

Flow control under SCTP

Flow control in SCTP is similar to that in TCP. Like TCP, SCTP

executes flow control to prevent overwhelming the receiver. In SCTP,


Faizan
we need to handle two units of data, the byte and the chunk. The values

of rwnd and cwnd are expressed in bytes; the values of TSN and

acknowledgments are expressed in chunks. Current SCTP

implementations still use a byte-oriented window for flow control.

Receiver Site:

The receiver has one buffer (queue) and three variables. The queue

holds the received data chunks that have not yet been read by the

process. The first variable holds the last TSN received,cumTSN. The

second variable holds the available buffer size; winsize. The third

variable holds the last accumulative acknowledgment, lastACK. The

following figure shows the queue and variables at the receiver site.

1. When the site receives a data chunk, it stores it at the end of the

buffer (queue) and subtracts the size of the chunk from winSize. The

TSN number of the chunk is stored in the cumTSN variable.

2. When the process reads a chunk, it removes it from the queue and

adds the size of the removed chunk to winSize (recycling).

3. When the receiver decides to send a SACK, it checks the value of

lastAck; if it is less than cumTSN, it sends a SACK with a cumulative

TSN number equal to the cumTSN. It also includes the value of

winSize as the advertised window size.

Sender Site:

The sender has one buffer (queue) and three variables: curTSN, rwnd,

and inTransit, as shown in the following figure. We assume each chunk


Faizan
is 100 bytes long.

The buffer holds the chunks produced by the process that either have

been sent or are ready to be sent. The first variable, curTSN, refers to

the next chunk to be sent. All chunks in the queue with a TSN less than

this value have been sent, but not acknowledged; they are outstanding.

The second variable, rwnd, holds the last value advertised by the

receiver (in bytes). The third variable, inTransit, holds the number of

bytes in transit, bytes sent but not yet acknowledged. The following is

the procedure used by the sender.

1. A chunk pointed to by curTSN can be sent if the size of the data is

less than or equal to the quantity rwnd - inTransit. After sending the

chunk, the value of curTSN is incremented by 1 and now points to the

next chunk to be sent. The value of inTransit is incremented by the size

of the data in the transmitted chunk.

2. When a SACK is received, the chunks with a TSN less than or equal

to the cumulative TSN in the SACK are removed from the queue and

discarded. The sender does not have to worry about them anymore.

The value of inTransit is reduced by the total size of the discarded

chunks. The value of rwnd is updated with the value of the advertised

window in the SACK.

∙ Draw and explain TCP segment structure.

TCP is a reliable connection- oriented protocol i.e., connection is

established between the sender and receiver before the data can be

transmitted.

Faizan
A Packet in TCP is called a segment. TCP segment consists of data

bytes to be sent and a header that is added to the data by TCP as shown

in following figure.

The header of TCP segment can range from 20-60 bytes.40 bytes are

for option. if there are no options, header is of 20 bytes else it can be of

upmost 60 bytes.

Header Fields in TCP Segment Structure:

1) Source port address: -

This is a 16-bit field that defines the port number of the application

program in the host that is sending the segment. This serves the same

purpose as the source port address in the UDP header.

2) Destination port address: -

This is a 16-bit field that defines the port number of the application

program in the host that is receiving the segment. This serves the same

purpose as the destination port address in the UDP header.

3) Sequence Number: -

This 32-bit field defines the number assigned to the first byte of data

contained in this segment. As we said before, TCP is a stream transport

protocol. To ensure connectivity, each byte to be transmitted is

numbered. The sequence number tells the destination which byte in

this sequence comprises the first byte in the segment. During


Faizan
connection establishment, each party uses a random number generator

to create an initial sequence number (ISN), which is usually different

in each direction.

4) Acknowledgment Number: -

This 32-bit field defines the byte number that the receiver of the

segment is expecting to receive from the other party. If the receiver of

the segment has successfully received byte number x from the other

party, it defines x + 1 as the acknowledgment number.

Acknowledgment and data can be piggybacked together.

5) Header length: -

This 4-bit field indicates the number of 4-byte words in the TCP

header. The length of the header can be between 20 and 60 bytes.

Therefore, the value of this field can be between 5 (5 x 4 = 20) and 15

(15 x 4 = 60).

6) Reserved:-

This is a 6-bit field reserved for future use.

7) Control Field:-

This field defines 6 different control bits or flags. These are 6, 1 bit

control bits that controls connection establishment, connection

termination, connection abortion, flow control, mode of transfer etc.

∙ Compare TCP and UDP.

Faizan
∙ Explain how TCP connections are established using the 3 way handshake.

Faizan
Faizan
∙ Explain TCP with respect to flow control and error control.

Faizan
∙ Describe the fields of SCTP packet format. Explain SCTP association establishment
process

Faizan
Faizan
∙ The following is the content of a UDP header in hexadecimal format.
Faizan
CB84000D001C001C
a) What is the source port number?

b) What is the destination port number?

c) What is the total length of the user datagram?

d) What is the length of the data?

e) Is the packet directed from a client to a server or vice versa?

f) What is the client process?

(different question)

Chapter 5

Faizan
2 marks

∙ Elaborate need of domain name system.

Need of domain name system:

 Since IP addresses are difficult to remember and names are easier

to remember Domain Name System is used and DNS servers are

used for converting these names into IP addresses.

 Large number to hosts and servers connected in the internet can

be classified using Domain name system so that hierarchical

naming system is implemented.

 To identify an entity, TCP/IP protocols use the IP address. An IP

is uniquely identifies the connection of a host to internet. Use for

mapping can map a name to an address or an address to a name

∙ Distinguish between SMTP and POP3 protocol (Any two points).

Faizan
∙ Differentiate between FTP and TFTP (2 points).

∙ Define WWW with its architecture diagram.

Faizan
4 marks

Faizan
∙ Describe the HTTP Request Message Format.

∙ Describe the HTTP Response Message Format.

Faizan
∙ Construct a suitable diagram for each below commands of FTP to show its use
a) get
b) mget

c) put

d) mput

Faizan
Faizan
∙ Describe the architecture of E-mail system using four scenario.

Faizan
∙ Describe SMTP with suitable diagram.

Faizan
∙ Distinguish between SMTP and POP3 protocol.

Faizan
∙ Compare POP3 with IMAP on below points

∙ Describe MIME working with its header fields.

∙ Explain the working of TELNET.

For TCP / IP networks like the Internet, Telnet is a terminal emulation program. The software Telnet
runs on your system and links your Personal Computer to a network server. It allows a user to
access an account or computer remotely.

WORKING

It makes available users by an interactive and bidirectional text-oriented message system exploit an
effective terminal connection which is much more than 8 byte.

User data is sprinkled in the band long with telnet control information above the TCP. It helps to
achieve some functions in a remote manner. The user joins the server beside using the TCP
protocol, so that means like the other side connection is also established using the telnet
hostname. These commands are used on the server by the corresponding user to achieve the need
task. These commands are used to end a telnet session or logoff a session or a user. Currently, both

Faizan
virtual terminal and terminal emulators can be used for telnet, which is fundamentally a modern
computer that converses by means of the identical Telnet protocol. This command helps telnet
protocol to achieve communication with a remote device and mainly various other OS also provides
a large amount of support for these systems

SYNTAX

telnet hostname port

∙ Describe DHCP with its operation and static and dynamic allocation

Faizan

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy