ACN_TS2_QB_24-25
ACN_TS2_QB_24-25
ACN_TS2_QB_24-25
Chapter 4
2 marks
2) Reliable
3) Congestion Control
4) Full Duplex
6) Flow Control
UDP can be used in applications that require lossless data transmission. For example, an application
that is configured to manage the process of retransmitting lost packets and correctly arrange
received packets might use UDP. This approach can help to improve the data transfer rate of large
files compared to TCP.
UDP is an ideal protocol for network applications in which perceived latency is critical, such as in
gaming, voice and video communications.
Faizan
UDP can also be used for applications that depend on the reliable exchange of information but
should have their own methods to answer packets.
UDP can also be used for multicasting because it supports packet switching. In addition, UDP is used
for some routing update protocols, such as Routing Information Protocol (RIP).
1) Retransmission Timer:
2) 2) Persistent Timer:
3) 3) Keepalive Timer:
4) 4) Time Wait Timer:
There are 6, 1-bit control bits that control connection establishment, termination, abortion, flow
control etc..
3. PSH: The receiver should pass this data to application as soon as possible.
4 marks
Transmission Control Protocol (TCP) to the processes at the application layer: • Stream Delivery
Service. • Full Duplex Service • Connection Oriented Service. • Reliable Service. Stream Delivery
Service TCP is a stream-oriented protocol. It enables the sending process to deliver dataas a stream
of bytes and the receiving process to acquire data as a stream of bytes. TCP creates a working
environment so that the sending and receiving procedures are connected by an imaginary "tube",
as shown in the figure below:
Faizan
Full-Duplex Service
TCP offers a full-duplex service where the data can flow in both directions simultaneously. Each TCP
will then have a sending buffer and receiving buffer. The TCP segments are sent in both directions.
Connection-Oriented Service We are already aware that the TCP is a connection-oriented protocol.
When a process wants to communicate (send and receive) with another process (process -2), the
sequence of operations is as follows: • TCP of process-1 informs TCP of process-2 and gets its
approval. • TCP of process-1 tells TCP of process-2 exchange data in both directions. • After
completing the data exchange, when buffers on both sides are empty, the two TCPs destroy their
buffers.
The type of connection in TCP is not physical, but it is virtual. The TCP segment encapsulated in an
IP datagram can be sent out of order. These segments can get lost or corrupted and may have to be
resend. Each segment may take a different path to reach the destination
Reliable Servic
TCP is a reliable transport protocol. It uses an acknowledgment mechanism for checking the safe
and sound arrival of data.
of rwnd and cwnd are expressed in bytes; the values of TSN and
Receiver Site:
The receiver has one buffer (queue) and three variables. The queue
holds the received data chunks that have not yet been read by the
process. The first variable holds the last TSN received,cumTSN. The
second variable holds the available buffer size; winsize. The third
following figure shows the queue and variables at the receiver site.
1. When the site receives a data chunk, it stores it at the end of the
buffer (queue) and subtracts the size of the chunk from winSize. The
2. When the process reads a chunk, it removes it from the queue and
Sender Site:
The sender has one buffer (queue) and three variables: curTSN, rwnd,
The buffer holds the chunks produced by the process that either have
been sent or are ready to be sent. The first variable, curTSN, refers to
the next chunk to be sent. All chunks in the queue with a TSN less than
this value have been sent, but not acknowledged; they are outstanding.
The second variable, rwnd, holds the last value advertised by the
receiver (in bytes). The third variable, inTransit, holds the number of
bytes in transit, bytes sent but not yet acknowledged. The following is
less than or equal to the quantity rwnd - inTransit. After sending the
2. When a SACK is received, the chunks with a TSN less than or equal
to the cumulative TSN in the SACK are removed from the queue and
discarded. The sender does not have to worry about them anymore.
chunks. The value of rwnd is updated with the value of the advertised
established between the sender and receiver before the data can be
transmitted.
Faizan
A Packet in TCP is called a segment. TCP segment consists of data
bytes to be sent and a header that is added to the data by TCP as shown
in following figure.
The header of TCP segment can range from 20-60 bytes.40 bytes are
upmost 60 bytes.
This is a 16-bit field that defines the port number of the application
program in the host that is sending the segment. This serves the same
This is a 16-bit field that defines the port number of the application
program in the host that is receiving the segment. This serves the same
3) Sequence Number: -
This 32-bit field defines the number assigned to the first byte of data
in each direction.
4) Acknowledgment Number: -
This 32-bit field defines the byte number that the receiver of the
the segment has successfully received byte number x from the other
5) Header length: -
This 4-bit field indicates the number of 4-byte words in the TCP
(15 x 4 = 60).
6) Reserved:-
7) Control Field:-
This field defines 6 different control bits or flags. These are 6, 1 bit
Faizan
∙ Explain how TCP connections are established using the 3 way handshake.
Faizan
Faizan
∙ Explain TCP with respect to flow control and error control.
Faizan
∙ Describe the fields of SCTP packet format. Explain SCTP association establishment
process
Faizan
Faizan
∙ The following is the content of a UDP header in hexadecimal format.
Faizan
CB84000D001C001C
a) What is the source port number?
(different question)
Chapter 5
Faizan
2 marks
Faizan
∙ Differentiate between FTP and TFTP (2 points).
Faizan
4 marks
Faizan
∙ Describe the HTTP Request Message Format.
Faizan
∙ Construct a suitable diagram for each below commands of FTP to show its use
a) get
b) mget
c) put
d) mput
Faizan
Faizan
∙ Describe the architecture of E-mail system using four scenario.
Faizan
∙ Describe SMTP with suitable diagram.
Faizan
∙ Distinguish between SMTP and POP3 protocol.
Faizan
∙ Compare POP3 with IMAP on below points
For TCP / IP networks like the Internet, Telnet is a terminal emulation program. The software Telnet
runs on your system and links your Personal Computer to a network server. It allows a user to
access an account or computer remotely.
WORKING
It makes available users by an interactive and bidirectional text-oriented message system exploit an
effective terminal connection which is much more than 8 byte.
User data is sprinkled in the band long with telnet control information above the TCP. It helps to
achieve some functions in a remote manner. The user joins the server beside using the TCP
protocol, so that means like the other side connection is also established using the telnet
hostname. These commands are used on the server by the corresponding user to achieve the need
task. These commands are used to end a telnet session or logoff a session or a user. Currently, both
Faizan
virtual terminal and terminal emulators can be used for telnet, which is fundamentally a modern
computer that converses by means of the identical Telnet protocol. This command helps telnet
protocol to achieve communication with a remote device and mainly various other OS also provides
a large amount of support for these systems
SYNTAX
∙ Describe DHCP with its operation and static and dynamic allocation
Faizan