Professional Documents
Culture Documents
Introduction
ii) Metropolitan area network (MAN): - It is used for medium size area. Ex-
ample MAN would be city or state.
- The MAN gives transfer rate from 34 to 150 Mbps.
-MAN is designed with two unidirectional buses.
- Moderate speed & expensive equipment
iii) Wide area network(WAN): - It is usually a larger network that covers the
large geographical area, It consists of 2 or more LAN.
-WAN is not limited to a building or campus like LAN, but span over the wide area.
Here data transmission is reliable.
1
Sunil Mahesh
- An Extranet is an extension of an intranet that allows secure communications to
users outside of the intranet (e.g. business partners, customers).
- Informally, the Internet is the set of users, enterprises, and content providers that
are interconnected by Internet Service Providers (ISP).
- Typically, the human-readable names of servers are translated to IP addresses,
transparently to users, via the directory function of the Domain Name System
(DNS).
ii) Freedom to Choose the Right Tool: - If you choose an open networking
environment, this adds another dimension to the information-sharing capabilities
inherent in computer networking.
- Open networking products enable users to work on the type of computer best
suited to the job they must do, without placing restrictions on their file-sharing
capabilities.
2
Sunil Mahesh
The design of any particular computer can make it well suited for some tasks and
not as well suited for others.
3
Sunil Mahesh
- This model is called ISO OSI (open system interconnection) reference model. Be-
cause it deals with connecting open system, that is open for communication with
other systems.
- The OSI become so accurate a concept that almost all major network standard.
1) Physical Layer: -This is the lowest layer of the OSI model. Physical layer
coordinates the functions required to transmit a bit stream over the communication
channel.
- It deals with the electrical and mechanical specification of interface and transmis-
sion media. It also deals with procedures a function required for transmission.
- The purpose of the physical layer is to take binary info from higher layers,
translate it into transmission signal or frequency.
2) Data Link Layer: - The data link layer is responsible for transmitting frames
from one node to the next. It transforms the physical layer to a reliable link making
it an error free link to the upper layer.
- The data link layer receives the information on its higher layer, places info inside
the frame.
- The data link layer on receiving node checks the frame surrounding the informa-
tion received.
ii)Physical addressing: - When frames are to be sent to different LANs, the data
link layer adds a header to the frame to define sender or receiver.
iii)Flow control: - When the rate of the data transmitted and rate of data reception
by the receiver is not same, some data may be lost. The data link layer imposes a
flow control mechanism to prevent overwhelming the receiver.
iv)Error control: - Data link layer incorporates reliability to the physical layer by
adding a mechanism to detect and retransmit damaged or lost frames.
4
Sunil Mahesh
3)Network Layer: - The network layer is responsible for the delivery of packets
from the source to destination.
- This layer controls the operations of the Subnet.
- Routers are based on the static tables that are wired into the network.
iii) Flow control: - Transport layer performs end-to-end flow control while data
link layer performs it across the link.
iv) Error control: - Error control at this layer is performed on end-to-end basis
rather that across the link, The transport layer ensures error-free transmission.
5)Session Layer: -The Session layer is network dialogue controller i.e. it estab-
lishes and synchronises the interaction between communication systems.
5
Sunil Mahesh
Function of session layer
i) Dialogue control: - Communication between two processes takes place in either
half duplex or full duplex mode. The session layer manages dialogue control for this
communication.
ii) Synchronisation: - Session layer adds synchronisation points into the stream of
data.
6) Presentation Layer: - The presentation layer deals with syntax and semantics
of the information being exchanged Presentation.
ii) File TransferAccess and Management (FTAM): - FTAM allows the user
to access files on remote hosts, to retrieve files and to manage files on the remote
computer.
iii)Mail Services: - E-mail forwarding, storage are the services under this cate-
gory.
6
Sunil Mahesh
6) Compare OSI model with TCP/IP model.
Ans:
OSI Model TCP/IP model
1) Services, interfaces & protocols are 1) Services, interfaces & protocols are
clearly distinguished. not clearly distinguished.
2) OSI does not support Internet work- 2) TCP/IP support Internet working.
ing.
3) It is Less Credible. 3) It is More Credible.
4) In OSI all packets are delivered. 4) TCP reliably delivered packets.
5) It is strictly layering. 5) TCP is Loosely layered.
i) Network Interface layer: - As its name suggest, this layer represents the place
where actual TCP/IP protocols running at higher layers interface to the network.
- It is equivalent to the data link layer in OSI Reference model.
- It is also called link layer.
7
Sunil Mahesh
- Here we find IP (Internet protocol), it is the heart of the system.
iii) Transport layer: -It can deliver packets from one physical device to another.
-UDP and TCP are the transport level protocol responsible for delivering a message
from one process to another process.
iv)Application layer: Highest layer & Application layer provides the service.
8
Sunil Mahesh
internet site to other. The TELNET command/ program gets the user to the
login/logout of another host.
FTP: - It is special software and set of rules used for transferring the files from one
computer to other, It's a high-level application layer protocol and providing a very
simple interface for any user of the internet for transferring file in the downloading
& uploading facilities. FTP is used to TCP/IP connection between client or server,
One connection used for the actual data transfer.
-In Bus network topology one machine allowed to transmit all other machines are
required to refer from sending.
-In LAN where bus topology is used.
-Each node is connected to the single bus.
-Each computer or server is connected to the single bus cable.
-Bus topology faces the problem more than one host sends a data at one time.
- So it uses CSMA/CD / Master and slave technology.
9
Sunil Mahesh
ii)Ring Topology:
-In a ring topology, every host machine connected exactly to other machines to cre-
ate a circular network structure.
-When one host tries to send data to the host, which is not adjacent to it the data
travels through all intermediate host.
-If you want to add more host to the existing structure just need an extra cable.
-Failure of single host results in failure of the whole ring.
-All host in star topology connected to a central device called hub device using
point to point connection.
-Hub is the server and all the hosts are the clients.
-Hub can be a layer1 device (Hub/Reporter).
-Hub can be a layer2 device (Hub/Bridge).
-Hub can be a layer3 device (Router/gateway).
-If hub fails connectively of all hosts fail.
-Star topology is not an expensive network.
10
Sunil Mahesh
Chapter – 2
The physical Layer
- Co-axial widely used in a telephone system, now they replaced by fibre optics.
- Two kinds of Co-axial widely used i.e 50-ohm used for digital transmissions &
75-ohm used for Analog transmissions.
-It carries signals of higher frequency rays, ranged than twisted pair.
11
Sunil Mahesh
- It consists of centre copper conductor surrounded by insulation, such as TEFLON.
- It is intern surrounded by tube shape conductor of solid copper.
- It supports high data rates and longer distances.
- It is used to transmit both analogue and digital signals.Basebands co-axial offers
greater resistance to noise & better performance then twisted pairs (TP).
- Security of baseband coaxial is a problem
- It is more expensive than twisted pair.
This is a cable used for the telephone system. It is used to use to connect termi-
nals and low-speed data equipment to the mainframes. It is frequently pre-install in
buildings. There are 2 types of TPC a) UTP b) STP
3) Discuss the various ISDN services & explain ISDN architecture for ba-
sic home use & small business setup.
Ans: -ISDN stands for „Integrated Service Digital Network'. It was first introduced
by NEC Japan. The basic purpose was the integration of traditionally different
computer & communication (C &C) services into a single one.\
ISDN Services:
i)Voice (telephone)
ii) Data (internet)
iii) Entertainment (T.V)
- One ISDN feature is a telephone with multiple buttons for instant call setup to
arbitrary telephone number anywhere in the world.
- Another feature is the display of callers telephone number, name & address
during ringing.
12
Sunil Mahesh
ISDN Architecture for basic home use & small business setup: - The key
idea behind the ISDN is that of digital bit pipe between the customer & the carrier
through which bits flow in both directions, whether the bits originate from a digital
terminal. A digital facsimile machine or some other device is irrelevant.
- The digital bit pipe can support multiple independent channels by this time
multiplexing of the bit stream. Two principal standards for the bit pipe have been
developed.
A low bandwidth standard for home use &
A higher bandwidth standard for business use that supports multiple channels
identical to the home use.
- The ISDN exchange in the carrier office using the twisted pair previously used to
connect the telephone.
- NT1 Box has a connector into which bus cable can be inserted. Up to 8 ISDN
telephones terminals, alarms & other devices can be connected to the cable from
customer‟s point of view network boundary is the connector on NT1.
- For a large business, the model of teeth following figure is used. There is a
device NT2 called PBX(Private batch exchange) there connected to NT1 and
providing an interface for ISDN devices.
---------------------------(Diagram)-------------------------------------------------------------
----------
Disadvantages: -i) ISDN lacks the standard that ensures interoperability, as a re-
sult
Customer must be careful to purchase equipment that is compatible with local
phone equipment.
ii) Another problem is that not all phone companies offer the same service, so
customers must ensure that the service need is available in their area.
13
Sunil Mahesh
5) Write short notes i) Circuit Switching
ii) Packet Switching
iii) MessageSwitching
- In circuit switching network, before communication can occur between two de-
vices, a circuit is established between them. This is shown a thick blue line for the
continues of data from device A to device B.
ii) Packet Switching: - In this network data is chopped up into small pieces called
„packets‟, and sent over the network. The packets can be routed, combined or frag-
mented.
-Packets are transmitted through the network independently.
-No physical copper path is established in advance between sender and receiver.
-When a sender wants to send a block of data it is stored in the switching office and
then forward later.
iii)Message Switching: -It enables any two users to communicate with each other.
Voice being the very vital medium of human communication & it permits long
distance voice communication.
14
Sunil Mahesh
- The packet is stored and forwarded, No waste of bandwidth.
-It also supports the store and forward transmissionRecord of the packet is
possible.
- Text messages are generally non-real time &non-conversational in nature.
- The messages are forwarded from node to node by the operator.
- In the VLF, LT', and MF bands, radio waves follow the ground and can be
detected for about 1000 km at the lower frequencies, less at the higher ones.
15
Sunil Mahesh
- In the HF and VHF bands, the ground waves tend to be absorbed by the earth, but
if they reach the ionosphere (a layer of charged particles circling the earth at a
height of 100 to 500 km) are refracted.
16
Sunil Mahesh
ii)Time Division Multiplexing (TDM):
- TDM can be handled entirely by digital electronics, so it has become more popu-
lar.
- But it can only be used for digital data Since local loops produce the analogue sig-
nals.
- It is a digital mixing technique for combining several low rate channels into a sin-
gle high rate channel.
-In TDM single information signed can take entered bandwidth of the channel.
-TDM is more efficient than FDM in that if does not require guard bands & it
operates directly in digital form.
-In TDM, the transmission between the multiplexer is provided by a single high-
speed digital transmission line.
-A TDM is the serial system because the signal from each user follows in times, the
signal from another user. TDM output is carrying much more information.
17
Sunil Mahesh
Chapter – 3
The Medium Access Sub-Layer
PURE ALOHA
- The original ALOHA protocol is called „Pure ALOHA‟.
- This is simple & elegant protocols and idea is that different stations send a frame,
on common may be the possibility of collisions of frames.
- In pure ALOHA the stations transmit a frame, whenever they have data to send.
When two or more stations transmit simultaneously, there is a collision and the
frames are destroyed.
- In pure ALOHA whenever any station transmits frame if expects the
acknowledgment from the receiver.
- Ifanacknowledgment is not received within specified time, the station assumes that
frame (or acknowledgment) has been destroyed.
- If the frames are destroyed because of collisions stations waits fortherandom
amount of time and sends it again. The pure ALOHA dictates that when timeout pe-
riod passes, each station must wait fortherandom amount of time before re-sending
its frame.
- With pure aloha, stations are allowed to access the channel whenever they have
data to transmit. Because threats of data collisions exist.
-In the figure there are four stations, they share the common single channel.
-All the stations are transmitting frames.
-Some of the frames collide because they share the same common channel.
19
Sunil Mahesh
-Only two frame 1.1 and frame 2.2 services.
-All other frames are destroyed.
-Whenever two frames try to acetyl the channel at the same time, there will be a
collision and both will be damaged.
-If the first bit of new frame overlaps with the last bit of old frame both frames will
be totally destroyed and both will have to be retransmitted.
Advantages:
i) Superior to fixed assignments when there is a large number of bursty try stations.
ii) Adapts to verifying no of stations.
Slotted ALOHA
- In a slotted ALOHA system, time is divided into slots the size of the single frame.
If the user wants to transmit, they must wait until the start of the next time slot.
-Slotted ALOHA was invented to improve the efficiency of pure ALOHA as
chances of a collision in pure ALOHA are very high.
-IN Slotted ALOHA, time of the shared channel is divided intodiscrete intervals
slots.
-The station can send a frame only at the beginning of the slot and one frame is sent
in the slot.
-In slotted ALOHA, if any station is not able to place the frame on the channel t the
beginning of the slot i.e. it measured the time slot then the station has to wait until
the beginning of the next time slot.
-In slotted ALOHA there is a still possibility of collision if two stations try to send
at the beginning of the same time slot.
-Slotted ALOHA still has an edge over pure ALOHA as chances of collision are
reduced to one-half.
20
Sunil Mahesh
Advantages:-i) Doubles the efficiency of ALOHA
ii) Adaptable to changing station population.
3)Explain Carrier Sense Multiple Access protocol (CSMA) & Its Types.
Ans:-Carrier Sense Multiple Access (CSMA):
- CSMA uses a technique called „carrier sense’ to increase bandwidth utilization.
-The CSMA method was to develop to minimize the chance of collision and to in-
crease the performance.
-In this method, the chances of collision can be reduced if a station senses the me-
dium before trying to use it.
-Carrier sense multiple Access (CSMA) requires that each station first listens to the
medium (or check the state of the medium) before sending.
-The CSMA is based on the principle “sense before transmit” or “listen to talk”.
-CSMA can reduce the possibility of the collision but it cannot eliminate it.
-Vulnerable time for CSMA is a propagation time.
-This is the time needed for a signal to propagate from one end of the medium to
other.
-When a station sends a frame and any other station tries to send a frame daring this
time a collision will result.
Types of CSMA
i) 1- Persistent CSMA.
ii) Non- Persistent CSMA.
iii) P- Persistent CSMA.
1) 1- Persistent CSMA.
-In this method, station continuously checks or sense the channel until become free.
-If the channel is idle, it sends frames immediately (Probability 1) that is why it is
called as 1- Persistent CSMA.
3) P- Persistent CSMA.
-In this method, the channel has time slots such that the time slot duration is equal
to greater than maximum propagation delay time.
21
Sunil Mahesh
-whenever station becomes ready to send it senses the channel is busy, the station
waits until next slot.
-If the channel is idle, it transmits with the probability P.
Basic idea:
Stations are divided into groups.
Each group is allocated a slot for transmission.
Members of one group compete for one slot only.
Special cases:
Each group with only one member (e.g., basic bitmap). Collision-free.
Each group with two stations. The probability that both will try to transmit during
a slot is, which for small is negligible.
A single group containing all stations (i.e., slotted ALOHA). Zero delays at low
load but very high collisions at high load.
23
Sunil Mahesh
8) Write a Brief note on the Wireless network protocol.
Ans: -Wireless network protocols:
- The MAC sublayer in wireless networks faces an interesting problem.
- The transmission medium is shared, but due to the limited range of the transmit-
ters, it is possible that not all stations can hear each other.
- In this case, the previously mentioned CSMA protocols will fail.
- Where the radius of the circles represents the range of the transmitter. The three
receivers (A, B and C) are located such that user B can hear both A and C, but users
A and C cannot hear each other.
- A needs transmit to user B as well. User A senses the channel, but since he cannot
hear user C.
24
Sunil Mahesh
IEEE 802.5 [Token ring]:
In a token ring a special bit pattern,
called the token, circulates around
ring whenever all stations are idle.
When a station transmits, it breaks
the ring and inserts its own frame
with destination and source ad-
dresses.
When the frame eventually returns
to the originating station after com-
pleting the round, the station removes
the frame and closes the ring. Be-
cause there is only one token, only
one station can transmit at a given in-
stant, thus solving the channel access
problem.
Each station is connected to the
ring through a ring interface unit
(RIU).
25
Sunil Mahesh
Chapter – 4
The Data Link Layer
- When the receiver gets T(x), it divides T(x) by G(x); if T(x) divides cleanly (e.g.,
no remainder), no error has occurred.
-The receiver gets T(x) + E(x), where each bit in E(x) corresponds to an error bit.
- K 1 bits indicate k single-bit errors.
- Receiver computes [T(x) + E(x)]=G(x) = E(x)=G(x).
Will detect:
26
Sunil Mahesh
i) Single bit errors. If a single-bit error occurs, G(x) will detect it if it contains more
than one term. If it contains only one term, it may or may not detect the error, de-
pending on the E(x) and G(x).
Piggybacking:
- Interleaving data and control frames on the same circuit is an improvement over
having two separate physical circuits, yet another improvement is possible.
- When a data frame arrives, instead of immediately sending a separate control
frame, the receiver restrains itself and waits until the network layer passes it the
next packet.
- The acknowledgement is attached to the outgoing data frame (using the ack field
in the frame header).
- The technique of temporarily delaying outgoing acknowledgements so that they
can be hooked onto the next outgoing data frame is known as piggybacking.
- The advantage of using piggybacking over having distinct acknowledgement
frames is a better use of the available channel bandwidth.
27
Sunil Mahesh
- The sender maintenance a timeout counter,
when a frame is sent the sender starts the
timeout counter.
- If the acknowledgement of frames comes
in time, the sender sends next frame in the
queue.
- If the acknowledgement doesn‟t come, the
sender assumes that either the frame or its
acknowledgement is lost. Sender re-
transmits the frame & starts the time
counter.
- If a negative acknowledgement is received,
the sender Retransmits the frames.
28
Sunil Mahesh
8) What are Sliding Window Protocols? Explain.
Ans: -Sliding window protocols is one in which transmit the data in two-direction
& has efficiency complexity & buffer requirement. Also, it maintains the sequence
of frames correctly on window sender & receiver.
- The main essence of this protocol is at any instant of time, the sender maintains a
set of sequence number corresponding to frames, it is permitted to send.
- The need for a large window on the sending side occurs whenever the product of
bandwidth x round-trip-delay is large.
- If the bandwidth is high even for a moderate delay, the sender will exhaust its
window quickly unless it has a large window.
- If the delay is high (e.g., on a geostationary satellite channel), the sender will ex-
haust its window even for a moderate bandwidth, The product of these two factors
basically tells what the capacity of the pipe is, and the sender needs the ability to fill
it without stopping in order to operate at peak efficiency.
9) Explain the Services provided by Data Link Layer Toth network layer.
Ans: - The main function of data link layer is to provide service to the network.
The principle service is transferring data from n/w layer on the source machine to
the network layer on destination.
- 3 commonly provided services are:
i) Unacknowledged connectionless service
ii) Acknowledged connection service
iii) Acknowledge connection-oriented service
- Unacknowledged connectionless services consist having source sends independent
frames to destination without having destination acknowledgement.
- In acknowledged connectionless service it has no logical connection used but each
frame sent is individually acknowledged.
- Acknowledged connection-oriented service: source & destination establish a con-
nection before any data are transferred & it is acknowledged.
29
Sunil Mahesh
Chapter – 5
The Network Layer
Ans: - i) Routeing algorithm: -The routeing algorithm is that part of the network
layer software responsible for deciding which output line an incoming packet
should be transmitted on.
- If the subnet uses data grants internally, this decision must be made anew for
every arriving data packet since the best route may how changed since last time.
- If the subnet uses virtual circuits internally, rout. Decisions are made only when a
new virtual circuit is being set up
- The latter case is sometimes called session routeing because a route remains in
force for an entire user session (e.g. a login session at a terminal or a file transfer).
- Routeing algorithms may be classified into two major classes: non-adaptive and
adaptive, depending on how the routes are calculated.
- Non-adaptive algorithms, also known as Static algorithms do not base their
routeing decisions on the estimates of current traffic and topology.
30
Sunil Mahesh
- We have shown the names of the groups with loyal members on each network.
Following diagram also shows the multicast routing table for router R. There is one
shortest path tree for each group; therefore there are five shortest path trees for five
groups.
iv) Congestion: -When too many packets are present in the subnet, the performance
degrades this situation called congestion.
- When a number of packets dumped into subnet by the hosts is within its carrying
capacity, they are all delivered & the number delivered is propositional to the num-
ber sent.
31
Sunil Mahesh
- Connected to this backbone are routers which are in turn connected to a particular
workgroup. These workgroups occupy a unique LAN
- For huge networks, a two-level hierarchy may be insufficient; it may be necessary
to group the regions into clusters, the clusters into zones, the zones into groups, and
so on until we run out of names for aggregations.
- The full routing table for router 1A has 17 entries, as shown in above diagram,
when routing is done hierarchically, there are entries for all local routers as before
& other regions have been considered into a single router.
Non- Adaptive Routing algorithm: -This not bases their routing decisions on
measurements or estimates of the current traffic and topology.
- Instead, the choice of the route to use to get from I to J is computed in advance,
offline, and downloaded to the routers when the network is booted.
Vii) Subnet: - In the internet, the parts of the network are called „Subnet”. Subnet
to mean the set of all routers & communication lines a network.
- Every host & router on the internet has an IP address, which encodes on its net-
work & host number. All IP addresses are 32 bit long & are used in the source ad-
dress.
- IP address is divided into the 5 categories as shown below figure.
32
Sunil Mahesh
2) What is Congestion? Explain Leaky Bucket algorithm to prevent Conges-
tion.
Ans: -Congestion:-When too many packets are present in the subnet, the perform-
ance degrades this situation called congestion.
- When a number of packets dumped into subnet by the hosts is within its carrying
capacity, they are all delivered & the number delivered is propositional to the
number sent.
- Imagine a bucket with a small hole in the bottom, no matter the rate at which wa-
ter enters the bucket, the outflow is at a constant rate p. when there is any water in
bucket & zero when the bucket is empty.Also once the bucket is full, any additional
water entering it spills over the sides & is lost.
- The same idea can be applied to packets conceptually; each host is a finite queue if
a packet arrives at the queue.
- When it is full, the packet is discarded. In other words, if one or more processes
within the host try to send a packet when maximum no is queued.
- This arrangement must be built into the hardware interface or simulated by the
host operating system. It was first proposed by Turner in 1986 & is called the leaky
bucket algorithm.
33
Sunil Mahesh
3) Write a note on Flooding.
Ans: - Another static algorithm is flooding, in which every incoming packet is sent
out on every outgoing line except the one if arrived on. Flooding obviously gener-
ates vast no of duplicate packets. Flooding accomplishes the first goal of multicast-
ing.
- The alternative approaches for data routing, the flooding is to keep track of which
packets have been flooded to avoid then out a second time.
- Flooding is not practical in most applications, but it does have some uses.
Ex: in military applications, when large number of routers may be blown to bits at
any instant.
- A router receives the packet & without even looking at the destination group ad-
dress, sends it out from every interface except the one from which it was received.
- Flooding always chooses the shortest path because it chose every possible path in
parallel
34
Sunil Mahesh
bination of criteria.
- The first 5 steps used in computing the shortest path from A to D. the arrows indi-
cates working nodes.
- We want to find the shortest path from A to D start marking node A as permanent.
Indicated by filled in circle, Each of the nodes adjacent to A.
- We now start at B & examine all nodes adjacent to it. If the sum of the label on B
& distance from B to the node.
35
Sunil Mahesh
- Above figure shows the concept. The figure shows a simple domain with 4 nodes.
Each node uses the same topology to create a routing table, but the routing table for
each node is unique because the calculations are based on different interpretations
of the topology.
- This is analogous to a city map. While each person may have the same map, each
needs to take a different route to reach her specific destination.
- The topology must be dynamic, representing the latest state of each node and each
link. If there are changes in any point in the network, the topology must be updated
for each node.
- Link state routing is based on the assumption that, although the global knowledge
about the topology is not clear, each node has partial knowledge.
- The set of optimal routes from all sources to a given destination forms a tree
rooted at the destination. Such a tree is called a sink tree. Figure (a) A subnet. (b) A
sink tree for router B.
36
Sunil Mahesh
- If insufficient memory to hold all of them, packets will be lost. Adding more
memory may help up to a point.
- Congestion gets worse, not better because by the time packets get to the front of
the queue, all the packets will be fully forwards to the next router.
- Similarly, low bandwidth lines can also cause congestion. Upgrading the lines but
not changing the processors.
- Table content: In distance vector routing, each router maintains a routing table
indexed by, and containing one entry for, each router in the subnet. This entry con-
tains two parts: the preferred outgoing line to use for that destination and an esti-
mate of the time or distance to that destination.
37
Sunil Mahesh
Chapter – 6
The Transport Layer
- To start with the server executes a LISTEN primitive typically by calling a library
procedure that makes a system call to block the server until a clients turn up.
- When a client wants to talk with the server, it executes a CONNECT primitive, it
causes a CONNECTION REQ to be sent to the server.
- DATA can now be exchanged using SEND & RECEIVE primitives.
38
Sunil Mahesh