Professional Documents
Culture Documents
Assignment-2
Q1. Station A needs to send a message consisting of 9 packets to station
B using sliding window (window size 3) and go back n error control
strategy. All packets are ready and immediately available for
transmission. If every Sth packet that A transmits gets lost (but no ACKs
from B ever get lost), then what is the number of packets that A will
transmit for sending the message to B?
Solution:
Since go-back n error control strategy is used all packets after a
lost packet are sent again.
Sender Receiver
1 -
2 1
3 2
4 3
5 4
6 -
7 6
7
[Timeout for 5]
5
6 5
7 6
8
9
8
9
[Timeout for 7]
7
8 7
9 8
[Timeout for 9]
9
9
Name: Shubham Shah CLASS: TE-3/ D Roll No: 69
1. Network Provisioning
a. The fundamental way of avoiding congestion is to build a
network that is properly matched to the traffic that is going
to carry.
b. If the network uses a low Bandwidth link along which a
heavy traffic is directed then congestion is most certain to
take place, we can add resources dynamically when there is
congestion.
c. This is called as network provisioning. It is a slow preventive
solution and happens on a time scale of months.
2. Traffic aware Routing
a. If we cannot increase the capacity of network then we
should hint of utilizing the exisiting capacity in the best
possible way.
b. Routers can be tailored to suit traffic patterns that change
during the day as network users make and sleep in different
time zones.
c. The traffic can be routed over those paths which have less
traffic at that time. This is traffic aware routing.
3. Admission Control
Name: Shubham Shah CLASS: TE-3/ D Roll No: 69
a. Sometimes it is not possible to increase capacity. Then the
only possible way to fight congestion is to decrease the load.
b. The leaky bucket and token bucket methods are example of
admission control.
4. Traffic Throttling
a. In the internet and many other computer networks, senders
adjust their transmission rates and send only that much
traffic which a network can deliver without causing
congestion.
b. When congestion is about to happen, the senders should be
hold to reduce their transmission and slow down. This
technique is an example of congestion avoidance principle.
c. Note that traffic throttling approach can be used in both
datagram subnets as well as virtual circuit subnets.
5. Load Shedding:
a. When all other solutions fail to certain congestion, the
network has no option but to discard packets that can not be
delivered.
b. A good policy for selecting which packets to discard can help
preventing the congestion collapse.
Q3. Find the first address in the block if one of the addresses is
140.120.84.24/20.
Solution:
The first, second and fourth bytes are easy.
For the third byte, we keep the bits corresponding to the
number of is in that group.
IP Address:
140 120 84 24
8 8 4 0
140 120 80 0
First Address
84 01010100
Name: Shubham Shah CLASS: TE-3/ D Roll No: 69
Keep left 4 bits 01010000
Results in decimal: 80
Message transfer
Send Mail agent
Sender User Agent
Queue
Message transfer
Receiver User Agent agent
User Mailbox
The sender’s user agent prepares the message and sends it to the MTA.
The MTA’S responsibility is to transfer the ail across the network to the
receivers MTA. To send mails, a system must have a Client MTA, and to
receive mails, a system must have a server MTA.
Some SMTP Commands
o HELO
o MAIL
o RCPT
o DATA
Name: Shubham Shah CLASS: TE-3/ D Roll No: 69