You are on page 1of 5

Name: Shubham Shah CLASS: TE-3/ D Roll No: 69

Assignment-2
Q1. Station A needs to send a message consisting of 9 packets to station
B using sliding window (window size 3) and go back n error control
strategy. All packets are ready and immediately available for
transmission. If every Sth packet that A transmits gets lost (but no ACKs
from B ever get lost), then what is the number of packets that A will
transmit for sending the message to B?

Solution:
 Since go-back n error control strategy is used all packets after a
lost packet are sent again.
Sender Receiver
1 -
2 1
3 2
4 3
5 4
6 -
7 6
7
[Timeout for 5]
5
6 5
7 6
8
9
8
9
[Timeout for 7]
7
8 7
9 8
[Timeout for 9]
9
9
Name: Shubham Shah CLASS: TE-3/ D Roll No: 69

Q2. Explain Congestion Control Approaches in TCP.


Solution:
 The two basic solution to the problem of Congestion are:
Increase the Resources
Decrease the load
These solutions are applied on different time scales in order to either
prevent congestion or handle it if it has occurred.

Network Traffic Aware Admission Traffic Load


Provisioning Rooting Control Throttling Shedding

1. Network Provisioning
a. The fundamental way of avoiding congestion is to build a
network that is properly matched to the traffic that is going
to carry.
b. If the network uses a low Bandwidth link along which a
heavy traffic is directed then congestion is most certain to
take place, we can add resources dynamically when there is
congestion.
c. This is called as network provisioning. It is a slow preventive
solution and happens on a time scale of months.
2. Traffic aware Routing
a. If we cannot increase the capacity of network then we
should hint of utilizing the exisiting capacity in the best
possible way.
b. Routers can be tailored to suit traffic patterns that change
during the day as network users make and sleep in different
time zones.
c. The traffic can be routed over those paths which have less
traffic at that time. This is traffic aware routing.
3. Admission Control
Name: Shubham Shah CLASS: TE-3/ D Roll No: 69
a. Sometimes it is not possible to increase capacity. Then the
only possible way to fight congestion is to decrease the load.
b. The leaky bucket and token bucket methods are example of
admission control.
4. Traffic Throttling
a. In the internet and many other computer networks, senders
adjust their transmission rates and send only that much
traffic which a network can deliver without causing
congestion.
b. When congestion is about to happen, the senders should be
hold to reduce their transmission and slow down. This
technique is an example of congestion avoidance principle.
c. Note that traffic throttling approach can be used in both
datagram subnets as well as virtual circuit subnets.
5. Load Shedding:
a. When all other solutions fail to certain congestion, the
network has no option but to discard packets that can not be
delivered.
b. A good policy for selecting which packets to discard can help
preventing the congestion collapse.
Q3. Find the first address in the block if one of the addresses is
140.120.84.24/20.
Solution:
 The first, second and fourth bytes are easy.
 For the third byte, we keep the bits corresponding to the
number of is in that group.
IP Address:
140 120 84 24
8 8 4 0
140 120 80 0

First Address
84 01010100
Name: Shubham Shah CLASS: TE-3/ D Roll No: 69
Keep left 4 bits 01010000

Results in decimal: 80

The First Address is 140.120.80.0/20

Q4. Illustrate the Concept of SMTP?


Solution:
SMTP is an application layer protocol. The Client who wants to send
the mail opens a TCP Connection to the SMTP server and then sends the mail
across the connection. The SMTP is always on Listening mode. As soon as it
listens for a TCP from any client, the SMTP process initiates a connection
through port after successfully establishing a TCP connection the client process
sends the mail instantly model of SMTP system.

Message transfer
Send Mail agent
Sender User Agent
Queue

Message transfer
Receiver User Agent agent
User Mailbox

 The sender’s user agent prepares the message and sends it to the MTA.
The MTA’S responsibility is to transfer the ail across the network to the
receivers MTA. To send mails, a system must have a Client MTA, and to
receive mails, a system must have a server MTA.
 Some SMTP Commands
o HELO
o MAIL
o RCPT
o DATA
Name: Shubham Shah CLASS: TE-3/ D Roll No: 69

You might also like