You are on page 1of 7

Network Programming & Administration

1. How is flow control managed in TCP ? Explain the sliding window protocol using an example.

Sol. Flow control is accomplished by the receiver sending back a window to the sender. The size
of this window, called the receive window, tells the sender how much data to send. Often, when
the client is saturated, it might not be able to send back a receive window to the sender to signal
it to slow down transmission.

The sliding window is a technique for sending multiple frames at a time. It controls the data
packets between the two devices where reliable and gradual delivery of data frames is needed. It
is also used in TCP (Transmission Control Protocol).

Sliding window protocol has two types:

1. Go-Back-N ARQ
2. Selective Repeat ARQ
● Go-Back-N ARQ:-

Go-Back-N ARQ protocol is also known as Go-Back-N Automatic Repeat Request. It is a data link
layer protocol that uses a sliding window method. In this, if any frame is corrupted or lost, all
subsequent frames have to be sent again.

The size of the sender window is N in this protocol. For example, Go-Back-8, the size of the
sender window, will be 8. The receiver window size is always 1.

If the receiver receives a corrupted frame, it cancels it. The receiver does not accept a corrupted
frame. When the timer expires, the sender sends the correct frame again. The design of the
Go-Back-N ARQ protocol is shown below.

2. What is Virtual Private Network (VPN) ? Write its advantages and disadvantages. Also compare
VPN with Free NX.

Sol. VPN stands for the virtual private network. A virtual private network (VPN) is a technology that
creates a safe and encrypted connection over a less secure network, such as the internet.

Here are some of the key advantages of a VPN for both home and professional use:

1. Bypass Geo-locked Content

Many popular entertainment websites have different content accessible in specific regions. This is done
for many reasons, but the bottom line is that some content is only available in a particular location. By
using a VPN to make your connection appear as if it is coming from the region where the content is
available, you can easily enjoy your favorite entertainment no matter where you are.
2. Provide Safety Through Anonymity

When using a VPN, your network information appears as if it is coming from a location different than your
own. This disguise for network data helps keep VPN users safe, because anyone looking to steal
information would be getting the VPN server’s data instead. Using a VPN keeps the user's location and
other valuable information secure and inaccessible by unwanted parties.

3. Secure Connection for Remote Work

Businesses today need to consider internet safety more than ever. With more people than ever working
from home, sensitive company and customer information is at a higher risk of theft.

For example, say an employee connects to a work computer remotely on a public network without using a
VPN. Theoretically, anyone on that public network could gain access to the internal company network,
because the employee did nothing to hide their information.

Unfettered access to company files and customer information can be catastrophic to a business. Using a
VPN to connect to business-based networks can help ensure that sensitive data is hidden behind the
dummy information provided via the VPN.

4. Save Money on Region-Based eCommerce

When shopping online, websites like hotels or airlines track customers' network information to increase
prices. Some eCommerce vendors will even charge different prices for services based on region. Using a
VPN to hide your location allows you to see offers unaffected by shady pricing tactics such as those
mentioned above. The money you could save on flights alone could be more than you spent on the VPN.

5. Cost-Effective Security

There are new "security solutions" every day, but the latest software and firewalls can be expensive and
may end up causing more issues than they prevent. You can avoid steep licensing fees or monthly
charges by using a VPN. While it might not scan for viruses or block intruders from trying to connect to
your PC, a VPN prevents the need for those features by essentially making you invisible online. You do not
need to block outside people trying to get into your network when they think your system is two thousand
miles away in Jamaica.
6. Gaming Pros

If you have the bandwidth, using a VPN while gaming can have some advantages. The bonuses include
protection from DDoS attacks or angry players trying to gain access to your home network. The
region-free capabilities of using a VPN also means that you could choose which servers to use when
playing a game, which could even improve your connection speeds in some situations. Some gaming
titles may only be available in specific regions, and a VPN could give you access to those games as well.

Disadvantages of a VPN

Before deciding to use a VPN, it’s important to understand the disadvantages of a VPN as well. The good
news is that in most cases, the pros far outweigh the cons. Here’s what you need to know

1.Slow Connection Speeds

Due to the fact that a VPN is a virtual connection existing inside of a physical network, there is always
going to be some slowdown in terms of internet speeds. Creating and maintaining the VPN will take a
certain amount of bandwidth, which slows connection speeds. To put it plainly, using a VPN is taking
resources from your internet, thus limiting how fast your connection through the VPN can be.

This is gradually becoming less of an issue though, because VPN services are getting better every day.
Most large VPN providers boast a minimal loss of connection speeds.

2. VPN Blocking Software Exists

Those same companies that want to charge people more based on location found out about VPN use and
recently have taken steps to combat it. Some eCommerce sites utilize software known as VPN blockers,
which works to identify and prevent users from using VPNs.

A common way these programs work is with websites that require users to register accounts before use.
The company that generally stores account information like username and email will now also store a list
of your common IP addresses. If the website notices that you are using an IP from a different location
than usual, they may restrict or block your access. VPN blockers are growing in popularity right alongside
VPN use.

3. Complicated Set Up

While connecting to the internet may be easy, setting up a VPN is not. A VPN is essentially an encrypted
tunnel that hides the information inside. Failing to set up the VPN correctly can result in leaks.
Information leaks can occur when using a VPN that is not correctly configured. These leaks are
significantly more dangerous than browsing the web without a VPN, because the leak shows that you are
trying to use a VPN to hide information, thus drawing attention from unwanted parties. For this reason, it
is crucial to ensure you understand your VPN provider’s operating procedures before implementing them.

4. Dropped Connections

Even the best VPN can sometimes drop the connection. When a VPN loses connectivity, it is not the same
as merely losing Wi-Fi and being disconnected from the internet. A dropped connection over VPN means
that your true network information is now on display for anyone. This also means that during a dropped
connection, your ISP can see what sites you are visiting. If any site you visit violates an ISP's terms of
service— like a torrent, for example — they could shut down your connection right then and there.

5. Gaming Cons

When gaming, your connection speed is critical. Having a slow connection to game servers can be
incredibly frustrating, and adding a VPN could make playing some games impossible. Users with less
bandwidth may find that gaming over VPN is simply not an option. But, as we mentioned earlier, VPNs are
improving over time and consuming less bandwidth.

Or

3. Write the syntax of the following system calls along with the meaning of parameters used by
them

(i) bind( )

(ii) htons() )

(iii) connect( )

(iv) listen( )

(v) sendto() )

4. Explain any four methods used by HTTP for data transfer?explain the significance of "Type of
Service" field in the header of IP datagram?
5. Explain the working of ARP. Write similarities and differences between ARP and HARP?
6. Write the differences and similarities between TCP/IP model and OSI reference models.
7. What is DHCP ? Explain the working of DHCP with the activities performed between DHCP client
and DHCP server?
8. Write an algorithm each for TCP client and TCP server based qn the following specifications
(i) TCP client will send a list of 10 numbers to the TCP server.

(ii) TCP server can handle maximum 4 client at a time. TCP server will find the smallest number
from the given list and return to the respective client.

9. Assume the following hexadecimal number as a TCP header sequence : 9

05320017 00000001 00000000

500207FF 00000000

(i) What is the source port number ? (ii) What is the sequence number ? (iii) What is the
acknowledgement number ?

(iv) What is the length of the header ? (v) What is the type of the segment ? (vi) What is the
window size ?

10. Write an algorithm each for TCP client and for TCP server to perform the following tasks

• TCP client establishes the connection with server.

• TCP client sends any three numbers to the server.

• TCP server responds back to the client by sending the smallest number.

• TCP server cannot handle more than four clients at a time.

Note : Make suitable assumptions, if any?

11. Write short notes on any four of the following :

(a) Roles and responsibilities of a Network Administrator

(b) LINUX kernel management

(c) Disk security management

(d) Socket descriptor

(e) Simple Network Management Protocol (SNMP)

(f) Network File System (NFS)

(g)Network Monitoring Tools

(h) Cloud Computing

(i) DHCP

TCP and UDP


(j) Broadcasting and Multicasting

(k) IPv4 and IPv6

(l) BOOTP and DHCP

12. Differentiate between RAT 16 and

FAT 32.

14. Explain distance vector routing with the

help of an example.

15. Write the step by step procedure to

configure a Samba server. Assume server

IP address is 192.162.0.18 and server

machine name is?

16. What is the significance of the following TCP header fields:

● Sequence Number
● Reserved bits
● Window Size
● Checksum
● Urgent Pointer

17. Calculate subnet address if the IP address and the subnet mask are given

as shown below:

● IP address: 205.50.39.56
● Subnet Mask: 255.255.245.0

18. What is the main functions of the Dynamic Host Configuration Protocol?

How does it work? Where is the DHCP server located?

19. How many bits are needed for defining Net IDs and Host IDs of Class A,

Class B and Class C respectively?

20. How is the "Disc User" checked in Linux ?

Explain with the help of an example?

You might also like