Professional Documents
Culture Documents
1. How is flow control managed in TCP ? Explain the sliding window protocol using an example.
Sol. Flow control is accomplished by the receiver sending back a window to the sender. The size
of this window, called the receive window, tells the sender how much data to send. Often, when
the client is saturated, it might not be able to send back a receive window to the sender to signal
it to slow down transmission.
The sliding window is a technique for sending multiple frames at a time. It controls the data
packets between the two devices where reliable and gradual delivery of data frames is needed. It
is also used in TCP (Transmission Control Protocol).
1. Go-Back-N ARQ
2. Selective Repeat ARQ
● Go-Back-N ARQ:-
Go-Back-N ARQ protocol is also known as Go-Back-N Automatic Repeat Request. It is a data link
layer protocol that uses a sliding window method. In this, if any frame is corrupted or lost, all
subsequent frames have to be sent again.
The size of the sender window is N in this protocol. For example, Go-Back-8, the size of the
sender window, will be 8. The receiver window size is always 1.
If the receiver receives a corrupted frame, it cancels it. The receiver does not accept a corrupted
frame. When the timer expires, the sender sends the correct frame again. The design of the
Go-Back-N ARQ protocol is shown below.
2. What is Virtual Private Network (VPN) ? Write its advantages and disadvantages. Also compare
VPN with Free NX.
Sol. VPN stands for the virtual private network. A virtual private network (VPN) is a technology that
creates a safe and encrypted connection over a less secure network, such as the internet.
Here are some of the key advantages of a VPN for both home and professional use:
Many popular entertainment websites have different content accessible in specific regions. This is done
for many reasons, but the bottom line is that some content is only available in a particular location. By
using a VPN to make your connection appear as if it is coming from the region where the content is
available, you can easily enjoy your favorite entertainment no matter where you are.
2. Provide Safety Through Anonymity
When using a VPN, your network information appears as if it is coming from a location different than your
own. This disguise for network data helps keep VPN users safe, because anyone looking to steal
information would be getting the VPN server’s data instead. Using a VPN keeps the user's location and
other valuable information secure and inaccessible by unwanted parties.
Businesses today need to consider internet safety more than ever. With more people than ever working
from home, sensitive company and customer information is at a higher risk of theft.
For example, say an employee connects to a work computer remotely on a public network without using a
VPN. Theoretically, anyone on that public network could gain access to the internal company network,
because the employee did nothing to hide their information.
Unfettered access to company files and customer information can be catastrophic to a business. Using a
VPN to connect to business-based networks can help ensure that sensitive data is hidden behind the
dummy information provided via the VPN.
When shopping online, websites like hotels or airlines track customers' network information to increase
prices. Some eCommerce vendors will even charge different prices for services based on region. Using a
VPN to hide your location allows you to see offers unaffected by shady pricing tactics such as those
mentioned above. The money you could save on flights alone could be more than you spent on the VPN.
5. Cost-Effective Security
There are new "security solutions" every day, but the latest software and firewalls can be expensive and
may end up causing more issues than they prevent. You can avoid steep licensing fees or monthly
charges by using a VPN. While it might not scan for viruses or block intruders from trying to connect to
your PC, a VPN prevents the need for those features by essentially making you invisible online. You do not
need to block outside people trying to get into your network when they think your system is two thousand
miles away in Jamaica.
6. Gaming Pros
If you have the bandwidth, using a VPN while gaming can have some advantages. The bonuses include
protection from DDoS attacks or angry players trying to gain access to your home network. The
region-free capabilities of using a VPN also means that you could choose which servers to use when
playing a game, which could even improve your connection speeds in some situations. Some gaming
titles may only be available in specific regions, and a VPN could give you access to those games as well.
Disadvantages of a VPN
Before deciding to use a VPN, it’s important to understand the disadvantages of a VPN as well. The good
news is that in most cases, the pros far outweigh the cons. Here’s what you need to know
Due to the fact that a VPN is a virtual connection existing inside of a physical network, there is always
going to be some slowdown in terms of internet speeds. Creating and maintaining the VPN will take a
certain amount of bandwidth, which slows connection speeds. To put it plainly, using a VPN is taking
resources from your internet, thus limiting how fast your connection through the VPN can be.
This is gradually becoming less of an issue though, because VPN services are getting better every day.
Most large VPN providers boast a minimal loss of connection speeds.
Those same companies that want to charge people more based on location found out about VPN use and
recently have taken steps to combat it. Some eCommerce sites utilize software known as VPN blockers,
which works to identify and prevent users from using VPNs.
A common way these programs work is with websites that require users to register accounts before use.
The company that generally stores account information like username and email will now also store a list
of your common IP addresses. If the website notices that you are using an IP from a different location
than usual, they may restrict or block your access. VPN blockers are growing in popularity right alongside
VPN use.
3. Complicated Set Up
While connecting to the internet may be easy, setting up a VPN is not. A VPN is essentially an encrypted
tunnel that hides the information inside. Failing to set up the VPN correctly can result in leaks.
Information leaks can occur when using a VPN that is not correctly configured. These leaks are
significantly more dangerous than browsing the web without a VPN, because the leak shows that you are
trying to use a VPN to hide information, thus drawing attention from unwanted parties. For this reason, it
is crucial to ensure you understand your VPN provider’s operating procedures before implementing them.
4. Dropped Connections
Even the best VPN can sometimes drop the connection. When a VPN loses connectivity, it is not the same
as merely losing Wi-Fi and being disconnected from the internet. A dropped connection over VPN means
that your true network information is now on display for anyone. This also means that during a dropped
connection, your ISP can see what sites you are visiting. If any site you visit violates an ISP's terms of
service— like a torrent, for example — they could shut down your connection right then and there.
5. Gaming Cons
When gaming, your connection speed is critical. Having a slow connection to game servers can be
incredibly frustrating, and adding a VPN could make playing some games impossible. Users with less
bandwidth may find that gaming over VPN is simply not an option. But, as we mentioned earlier, VPNs are
improving over time and consuming less bandwidth.
Or
3. Write the syntax of the following system calls along with the meaning of parameters used by
them
(i) bind( )
(ii) htons() )
(iii) connect( )
(iv) listen( )
(v) sendto() )
4. Explain any four methods used by HTTP for data transfer?explain the significance of "Type of
Service" field in the header of IP datagram?
5. Explain the working of ARP. Write similarities and differences between ARP and HARP?
6. Write the differences and similarities between TCP/IP model and OSI reference models.
7. What is DHCP ? Explain the working of DHCP with the activities performed between DHCP client
and DHCP server?
8. Write an algorithm each for TCP client and TCP server based qn the following specifications
(i) TCP client will send a list of 10 numbers to the TCP server.
(ii) TCP server can handle maximum 4 client at a time. TCP server will find the smallest number
from the given list and return to the respective client.
500207FF 00000000
(i) What is the source port number ? (ii) What is the sequence number ? (iii) What is the
acknowledgement number ?
(iv) What is the length of the header ? (v) What is the type of the segment ? (vi) What is the
window size ?
10. Write an algorithm each for TCP client and for TCP server to perform the following tasks
• TCP server responds back to the client by sending the smallest number.
(i) DHCP
FAT 32.
help of an example.
● Sequence Number
● Reserved bits
● Window Size
● Checksum
● Urgent Pointer
17. Calculate subnet address if the IP address and the subnet mask are given
as shown below:
● IP address: 205.50.39.56
● Subnet Mask: 255.255.245.0
18. What is the main functions of the Dynamic Host Configuration Protocol?
19. How many bits are needed for defining Net IDs and Host IDs of Class A,