Professional Documents
Culture Documents
G Pranav - CB.EN.U4AIE22016
1. Identify at least two client server applications. What are the protocols involved in each layer of
the TCP/IP stack when a data has to be transmitted from the client to the server
Whatsapp and the online game Valorant are two Client-Server applications
2. Identify at least two peer to peer applications(p2p) available now. What are the protocols used for
p2p applications? For a communication session between a pair of processes, which process is the
client and which is the server?
Two examples of p2p applications are torrent apps (such as Bittorent and Utorent) and cryptocurrency networks.
The client process is the process that initiated the communication and makes a request for some data. The server
process is the process that provides the data or service that the client requested
3. What are the factors that enable high speed transmission of large data in the network based applications today?
Relate it with the different functionalities in the 5 layer mode
Application Layer - Compression algorithms can be used to reduce data size before transmission
Transport Layer - High speed protocols such as TCP fast open are used to reduce round trip delays and use multiple
data paths simultaneously
Network Layer: Quality of service mechanisms prioritize certain types of traffic, ensuring that real-time or critical data
receives preferential treatment. Traffic management techniques help prevent congestion and ensure efficient use of
available bandwidth
Physical Layer: Advances in physical layer technologies, such as the use of optical fiber enable the transmission of
data at extremely high speeds over long distances
4. What are the proprietary and non-proprietary protocols? Give an example for each
Proprietary protocols are owned and operated by a specific company. They give the owner the ability to change the
protocol design and implementation and enforce restrictions on the usage. An example of a proprietary protocol is the
Skype protocol, which is owned by Microsoft
Non-Proprietary protocols are open source and free to use by anyone. Examples of this are all the protocols used in
the TCP/IP stack
5. What is the format of data transmission from one device to another in a wired and wireless medium?
Wireless- Data is sent as electromagnetic radiation, such as Radio waves (used in WiFi) or microwaves (used by
satellites). Bluetooth uses a combination of frequency hopping and modulation to transmit data
6. What are the different types of cables used in connecting network devices. Identify need for the
same based on their transmission rate
Ethernet cables use Cat5e to Cat7 cables, each with increasing transmission rates. Cat5e has up to 1gbps
transmission rates and is usually used in home networks or small businesses, while Cat7 has up to 10gbps
transmission rates and is better shielded. It is usually used in data centers or other high-speed applications
Fiber-Optic cables come in either single-mode (up to 100Gbps or higher) and is used for long distances, or multi-mode
(up to 40gbps) used for shorter distances and data centers.
7. Describe the most popular wireless Internet access technologies today. Compare and contrast them.
Wifi - Uses radio waves to transmit data over short distances. Speeds range from several Mbps to several Gbps.
Limited range, used to provide wireless access to laptops, smartphones, and other devices used at homes or
businesses
Cellular Networks (3G, 4G, 5G) - Uses Cellular networks to provide connectivity over large geographical areas through
a network of cell towers. Speeds are about the same or a little bit less tha WiFi. Used to provide connectivity on the go
to smartphones or tablets.
8. Consider sending a packet from a source host to a destination host over a fixed route. List the delay components
in the end-to-end delay. Which of these delays are constant and which are variable?
Transmission Delay - The time taken to push all the packets bits into the data link. A variable delay which depends on
the data packet size
Propagation Delay - The time taken for a bit to travel from the sender to the receiver. The delay is constant for a
medium and distance
Processing Delay - The time taken for network devices like routers and switches to process the packet and reform the
packets into the data. Varies based on the devices processing power and network load
Queuing Delay - The time the packet waits in a queue at a router or switch before being transmitted. Varies on the
data congestion in the network device
Transmission, propagation, and processing delays happen again at the destination host.
9. Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system
A creates packets from the file. When one of these packets arrives to a router, what information in the packet does
the router use to determine the link onto which the packet is forwarded?
End system A first has to break the file into small units called packets. The file is first divided into smaller segments of
a fixed size. Each segment is given control information used for routing, error detection, and reassembly once it
reaches. The file data is then copied on to the readied packet and a checksum is calculated to make sure the data is
not changed by the time it arrives.
The packets then take different paths to arrive at their first stop, usually a router. The router uses a set of information -
the Source and Destination IP addresses to determine the sender and recipient of the package, the routing table
which contains information about available network paths, and other header fields based on the routing protocol- using
10. Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of
data every k time units, where k is small and fixed). Also, when such an application
starts, it will continue running for a relatively long period of time. Answer the following questions, briefly justifying
your answer:
a. Would a packet-switched network or a circuit-switched network be more appropriate for this application? Why?
b. Suppose that a packet-switched network is used and the only traffic in this network comes from such
applications as described above. Furthermore, assume that the sum of the application data
rates is less than the capacities of each and every link. Is some form of congestion control needed? Why?