You are on page 1of 3

Computer Networking Assignment

G Pranav - CB.EN.U4AIE22016

1. Identify at least two client server applications. What are the protocols involved in each layer of
the TCP/IP stack when a data has to be transmitted from the client to the server

Whatsapp and the online game Valorant are two Client-Server applications

Application Layer Protocols: HTTP, FTP, SMTP etc.


These protocols initiate data transmission, such as web browsers sending HTTP requests

Transport Layer Protocols: TCP (Transmission control protocol), UDP


TCP breaks the data into smaller segments and ensures the arrive in the order they were first in

Network Layer Protocols: IP (Internet protocol)


IP Addresses route data between different networks and devices

Data Link Layer Protocols: Ethernet, Wi-Fi


Data is divided and transmitted physically using Ethernet cables or over wireless signals

2. Identify at least two peer to peer applications(p2p) available now. What are the protocols used for
p2p applications? For a communication session between a pair of processes, which process is the
client and which is the server?

Two examples of p2p applications are torrent apps (such as Bittorent and Utorent) and cryptocurrency networks.

The client process is the process that initiated the communication and makes a request for some data. The server
process is the process that provides the data or service that the client requested

3. What are the factors that enable high speed transmission of large data in the network based applications today?
Relate it with the different functionalities in the 5 layer mode

Application Layer - Compression algorithms can be used to reduce data size before transmission
Transport Layer - High speed protocols such as TCP fast open are used to reduce round trip delays and use multiple
data paths simultaneously

Network Layer: Quality of service mechanisms prioritize certain types of traffic, ensuring that real-time or critical data
receives preferential treatment. Traffic management techniques help prevent congestion and ensure efficient use of
available bandwidth

Physical Layer: Advances in physical layer technologies, such as the use of optical fiber enable the transmission of
data at extremely high speeds over long distances

4. What are the proprietary and non-proprietary protocols? Give an example for each

Proprietary protocols are owned and operated by a specific company. They give the owner the ability to change the
protocol design and implementation and enforce restrictions on the usage. An example of a proprietary protocol is the
Skype protocol, which is owned by Microsoft
Non-Proprietary protocols are open source and free to use by anyone. Examples of this are all the protocols used in
the TCP/IP stack

5. What is the format of data transmission from one device to another in a wired and wireless medium?

Computer Networking Assignment 1


Wired - Data is sent as bitstreams of digital signals in binary. Essentially, electrical voltage levels or light that represent
binary 0s and 1s

Wireless- Data is sent as electromagnetic radiation, such as Radio waves (used in WiFi) or microwaves (used by
satellites). Bluetooth uses a combination of frequency hopping and modulation to transmit data

6. What are the different types of cables used in connecting network devices. Identify need for the
same based on their transmission rate

Ethernet cables use Cat5e to Cat7 cables, each with increasing transmission rates. Cat5e has up to 1gbps
transmission rates and is usually used in home networks or small businesses, while Cat7 has up to 10gbps
transmission rates and is better shielded. It is usually used in data centers or other high-speed applications

Fiber-Optic cables come in either single-mode (up to 100Gbps or higher) and is used for long distances, or multi-mode
(up to 40gbps) used for shorter distances and data centers.

7. Describe the most popular wireless Internet access technologies today. Compare and contrast them.

Wifi - Uses radio waves to transmit data over short distances. Speeds range from several Mbps to several Gbps.
Limited range, used to provide wireless access to laptops, smartphones, and other devices used at homes or
businesses
Cellular Networks (3G, 4G, 5G) - Uses Cellular networks to provide connectivity over large geographical areas through
a network of cell towers. Speeds are about the same or a little bit less tha WiFi. Used to provide connectivity on the go
to smartphones or tablets.

8. Consider sending a packet from a source host to a destination host over a fixed route. List the delay components
in the end-to-end delay. Which of these delays are constant and which are variable?

Transmission Delay - The time taken to push all the packets bits into the data link. A variable delay which depends on
the data packet size
Propagation Delay - The time taken for a bit to travel from the sender to the receiver. The delay is constant for a
medium and distance
Processing Delay - The time taken for network devices like routers and switches to process the packet and reform the
packets into the data. Varies based on the devices processing power and network load
Queuing Delay - The time the packet waits in a queue at a router or switch before being transmitted. Varies on the
data congestion in the network device
Transmission, propagation, and processing delays happen again at the destination host.

9. Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system
A creates packets from the file. When one of these packets arrives to a router, what information in the packet does
the router use to determine the link onto which the packet is forwarded?

End system A first has to break the file into small units called packets. The file is first divided into smaller segments of
a fixed size. Each segment is given control information used for routing, error detection, and reassembly once it
reaches. The file data is then copied on to the readied packet and a checksum is calculated to make sure the data is
not changed by the time it arrives.
The packets then take different paths to arrive at their first stop, usually a router. The router uses a set of information -
the Source and Destination IP addresses to determine the sender and recipient of the package, the routing table
which contains information about available network paths, and other header fields based on the routing protocol- using

Computer Networking Assignment 2


all this, the router sends the information off on an optimal path to End System B, repeating the process for each
arriving packet

10. Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of
data every k time units, where k is small and fixed). Also, when such an application
starts, it will continue running for a relatively long period of time. Answer the following questions, briefly justifying
your answer:
a. Would a packet-switched network or a circuit-switched network be more appropriate for this application? Why?
b. Suppose that a packet-switched network is used and the only traffic in this network comes from such
applications as described above. Furthermore, assume that the sum of the application data
rates is less than the capacities of each and every link. Is some form of congestion control needed? Why?

a. A Packet-switched network would be more appropriate. In a circuit-switched network, dedicated communication


channels are reserved for the entire duration of the application and data is directly sent through those channels. This
would cause inefficient data usage and congestion in the network over time in an application that runs for a long time.
In contrast, in a packet-switched network, data is broken into packets and sent individually. Resources can be
dynamically allocated and the network can use multiple channels to send data and avoid congestion that can be
caused in a dedicated channel, avoiding bad resource utilization as well.
b. Some congestion control is needed even if the application data rates are within the capabilities of the links in a
packet switched network. Congestion can occur due to temporary traffic spikes, network failures, or variation in path
routing. Without congestion control, packets can congest in data links and get lost. Congestion control mechanisms
help regulate the flow of data into the network, ensuring that it doesn't exceed the network's capacity. This can involve
techniques like traffic shaping, rate limiting, and the use of congestion signals to adjust sending rates. Even when the
network has ample capacity, congestion control mechanisms help maintain fair and efficient data flow, preventing
over-utilization of network resources and ensuring that different flows share the available bandwidth equitably.

Computer Networking Assignment 3

You might also like