You are on page 1of 8

Q 1.

Silly Window Syndrome


Ans - Silly Window Syndrome is a problem that arises due to poor implementation of TCP. It
degrades the TCP performance and makes the data transmission extremely inefficient. The
problem is called so because:

It causes the sender window size to shrink to a silly value.

The window size shrinks to such an extent that the data being transmitted is smaller than TCP
Header.

What are the causes?


The two major causes of this syndrome are as follows:

Sender window transmitting one byte of data repeatedly.

Receiver window accepting one byte of data repeatedly.


Cause-1: Sender window transmitting one byte of data repeatedly –
Suppose only one byte of data is generated by an application . The poor implementation of TCP
leads to transmit this small segment of data.Every time the application generates a byte of data,
the window transmits it. This makes the transmission process slow and inefficient.The problem
is solved by Nagle’s algorithm.

Nagle’s algorithm suggests:

Sender should send only the first byte on receiving one byte data from the application.

Sender should buffer all the rest bytes until the outstanding byte gets acknowledged.

In other words, sender should wait for 1 RTT(Round Trip Time).

After receiving the acknowledgement, sender should send the buffered data in one TCP
segment. Then, sender should buffer the data again until the previously sent data gets
acknowledged.

Cause-2: Receiver window accepting one byte of data repeatedly –


Suppose consider the case when the receiver is unable to process all the incoming data.In such
a case, the receiver will advertise a small window size.The process continues and the window
size becomes smaller and smaller.A stage arrives when it repeatedly advertises window size of
1 byte.This makes receiving process slow and inefficient.The solution to this problem is Clark’s
Solution.

Clark’s solution suggests:


Receiver should not send a window update for 1 byte.

Receiver should wait until it has a decent amount of space available.

Receiver should then advertise that window size to the sender.

Q 2. Sliding Window Protocol


The sliding window is a technique for sending multiple frames at a time. It controls the data
packets between the two devices where reliable and gradual delivery of data frames is needed.
It is also used in TCP (Transmission Control Protocol).

In this technique, each frame has sent from the sequence number. The sequence numbers are
used to find the missing data in the receiver end. The purpose of the sliding window technique is
to avoid duplicate data, so it uses the sequence number.

Types of Sliding Window Protocol


Sliding window protocol has two types:

Go-Back-N ARQ
Selective Repeat ARQ
Go-Back-N ARQ
Go-Back-N ARQ protocol is also known as Go-Back-N Automatic Repeat Request. It is a data
link layer protocol that uses a sliding window method. In this, if any frame is corrupted or lost, all
subsequent frames have to be sent again.

The size of the sender window is N in this protocol. For example, Go-Back-8, the size of the
sender window, will be 8. The receiver window size is always 1.

If the receiver receives a corrupted frame, it cancels it. The receiver does not accept a corrupted
frame. When the timer expires, the sender sends the correct frame again. The design of the
Go-Back-N ARQ protocol is shown below.

Selective Repeat ARQ


Selective Repeat ARQ is also known as the Selective Repeat Automatic Repeat Request. It is a
data link layer protocol that uses a sliding window method. The Go-back-N ARQ protocol works
well if it has fewer errors. But if there is a lot of error in the frame, lots of bandwidth loss in
sending the frames again. So, we use the Selective Repeat ARQ protocol. In this protocol, the
size of the sender window is always equal to the size of the receiver window. The size of the
sliding window is always greater than 1.

If the receiver receives a corrupt frame, it does not directly discard it. It sends a negative
acknowledgment to the sender. The sender sends that frame again as soon as on the receiving
negative acknowledgment. There is no waiting for any time-out to send that frame. The design
of the Selective Repeat ARQ protocol is shown below.

Q 3. block cipher

A block cipher takes a block of plaintext bits and generates a block of ciphertext bits, generally
of same size. The size of block is fixed in the given scheme. The choice of block size does not
directly affect to the strength of encryption scheme. The strength of cipher depends up on the
key length.

Block Size
Though any size of block is acceptable, following aspects are borne in mind while selecting a
size of a block.

Avoid very small block size − Say a block size is m bits. Then the possible plaintext bits
combinations are then 2m. If the attacker discovers the plain text blocks corresponding to some
previously sent ciphertext blocks, then the attacker can launch a type of ‘dictionary attack’ by
building up a dictionary of plaintext/ciphertext pairs sent using that encryption key. A larger block
size makes attack harder as the dictionary needs to be larger.

Do not have very large block size − With very large block size, the cipher becomes inefficient to
operate. Such plaintexts will need to be padded before being encrypted.

Multiples of 8 bit − A preferred block size is a multiple of 8 as it is easy for implementation as


most computer processor handle data in multiple of 8 bits.

Padding in Block Cipher


Block ciphers process blocks of fixed sizes (say 64 bits). The length of plaintexts is mostly not a
multiple of the block size. For example, a 150-bit plaintext provides two blocks of 64 bits each
with third block of balance 22 bits. The last block of bits needs to be padded up with redundant
information so that the length of the final block equal to block size of the scheme. In our
example, the remaining 22 bits need to have additional 42 redundant bits added to provide a
complete block. The process of adding bits to the last block is referred to as padding.

Too much padding makes the system inefficient. Also, padding may render the system insecure
at times, if the padding is done with same bits always.

Block Cipher Schemes


There is a vast number of block ciphers schemes that are in use. Many of them are publically
known. Most popular and prominent block ciphers are listed below.

Digital Encryption Standard (DES) − The popular block cipher of the 1990s. It is now considered
as a ‘broken’ block cipher, due primarily to its small key size.
Triple DES − It is a variant scheme based on repeated DES applications. It is still a respected
block ciphers but inefficient compared to the new faster block ciphers available.

Advanced Encryption Standard (AES) − It is a relatively new block cipher based on the
encryption algorithm Rijndael that won the AES design competition.

IDEA − It is a sufficiently strong block cipher with a block size of 64 and a key size of 128 bits. A
number of applications use IDEA encryption, including early versions of Pretty Good Privacy
(PGP) protocol. The use of IDEA scheme has a restricted adoption due to patent issues.

Twofish − This scheme of block cipher uses block size of 128 bits and a key of variable length. It
was one of the AES finalists. It is based on the earlier block cipher Blowfish with a block size of
64 bits.

Serpent − A block cipher with a block size of 128 bits and key lengths of 128, 192, or 256 bits,
which was also an AES competition finalist. It is a slower but has more secure design than other
block cipher.

Q 4. How does Frame Relay Work?

Frame Relay is a packet-switching network protocol that is designed to work at the data link
layer of the network. It is used to connect Local Area Networks (LANs) and transmit data across
Wide Area Networks (WANs). It is a better alternative to a point-to-point network for connecting
multiple nodes that require separate dedicated links to be established between each pair of
nodes. It allows transmission of different size packets and dynamic bandwidth allocation. Also, it
provides a congestion control mechanism to reduce the network overheads due to congestion. It
does not have an error control and flow management mechanism.
Working:
Frame relay switches set up virtual circuits to connect multiple LANs to build a WAN. Frame
relay transfers data between LANs across WAN by dividing the data in packets known as
frames and transmitting these packets across the network. It supports communication with
multiple LANs over the shared physical links or private lines.

Frame relay network is established between Local Area Networks (LANs) border devices such
as routers and service provider network that connects all the LAN networks. Each LAN has an
access link that connects routers of LAN to the service provider network terminated by the frame
relay switch. The access link is the private physical link used for communication with other LAN
networks over WAN. The frame relay switch is responsible for terminating the access link and
providing frame relay services.

For data transmission, LAN’s router (or other border device linked with access link) sends the
data packets over the access link. The packet sent by LAN is examined by a frame relay switch
to get the Data Link Connection Identifier (DLCI) which indicates the destination of the packet.
Frame relay switch already has the information about addresses of the LANs connected to the
network hence it identifies the destination LAN by looking at DLCI of the data packet. DLCI
basically identifies the virtual circuit (i.e. logical path between nodes that doesn’t really exist)
between source and destination network. It configures and transmits the packet to frame relay
switch of destination LAN which in turn transfers the data packet to destination LAN by sending
it over its respective access link. Hence, in this way, a LAN is connected with multiple other
LANs by sharing a single physical link for data transmission.

Q 5. Asynchronous Transfer Mode (ATM) in Computer Network


Asynchronous Transfer Mode (ATM):
It is an International Telecommunication Union- Telecommunications Standards Section (ITU-T)
efficient for call relay and it transmits all information including multiple service types such as
data, video, or voice which is conveyed in small fixed-size packets called cells. Cells are
transmitted asynchronously and the network is connection-oriented.

ATM is a technology that has some event in the development of broadband ISDN in the 1970s
and 1980s, which can be considered an evolution of packet switching. Each cell is 53 bytes long
– 5 bytes header and 48 bytes payload. Making an ATM call requires first sending a message to
set up a connection.

Subsequently, all cells follow the same path to the destination. It can handle both constant rate
traffic and variable rate traffic. Thus it can carry multiple types of traffic with end-to-end quality of
service. ATM is independent of a transmission medium, they may be sent on a wire or fiber by
themselves or they may also be packaged inside the payload of other carrier systems. ATM
networks use “Packet” or “cell” Switching with virtual circuits. Its design helps in the
implementation of high-performance multimedia networking.
ATM Cell Format –
As information is transmitted in ATM in the form of fixed-size units called cells. As known
already each cell is 53 bytes long which consists of a 5 bytes header and 48 bytes payload.

Asynchronous Transfer Mode can be of two format types which are as follows:

Q.6 Layers of OSI Model

OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International
Organization for Standardization.

Layers of OSI Model


1.Physical Layer
2.Data Link Layer
3.Network Layer
4.Transport Layer
5.Session Layer
6.Presentation Layer
7.Application Layer

Layer 1- Physical Layer


The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual
physical connection between the devices. The physical layer contains information in the form of
bits. It is responsible for transmitting individual bits from one node to the next. When receiving
data, this layer will get the signal received and convert it into 0s and 1s and send them to the
Data Link layer, which will put the frame back together.

Layer 2- Data Link Layer (DLL)


The data link layer is responsible for the node-to-node delivery of the message. The main
function of this layer is to make sure data transfer is error-free from one node to another, over
the physical layer. When a packet arrives in a network, it is the responsibility of the DLL to
transmit it to the Host using its MAC address.
The Data Link Layer is divided into two sublayers:

Logical Link Control (LLC)


Media Access Control (MAC)

Layer 3- Network Layer


The network layer works for the transmission of data from one host to the other located in
different networks. It also takes care of packet routing i.e. selection of the shortest path to
transmit the packet, from the number of routes available. The sender & receiver’s IP addresses
are placed in the header by the network layer.

Layer 4- Transport Layer


The transport layer provides services to the application layer and takes services from the
network layer. The data in the transport layer is referred to as Segments. It is responsible for the
End to End Delivery of the complete message. The transport layer also provides the
acknowledgment of the successful data transmission and re-transmits the data if an error is
found.

At the sender’s side: The transport layer receives the formatted data from the upper layers,
performs Segmentation, and also implements Flow & Error control to ensure proper data
transmission. It also adds Source and Destination port numbers in its header and forwards the
segmented data to the Network Layer.

Note: The sender needs to know the port number associated with the receiver’s application.

Generally, this destination port number is configured, either by default or manually. For example,
when a web application requests a web server, it typically uses port number 80, because this is
the default port assigned to web applications. Many applications have default ports assigned.

At the receiver’s side: Transport Layer reads the port number from its header and forwards the
Data which it has received to the respective application. It also performs sequencing and
reassembling of the segmented data.

Layer 5- Session Layer


This layer is responsible for the establishment of connection, maintenance of sessions, and
authentication, and also ensures security.

The Functions of the Session Layer


Session establishment, maintenance, and termination: The layer allows the two processes to
establish, use and terminate a connection.
Synchronization: This layer allows a process to add checkpoints that are considered
synchronization points in the data. These synchronization points help to identify the error so that
the data is re-synchronized properly, and ends of the messages are not cut prematurely and
data loss is avoided.
Dialog Controller: The session layer allows two systems to start communication with each other
in half-duplex or full-duplex.

Layer 6- Presentation Layer


The presentation layer is also called the Translation layer. The data from the application layer is
extracted here and manipulated as per the required format to transmit over the network.

The Functions of the Presentation Layer are


Translation: For example, ASCII to EBCDIC.
Encryption/ Decryption: Data encryption translates the data into another form or code. The
encrypted data is known as the ciphertext and the decrypted data is known as plain text. A key
value is used for encrypting as well as decrypting data.
Compression: Reduces the number of bits that need to be transmitted on the network.

Layer 7- Application Layer


At the very top of the OSI Reference Model stack of layers, we find the Application layer which
is implemented by the network applications. These applications produce the data, which has to
be transferred over the network. This layer also serves as a window for the application services
to access the network and for displaying the received information to the user.

Example: Application – Browsers, Skype Messenger, etc.

Note: The application Layer is also called Desktop Layer.

You might also like