You are on page 1of 20

BCA Vh Semester /

different with TCP/IP model ?


ComputerNetwork 2018-19/183
/

itt and
between OSI
Howis
Merence
TCP/IP Model :
Compuier Network OSI
generic. protocol independent It is TCP /IP
zas communication gateway the the based
indard,acting on
internet standard
has developed. It is
Year- 2013-19 BCA N-502 a
is
user.
protocol around which
k and
end communication
connection of host protocol
(Time:Three Hours
cqul marks. IMaximum Marks: 701 verticall approach. It follows over networkwhich allows
oe: Atempt any Fhe gucstins 4l gucstions carry
This solution is provided by Mrs. ShilpaTyagi
olows
has separate
presentation laver and| TCPIP horizontal
does not approach.
model have a separate
model, the transport layerpresentation
ssion
M
layer.
thismodelthe transport layer guarantees the
layer or session layer.
In TCP/IP does not
Q1(a). Explain in detail the oSI model with all its seven layers. Bliveryofpackets.
Ans. OSI Model :
layerof
guarantee delivery of packets.
OSI model provides both the The network
erwork andl connectionless service. layer in TCP/P model provides
Application Layer oanection oriented connectionless service.
Software hassevenlayer. It hasfour layers.
|Presentation Layer Oslmodel has a problem of fitting the protocol TCPAP model does not fit any protocol.
Sender Layer
Session Layer intothemode!
Transport Layer >Heart of OSI which the network are built. TCPAP
model around model is, in a way implementation of
Receiver Network Layer Generallyitis used as a guidance tool. the OSl model.
Dala Link Layer Protocols are hidden in OSI model. and are In TCPIP replacing protocol is iot easy.
Hardware replaced:as the technology changes.
Physical Layer Layer easily
OSI stands for open svstem
an OSI model. interconnection. It has been developed by ISO. There are La Explain about the error detecting and eror correcting codes.
1. Physica! seven layers in Error detecting and error correcting codes :
Layer: The lowest layer of the OSIreference model the physical
is Lris acode or condition when the output information does not match with the input information.
for the
actual physical
receiving data this laver connection between the devices and also contains layer. It is
informatioD in responsi
link laye. will get signal and convert the data into 0 and Is and ble
send them tobits.the When
bor Detecting Codes :
or detection is the process of detecting the errors that are present in the
data which is transmitted
2. Data Link dot redundancy codes to
Layer : It is batransmitter to the receiver in a communication system. We have to use some
this layer is to make sureresponsible for node to
the data transíer is node delivery of the message. The main codes are called error detecting codes."
t these errors. These
3. Network
Layer : it works for the error free from one node to
another. function f
different transmission of data from one pBS of Error Detection :
networks. It is also source to another
It providesrespcnsibleto routing and logical addressing of data.
4. for I. Parity check
Transport locatedin
The data in theLayer: services application layer and takes
network layer is considered 2. Cyclic Redundancy Check(CRC)(LRC)
Redundancy Check
of complete message. as segments. It is also services from network layer. 3.4. Longitudinal transmitting
5. Session
Layer : This layer is responsible for end to end Check Sum
delivery Parity Check: Parity bit means annadditional bit added to the data at the transmitter before
two types of parity bit inerror
authentication and also ensuresresponsible establishment of
for vertical redundancy check". There are
connection, maintenance ofsessions, a, parity check is also called as
6.
Presentation Layer : Presentatsecurity. parity
Hection, i.e. even parityand odd Acyclic codei_aalinear block code with the property that every cyclic
application layer is extracted hereion layer is also called the 2.Cyclic Redundancy Check : codeword. Cycliciredundancy check nodes are shortened cyclic
network. and manipulated as per the translation layer. The data from in another encoding. CRC works in two phases i.e..
7. required format to transmit over thethe t of a codeword results are used for error detection and
Applwhich
data. icationhasLayer :It is
to be implemented by the des. These type of codes
CRCchecker. (LRC): In this method, a block of bits are arranged in
atable
network applications. These
transferred over the network. AC generator and Redundancy Check parity bit for each column separately.
application produce the . Longitudinal havetocalculatethe bitsexcept the number of bits in the
sum is larger than parity and
prmat and then we similartoparity this mearns that if the checksum is zero, error is detected.
Sum:Itis zero,
4. Check constrainedtobe
eresult isalways
treceived
he the B 1.e. to a client
port handshake Way :Ans.Q2(6).comection.
mediatransfer Ans. acknowledgement a established eTorYpes comtion
Optical
cable
fibrecable
Coaxial
Twisted
"
In
:media
Q3(a).
3.choose SYN-Ack. one 2. 1. passive
way handshake.server,
To
Codes". erorand TheError
dáta received server. Ack A+1, SYN-Ack handshake SYN
Media
Guided to establish Connection singlei.e. Correcting codes
divided
isVarious for
for more sending open the
communication Explain
acknowledgement Finally, : and :
open. Explain The
pair the
Transmission Média
data sequence The
the than The : a
The
To
serverBefore
it using emor which
cable into
transmission sequence acknowledgement packe: In
SYNactiveoccurs up connection,
a bit
communication. the number the sequence theresponse establish for must a
establishment oomctionemor calledare Codes
oomecting ane
following to client three-way how used
client received
is :
terminology, various number
another the openconnections; first BCA
Unguided is
value
number sends number the
server. a attempts connections for :
Radiowaves
Infrared " " types set connection,
is bind TCP techniques "Emor asboth Vh
Microwavès i.e. to sequence server
performed
transmission
mode i.e..A+1.and
B+1. one anrandom that to uses
and tohandshake.
this connect using
and ernor Semester
transmission: isAck numberreplies
multipleCorrection
bit are detecting
of more set the the is listenthree-way a
Media toback number, number
server bythree- called three of
/
data than iswith atwith are tw o Comput e r
the the to set the
a a
through
distance
proportional antennas 2.and and transmission for Unguided
MediaItvolumes of or
: data.reflection and separate physical
lin:directed
ks. Media
Guide-Network
: /
3. other. There
1, the plastic. 3.Optical Advantages tran_mits : coverageCoaxialdepend 2.
has
There
1. Features transmission It
bYoadband Secure 2.
3.speed
High 1.
Infrared Microwaves: The
receiving canRadio
transmission also
is Inexpensive 3. 2.
bandwidth High 1. the
Unshielded is
communication. the needs penetrate are Better insulated
containing facility
on
distance are Used and al so
obstacles. distance referred It of information a three 2018-19 /
to antennas Waves three media. light
Fibre physical confined
:the is noise mode. comparatively.shorter for referred
media.
These to used Cable Twisted to
covered be In
height.of through major Noto through block major
this
ofelectromagnetic : Cableimmunity protection
1in |
waves properlytypes'ofunguidedmodes These physical as for alellarapconductors havi n gg 2
shield signalsin
They th e a two
interference It Pain: types narrow a- to 134
antennas. sending by buildings. wireless transmission a : as
are the needs are core It modes forthis
has being
cannot aligned medium uses cover. of wired
easy mode the an This guided
used signal unbounded or basebandmode anwayyW ;
and toThe Purpose.
Coaxial outer ard type
be to
penetrate for is with aligned.sending signals, is
receiving up
ofONcept on does media:
Short directiy each manage media: required laro glas
of plast of
cabl

Switching Packet : ask The nuit


Switching Switcshagieng.
sameter1ninated, is
<operCircuaitses ceoxnistebotdectihonbeforeWith, sender and in
" circuit triesPacket communication waythe

techniqueSwitching:pif er nCompare
Switching
Message : minimized. cost
are length, Si n ce and
datagram switching.
There Complete A isa
isi network"ThisaddressWhenestablish suchasPacketsswitchinPacket secondary
storage. of g instead Pach
to computer fo r network.
between i ty hpe
is of.
destinationpaclet are combine switching t ce
message itinsnetEachforwarork.d Thitypes message a With of páckets
they
switching
connection
a
the I
between
entitorely node of in station is message a busy can switching the can
and tw o end-to-end as established, receiver
dedicated be
devices have is
virtual initiating can the in switching a that
the receives appended
its or disk, tagged-with methods the can circuit, BCA
onnetwentirely ork is sends switching, disabled routed address:ri be advantage to ta ke
telephone a ends
next disk, then dotherefore
is storedstritly a circuit. be the network Circuit, Vth
not the path directly
node. and the transmi to pat
a h if cost seen pláce. until
the
from message, of a ari
entire called t ed betweencaix0 packetSemester
is the links.there need inappropriate
packet
destination. data must technique,
dedicated unbroken
th ere éffective defined
the 2i1 of as
system
then nodeto messago the iN ismassive access main t message solution
a transfer
exist connection
connectsthe Message
an y
transmimessage,
ts store is
tnode,hroughdestination two no problem, because delmemory aymaximum , switching
sourco works.
before almost path once path .
/Computer
and
and stations.
.
need amount3. and and that must
is
and
the store - the -t0,
an protocols.
1,access Network
2. itistransmitting. Carrier Ans.
. uses thatmessage The Division s has The the station.
returnpacket
itto the that samecbanne! CSMA/CD, asthe (CSMA/CD):
performance, Collision
Detection
To
devices
All Devices method used Also Q4.
Ihibandwi
s Each dth In det eit. rminised transmi ssi on CDMA Code already duration sending t here carrieror in reduce Carrier devices
clear.
Ethermet
Explain
band frequeri requency cy CDMA also transmitter iswindow In
timepersistent
can attachedto known Multiple
station into transmitted
Divalissoiob- reached collision,
is originalsize. S a is onbusy,
is
201819/1135 /
is is known Multiplexing,
by ofthe of
no channel is the Sense
the a
haveconnectto to onSense
divided'iisntodivDiisiovnision is digitaltaechnol
reserved mi xes
ogy called collisioncotlision. communication
package.
collision Ethernet
the and protocol impact equal
Mutiple control shared as Access
network
Multiple
in
allocated most pseudo network th e CSMA, detail
for multiple
to
the signal the Multiple
Spread successfully a is issuer with
to station before
the non-persistent
in uses of
Multiple acces shareand
access acçess
that variousMultiple intended used random packets one fo r maximumsimpty This which collision Protocol
a digital packet a transmitting
waits. frame
just an to is any
station band access, the
in stream
Speçtrumof Access immediatelyalso Access the indicates
the topologies
iisten
cable to
Access
a
number the doubled media It algorithm the
on network
: four
frequency to
for send Access receiver
USA, constituting mobi l e the
wi n dow limit. allows another
sentby listensCSMA. station the network same the
s
al the in
an competing(CDMA) and unless
to network with thatnetwork. such multiple
the itavai s l abl e sequence phones. From to
cancel ensure at If senses çalled access
time databands.
,
: which order
the
Code wil limit the the the when many as
: a it
delaynetwork.
dynamic reflected decisions
changes. algorithm. Ans. Q5(b).
algorithm. follows: network Ans.layer.
These 7. 6. 5. 4. 3. 2. Various Explain
1.
Q5(a).
etc. Adaptive there Resource be aare thenFlow methods
thatinterference theyare upon alterations.
Error evolving.
can done ScalabilityAddressing
leading thinfomation
e
should design
Routing deallocation components loss
Reliability Design
information
Adaptive
to whenever inThe are Define implemented. proper
chances the sender
select the the Explain are is Control: common
accommodate so ofbits design
used optimal data Control that to exist issue
changealgorithm transferred. so congestion. The Issues
topology Algorithm adaptive There : Allocation: flow of as and transferred while
algorithrns network
routes. in amongshould overflowing is erTor
the
sizereceiver : Naming so : may : issues
such controlreceived to Networks that isdata
in network areusage Ifprotect : networks design
issuesthe
of
in which detail several the detection The are toNetwork be Network
Layer : BCA
ascurrent routing as suchcontinually each transfer. of
topology
well : and oftheoccurmechanism by rate layer The or unreliable,
make network
also The of is Vh
change
non-adaptive
any systems. routing thhosts e the data are addressing
layer not
as so the of additions design
are each Semester
topology, maketraffic
decision or two resources. allocation
that receiver, datapackets andneeds scalable
receiver. So, continuously distorted. sure channels So
their occurs identifycan an
use traffic routing algorithm needs is
correction
should message.
increasing resulting layer
routing minimal to important
that
load, the oftheofare load and and therehigher while agree and and
system are /Computer
to be the and
in as of
" 1.
Types
" multiplexing asTheMultiplexing.
send Ans. :
Multiplexing 2.
" "
Multiplexing Q6(a). . " Distance Two
" " 1. booted. routertaken
is Non-Adaptive
bandwidthFrequency
subdivided It Itmultiplexing process the through
subnet. the table land ItItis Flow sent.When is neighbour.
internet
RIP. as It
" routing
This
These Network
is
is an of routing
based
Flow takes exchanging network. Each Itis
neighbour. withits
shares its this In
multiple is Kouting inalsois
a
Multiplexing Explain in Based a used also
techniqueanalog non-adaptive
to this into an router advance decisions are /
into ofDivision known
is of update known routing the 2018-19
combining is minimizethe routing in Vector known
a data accountRouting the These hasknowledge Algorithms
several technique.
single and technique a information algorithm
and Algorithm
as streams briefly original
is a asscheme, /
Multiplexing in Multiplexer. : th e algorithm.
then routing sent, Bellman-Ford table Routing downioaded once as M
transmission
channels. which the both tables Static 136
Algorithm they which
hard dataovera used average th
ARPANET,e with about each
any seeks the are routing, :
algorithm. entire with
the streamns topology information are router
the : : have
ware single to two to
the
do
medium combine packet finda :routing updated entire to , not
been
available : used medium. algorithm routers as
is type immediate
and periodicall routechange
known routing and selected,
for and delay table in abnt. networ
is of the the to thei
hy
ly heain aimdivision
be
l ATM : 4. 3. 2. 1.AM
Services
sAAschrynchronousIonous b OM aM mainMS
4. 3. e et
Source 1Source 2Source n sameis analog. n uissed number sender
ATM ATM t
me Pont
ne SandDHCarrier datraaOr ,Explain
ofSONET/
Residential
private
establishment infrastlinreuctserurevicesrelbetayweenWANS
Unspeci iedAvailablservie ces
VariablefConstant
bit
timgeneral nServices
e-bit dbiit vliysitoransfer Division on
mulFDMtiplexing fibre signreceials ver.channels
are
tfiequency of
ofand usraeddioin the
: briefly
broadofbathend trafiic. (backbone
and ATM
fiber
enablfor ing networ:k used
can
It

be
rate bit rate rate
rate
have
mode
multiplfeourxing
Class
t:he MULTIPLEXER except
Multoptiplicesxing trequency can
broadcasts and Device
resjdentneitanwlforraksstructures frameFrame and asa
is
a ATM ttehchni
at 1 que.
increase
to be
sent allocate
telepbone relay other WAN differentswitchitong ServiceTransmitter
WDM
the .It
(WDM)
through '57 Frequency
1 Range
broadband ATM byand reserlayvneticesworks, sendto
:
encode
tebitchnique
optical
used
isthe
:
and them is Device |
multiplexing
TV
isbuilding ATM rate data classes. signals
capacityy an to
by private are to FDM networks.difierent 12 2|
se-vices choice the service cels
choices. into used utilize
14

in ATM line to ashas Over


usedwhich are ofsubdivided to Device
small, by the simultaneously.
fibre
searprchionvifdreasstructneturweorksI atwo long telecommuni Transmitted
through transmitted It
tor internetwornetkwinorgkingdistasckstances,
the
fixed-sizcedation opticfalibre SiLiggnalht high optic doesdevices.
not
19 3
data
nethigwhlory king To
:
through rate cable. require inthoe
for make of cells.
scalable carryiinngfserrasvtircues.ctuprreotocolrout. er network
capability
the any
available
more serving fibre synchronization bandwidth
infsroalstutriuongcture effectthe ive that optic fibre of
for as
telephonic a an uses
cable. optic
for use range end the
sspection,1ot Ans.
by byItopens " gateways
bridges.
" andQ7(b). Wires, 4. 3. 2. Disadvantage 1. 4. 3. 2. disadvantages 1.Ans. Q7(a).
computer
the the It BlockOpens closes It
Functions more transmitter
Fragility or extra
cost.
Distance available toLow ground onlLimited
y longer Long inLess cable. light than Thinner is information
advantage. optical bandwidth Uptical
Greater
thekeeps repeatersS low optical thinner Advantages
user. user user. ports or a Describe vulnerable power.power orusedbe lifespan
life signal weighted the
can
More comeinvites port blacklists port down :Optical to application:Fiber
work fiber copper and and fiber fiber Write
Thisclosed, only toFirewall of are and :improve :Light ofcycle degradation bandwidth
a The Although on Optical can that
specificaly, only port the to needed the wiground
th
for : less is an wire. be cable can and can
thLight-weighted of of
in is, duringspecific damage fiber receiver emitting Optical Opticaloptical the
throughanother calledexcept completely.
specific functions distance power the over than comparable aThey drawn speed.
besupport BCA
to high mobiie an d Fiber is
specific IP :
compared is
boost supply, 100 fibers trans1mitted
its andadvantage Vth
the
computer, stateful whenaddreses. IP rather should powersources
communication.cannot optic
it
:
in
copper The
: are
smaller
to
most extremely The fasterFiberfiber.
user port a "invited" timeaddresses. of the between years.
usually loss
smaller : Semester/Computer
fragile d it are leave cable
woulemitters Opticalsignificant amount
wire. of copper diameters
specified
launches firewall, tosignals. keep per :
packet frames. copper limited siz e speed
that
and short the have signal wire and fiber tunit high and
in add are the can
of of :
The is nodes Ihe (a) Ans. Q8.
1.referred "
Functions" .It Gateways:
Functionsof
Network (e) Ethernet
E-mail
topologies) (d) ) (b
Network
(c ) (a)
Write between
failure. adapi
network
wireless
r . network manageable
sections. " but together.
These It todevices . network.
network.
It It. enables It" Gat " firewallI.theserver, anNetwork
channel. deviceMeshvarious
particular arrangement and Transport Network The into
netwok
organisation. allows
send withintby
netyork one e way
X.25 bridge are connects translates is may application,
conneçtingas also LAN
Topology
Connected ISnetwork
network Topology network short administators
segments together, segments
owned of and
the into the be the /2018-19/
can bri.Tdgehe Bridges receive used technology a provide server
of notes nalso :
fo-stnemgest2netwOtk two computer a the trafficroutet,
topologies network
Iines Service and are forrat data
i to respond tne
topology,
: : to also
connect
It
: data threçeived
e protect to
full. appllcation 138
to In via following:theSon o guard managed not intetnal o
within iferewall
flow to
control
another mesh senderand which Primitives.
receiver oft en works divides a
independent over2 roocol the and
topology,pey are : comprises
sendt oeiA againstaplace wircd the
from nodes agin,COnversion another,
or is
as satne the by netwotg
locai a servet alloWed reache
device and e
via
a of
hatcwars
TA
two
bnidges PXternalwireles
an
enties iN
teCognib the' out
whic pax

n etworDotks. ontcoelsr,cwionnedel2dcti o n 'y25upose LofnedosistNehetAwx2or5 k siu:m hernet Sent "used er serss etis Tjobpriodlogy :og bih hb
binary usElualecaytetronic (d)
div i ded E Lh e rie t
Sendservice
5.prim4. itives3. 2.
Li ste
Thereservice.proces
1.
n
sTr
e r v ai
are can isstreamsencoded
n
c esp
A(e)
or t . Mail E- m ail: y
such in oldcesart ying
is
the the name network
of by
aesIg ned
is

Discon ect ReceisvCoeervniceesecrtvicseervice ftiyvpees accesspthesesciefiedService E-mail intheis Interinpetasa1980sckreetheft,-e(srOweS)nceitchiInngtevoirnatceional given toteachnology rtoutnransmissisublothne atyerswophysi. Comput
a c
to
con ecting
C e s
se rv ic
into on
e s
the co m pTop logy:n transmits control oTopdlegy
u ter
a

cal ersnetwork Tshi topology,this sdattoapologybus star


opo l g y
the
is
:the :In
In BCA
VIh
from topolandogy, Semester
service primit veservicesofprimitivesPrbiyma siettives wasoneASCIexcIhange protocol X.25 signatelslegraph suite of where over te chnol o gy topology
primit ves primp
it ri
v m
e sit v es text, has model over al co a y ia l
th at l a yer
t o get h er one
v forms t end every otheral al /Computer /
primit ves primareitives. : Howefthirest vcoermput, er today, itsfianlçeieben ctaemchenique analtoeglephoneprandotocols workstationsthe cables, I patahndlogical data with which collection a aring computthe:toer nodesconnected
of of are and is the
devicesare
: dif erent A uses you of is
av ailate
blep hone used format ink lalyerink cable is
of stored mos tly s t a
ou n
t da rd . for t w is te d cometing another. and are Network
primtor itive the acalmenso s age of and conspauctakteitv-sewitched
lines. are
coat
data
r o l so
ofthat in two
used of netwconnected
ork
connection ncans Intem et r ele ga te d Or
fa v oig
r, i n al y was connect ed pai r bef ore and 0Sl di ferent or devic e a 2018-19/0139 /
and se nd by hatoving commonly commite cables, medírefaerence comput er more devic theto to
orieopentedration. stil non- te
telecommunication.
is xt ATMS developed
being wide the
to fibe tr ansmi
acess ti n g can area types
central single w ith is a
To the files, arned placed used ar19a7n6e,in
twork same optic model. shanetre works topologies.of exactyits connected
service ac es most for
credit usebefore X25 contonro, The ion: node. hub
the infomat
as cable. cable.
and thepopulat acahrments E-nail data ike two to through
e Optehne communhadithce ation.
card lesbythin tis sarme these link LAN, neighbouring single
2

con ectionlesservice a use. mesents ages verification 1970s


complex aSynd stem original shared a nétvsubliork ayers layerEthernet MAN,
is
cable, cable. a
user in
BCA VthSerhes NetWoK/ 2019-20/ 141
the
and
other for receiving data.

Year- 2019-20
Computer Nework e
data - Direction of data

[Time: Three Hours


Note: Attempt any Five
questions.
BCA N-S02 data
in both directions simultaneously. There is no needtoswitch from transmit
cantravel Its like atwo lane bridge on atwo-lane highway. In television, we
This solution All half duplex.
is provided by Mr. Vinayquestions carry equal marks.
Singhal |Maximum Marks:701 us,
ike
mode
shows
in
wherethehost
has. a number of people on the show, and they all try to talkat once are
Q1(a). Write a short note on gple
offiullduplex.
Unguided Media. Guided and 2, ofdata communications,ful Jduplex allows both way communication simultaneously.
Ans. Half duplex world
Please Refer 03(a) 2018-19 ditime.rections on amode,
transmission datMode
a cannbe In this type of Full Duples Operation
OR Page-134| Example ofsignal
half carrier, buttranot
nsmiatt ethed insanaboth
(Please Refer Q2 Unit-II in which
are sent inmessage is duplex is a
'Walkiemessaoee
-Talt Both way at A
Q1(b). Define simplex, half Page-24] both the sent one at atime but
directions.
A the same time oo000

duplex.
Ans.
duplex and full Direction of data 1
Transmission Modes :
¬- Direction of data 2 Packetand MessageSwitching,
Also Differentiate
ofTransmission mode short note on Circuit,
transferring of datarefers to the mechanism
connected over a netvork.between two
A
half-duplex
not at the same channel can send and
Write a
it,PacketSwitching. Packet Switching :
of
transmission There are threedevices two way traffictime. It's like aone-lane receive, but Circuit Switching, Message
Switching and
1.
Simplex Mode
modes. These are :
: In this
types
Only, one must give way in order bridoe wh [Please Refer Q12Unit-IPage-34]
mode, data can be sent only type of end transmits to
at a time, the croe Switching :
communication unidirectional. transmission
in receives. In Circuit Switching and Packet
is one
message back to the sender. We cannot direction i.e.a detection andaddition,
request
it is possible to
the
other
pertorm end Berence
error
between
CircuitSwitching
Packet Switching
send
Examples of simplex Mode information that sender to Basisof

Another arrived corrupted. retransmit Comparison Connection oriented


Connectionless
initially designed for data
are
Television broadcasting etc. Loudspeakers: movies example ofhalf-duplex is
and CB Radio LOrientation VoICe It was
initially designed for
(Citizens Band). Wetalk-back
transmission. of
radio, was
are received out
CPU Direction of data where people have seen Purpose communication.
sent from Packet of message assembled at the
through walkie-talkie andcommuni
Monitor person when cate want
to each other, Message is received in the order, order and also
destination. implemented at
Simplex to speak they they the other 3Order the source.
not possiblechannels are not often used say switching is
to because it is only one person can talk atover", This is because implemented Packet
at | networklayer.
he transmit end.send back error or a time. is for
Circuit switching route is created
It's like aone
controisignals to 4Layers physical layer. oncepath issetallparts
Flexible because a the destination.
packet to travel to
way Half Duplex Operation cach
Television, or Radio.street.TheAnsimplex
example of simplex S. Flexibility
Inflexiblebecause
transmissionfollowsthe
samepath.

orresponds directly to
mmunication.
channel also
Shannon's model of A Two way but not at
of
UDPProtocols.
A CompareTCPand
Uni-MPage-125]
the same time
<(D).
Simplex Channel Operation 3. Full Ans. PleaseReferQ17
duplex Mode : In full duplex
can send data of ISDN ?
services
in system we thevarious
Example of Full both the service
ISDN is a digital
Duplex isdirections
What are
One way only leooooo00
in which there is a simulNetwork'
Telephone taneously. Q3(a). Define ISSDN.
'Integrated Services Digital Network,communication protocols
actually a set of simultaneously
abbreviatedas networks.ISDNisgroupoofdigital services that wires. ISDN
persons by a
talk and listentelephone communication
line, between two
at the same using which both can
Ans. ISDN :
The term ISDN is
existing
telephone
themto carry a
over companiesthatallowvideotobe transmitted
overexisting
telephone
designed to run
In full
duplex system theretime.can be two proposed1 by
telephone
voice, music,
graphicsand and Network Layers.
data-link
lines one Convey data, text,OSI model's
physical,
encompass the
BCA
control. protocol still suffers from afew drawbacks. Firstly,
introducingflowfeedback ifthe receiver hadthe capacity to accept more than
BCA Vh Semester/Computer Network / solved by contain a ahoulds one frame, its resources are bing underutilized.
2019-20/142 be protocols. when it
ISDN is a wide area network becoming widely
Q3(b). Define Flow Control,
ay
inform the
sender rai Secondly, if the réceiyerwas busy and dËd not wish
available. Due to rapid advances in computer and one flow control algorithm Exnlalcof to receive any more packets, it may delay the
communication technologies, these two fields, have Ans. low Control : to ihe
next
frame. Control: acknowledgement. However, the timer on the
for Flow can be
oa
virtually merged into each other. ISDN is the product Flow control is one of the key Mechanism mechanisms Sender's side may go off and cause anunneçessary
control is a set aspects or types of
of such a merger of these technologies, The first layer. Flow of data lin
generation of ISDN is called as of two flow'ofdata mechanitm retransmission, These drawbacks are overcome by
Narrowband ISDN tell the sender how much
and is based on the use of 64 Kbps channel as the before it múst wait for an dátü it cana procedures thar controlthe flow control
are
the sliding window protocols..
basic unit of switching and has a circuit switchind ihe receivèp: t i Ngement trahsmit
from Wait: This
eacknowledgementofthe
frameto
transmitting a data data i In sliding window protocols the sender's data link
orientation. The main important device in the Flow
after
layer maintains a »sending window' which çonsists
narrowband ISDN is the frame relay. The second related tocontrol is another
important design issge
sender
the
until
:
ofa set of sequence numbers corresponding to
the
generation of ISDN is referred to as the broadband handled the is data
what tolinkdolayer.
with The
the sender which sent
is received.
problem'to:k d
wait control the receiver
ISDN (B-ISDN). It supports very high ata Window : In this
flow frames it is permitted to send.Similarly, to the
maintains a receiving window' coesponding
the
typically hundreds of Mbps. It has a packet ratesystematicaly wants to receiver agree on
switching
orientation. The main important technical happens faster rate than transmit frames at oiiding sender and which the
is permitted to accept, The window
the capacity ofthe receiver, Thie sunistn,
both
data-frames aftër set of frames it policy and it
contribution of B-ISDN is When The sender is- 4sing Stop and wait
should be sent. resources this size is dependent
on the retransnission
transfer mode (ATM) which is the
a faster
asynchronous computet thùn the
called cell relay. swamp the receiver.receiver. This will completelv oi
pwledgemeint may differ in values for the receiver's and the
ISDN stands for Integratedalso The receiver
Services Digital som oftheframes simply because they keep will ontrol
mechanisA wastes
underlying resources sender's window. Th sequence numbers within the
Network. It is a design for completely make use of
sender's window represent the frames sent but as
digital: too-quicklyThe soluion to,this are arriving aUchas triesto a new packet
telephone/telecommunications
designed to carry voice, data, imagesnetwork.
and
It is introduce the flow çontrol Thè flow,contro problem possible.
Wait Protocol :.
yet not acknowledged.
network
Whenever
layer, the upper edge of
we could ever need. The 'èverything control:the: Tate of frame transmission, to:a, value op and is the simplest form
arrives from the
advancd by one. When an
Digital Network is a setIntgrated Jervices
of international which.can be hand<ed by the
receiver. It reguires Sop-and-waitflow control the window, is arrives from the receiver the
the,receiver acknowledgement
standards for access to advanced, al igitaiÍ receiver to the some kind of a feedback control. In this method,
one. The receiver's
public teleconmunications networks. sender mechanism from the ieates ow readinessto receivedata for each frame, edge is advanced by the
The key elements ofthis The flow of data must not be allowedtoova its into multipl frames. The lower corresponds to the frames th¡tframe
definition ar-:
1. Integrated services (Voice, the receiver. For this reason, message is broken (acknowledgement) after window receiver's data link layermay accept., Whenedge
a
of
Data and Mixed Media atVideo, Image,has a block èCnemory; calledcach receiving device nder waits for specified
aSbufferreserved
an ACK out). It
ime (called time the with sequence number equalpassed to the lower
network
a number of for stöfing incoming frame for received received, it is tothe
standard data rates). i I f the buffer begins todata until they are processed. lery sent to ensure that
the reçeiver has next frane the window is
acknowledgement is generated
and the
2. Digital (Digital terminal
equipment, Digital fill:up, the receivermust be me correctly. It will then send
the a frame falling
layer, an rotated by one. Ifhowever,receiver's
local loops, Digital trunks, Digital ableto tell the sendertohalt transmission ont itis 'aly after the ACK has been received. windowis window is received, the data
and Digital signaling). switching once again ready to receive. : g t shi outside the optipns.ltmay eitherdi_card this
3. Network The simplest way of flow control is a |Operations : frame ata time. link layerhas two untilthedesired
(Worldwide,
communications fabric interoperating
under
Go 'Stop
protocol' in which,a sender waits for an |1. Sender : and kecelver. Transmits
:Transmits a single
acknowledgement.,
frame and all subsequent främes
accept these
frames
control using common standards.distributed acknowledgement by the receiver before sending a frame.
or it may
frame is.received until the appropriate network
framne, is
ISDN integrates all services like another packet. Stop and.Go protocol' utílize only (ACK) as it receives
within time out. and buffer them
the frames to the
_witched voice 4% of the network bandwidth. To obtain
telephony, Centrex, Dedicated point-to-point 3. Sender
receive ACK
ueii and then pass
received sequençe.itr
carrier, packet switched data carrier etc by data throughput tates, sliding window high 1.. tiyy9l. employARO
Protocol is 4. Go to step protocolsalso
a small set of providing The sender and receiver are used. of Stop & Wait : layer in
methodof Mostslidingwindow mechanism. In ARO.
standard
protocols that tapply to all interfaces ánd access fixed window size, which is the programmed to use,a Pros and Cons
advantage'of this reQuest ) acknowledgement
services. Because ISDN of data that can be sent maximum amount Pros :The only ACK(AutomaticRepeat for,a positive frame. If no
is an international
standard, the same before an flow control is its simplicity. waitfor the the sender waits
t e x t certain time
access protocols should be interfaces. and acknowledgement arrives, sender needs to'
source acknowledoement
before received within a
he world. available anywhere in Why Flow Cons :The frame ittransmits. This is a when is
frame.
3 Control is Used : after every particularlybad
andis muchlongerthonh interval it
retransmits the
Considera situation in which the sender transmits of
inefficiency,
delay is oftvo
types :
lost or received
'n': If a frame is
ARQ is
naPlease Refer Q17 Uni-II Page-42) frames faster than the reçeiver can accept them. f
the sender keeps pumping out frames at high rate,
the Propagation
transmission delay, ta) Go Back receiver may simply discard
in error, the
all

at some point the: receiver will be completely Window Protocols stop


and wait
swamped and will start losing some 2. Sliding of
timers, the
frames.his Inspite of the use
Routing
the
:
ofmoving packets
process
Distributed hash table (DHT)
hosttoa another. Path computation element (PCE)
BCA Vth Semester /Computer Network / 2019-20/ 144
performedbyedicated
I devices e Policy-based routing
Qoality ofservice in routing
subsequent frames,:sending no acknowledgments for the
windowis of size 1. Since no discarded frames. In this casethe Routers.
featureoftheIntermet
andit Satic routing
acknowledgements
un, the sender will eventually time out are being received the sender's recety of deliberate Warm hole routing
starting from the damaged and
or lost frame. Theretransmit
window
all the unacknowledged frames inwilondIl AI iswith a
key
a
great dea transníssion)fines Distanee Vector Routing
obtained as follows. Assume that the window size maximum window size for this protocol can bne yofhighcapacity microwave),isa In thís routing scherise, eachrouerperiodically
contain the frames with sequence numbers from 0 toof the sender isn. So the window will intisllao cable.and
fiber
(ie,resistance shares its kowledge about the eatire network
these frames and the receiver's data link layer (w-1). Consider that the sender transmits a .optical
the
inthe
robustness with its neighbour.
data link layer does not receive any receives al of them correctly. However, the failure)ofthe
Internet.
Itis alsoknoWn as Bellma-Ford
algorithm.
retransrnit all the frames after its timeracknowledgements as all of them are lost. So the sendersenderactof
w
ipment routingby
routerperformsnextrouter. hasa table with informaionabout
goes off. intermediary ' Each router
overlap, the sum of theHowever
to w. Hence to avoid the receiver window has already to the updated by
two windows should be less than advancel t themessage analyzing self network. These tables are immediate
number space. the sequenen? aloug involves information with the
process deierminethe exchanging
w-1 +1< Sequence Number f this routingtables to neighbour. the
Le., w < Sequence Number Space
Space anfiguring. original ARPANEI,ndin
optimal)path.network, there are "tisusedinthe
Maximum Window Size = Sequence Number Space i lie.,
t switched internet as RIP
entire routingtable
(b) Selective Repest : In this protocol rather - 1 lna packet different stations are
numberofnodesand thesenodes.Apacket Whenanupdateissent,the
than discard all the subsequent frames followine a,communicatingthrought "
damaged or lost frame, the receiver's data link layer simply stores tobeissent.
sender does not receive an them in buffers, When the network,whichhaspathto VectorRosting:
acknowledgement
time interval and it retransmits only the lost
for the first frame it's timer goes off after a Cerlain sintroduced lin the The Advautage of Distance &use.
destinationstation. bythe configure wel
sender's data link layer will have a sequenceframe.Assuming error - free transmission this time. the is ad
to
1. Itiseasyhasbeenaroundsolong,itis
of a many correct frames which it can hand over deliveredat thepacketisdecidedfindout 2. Sinceit widelyUsed.
the network layer. Thus there is less overhead in to by trieslo
protocol. retransmission than in the case of Go Back n be followed algorithm. Routing path betveen nownand
requirebigh-levelknowledge
to
outing optimized does not
In case of selective repeat protocol the window size may be least-cost orthedesstinationstations.If 3. k levelto
size of both the sender's and the receiver's window is w. So calculated as follows. Assume that the thee and the congestion deploy demandhighbancdwidth size ofthe
initially both of them contain the values source properly, tdoes not asthe
Oto (w-1), Consider that sender's data link layer transmits all the the
is not done 4.
theirperiodic updates
wframes, the routing
layer receives them correctly and sends acknowledgements for each of them.receiver's data link may takeplace.
send relativelysmall.
packetsarcerequirea largeamountof
CPU
However, all the Techuiques: routing
acknowledgements are lost and the sender does not ad.nce it's window. The receiver window at Algorithms and implemented t doesnot memnorytostore
the
this point contairs the values w to (2w-1). To avoid overlap when the sender's
data link layer outing algorithmshavebeen themareas 5. SOurcesor
retransmits, we must have the sum of these two windows less than sequence number space. Manyrouting techniques.Someof Routing:
Hence, we get the condition sing different Distance Vector convergence
Dlow:
of
Shortconmi scalability duetoslow routing
Maximum Window Size = Sequence Number Space /2 Dynamicrouting Limited consumptionand
1. bandwith
" Deflectionrouting time,
Q4(a). What is Routing ? Explain distance vetor algorithm with an example. pairalgorithm routingis
distancevector correct
Ans. Routing : Edge disjointshortest loops.
problemwith coaverging tothe
."
" Dijkshtra'salgorithm 2. The
count
slownessin aproblemcalled
In intermetworking, the process of moving apacket of data from source to destination is 'Routing'. Floodsearchrouting its
This isdue to
Routing is usually perforned by adedicated device called a'Router. Routing is akey feature of the anSwer:
o-infinity problem. bandwidth
theineoute.
Internet because . rables messages to pass from one computer to another and eventually reach the " Fuzzy routing
Geographicrouting routing does nottakechoosing
target machine. Each intermediary computer perforns routing by passing along the message to the next Thisconsideration when
Heuristicrouting into
computer. Part of thisprocess involves analyzing arouting table to determine the best path. 7The importance "Hierarchical routing
of Routing' is that it can determine best path for data to reach the destination. It can linit the forwardingalgorithm
collision domain and can connect different media &architectures. ""IP
Multipathrouting
Routing is the process or selecting best path in a network. In the past, the term 'routing' also mean pathbridging
routingschemes
forwarding network traffie among networks'. However, it is better deseribed as'forwarding' Routing > Shortest
network
Key-based routing(KBR)
Overlay
is performed for many kinds of networks including the Telephone Network (circuit switching), Electronic
Data Networks (such as the internet) and Transportation Networks,
congestion control algorithm:
BCA VIh Semester /Computer Network / main
2019-20/ 148 Bucket
Algorithm: hole in the
Q4(b). Explain the following : required are 3. bucket through an example, imagine abucket with a small
understadleaky
(i) Hamming Code enters bucket, the outilow is at constant rate.
the
(ü) IEEE Standard 802.3 Ans. (li) IEEE Standard rate water
802.3 : matteratwhat additional water enteringspills over the sides and is lost. Similarly each
Ans. () Hamming Code : water, leaky bucketalgorithm.
Codes which allow error detection and correction (Please Refer 03 Unit-IV Page-67j is
obucket fullof
a
contains
leakyibucket and the following steps are involvedin
into the bucket.
are called 'Error Detecting' and
e
sendIthe packet is thrown
'Correcting algorithm.
Codes'. 'Hamming code' is the most commonly Q5(a). Explain various inertace
hostwants
to
rate, means thatthe
packets at aconstant
network interface transmit
used eror detccting and correcting code. Hamming Ans. Congestion :
congestion control at a
the leaks.
gbucket
constant
code is basically alinear block code named after its traffic bythe leaky bucket.
inventor R.H. Hamming. It is an error correcting Congestion is a situation in convertedtoa uniform afinite rate.
code. The parity bits are inserted in between the
networks in which too
apart of subnet,
communication
many packets are present in sY
is
traflic
a firnite
queue that outputs at
data bits. performance degrades. bucketis
may occur
D,D, Ds P D3 P; P¢-7bit hamming code he capacitywhen the löad on network is Congestion y
of network. When to0 much greater than Inflow
offered, traffeit maybe
D,D. D.D congestion sets in and
D's represent data bits while P's represent parity degrades sharply. performance bursty
-Consent
bits. outflow
The parity bits are inserted at each 2 where n =
Max. Carrying Capacity
Delivered
of Subnet Bucket
Packet
Perfect Representation ofLeaky
0, 1,2,3,.... Diagrammatic
P, is at 20 =1(first bit) burstythetrafficis,
Desirable Algorithm : theaveragerate,nomatterhow notlost.Onesuch
P, is at 2 =2 (second bit) patternat datais
okenBucket algorithmenforcesoutputneedaflexiblealgorithmsothatthealgorithmare asfollows:
P, is at 22=4(fourth bit) etc. leakybucket traffic we token bucket
u the bursty Algorithm.Seps includedin
The concept of hamming code can be extended Congested Aordertodeal withToken Bucket
Lo any number of bits. If a hamming code consists called as intothebucket.
sthmis
intervaltokensarethrown packetissent.
of D-data bits and P-parity bits, their total number Packet Sent ilnregular maximum capacity. from the bucketandthe
of bits Thus, a state occurring in network layer when The bucket has a packet,a tokenisremovedcannotbesent. following ways:
the message traffic is so heavy ready packet algoriühm, inthe butitis
»N=D+P -.(1) that it slow down Ifthereis a token in the bucketthe thanthe leakybucket introducedinthenetwork, bucket
Minimum Number of parity bits : If P is the network response time. there is no is superior packet are Inthe token
If
bucket algorithm whichthe bucketalgorithm. capturea
number of parity bits and D is the number of data theroleat transmitted,itmust some
bits, then
Effects of Congestion : Thetokenbucketalgorithmcontrols isintroducedinthetoken packetto be introduces
" As delay increase, performance
decrease heleaky Someflexibility Foranincoming availableandthus
Ds2 =P-1 ..(2)
" Ifdelay increase, retransmission occurs, making servativein nature.
generatedateach
tick.
sameate, if
tokensare
situation worse. tokensare placeatthe
The number of required parity bits may be Borithim transmissiontakes Host
Computer
calculated as follows : Congestion Control Algorithm : Kenandthe system.
in the
Let number of data bits be 4. If performance degrades in a subnet because of nOuntofflexibility Host
too many data pckets in present, i.e. traffic load Computer
Let P=2;then equation (2) gives:
4s2-2-l=4s4-3 temporarily exceeds the offered resources. This .Onetokenis
4s1 situation is called 'Congestion'. addedtobucket
So the above condition (2) is not satisfied, now let Congestion control refers to the mechanisms The bucket atevery4T
P=3, then and techniques used to control congestion and holds to Kin
keep the traffic below the capacity of the network. Network
4s2 -3-1 The number of packets delivered is proportional to (b)Afer
4s2 the number of packets send. But iftraffic increases NetworkTokenBucketRepresentation
So condition (2) is satisfied; hence number ofthe to0 much, routers are no longer able to handle all
bits in hamming code. ()Before
the traffic and packets willget lost. With further
N=D+P4+3-7 growing traffic this subnet will collapse and no more
Thus, for sending a 4-bit message, parity bit packets are delivered.
BCA VIh

occurin Stop and port.


BCA VN Semester /Computer Network / 2019-20 /148 transition may Port 25 is the default SMTP non-encrypted port.
jllowing
Q5(b). Differentiate HDLC and SDLC. counter. Port 2525 : This port is opened on all site ground
Ans, Difference between HDLCand SDLC : maintainsthe timeout starts the sender in case port 25 is filtered and we want to
r
sender
thesender
HDLC(High level Data link control) and SDLC (Synchronous Data Link Control) are two protocols The
theframe
issent, send non-encrypted emails with SMTP.
that provide point to multipoint interconnection between computers. When
timcoutcounter. comes in time, Port
G56:This is the port used if we want to
The main difference between HDLCand SDLC is actualy their origin. I'acknowledgmentofframe message using SMTP securely.
HDLC is actually astandard protocol that was used by many hardware makers while SDLC 0s not transmitsthe next
tframe in queue. send
time, IMAP :
but is still used in some lBM hardware. sender
the acknowledgment tdoes not comein is a mail
The another main difference between HDLC and SDLC is that it supports only the NRM
(Normal fthe assumes that either the frame or Internet Message Access Protocolremote web
Response Mode), where secondary stations do not communicate with the primary, unless this is sender transmit.Sender protocol used for accessing email ona
pemitted. Besides this, the HDLC can also supports ARM (Asynchronous response mode), where the sacknowledgmentislostinstart the timeout sender from a local client. IMAP and POP3 are the
secondary stations can initiate communication with the primary, with out our prior frame and internet protocol for
and iansmits the two most commonly used
ssynchronous balance mode where each station can act as a primary or secondary.permission
r
counter. acknowledgmentis received. retrieving.
SDLC is quite old and has since been replaced by HDLC and Advance Data Communication negative frame.
, Ifthe the Addressing?
Control Procedures or ADCCP. retransmits
Q7(6). What is DNSand IP
the sender Explain with example.
Summary: Back-N-ARO: utilize (DNS) :
1. HDLC is actually adopted from SDLC.
ARQ mechanism does not the Ans. Domain Name System domain and host
2. HDLC is a stahdard protocol while SDLC is not. nnand Wait When DNS translates lnternet
their best, idle The automaticallyconverts
3. HDLC has Asynchronous balance mode feature while SDLC does not. resources at the sendersets both namesto IPaddresses. DNS address bar
- received,
Anowledgnent is Go-Back-NAROmethod, web browser
4. HDLC supports from that are not multiple bit-octets while SDLC does not. the names wetype in our servers hosting those
5. HDLC is removed some procedure that were present is SDLC. nothing. In addresses-ofweb
* n ddoes receiver maintain a window, tothe IP distributed database to
aerand Receiver sites. DNS implements ainformationforallpublic
Q6(a). What is Bridge ? Explain bridges from 802.X to 802.Y. andaddress
Sender storethisnarne assumes IP addresses
Ans. Frame 0 lnternet DNS hierarchy
Set Timer for 0 hosts on the daabase residesona likeweb
[Please Refer QI2 Unit-IV Page-75] Set Timer for 1
Frame 1 donot change The
sefvers. When clients
host
database Interinet
06(b). State whether true or false "STOP-and-WAIT ARQ is a type of Go-Back-N ARQ t: Frahe 2 ofspecial requ¢sts invoBving resolver
Set Timer for 2 browsers issueófsoftware calledtheDNS
Protocol." Justify. apiece determine the
Ans. "STOP-and-lVAIT ARO isatype of Go-Back-N ARQ Protocol". This statement is true. n Go Closcd Timer for 0 7 names, server to
and Send 3 contacts a DNS DNS serverdoes not
first
Back-N-ARQ if sender window size is one, it becomes STOP-and-WAITARQ. II's detailed justification address. Ifthe turnfoward
is described below: Server'sIP mapping,it willin the next
containthe neededdifferent DNS server at
Stop-and-Wait-ARQ and Go-Back-N-ARQ are thetypes of techniques available with which Data Link windows it the request to a hierarchy.
Layer may deploy to control the error by ARQ (Automatic Repeat Request). the frames in received delegation
When sender sends all has higherlevelintheseveral forwardingand
Stop-and-Wait-ARQ : sequence No it frames are potentially withinthe DNS hierarchy, the
tasrg checks up to what, If all After
positive acknowledgement. set are sent eventually arrives at
Sender Receiver the sender send next
NACKMessages
forthe givenhost th¹requestover
Frame 0 positively acknowledged,thatit has received Paddress
thatinturn
completes
of frame. If sender find a theresolver,
particularframe,it Internet Protocol. caching
Timeout ACK 0 or it has receive any ACK
for
additionally includes supportfor
the frame. DNS redundancy.
Frame 1 etransmit all andfor work as fillows
:
Timeout E-mail Protocols. Ohy requests does DNS Work? DNS
IP
address, an
Frame 1 V(a). Explain How nane onto an procedure
: 1. To map a program calls a library
Timeout Ans, E-mail Protocols Sending Emails application name is passec on to
Protocol for (SMTPis the resolver. The
SMTP Standard Transfer Protocol acrosthe called resolveras a
parametcr.
Simple Mail emails
for sending
the
the standard protocol works on
three
internet. protocol,
SMTP
By default, the
BCA Vth
2. The resolver sends a
Semester /Computer
Network / 2019-20 / 130
UDP
IP address to packet to a local DNS
corresponding
3 The the resolver. server which looks up the Computer Network
with resolver
the then sends this address
IP Address destination
or to the
sends in the UDP caller. Then the
program can
name and
returns th 2020-21 BCA N-502
packets. establish aTCP
connestifgne:Three Hours IMaximum Marks:70|
Q8. Write short (Please Refer Q17 Unit-V Attemptany Five questions. All questions carry equal marks.
(0) oSI Modelnotes on the
(iü)) TDM and following: Page-101] vte:

FDM List allthe layers of OSI model and also explain each layer in
(iin) ATM and X.25 isOSI model ?
What
(iv) Network Security
Ans.
() OSI
Model : Please Refer Q12 Unit-l Page-15j
What is Time Division
Multiplexing?
(Please Refer Q12 Unit-I Multiplexing (TDM)-:
(iü)) TDM and
FDM: Page-15] Time Division
Division Multiplexing (TDM) is a communications process that
transmits tvo or more
common channel. TDM, incoming signal are divided into equal
(Please Refer Q20 Unit-II Page 45] aaming digital signal over
a shared medium and
these signals are transmitted over a
(iii) ATM and .length time slots. After multiplexing,demultiplexing. Time slot selection is directly proportional to
X.25: embled into their original format after
ATM Overview: 'erall system efficiency. Digital Circuit Switching. TDM wasTDM for
initially
ATM is (TDM) is also known as a switching network use
Tme division multiplexing
packet aconnectiIton-ori
switching ented, unreliable guaranteedacknowledge
networking system.technology.
Unlike most
(does not
provides predictable, connectionless the receipt of cells sent),
qualitynetworking
of service. protocols,
system telegraphy
implementation. Packet
assigned fixed tíme slots for
yeloped in 1870 for large packets are divided into fixed lengths andwithin assigned time slots, are
From end to end, every componentassembled into acomplete signal at the destination. TDMis comprisedoftwo major categories :
virtual circui ecommunication links, i.e. transmitted
in an ATM network ATM is a and packet, which must be
provides a Sansmission. Each divided signal
deterministic traffic loads
Asynchronous Transfer Mode, a
high-level
of control.
long-distance communication
links and bears heavy data
fixed size. ATM sought to network technology
based on transfèrring
data in cells or packets of a 1. from TDM:TDM is used for
Sync TDM is used for
high-speed
networks. To provide fast resolve the conflict between
data circuit-switched end users.
networks and packet-switched 2. Synchronous Time Division Multiplexing (syne TDM):
sized packets called ATM cell.transfer, the ATM switch divides the data received from sender the signal ofa
givensub
created as asampleof error correctionchannel.
ATM network uses an ATM switch into small transmission. packet) is
transfer from different computers. which receives the request for data TDM frame (or
data
During each time slot aconsists ofasynchronization
channelandsometime
an
errorcorrection
and newBycreated
whena samplewhen
also with its associated
(For More Information Please Refer Q17 channel. The frame sub-channel(along repeatedfora secónd sample interleaved one afer
ofgiven is
X.25 : Unit-IVPage-80j the first samplechannel)aretaken, the process frame, etc. andtheframessub-channel.
Atersynchronisation
repeated for athird repeatedfor the next
are

X.25 is an ITU-T standard and Then


frame is created, has expired the process
is differentiate
An X.25 WAN consists of protocol suite for packet switched wide area network(WAN) communication. asecond When the time
slot protocolandalso
packet-switching exchange
leased liñes, plain old telephone service connections or (PSE) nodes as the networking hardware, and the other.
and selective repeat
Go-back-Nprotocol
X.25 is a family of protocols that was popular duringISDN
the
connections as physical links. Explain
Transaction systems such as automated teller machines. X.251980s with telecommunications companies. Q2(6).
each other? Unit-IIIPage-56)
was originally defined bythe International between (PleaseReferQ12 switching.
Telegraph and Telephone Consultative Committee (CcITT, now ITU-T) in aseries of drafts and finalized Ans. circuit
in a publication known as The Orange Book in 1976. switchingand
between packet
Osbst. (For More Information Please Refer Q18 Unit-IV Page-83] Differentiate Unit-lIPage-37)
Q3(a). (PleaseReferQ13
(iv) Network Security : Ans.

(Please Refer Q19 Unit-VI Page-I26]


NelW
Semester/Computel
BCA Vth
Ans. () Q0S (Quality of Service) :
petectingCodes: detectingthe Quality of Service (QoS) is performance of a
the description or
BCA Vth Semester/ Computer Network /2020-21 / 152 of
process measurerment of the overall
detectionis the the data which is, or computer network or
03(b). Discuss the transmission in ATM ar
present in
are transmittertothe
receiver in a service, such as telephony service, particularly the
networks. Also explain its reference Simplex Channel Operation that
computing
model. s
from a We have to use some Cloud the users of the network. To
saited system. errors. These performance seen by several
quantitatively measure quality ofservice,are often
Ans. nunication these
(Please Refer Q17 Uni-IV Page-&0] codesto detect codes," service
dancy detecting related aspects of the network
called error
One way only considered,suchaserror rates, bitrate, throughput,
Q4(a). What is twisted pair, coaxial cable, s
are
Detection : additional transmission delay, availability,jitter,etc. Qualityof
and fiber optics? Error an n
Differentiate
twisted pair and coaxial cable. between Half Duplex Mode : of
Check
bit means
: Paritythe transmitter
before
service is the ability to provide
differentpriority to
Ans. Twisted Pair, Coaxial In this type of transmission Parity data at called as applications. users, or data ilows, or to
Cable, and Fiber fmode, data can. dedtothe paritycheckis also types itferent level. performance to a data
Optics : ransmitted in both directions on asigial carrier bu!smitting data, There are two guarantee acertain of
important for
not at the same time. Example of half check". particularly
(Please Refer 03 Unit-II Page-25] duplex is icalredundancydetection, i.e. even parity and flow. Quality ofserviceis special requirements.
Walkie-Talkie which
in
time but messages are sent inmessage is sent one at : vbit in error with
the transportoftraffic also has responsibility for
Differences between Twisted-Pair Cable and both the directions (gar
dparity. Redundancy Check: A
cycliccode The Transport Layer service provided
Coaxial Cable : Direction of data property that every the quality of thecommunication anyor all.
Cyclic networks,
[Please Refer 07 Unit-II Page-29] block code with theresults in another to the SessionLayer. Forsome NetworkLayer.
Direction of data 2 linear codeword occur in the
ja nodes are ofseveral erfors might
olic shift of a redundancy check are might be:
Q4(b). What is meant by simplex & half Ahalf-duplex channel can send and Cyclic
receive. bu.ndeword.cyclic codes. These type codesworks Messages
of
duplex communication system ? not at the same time. It's like aone-lane bidgew CRC
Where.hortened detectionand encoding. checker. " corrupted
Ans. Transmission Modes : amountof time (if
two way trafic must give way in order to Cros.edfor error generatorandCRC lost
an inordinate
Transmission mode refers to the mechanism Only one end transmits at a time, the other endntwophasesi.e.,CRC Redundancy Check
(LRC) : " delayedfor internediatenodegoesdown),
of transferring of data between two devices recives. In addition, it is possible to perform errot Longitudinal arranged in a forexampe,an suddenlyreappear
3. of bits are andthenthey may
connected over a network, There are three types detection and request the sender to retransmitlin this method, a blockhave to calculatetheparity
of transmission modes. These are: information that arrived corrupted. then we " Duplicated or duplicate
ableformatand out of sequence sequence
1. Simplex mode Another example ofhalf-duplex is talk-back r it for each column separately. bits except
similarto parity parity
" deliveredmight bedeliveredout of ofthe
2. Half duplex mode and CB Radio (Citizens Band). We Kradi
have seen 4.o, Check Sum : It is
sum is larger than messages model lets the user
reference quantitatively,thequality
3. Full duplex mode movies where people communicate to each other, the number ofbits in theconstrainedtobe zero,this The OSI
Layerspecify,donebyprovidingQuality
Simplex Mode : through walkie-talkie and whenthey want the other andtheresultis checksumiszero,erroris detected. ofservice
always Transportrequired. is
Thisparameters along with the
In this tvoe of transmission mode, data can be person to speak they say "over". Thisisbecause meansthatifthe Service, or Q0S,communicationchannelorto
only one person can talk at a time. of defined for both
sent only in one direction i.e. communication is
Error Correcting Codes errordetecting establisha equestto
forboth Correction Parameters are andpacket
unidirectional. We cannot send a message back to, whichareused delivera packet.(connection-oriented)
Thecodes calledasError
the sendet. Half Duplex Operation
errorcorrectionare
correctingtechniquesare oftwo circuit-switched
Switched(connectionless)service.
and multiplebit
Examples of simplex Mode are Loudspeakers, Codes".Theerror erorcorrectionand
bit Establishment:
Television broadcasting etc. A Twotheway but not at A typesi.e.single
error correction. Connection performedby the
is Handshake.
Direction of data
00000 same time check? (ü)
Connection
establishment To
CPU Monitor redundancy Three-way three-way
cyclic called a
TCP uses connectwith
Q5(b).Whatis concept
Page-52 establish a connection, to
Simplex channels are not often used because it is 05(a). Describe error-detection and Uni-HII Before a clientattemptstoaporttoopen
not possibile to send back error or control signals to correctiontechniques.
Ans.
Refer07 handshake. servermustfirst bind Passiveopen.
(Please withrespect a server, the is calleda
the transmit end. Ans. Error Detecting and Error Correeting : following may
connections:thisestablished, a client
It's like a one way street.An example of simplex Error is a code or condition when the output Describethe it up for passiveopen is
O6(a), layer: ofService) Once the Actiye open.
is Television, or Radio. The simplex hannel also information does not natch with theinput transport
(ü)ConnectionEstablishment
(Quality o
to initiate an
corresponds directly to Shannon's model of information. () Q0s
communication. (i)Flowcontrol
BCA VUhSem

transmission streams toa multiplexer which combines them, then into a


their direct them to their
BCA Vth Semester l Computer Network / 2020-21 / 184 theleft direct strearmback<into its components transmissions and
on separatesthe refers to the physical path. The word channelrefers to the portion of
wwhich linkk
yines
To establish a connection, the three-way handshake occurs like this : The word given pair of lines. One link can have (n) channels.
tiplexer,
1. The active open is performed by the client sending a SYN to the
server.
pondingzlines.transmission between a
2. In response, the server replies with a SYN-ACK,
that
carriesa
main multiplexingtechniques:
3. Finally the client sends an ACK back to the server. s three Multiplexing
At this point, both the client and server have are
re
received an acknowledgeinent of the connection
Wavelength Time
(ti) Flow Control : Frequency
When a data frame is sent from one host to division division
another over a division multiplexing multiplexing|
and receiver should work at the same single medium, it is required that the sender
speed. If sender is sending too fast the receiver may be multiplexing|
(swamped) and data may be lost. overloaded Analog Digital
Analog
There are two types of mechanisms can be deployed to
1. Stop and Wait : This flow comtrol the flow of data: sends
control from transmitter's side that get
stop and wait until the acknowledgementmechanism forces the sender after transmitting a data frame to ofMultiplexing: channels are to be transmitted, then end alsoallinput we
2. Slidingg Window: In this flow
of the data-frame sent is received. signals or one, sothat atthe receiving
control mechanism, both sender and receiver agree on the Whenmany multiplexer converts many into
of )multaneouslyi.e. there is a
data-frames after which the
wastes resources, this protocolacknowledgement should be sent. Stop and wait flow control number mechanism snultaneously expensive and requires more
wires tosend So,
through single wire.
is
tries to make use of underlying resources as much as possible.
many signals separately
cable T.V distributor sends many channels(short muxing) is a term
Q6(b). What are the following standards: Sending For examplein networks, multiplexing
telecommunications and computer signalsordigitaldatastreamsare
fmultiplexing. combinedinto
edofelectronics, message
IEEE 802.3, IEEE 802.4 multipleanalog
How do IEEE 802.3, IEEE 802.4 and IEEE 802.5and IEEE 802.5 in
processwhere expensiveresource. analog
differ ? Explain. sdto refertoa medium. The aim is to share an analogsignalstobeprocessedbyone usingone
shared allows several transferred
Ans. IEEE Standard 802.3:
on2 signal over a electronics,multiplexing
telecommunications,severalphone
callsmaybe
[Please Refer 03 Unit-IV Page-67 Eorexample,in (ADC),and in
-digitalconverter Explain.
IEEE 802.4 : andLANS?
wire.
X.25 gate wayslinkhosts
[Please Refer Q5 Unit-IV Page-69) Gateway? Howdo with different
IEEE 802. 5 : 07(b). What isa between two networks operating at layer3,
operates
a passage networkgatewaydepending upon the
[Please Refer Q7 Unit-IV Page-71]
Ans. Gateway :
node that forms of gateways, the
gateway is a network most common type interconnection) model. However, as theentry-exit
A The model. Itacts gateway.Only
Comparison of IEEE standards 802.3, 802.4 and 802.5 : transmission protocols. (open systems layersof0SI throughthe
network layer ofthe OSIoperateatanyofthesevennetworksshouldpass
(Please Refer Q8 Unit-IV Page-72] i.e.
functionality, a gatewaycan flows acrossthe
trafficthat LANdoes notpass through thegateway.
networksinceall a
o Q7(a). What is multiplexing ?Briefly explain TDM and FDM. Why is multiplexing needed pointfora traffic betweenthe nodesof
rsodn datacommunication system ? the internal Internet
t0dAns. Multiplexing, TDM and FDM :
Gateway
[Please Refer Q11 Unit-VI Page-120]
Router or
Multiplexing : Switches
noT mdirnneH
MatiplexingYAis a technique used for sending several signals simultaneously over a common inLAN

inr# multiplexed system, n lines share the bandwidth of one link. The basic format of a multiplexed
itiw systemis:
21qmsta i Mux: Multiplexer
.n9qo 9vieat sbotisp Internet
MDemux: Demultiplexer between a LAN
and
n input n output Gateway
M
lines
Ilink, nchannels
other eilu,
regeneratedatt the
network.
BCA Vth Semester/ Computur Network/2020-21/ 156 Ii s d one
alache
i to
four:
Types of Gateways: notes onany
Communication
On basis of direction of data flow, gateways are broadly short
1. Unidirectional Gateways : They allow data to flowdivided into two categories :
in only one direction.
tuireless
e
Mode!
source node are replicated in the destination node, but not vice versa. They Changes made in thajDomain
0SI
namesystem
tools. can be cSMA/CD
used as archiving
2. Bidirectional Gateways: They allow data to flow in bothdirections. They can he ea Bridge
synchronization tools. WirelessCommunication:
Unit-IPage-32/
On basis of functionalities, there can be a
follows: variety of gateways, the prominent among them are [PleaseReferQ10
a)
> Network Gateway : This is the
most common type of gateway that provides as
two dissimilar networks operating with
different interface betweor Model: [PleaseRefer Q12 Unit-IPage-15)
without specifying the type, it indicates a networkprotocols. Whenever the term gateway is mentionedisl
Cloud Storage Gateway : is a network node gateway. or server that translates UnitIIIPage-62)
different cloud storage service API calls, such as SOAP storage requests RESCSMA/CD
(Simple Object Access Protocol) with :
(PleaseReferQ17
(Representational State Transfer). It automatically converts the
without necessitating transfer of thefacilitates integration of private cloud storage into applications System :
applications into any public cloud, thus simplifying data Domain Name Internet domain and host names to IP addresses. DNS
servers hosting thosesites.
of web hostson
communication.
translates the IP addresses
bar to forallpublic
information
DNS browser address andaddress hierarchy of special
There are some Features of Gateways are as follows: ie tyne in our web
a database tostorethisname databaseresides on a a piece
> Gateway is located at the boundary of a network and distributed change.The Internethostnames,
from that network.
manages all data that inflows or outflowe nlementsaassumnes IP addressesdo not issue requests involving theserver'sIPaddress. If
browsers determine different
It forms a passage between two different networks operating with different loternet. DNS clientslike web contactsa DNSserverto the requesttoa
transmission protocnls servers. When resolverfirst turn forward
Agateway operates as aprotocol converter, providing compatibility between the different protocnls knce the DNS mapping, it will in
ofware called
contain the
needed hierarchy,theIP
used in the two different networks. doesnot thehierarchy. messagesaresentwithin theDNS requestover
The feature that differentiates a gateway from other network devices is that it can DNS server higher level in completes the
operate at any S serveratthenext forwardinganddelegation resoBver, that in turn
layer of the OSI model. potentiallyseveral arrives at the
> It also stores information about the routing paths of the communicating networks. After given host eventually redundancy.
When used in enterprise scenario, a gateway node may be supplemented as proxy server or ress for the requests andfor the
iernetProtocol. suppor for caching procedure called
firewall. additionallyincludes work as follows : program calls a library
DNS application returnsthe
Agateway is generally implemented as a node with multiple NICs (network interface cards) DNS Work? DNS an
IP address, resolveras a
parameter. the name
and
connected to different networks. However, it can also be configured using software. Bow does whichlooks up
imap a name ontoan passed on to the server connection
> It usces packet switching technique to transmit data across the networks. I. To name is local DNS establisha TCP
resolver.The UDP packettoa can
Link host to X.25 with LANS : resolversends a resolver. program
The addresstothe caller.Thenthe
(a) This type of gateway costs about the same as a router. The difference will be in line-cost savings. . correspondingIP sendsthisaddresstothe
If the level of traffic to be transferred between LANs is low, the X.25 gateway is the most cost Theresolverthen sendsin theUDPpackets.
effective solution. If the levels of traffic are large enough to justify leased lines, or LAN-to-LAN J. destinationor
communication is required, a routing bridge or router would be the right choice. X.25 networks are withthe Unit-IV Page-72)
used when there is not enough traffic to justify leased lines or the remote nodes are so small and v Bridge : PleaseRefer09
geographically spread out that leased lines would simply be too ineficient.
(b) To allow devices made by different vendors in the same LÀN to talk to each other, a set ofinternet
protocols, such as TCPAP (°ransmission Control Protoco/Internet Protocol), is used. The gateway
converts the TCP/IP protocol into X.25. Then, at the remote node, X.25 traffic is converted into
whatever protocol is required.
(c) It can communicate with terminals attached to Ethermet using a DEC/LAT (DEC Local Area
Transport) protocol for better response times: the transmitting device need not wait for remote
acknowledgements. The gateway locally generates responses to the TCP/IP or LAT protocol. The
about! network layer
in| brief tunneling.
lsDNservices
Write
p2cketcircuitswitching
Ans. Design issues of Network Layer :
Computer Network 1SDN
services:
Page-42] [Please Refer Q1 Uni-VPage-85]
Year- 2021-22 Q17 Uni-lI Tunneling
BCA N-502 Refer
[Time: Three Hoursl
ase.
Circuit
Switching:
Page-34] [Please Refer Q15 Unit-V Page-99)
[Maximum Marks:70 scket
Q122Uni-II Describe different function
Note: Attempt anyFive questions. All questions carry equal marks. Refer detection Q7(a).
performed by transport layer.
hase
error
Summarizevvarious
o1(a). What are the uses of computer networks in general life ? rectionprotocols, Ans.
Page-114]
Ans. Protocol: [PleaseRefer Q1 Uni-VI
Detection
[Please Refer 08 Unit-I Page-7] Crror Unit-IIPage-49] Q7(b), Explain the concept of Domain
Refer 04 proper example.
Q1(b). Differentiate LAN, MAN &WAN. please Protocol: Name systemn with
System :
Unit-IIIPage-5I) Ans,
Ans. Difference between LAN, MAN and WAN : Correction Domaia Name host
Lor Internet domain and
Q5 The DNS translates converts
BASIS OF
LAN Please Refer ? addresses. DNS
automatically
COMPARISON MAN WAN protocol works namesto IP web browser
address bar
Expands to Local Area Network Metropolitan Area Wide Area Network ALOHA the names we type inour servers hosting those
How
ib), in
plain detail. addresses of webdistributed database to
Network to the IP implements a
informationforallpublic
Unit-IIIPage-60]
Meaning A network that connects a It covers relatively|It spans large locality and sites. DNS
andaddress addreses
PleaseReferQ14
group of computers in a large region such as connects countries storethisameInternet.
small geographical area. cities, towns. the DNS assumes IP hierarchy
together, Example Intemet Witn hosts on resides on a
the following
database
Ownership of Netwok Private Private or Public Private or Public change.The likeweb
ela), Describe sublayer: donot databaseservers.When clients host
|Design and maintenance Easy Difficult Difficult medium access of special involving Internet
Propagation Delay |Short Moderate Long sferenceto802.3standard requests resolver
browsers issue softwarecalledtheDNS
Speed High Moderate Low )(iüi) IEEE
TokenRing piece of determine the
names, a server to
Fault Tolerance More Tolerant Less Tolerant Less Tolerant a DNS does not
(ii)TokenBus first coatacts DNS server forward
Congestion Less More More Standard : IP address. If the in turn
server's mapping,itwill at the next
|Used for |College, School, Hospital. Small towns, City. Country/Continent. IEEE 802.3 Unit-IVPage-67
Ans. (i) 03 containtheneeded differentDNS
server
Devices used for WiFi, Ethernet Cables Modem and Wire Optic wires, Microwaves, [Please Refer to a
the request thehierarchy.
Satellites
transmission of data Cable
Page-71] higherlevelin severalforwardinghierarchy, anddelegation
|Moderate High Ring : Unit-IV the
Data transmission errorsLeast D Token sAerotentially
[PleaseReferQ7
DNS
withintheeventually arrives at
and noise sent
Small towns or cities Country or a group of messages are host over
Area confined to Schools, hospitals or Bus : Page-69/ IP addressforthegiven completestherequest
buildings countries ii) Token 05 Unit-IV in turn
[Please Refer Transparent the
resolver,that
Internet Protocol..
support for
caching
Q2(a). Compare OSI-model with TCP/IP model. Differentiate
between
Bridges. additionally includes
DNS redundancy.
Ans. Q5(b), SourceRouting requestsand for work? DNS workasaddress, an
follows :
Bridgesand Page-75]
(Please Refer Q14 Unit-I Page-18] DNS
QlI UnitIV How does onto an IP
Ans. a name libraryprocedure
Q2(b). what are connection oriented and connectionless services ? (PleaseRefer conceptof
IP 1. To map programcalls a
application name is passed
on to
Ans. Elaborate the the resolver.The
called parameter.
(Please Refer Q9 Unit-VI Page-19] Q6(a).
addressesindetail. as a
Uni-VPage-1OI] the resolver

Q3(a). Explain various tybes of transmission media. Ans. Q17


Ans. (PleaseRefer
Please Refer 02 Unit-II Page-23]
: repeaters. maysingle far Theallowsprovide
Multiplexing(e) :Firewall(d) model. (c) MODEM(b) : Ans.(a) Q8. 3. 2.
A as, A
Repeaters
Repeaters : FirewallMODEM
Repeaters
(d) (c) cSMA
(b) (a)
repeater be repeatersolution Multiplexing(e) with The
Write corresponding The
morecable.
software cablescurrent CSMA resolver the resolver
(or an A is is
thsystem up are short
destination
physicalis to to Protocol protocol
regenerator)
concerned,
2.5 use 2.5to
low-level
drive then sends
IP
notes
km may repeaters km, address
sends
layer long or a BCA
apart
contain but devices : onsends this UDP
(Please [Please is (Please Vth
an &series a tothe
device. cables. In [Please any to
packet
electronic multiple no extend
transceiver in theSemester/
address
that four theresolver.
path of It
Refer Refer receives, Refer Refer to
betweencablecable the 802.3, just of UDP to a
the the local
Computer
Ql1 device cablechipsamplify Q16 packets.caller.
Q28 segments for Q19 following DNS
segments amplifies
lengthexample
Unit-VT that any can Unit-II Unit-III
or Then serverNetwork
Unit-V two only
operates connected regenerate
transceivers and andwhere timingthe :
the
which
provide Page-45]Page-62/ /
Page-120)Page-111] multipleretransmits it program 2021-22/
on is looks
only by enough weak
required.
repeaters-but can
mayrepeaters propertiesthe of up
the signals signals. establish 16O.
transverse power the
physical
is in name
They
nonot both driyveto TCP
a
layer different two and
more directions. MAC are
tr¡nsceivers 500 needed connecti returne
ofthe than four protocol
than meter. .
08 ransmission a As to
ns. erent
he
dala), This Note:TimeTh: rHoe urs
Sliding Ans. Q4(a).
How
(Please sliding [Please
Please Role/Functions
Ans.
03(b). Q3(a).
Ans.
[Please Please the
Ans. wib2(b).
th
[Please
Ans.
Ple ase (b). please help
sAtolutetimpton any 2022-
Year-23
Window ExplalnDifferentiate
Refer
What
Refer
Describe
help
Refer
Explain from
of How
Refer blTCP/IP
ock Di f
Refer rentiate is
Refer Refer window Refer are media. of
QI(b) oSI provided
the
sultable
the Q12 packet Q2 the diagram, Five
Protocol
Q10 Ql of role Q20 Q17 Ql4 reference LAN,
Beena.Sachan Mr
Iby s.
Data
protocol TDM ISDNUnit-II Unit-II types Unit-I mÍdel? 2021-22 questions,
Unit-III Unit-lI
Uni-II : Link dataof and services? dlege Unit-II circuit MAN

Page46/ warks? Page-45]


Layer FDM.Page-42] Page-36] switching
Page-23] of
Page-18) ExplainPage-158] and
model questions
All Computer
Network
Page-551 :
link various
WAN.
layer. with
. is carry
It tothat shortestQ5(b).
helps betweenplays theirRouting topologies?
Ans. ofQ5(a).
structure. Ans. Ans. Q4(b).
transmit goal
ommonly Shortest
utilization.
resource intended
ms transmission,
usually and aiPrinciple networkingi?
Ans. merits [Please [Please ALOHA
ATM(ü)) ( ) equal
is a to involves [Please (i) ()
destination
tothe fnd a Usefulniss
establish devices destin ATM Define marks.
data
minimize path of rerzipient crucial is ALOHA
used shortest the Shortestoptimizing directing a path
ation Hou Refer Whatare
and Also
Refer Refer
packets most
routing the and
fundamental deemerits.Explain :
metric the based efficiently rolacross
e routing
Explain
of
"Routing" compare : the
efficient
distance mostensuring in data Router Q18 Q17 Q14 following
across time on is Path network [Maximum
Marks:70]
enabling packts
a efficien.interconnected each Uni-IM N-502
BCA
is or some
the a or routingpathRouting: and that concept inthe
detail.
in
Unit-I themvariousUnit-TV
resources
network. with
predefined Networking
patreliably.
number lowestbetween performancecommunication from principle is terms
hs data Page-20/ on
required
algorithm their
networking
reachesnetworks.
in
useful Page-8O] Page-60]
its
the types
The cost. a for
Routing proper :
of source source basis
hops most Themetric, that and data its : ofin of
to
works:(network
routing
2. 1.
3. Here's
7.Contínuous bra 6. 5. Router' 4.
Dijkstra's bandwidth,
values.
metric
lower in can Metric hasbetween administrators
topology.
nodes
them. Topology
map
needed tfailures,
he router.next
hop
determine the backtracking
source shortest Once distances
destination. algorithm
reliability,
expanding network the in pat
and h a
pathNetwork packet Packet These updated
routers in
calculated
Routing Selection:
progresses, Path
considerations
commonly
and a
termsrepresent an of segments) hew
network data next node between
network. It (devices)
routing the
associated
Calculation: the
of This
to packet routing
is hop
node
with Algorithm: latency,
distance, network,
the
congestion,
account conditions Forwarding:
then the destination
path from its various Representation:
map
shortestTableusing it maintains and reach used
a or between
algorithms to from builds the source routing principle SCA
and Monitorkeg nex destination.reach
each tables the iteratively worksalgorithm
by or metric and
includes
forwarded consults it can
hop the the lowest to shorter factors Each
congestion. known Vh
for
update throughout
network.
store thpaths,
eUpdate:
destination
tree. node a As source
neighboring node
Dijkstra' s links
algorithms
nodes.
orcan fo r When be tree
Dijkstra's a value. linkinformation ofSemester
changes table metric and to links such
monitor otherchange
continuously to the itinformation
s routing determined is of find (connections) in
as shortest
routing and destination. The router a
the routing Based reached, shortest node all Forexample, as
algorithm would This the the
Network
factors. of
nodes. other the network
in Adaptation: node algorihm value for shortest distance, network create Computer /
topology due appropriate receives tables requirements.
shortestto selecting metric about
tablesShortest table on to paths. nodes have path
each
to about the The and a
link are the the by is
or as to Advantages Network
Routercomponents of
:different network.
Ans,
Importance algorithm features routingcases,
topology, metrics.
the Routers' Q6(a).
distance-vector shortest While
it increase,
Router congestion, The leading
and network
reduced EfMiciency:
delays /
IPdecisions
address.routing
destination destination
Decision(LayerLayer:
Making: networks. their directs
determines
reach Function:
connects that OSI algorithms, algorithms Dijkstra' well Simplicity:
likseScalability: concept
choice 2022-23
appropriate purposes
model.
environments.
depends
may
easy of
in andWrite not as for to and
Vs. Shortest
Routers3) data computer and of always path networkimplement,
to
optimizes
fasterShortest
: /
tablesbased of the 'Router' A 'Switehes' 'Repeater
Switch: 'Switch'. clear on routing such especially Shortest many 162
path the different
packets and
factors routing
best as network
for to on operate OSI operate specific1 The link-state (RIP), be data path Path
networks, the size resource
data Routers
forwardng
make
IPmodel. path. difference
such istefficient path transmisslon
determine networks isa In choice
Complex
handling best and
makingit
straightforwaró
sCenarioS.
is touting Routlng
addresses, at between are provide with
packets across for networking different
the diferent layers at anyWhat
network
rotuing(OSPY
as choice. complexity
routing
utilzaoon,
minimizes
data but both of efficient apracica
network together computer antitiona for
based the They packetthem,t
s to they amongIs routing Other tmany
scales
and
device servecritical. the sze
on byet and
the most us
iwitchdiferent
:across
Network:
the lhatImportance be Decision(LayerLayer:
forwarding
shouldaddresses. segment Function:A'
. operates Sand witeh
traffic that and networks
domasIesginolms,aTeRoutrntaiftoaictn:ieorns.feature(sWANS) Nearetaworks:
includes lo:nger
Importarnceegenerating
signalSis gnal reach
th e
Repeater'
operat
OSI es
A network. .Trafficdomains
communication.
domains,
prevent network Networks:
optimize
within
and LANs determine
forwarded.
2) between at
Switches
forwards
connects
which
prevent
like or
taRouters
tnetworks
distances modet performance of amore sdevices broadcasts NAT. (LANS)
Isolation:
collisionswhich the They
Making: the devices data other
Boosting: ofsignals, ofa Its theat isa of
weaken 'Repeaters
and
data
Switches
create
to decisions
port use OSI
operate granular
packets
meansfirewalling,
to
are BCA
network mary csialmplRepeater' means LANS. Vth
In without thus priphysi
within s used
e from Switches providing traffic. local
by
toMAC model. on a from
they wide Semester
over are which at thelevel, to
network 'in alalowing purpby affeçting
they
reducing Switches
based the networking
between the separate create They area
degradatioampln. ifying
distance computer netosewlaorkiyer ng in isolatecreate network
They
commonly address
a data handlingsame same propagating networkand connect
dat a broadcast networks
communication.
due network
data (Layer
to
is
to Computer
a
thtraffic
e
full-duplex
collision broadcast segments
improve tables
used packet MAC make layer
on link network thnetwork em.
device traffic
provide
localComputer
/

travel extend devi)ce


The and of
entire and to
dataIt
to Network
network to netvork
netvorks, segment
Ans.detail.in
a Illustrate . routers serve
facilitating quality. data role inWe
amplifying " "
unauttahcks,orizsecuri
cyberat ed ty monitor trustedfArewall Role A Q6(b).
different can
errors.
performance
can Improving eSsentialnetworks, Fiber
significanty
loss, enabling
maintaining different communication
used
be
seamlessConnecting
network attenuation.
ensuring
strength.
Extending
network,
oTcrucial without
losing
connecting Routers travelextending
conchde repeaters over 2022-23 /
rules.traffic suchinternalsecurity of communication
What and Optic parts to is in that
and high-speed for communication divided particularty extending
thereby By as
0s
Firewall
a andlonger
functions regenerating signal over where connect long Network Repeaters
data
access, doingbasedcontrol fundamental
netthework that the
is different
Switcdistances
hes, the the and belpNetwork maintaining
lo
Networks: of
ng
Remote would
distances. 163
/
'R epeaters' maintain
reduce quality data the these into can
enhancing soincoming , lnternet.
on acts :
rol e wi th in within reach
distances,signals network. segments, be in the
Reach: travel
amplify
a and as networks signals, of Performance: Segments:limited. coverage
large
Jata a set
firewall a onand consistent and Bysignal
data transmission. between
segments,
the of untrusted
Its of the a
maithentensuri can fiber In repeaters physicalRepeaters longer these
where
breaches, primary barrler
component same network, ain network
ng transmission reducing integrity
aplay
repeates are
overapredet
l ehelrmips ned and Firewall'? switches other and
a network degrade devices
ensuring When area distances
outgoing external betw een netw ork sig nal crucial signal optic directspaces of signals,
security prevent role with hand, that by and can are
of in a a
and is
eplaining" of
" destination traffic
determine Cxamine
traftic Traffic
"Application " " " content established Packet
aboutallowsthe data level
isinspection blockprotocols.
access.incoming
unauthorized network,
networks. into Firewalls IP
Network resources. hijacking, Stateful
Access sessions stateful
connections.
ofbelong information.
malicious
Stateful content.
specific data offerstructure.
network
internal unauthorized helps control On
more
a
addressesa user attacks, the inspection, as incoming based based he
at Inspection:
th ey Filtering all
application single segmentroles, to inspection advanced of packets' HTTP For whether role
protocols the This often
Control: inspection
policies established, andInspection: rules. pass
IP incoming
on onFollowing
application packets,
This example,
addresses, of
Layer public Address departments, including ensure They analyzing traffic(web) factors predefined
a ECA
employ of users Deep
legitimacy throughFirewalls to and
firewall
enhances devices to to cantechnique allow,
or layer IP
the limit
Firewalls helps maintain firewall on and Vh
applications Filtering: addressTranslation network from spoofing
legitimate that track Modern help not packet individual othertraffic
firewall
a such
port
Control: are
outgoing
filtering,
level NAT network prevent block,nules. Semester/
security on accessing or incoming records the detect just that
inspection and tothe perform ports numbers, on as
in
some
an to other enforce make
network. detail
to visible
iniernal
translate connections. stateof
firewalls examines adherence portmight source These orFirewalls
detect various the to
that which Some by and
criteria. access and and packets
decisions packet prevent 80, redirectnetwork poinIS : Computer
concealing to (NAT):sensitive seSSiOn packels of header (DPI) allow and and rules
mightexamines networkprivate prevent access activeactive block This but
andfirewalls external Thisbased types use the to of
pose block . blockedLogging to
Network
securityrisk.a
network.safeguarding
integrity,
could
ofa gatekeeper
policies
and advanced
protocolstransport data while an layersimilar The Protocols
Layer: Ans. o7(a),
malicious confidentiality.
We
anetwork.
datremote Firewalls
allowing monitoring
Virtualevents,weasl
logs block behavior.
patterns
firewal
at tack isprevention
If
network These anIntrusion
d
End-to-end
delivery
delivery
Reliable
control
Flow " " " Theinternetwork can of 2022-237 /
Multiplexing
Addressing " " link provides the services Services compromise and network
services to and user the or firewalls
layertransport those Describe conclude
network
trafiic,for Private traffic. and detected, traffic
can layer in mitigating sensitiveprotecting
activities. and
VPNs secureoften
and malicious potential
abnormal a Detection
controls theprovidedofprovided the
Reporting:
activity,
asThese
stsytems
analyze
featurcs.
for 104
provided becontrols made services the the remote
encrypt support
Network analyz1ng the include
layer the Transport that for signs and
divided against internal traffic.
the up
provides
data
by various security various data, It access
compliance including logs Prevention:
ail plays a traffic VPN Firewalls- intrusion
physical
by the ofwithin link the by maintaining unauthorized firewall network, (VPN) netWork of
into the many and enforcing are can known
lower the layer. Transport Layer. the confidentialitycyber pivotal a functionality
between
to
purposes. crucial allowed take
fiv e
transport networks. a Services the
Support. maintain detection
services single
layers. layer The Transport threats acts ensurino intenal security action attack Many
categorie, network security
while network dataLayer that
roleacceSs
as the foand
layer across in a
the The link are &

LosrsolcontTcont Re
del
liab
vler
e ye
:liveryEad- The
oort-denldivery
t :
roErhlerroterrolailnasblpeort tra nspof
The
(2)
(c)
(b) The free ThError
e Sequence
cont
Duplicatcontionrol an delivery End-to-end
The performs have terror-free
(d) ltaryeransmiasre sion Loss Loss Sequence ofThe
data upper On h e data deldatiavery. primCont
ary rol entire layer
DuplDuplicatiocnation
arrive
given
to ContControl
segments second
rol layers the been
routers, delivery layer
id ent
at sequence arive
the
ify sending the
of Control introduced then layer Therefore,
aspect
link link role
delivery.
layer :Control Error provihasdes messagetransmits
at a : can end, checking
the is a
ofreliability Addressing
destination.ContControl risol mis inumber
ng s thtirrdansmission usedbethe theof : errorthchecks
the isHowever, also reliability
four from the
the : destination,aspect transport betfowr een for provitrdansport es aspects:
source entire
a Transport
ServiLayerces
Sequence fourt h se gment . by rel
by i a bi li t y the wi l is Sequence
transport not of can bethe layer erors thenode-t o-node
a the message
Error Control services destination.
aspect relisaomebility. correctlylower is beginning notbe error the layer
error Reliable
Delivery
thto
e
Reliable
delivery
numbers of layer. of layers.sequence is end-to-end caught between protocolConts rol. by
to
reliabiare lity. Thesethem. The responsible reliabilityhandling the
retransmitting destination.
used tr ansport
On re assembl e d. On control and
to the each
by
are
real ity,
In
Control Loss
sequence the ensure end data mechanidoessdesi 1m, control
Flow
toThe sendi n
the
g recei v ensur
in g in
f o
g
r
which netwofork.linkfan not gned no
identtriansport
fy layer that the the Therefore,
numbers end,ensures is the li n k. layer. ensure transmi but
sto
sion lost
the layer al
imend,plementthat ed Therefore, packet Iterror the it provi d e Duplication
Control and
lost the onl y ensures end-to-end
itensuresthe Multiplexing
allow the that it
packet s has detectend-t is error-free wil
o-end damaged
guarant
packets; e es fragment
the s al ensures s
at arrived ithne troduced only 10be
the
ver?s the packets.
similarly, that recei retceihattvransport
ed transport thosereliability. percent
f ra gment s correct l y . transmi
node-t o-nodession.
no oftra nsmi s sio n the errors inside
it transport various from layer. layer that one error
aldupl
lowsicate of
a
the
ways:too n window
Multipiering responsible This wth
:ethcient 3. the
Addressing 5.
: " The 4. FiOW Flow
receiver
(TSAP).variable application
point correct
The According
known Many multiplexing
Dowaward
multiple
haveamong transmissionsUpward same transport increases too
Nowadays,
programis the The The Control
sendinga protocol as muchcontrol
IP transport transport protocols a network well for to
application as low network
several identify
protocol The UpperUpper|Upper StackLayer represents the multiplexing: layer network
flow
as data, is
is layer. to multiplexing:
or is it used :
processcalled transport layer Each layer application th e slowpaths bound
connection, uses
byte control.
controls then to and
operating
supports
system in Physical Network link Transport
Data Datacombine layered connections. congestion prevent BCA
a the StackLayer
protocols a on capacity. oriented th e
process.
to station provides
particular to f or the discard Vh
a network another
generatedlayer. model, improve the Upward
multiplexing
improve to the receiver
It
destination session, úses the
layer StackLayer has Downward same rather flow Semestor
When need machine.the Downward To and senderduplicate
the discards
layer is only TS In the the destination multiplexing make of
user these
presentation, than datasliding thus,
represented to user by transport throughput. from /Computer
a
process. host delivers Communication Peer know one address an multiplexing more frame reducing so segments.
of Incases, multiplexing window
that overwhelming the
multiuser transport application
sends and whichspecified a this delivery layer along
cost-effective,means oriented. the
packets
The a which case, and transmission receiver Network
datagram
a by This protocol the
transport
message upper-layerentity. interacts withe means th e system and
two addressing application typeallowsthe same multiple
station is onto asking the 2022-23/186 /
multiprocessing
environments,protocols:
an from specified one the of one path; does that receiver.
layer to Upper session the efficiency. performance.
H6 StackLayer
protocols known machine multiplexingtransport transport notmakes for
other a is layer transport transport
protocols source provided th is become the
host TCP Physical Data
linkTransport
Network StackLayerUpper as as layerfunctions
protocols is retransmissionIfthe
the
a a must layer layerachicved Muluplexing layer occurcan
means host are station
Transport means is overwhelmed. data 1he receiver
define and communicating. by be used layer
to StackLayerUpper the of connection to connections transmission transport
that th e transmitted
or th e into th e split through
upward is
some destination UDP. Servicetranisport
port. delivery session a
when
a
sends overloaded of
source single connection packete
connections The networks uses several use Sliding layer
executing more
access layer. to to layer.
proCess
host.
port the the layer the the is

The User UDP This UDP UDP 1JDP


pP
:
Each Dort. deliverohost while inAn
dividual o
IP
Disadvantages
for
transmis ion. provides stands
the
It
is
ItTCP
TCP :

itUDP when
does does ItUDP

notreportcan ingprovinot des


Datuseragram packetcontThe rol, istype isstisandsa
datagram
end-t
and anofsimple
connectionless
lengtoh-endprotocol
a
for IPTCPUDP or
def
port is e
in ed prot colis
tparacknsetpeort ports
knowna
a
Formatproduced protocol User Physical Datlaink byhost from la-yerto-host
con durectaitoionn-oofraientTrterdansnspfmorulits ion
For
for contdiasicover
n provide
anbasic
anthaterror. any protocol
UDP
of

16-byte
has
a :informatby
ttheriansport
on usedisDatagram
(ClieTELEET
posi tive a the
originating
pr o to col s proto
as
col
creating IDanfunctions protoco. and -51001 nt) protsareocol
transmis ion. prthoetocollayer i orsequencing
error
Total Source
addressport
header
UDP to when provides it
the level
integer
ports.
connection,servicesControsequenci
l ng has needed : Length bit16
s
Protocol. port-to-port
or protocol protdatrela oicolability address,
port used
16 which
occurred,
ocol. reordering for
meansProtto bits non-sequenced to to
the.IP delivera
number the is isfrom
applications.
TCP the
but end-to-end
Data
Destinataddrionpeoshown
ssrt known the that and 1PTCPUDP or and protocols
itservices,
Datlinak
connectes ion
generat offnct
it ions Checksùm bitl6
s upper securi
adds ty Physical
a as is packet
a
particular doesnot delandivery s below:
bit16
user layer.-level are transport
transport a TELNET
(Server)
of
16 and that from
23
estvitual
ablished speci
data fy does datagram. importfualenctntss ionality. bits. from work
circuit of IP source
on
segment.which traspecinsminfoytssiol. a addresses servics the
topofthe host
betweenbetween packethas than
to theto
seder bothne thedamaged checksum peed the
IP
been and destinatprotiondestination
ocols
and ends
receiver lost packet error ze.
st
of as
the
Features
that Ans.Q7(b).
with TCP
networkNetwork
" process A processes. Logical a ifferent
Multiplexing:
correct the theto acknowledgement
mechanism number in FlowKelabLIy: the ata toICP
Sream
can Segment thetime. ToFull logical the
Network all Conneçtion Establish
The Data
is ACK segments
segmentsDuplex; correct is goup of
comproise Sunnmhrize Control: destination.
FHandlingsecuriysearch HLEN4
bits is application retransmitted
in th e data TCP
exchanged wantsachËeve Cornections:
connection.
Full
Fprmat a< application. isthbytes
e the
Security connection also if TCP transfer: protocol
Reserved can TCP Multiplexing
differenton form When they
applications
bytes
issuesS. bits 6
these issues address.
Sourceport to it from TCP BCA
:
flow
send provides Each by refered ofcan arrive assigns to in
the al Checksum terminatèd. in receiving
bits16 both Duplex in TheusingThis the
receive the the itself the TCP :
issues Issues the bit16
s
confidentlallty, and RC
G
K
between and both connection highest
isa to
destination. out
receiving a form h
A thereceive combination
Full the
process sequencesegmentsprotocol Semestor
service, asa of
requires
challengesnetwork
and directions. the each logical process without TCPorder of
H P
Duplex sequence
number that
Acknowledgement number tw o
directions. window TCP
Challenges SY R the is ofaccepting is sends TheTCP. transfers the Computer /
TCPs. identified channels known overflowing or number segments
a padding
Options & Sequence
number computers.
of
Lntegrity, security data service, receiving to
IfACK data
multi-faceted
encompass N bits32 TCP sockets, mechanism. eliminate an
bits from TCP acknowledgement
as toand and theNetwork/
: should i.e., by known
ports.
demultiplexing. the as is
each data
and process is the sequence the At its TCP notforward then
issues a data internal
buffer. The the in
pair the receive received byte
approach wide a
availablilty Destination portconnection-oriented have data
address from can itduplicate uses passed the 2022-23
B. of receiving transmitted
to
form
and pointer
Urgent Window size Thesending flowsockets numbers, different the the
range back within it /
bits16 bits16
bits16
TCP sequence IP. to of
involving challenges. in segments.
following both used end, contiguous the 168
of of and problem.
without any to a
transmits
and applications the timeout IP
data and
threats recèiving the window by the number number layer
protocol. sender
various and stepsdirectionssending
occu: data expects
the interval, stream
for
resources and isand indicating of to
How buffers sizes, transmission
security Suppose and forwarded packet bytesreassemble a
vulnerabilties forwarding
at positive of
receiving then bytes
to the is is
sosame called to This sent the
within handle the to the
measures the that
a
Breaches:
Data 3. Unauthorized
Access:
, hem :and
5. 4.
MalViwarrueses:and and best
Threats:
Insider 6.
PhishingUnauthorized
encrySoUnptliuaoutnitohnosr:ized
Man-in-the-Middle
Attacks:7. DenialSolutions: Solutions:
to
SoluteiMaons:licious
Educat
10.
Interception:
Segmentation:
Network 9.
Data 8.

Solutions: Solutions:
Unauthorized Intercepting
(PKI)
Malicious
Solutions:
foster Solutions: phishing
Overwhelming
delivery
of
Deceptive limit
:
practices.
Failure Lack
Solutions:
prevention
syst emstransmitting
Inadeguate and data userssoftware Implement
Solutions:
systedevims,canesd of Here
culture actionsnetworks measures.
to
a Service Conduct tacticsexposure, Encrypt Deploy to users
secure Apply Implement Social access about
and and preventi gaining s
to
Patch Use and a
regularly Segment
Establish networksensitive Useaccess of network (DoS) trick
to
sensitive to safe strong a
communications
encryption altering security the or(CDNs)
encryption Verify
Engineering: sensitive
secårity and updatviruses
e horized
Management : unintentional
principle traffic
Attacks: users browsing unaut access
updateasegmentation
robust
networks data data to

for communication
over during (e.g., awareness distribute
to requests
or
service awareness into
filtering,
regularlydata, antivirus
that authetication
and of data, to
patchpatch based unsecured data HTTPS, least
mistakes to revealing
for implement
audit habits can access.
d
sensitive
allowing
on transmission.
in
disrupt
rate sensitive
training
leading software,infect 1
management sofware function, transit privilege, traffic and and methods
between
lateralchannels
(SSL/TLS,
VPNs), bylimiting,
its confidential monitor data to emai l Regularty data
systems,
firewall,
and employees
monitor information fo r
los
data (e.g, or
two availability. practices I
systems.implement digital
process movement and users, update network
parties. data leaks
prevention andsteal muiti-factor
VPNS), signatures, user or intrusion information.
to internal through use access orlintrusiondata, and
regularly firewalls, for Secure activity, email theft. resources.
attackers. prevention multiple (DLP) or patch
authentication),
and users. filtering., disrupt systems
detectionfprevention
update and enforce
Wi-Fi public tools,
use
systems. channels and operations. to
software, intrusion networks, key
access
segment fix
implerment vulnerabilities access
and
infrastructure controls, Use
operating dete&tion/ content networks systems. controls,
avoid and anti
from non-encrypted
IMAP : internet. SMTP Ans. Ans. Ans. Ans. Ans. Q8.emerging of
Internet Port 2525: This Port By
Port 'Simple 13. Security:
Cloud12. 11.
Tunneling
protocols v) (iv) (ii)
E-mail(Bridges protocol
X.(ü)2CSMA Addressing
(0) technological
5 Write
a default,
25 Standard
(v) (v) (ii) (ii) () Compliance
controls
Solutions:
Metingimplement
controls. Mobile
access Security ninerabilities
Solutions: to in
Solutions:
Security
local G56: isolate
Message is E-mail Bridges X.25 CSMA
client. ThiSMTP.
s with the the Mail Tunneling briefly
threats
and
emails default TransferProtocols : these to
industry-specific risks loT
IMAPAcçess is port isSMTP Protocol :
Protocol solutions,
and
network
ensure
informed
about
Stay Select
and associated Implement
devices loT
the : about best
port openedSMTP protocol compliance.Regulatory reputable Security:
and
Protocol : user
practices security BCA
used Protocol for : any device
POP3 non-encrypted [Please [Please [Please (Please education, regulations with Vh
if onworks Sending four
devices
mobileand
Challenges: cloud cloud management
are isa all toissues relevant Semester
we site (SMTP)'
the mail want on Emails Refer Refer Refer Refer continually
of
two
protocol ground three the policies, requires and providers,services datanda
Computer /
to port. regulations,
most send port. is
the :
Q15 09 Q18 Uni-IIQ16 following: compliance policies,
sender enhance and a
comprehensive us e Internetof
commonly used message standard Unit-V Unit-IV Unit-IV regular Network
in perform encryption update
for case our standards. stored
accessing using protocol Page-99) Page-72I Page-83/Page-62/ monitoring.
network' s Things
(10T)
used port firmware, /2022-23/
SMTP approach regular for the
in
internet 25
email is for security It's audits,and datacloud.
and
securely. filtered sending essential that at
devices. 170
protocol on use
restand
remote
a and posture. includes network
emails to implement
for we stay a transit,and in segmentation
retrieving web want across combination
updated
senoel to security
send the on

You might also like