Professional Documents
Culture Documents
itt and
between OSI
Howis
Merence
TCP/IP Model :
Compuier Network OSI
generic. protocol independent It is TCP /IP
zas communication gateway the the based
indard,acting on
internet standard
has developed. It is
Year- 2013-19 BCA N-502 a
is
user.
protocol around which
k and
end communication
connection of host protocol
(Time:Three Hours
cqul marks. IMaximum Marks: 701 verticall approach. It follows over networkwhich allows
oe: Atempt any Fhe gucstins 4l gucstions carry
This solution is provided by Mrs. ShilpaTyagi
olows
has separate
presentation laver and| TCPIP horizontal
does not approach.
model have a separate
model, the transport layerpresentation
ssion
M
layer.
thismodelthe transport layer guarantees the
layer or session layer.
In TCP/IP does not
Q1(a). Explain in detail the oSI model with all its seven layers. Bliveryofpackets.
Ans. OSI Model :
layerof
guarantee delivery of packets.
OSI model provides both the The network
erwork andl connectionless service. layer in TCP/P model provides
Application Layer oanection oriented connectionless service.
Software hassevenlayer. It hasfour layers.
|Presentation Layer Oslmodel has a problem of fitting the protocol TCPAP model does not fit any protocol.
Sender Layer
Session Layer intothemode!
Transport Layer >Heart of OSI which the network are built. TCPAP
model around model is, in a way implementation of
Receiver Network Layer Generallyitis used as a guidance tool. the OSl model.
Dala Link Layer Protocols are hidden in OSI model. and are In TCPIP replacing protocol is iot easy.
Hardware replaced:as the technology changes.
Physical Layer Layer easily
OSI stands for open svstem
an OSI model. interconnection. It has been developed by ISO. There are La Explain about the error detecting and eror correcting codes.
1. Physica! seven layers in Error detecting and error correcting codes :
Layer: The lowest layer of the OSIreference model the physical
is Lris acode or condition when the output information does not match with the input information.
for the
actual physical
receiving data this laver connection between the devices and also contains layer. It is
informatioD in responsi
link laye. will get signal and convert the data into 0 and Is and ble
send them tobits.the When
bor Detecting Codes :
or detection is the process of detecting the errors that are present in the
data which is transmitted
2. Data Link dot redundancy codes to
Layer : It is batransmitter to the receiver in a communication system. We have to use some
this layer is to make sureresponsible for node to
the data transíer is node delivery of the message. The main codes are called error detecting codes."
t these errors. These
3. Network
Layer : it works for the error free from one node to
another. function f
different transmission of data from one pBS of Error Detection :
networks. It is also source to another
It providesrespcnsibleto routing and logical addressing of data.
4. for I. Parity check
Transport locatedin
The data in theLayer: services application layer and takes
network layer is considered 2. Cyclic Redundancy Check(CRC)(LRC)
Redundancy Check
of complete message. as segments. It is also services from network layer. 3.4. Longitudinal transmitting
5. Session
Layer : This layer is responsible for end to end Check Sum
delivery Parity Check: Parity bit means annadditional bit added to the data at the transmitter before
two types of parity bit inerror
authentication and also ensuresresponsible establishment of
for vertical redundancy check". There are
connection, maintenance ofsessions, a, parity check is also called as
6.
Presentation Layer : Presentatsecurity. parity
Hection, i.e. even parityand odd Acyclic codei_aalinear block code with the property that every cyclic
application layer is extracted hereion layer is also called the 2.Cyclic Redundancy Check : codeword. Cycliciredundancy check nodes are shortened cyclic
network. and manipulated as per the translation layer. The data from in another encoding. CRC works in two phases i.e..
7. required format to transmit over thethe t of a codeword results are used for error detection and
Applwhich
data. icationhasLayer :It is
to be implemented by the des. These type of codes
CRCchecker. (LRC): In this method, a block of bits are arranged in
atable
network applications. These
transferred over the network. AC generator and Redundancy Check parity bit for each column separately.
application produce the . Longitudinal havetocalculatethe bitsexcept the number of bits in the
sum is larger than parity and
prmat and then we similartoparity this mearns that if the checksum is zero, error is detected.
Sum:Itis zero,
4. Check constrainedtobe
eresult isalways
treceived
he the B 1.e. to a client
port handshake Way :Ans.Q2(6).comection.
mediatransfer Ans. acknowledgement a established eTorYpes comtion
Optical
cable
fibrecable
Coaxial
Twisted
"
In
:media
Q3(a).
3.choose SYN-Ack. one 2. 1. passive
way handshake.server,
To
Codes". erorand TheError
dáta received server. Ack A+1, SYN-Ack handshake SYN
Media
Guided to establish Connection singlei.e. Correcting codes
divided
isVarious for
for more sending open the
communication Explain
acknowledgement Finally, : and :
open. Explain The
pair the
Transmission Média
data sequence The
the than The : a
The
To
serverBefore
it using emor which
cable into
transmission sequence acknowledgement packe: In
SYNactiveoccurs up connection,
a bit
communication. the number the sequence theresponse establish for must a
establishment oomctionemor calledare Codes
oomecting ane
following to client three-way how used
client received
is :
terminology, various number
another the openconnections; first BCA
Unguided is
value
number sends number the
server. a attempts connections for :
Radiowaves
Infrared " " types set connection,
is bind TCP techniques "Emor asboth Vh
Microwavès i.e. to sequence server
performed
transmission
mode i.e..A+1.and
B+1. one anrandom that to uses
and tohandshake.
this connect using
and ernor Semester
transmission: isAck numberreplies
multipleCorrection
bit are detecting
of more set the the is listenthree-way a
Media toback number, number
server bythree- called three of
/
data than iswith atwith are tw o Comput e r
the the to set the
a a
through
distance
proportional antennas 2.and and transmission for Unguided
MediaItvolumes of or
: data.reflection and separate physical
lin:directed
ks. Media
Guide-Network
: /
3. other. There
1, the plastic. 3.Optical Advantages tran_mits : coverageCoaxialdepend 2.
has
There
1. Features transmission It
bYoadband Secure 2.
3.speed
High 1.
Infrared Microwaves: The
receiving canRadio
transmission also
is Inexpensive 3. 2.
bandwidth High 1. the
Unshielded is
communication. the needs penetrate are Better insulated
containing facility
on
distance are Used and al so
obstacles. distance referred It of information a three 2018-19 /
to antennas Waves three media. light
Fibre physical confined
:the is noise mode. comparatively.shorter for referred
media.
These to used Cable Twisted to
covered be In
height.of through major Noto through block major
this
ofelectromagnetic : Cableimmunity protection
1in |
waves properlytypes'ofunguidedmodes These physical as for alellarapconductors havi n gg 2
shield signalsin
They th e a two
interference It Pain: types narrow a- to 134
antennas. sending by buildings. wireless transmission a : as
are the needs are core It modes forthis
has being
cannot aligned medium uses cover. of wired
easy mode the an This guided
used signal unbounded or basebandmode anwayyW ;
and toThe Purpose.
Coaxial outer ard type
be to
penetrate for is with aligned.sending signals, is
receiving up
ofONcept on does media:
Short directiy each manage media: required laro glas
of plast of
cabl
techniqueSwitching:pif er nCompare
Switching
Message : minimized. cost
are length, Si n ce and
datagram switching.
There Complete A isa
isi network"ThisaddressWhenestablish suchasPacketsswitchinPacket secondary
storage. of g instead Pach
to computer fo r network.
between i ty hpe
is of.
destinationpaclet are combine switching t ce
message itinsnetEachforwarork.d Thitypes message a With of páckets
they
switching
connection
a
the I
between
entitorely node of in station is message a busy can switching the can
and tw o end-to-end as established, receiver
dedicated be
devices have is
virtual initiating can the in switching a that
the receives appended
its or disk, tagged-with methods the can circuit, BCA
onnetwentirely ork is sends switching, disabled routed address:ri be advantage to ta ke
telephone a ends
next disk, then dotherefore
is storedstritly a circuit. be the network Circuit, Vth
not the path directly
node. and the transmi to pat
a h if cost seen pláce. until
the
from message, of a ari
entire called t ed betweencaix0 packetSemester
is the links.there need inappropriate
packet
destination. data must technique,
dedicated unbroken
th ere éffective defined
the 2i1 of as
system
then nodeto messago the iN ismassive access main t message solution
a transfer
exist connection
connectsthe Message
an y
transmimessage,
ts store is
tnode,hroughdestination two no problem, because delmemory aymaximum , switching
sourco works.
before almost path once path .
/Computer
and
and stations.
.
need amount3. and and that must
is
and
the store - the -t0,
an protocols.
1,access Network
2. itistransmitting. Carrier Ans.
. uses thatmessage The Division s has The the station.
returnpacket
itto the that samecbanne! CSMA/CD, asthe (CSMA/CD):
performance, Collision
Detection
To
devices
All Devices method used Also Q4.
Ihibandwi
s Each dth In det eit. rminised transmi ssi on CDMA Code already duration sending t here carrieror in reduce Carrier devices
clear.
Ethermet
Explain
band frequeri requency cy CDMA also transmitter iswindow In
timepersistent
can attachedto known Multiple
station into transmitted
Divalissoiob- reached collision,
is originalsize. S a is onbusy,
is
201819/1135 /
is is known Multiplexing,
by ofthe of
no channel is the Sense
the a
haveconnectto to onSense
divided'iisntodivDiisiovnision is digitaltaechnol
reserved mi xes
ogy called collisioncotlision. communication
package.
collision Ethernet
the and protocol impact equal
Mutiple control shared as Access
network
Multiple
in
allocated most pseudo network th e CSMA, detail
for multiple
to
the signal the Multiple
Spread successfully a is issuer with
to station before
the non-persistent
in uses of
Multiple acces shareand
access acçess
that variousMultiple intended used random packets one fo r maximumsimpty This which collision Protocol
a digital packet a transmitting
waits. frame
just an to is any
station band access, the
in stream
Speçtrumof Access immediatelyalso Access the indicates
the topologies
iisten
cable to
Access
a
number the doubled media It algorithm the
on network
: four
frequency to
for send Access receiver
USA, constituting mobi l e the
wi n dow limit. allows another
sentby listensCSMA. station the network same the
s
al the in
an competing(CDMA) and unless
to network with thatnetwork. such multiple
the itavai s l abl e sequence phones. From to
cancel ensure at If senses çalled access
time databands.
,
: which order
the
Code wil limit the the the when many as
: a it
delaynetwork.
dynamic reflected decisions
changes. algorithm. Ans. Q5(b).
algorithm. follows: network Ans.layer.
These 7. 6. 5. 4. 3. 2. Various Explain
1.
Q5(a).
etc. Adaptive there Resource be aare thenFlow methods
thatinterference theyare upon alterations.
Error evolving.
can done ScalabilityAddressing
leading thinfomation
e
should design
Routing deallocation components loss
Reliability Design
information
Adaptive
to whenever inThe are Define implemented. proper
chances the sender
select the the Explain are is Control: common
accommodate so ofbits design
used optimal data Control that to exist issue
changealgorithm transferred. so congestion. The Issues
topology Algorithm adaptive There : Allocation: flow of as and transferred while
algorithrns network
routes. in amongshould overflowing is erTor
the
sizereceiver : Naming so : may : issues
such controlreceived to Networks that isdata
in network areusage Ifprotect : networks design
issuesthe
of
in which detail several the detection The are toNetwork be Network
Layer : BCA
ascurrent routing as suchcontinually each transfer. of
topology
well : and oftheoccurmechanism by rate layer The or unreliable,
make network
also The of is Vh
change
non-adaptive
any systems. routing thhosts e the data are addressing
layer not
as so the of additions design
are each Semester
topology, maketraffic
decision or two resources. allocation
that receiver, datapackets andneeds scalable
receiver. So, continuously distorted. sure channels So
their occurs identifycan an
use traffic routing algorithm needs is
correction
should message.
increasing resulting layer
routing minimal to important
that
load, the oftheofare load and and therehigher while agree and and
system are /Computer
to be the and
in as of
" 1.
Types
" multiplexing asTheMultiplexing.
send Ans. :
Multiplexing 2.
" "
Multiplexing Q6(a). . " Distance Two
" " 1. booted. routertaken
is Non-Adaptive
bandwidthFrequency
subdivided It Itmultiplexing process the through
subnet. the table land ItItis Flow sent.When is neighbour.
internet
RIP. as It
" routing
This
These Network
is
is an of routing
based
Flow takes exchanging network. Each Itis
neighbour. withits
shares its this In
multiple is Kouting inalsois
a
Multiplexing Explain in Based a used also
techniqueanalog non-adaptive
to this into an router advance decisions are /
into ofDivision known
is of update known routing the 2018-19
combining is minimizethe routing in Vector known
a data accountRouting the These hasknowledge Algorithms
several technique.
single and technique a information algorithm
and Algorithm
as streams briefly original
is a asscheme, /
Multiplexing in Multiplexer. : th e algorithm.
then routing sent, Bellman-Ford table Routing downioaded once as M
transmission
channels. which the both tables Static 136
Algorithm they which
hard dataovera used average th
ARPANET,e with about each
any seeks the are routing, :
algorithm. entire with
the streamns topology information are router
the : : have
ware single to two to
the
do
medium combine packet finda :routing updated entire to , not
been
available : used medium. algorithm routers as
is type immediate
and periodicall routechange
known routing and selected,
for and delay table in abnt. networ
is of the the to thei
hy
ly heain aimdivision
be
l ATM : 4. 3. 2. 1.AM
Services
sAAschrynchronousIonous b OM aM mainMS
4. 3. e et
Source 1Source 2Source n sameis analog. n uissed number sender
ATM ATM t
me Pont
ne SandDHCarrier datraaOr ,Explain
ofSONET/
Residential
private
establishment infrastlinreuctserurevicesrelbetayweenWANS
Unspeci iedAvailablservie ces
VariablefConstant
bit
timgeneral nServices
e-bit dbiit vliysitoransfer Division on
mulFDMtiplexing fibre signreceials ver.channels
are
tfiequency of
ofand usraeddioin the
: briefly
broadofbathend trafiic. (backbone
and ATM
fiber
enablfor ing networ:k used
can
It
be
rate bit rate rate
rate
have
mode
multiplfeourxing
Class
t:he MULTIPLEXER except
Multoptiplicesxing trequency can
broadcasts and Device
resjdentneitanwlforraksstructures frameFrame and asa
is
a ATM ttehchni
at 1 que.
increase
to be
sent allocate
telepbone relay other WAN differentswitchitong ServiceTransmitter
WDM
the .It
(WDM)
through '57 Frequency
1 Range
broadband ATM byand reserlayvneticesworks, sendto
:
encode
tebitchnique
optical
used
isthe
:
and them is Device |
multiplexing
TV
isbuilding ATM rate data classes. signals
capacityy an to
by private are to FDM networks.difierent 12 2|
se-vices choice the service cels
choices. into used utilize
14
n etworDotks. ontcoelsr,cwionnedel2dcti o n 'y25upose LofnedosistNehetAwx2or5 k siu:m hernet Sent "used er serss etis Tjobpriodlogy :og bih hb
binary usElualecaytetronic (d)
div i ded E Lh e rie t
Sendservice
5.prim4. itives3. 2.
Li ste
Thereservice.proces
1.
n
sTr
e r v ai
are can isstreamsencoded
n
c esp
A(e)
or t . Mail E- m ail: y
such in oldcesart ying
is
the the name network
of by
aesIg ned
is
Discon ect ReceisvCoeervniceesecrtvicseervice ftiyvpees accesspthesesciefiedService E-mail intheis Interinpetasa1980sckreetheft,-e(srOweS)nceitchiInngtevoirnatceional given toteachnology rtoutnransmissisublothne atyerswophysi. Comput
a c
to
con ecting
C e s
se rv ic
into on
e s
the co m pTop logy:n transmits control oTopdlegy
u ter
a
Year- 2019-20
Computer Nework e
data - Direction of data
duplex.
Ans.
duplex and full Direction of data 1
Transmission Modes :
¬- Direction of data 2 Packetand MessageSwitching,
Also Differentiate
ofTransmission mode short note on Circuit,
transferring of datarefers to the mechanism
connected over a netvork.between two
A
half-duplex
not at the same channel can send and
Write a
it,PacketSwitching. Packet Switching :
of
transmission There are threedevices two way traffictime. It's like aone-lane receive, but Circuit Switching, Message
Switching and
1.
Simplex Mode
modes. These are :
: In this
types
Only, one must give way in order bridoe wh [Please Refer Q12Unit-IPage-34]
mode, data can be sent only type of end transmits to
at a time, the croe Switching :
communication unidirectional. transmission
in receives. In Circuit Switching and Packet
is one
message back to the sender. We cannot direction i.e.a detection andaddition,
request
it is possible to
the
other
pertorm end Berence
error
between
CircuitSwitching
Packet Switching
send
Examples of simplex Mode information that sender to Basisof
orresponds directly to
mmunication.
channel also
Shannon's model of A Two way but not at
of
UDPProtocols.
A CompareTCPand
Uni-MPage-125]
the same time
<(D).
Simplex Channel Operation 3. Full Ans. PleaseReferQ17
duplex Mode : In full duplex
can send data of ISDN ?
services
in system we thevarious
Example of Full both the service
ISDN is a digital
Duplex isdirections
What are
One way only leooooo00
in which there is a simulNetwork'
Telephone taneously. Q3(a). Define ISSDN.
'Integrated Services Digital Network,communication protocols
actually a set of simultaneously
abbreviatedas networks.ISDNisgroupoofdigital services that wires. ISDN
persons by a
talk and listentelephone communication
line, between two
at the same using which both can
Ans. ISDN :
The term ISDN is
existing
telephone
themto carry a
over companiesthatallowvideotobe transmitted
overexisting
telephone
designed to run
In full
duplex system theretime.can be two proposed1 by
telephone
voice, music,
graphicsand and Network Layers.
data-link
lines one Convey data, text,OSI model's
physical,
encompass the
BCA
control. protocol still suffers from afew drawbacks. Firstly,
introducingflowfeedback ifthe receiver hadthe capacity to accept more than
BCA Vh Semester/Computer Network / solved by contain a ahoulds one frame, its resources are bing underutilized.
2019-20/142 be protocols. when it
ISDN is a wide area network becoming widely
Q3(b). Define Flow Control,
ay
inform the
sender rai Secondly, if the réceiyerwas busy and dËd not wish
available. Due to rapid advances in computer and one flow control algorithm Exnlalcof to receive any more packets, it may delay the
communication technologies, these two fields, have Ans. low Control : to ihe
next
frame. Control: acknowledgement. However, the timer on the
for Flow can be
oa
virtually merged into each other. ISDN is the product Flow control is one of the key Mechanism mechanisms Sender's side may go off and cause anunneçessary
control is a set aspects or types of
of such a merger of these technologies, The first layer. Flow of data lin
generation of ISDN is called as of two flow'ofdata mechanitm retransmission, These drawbacks are overcome by
Narrowband ISDN tell the sender how much
and is based on the use of 64 Kbps channel as the before it múst wait for an dátü it cana procedures thar controlthe flow control
are
the sliding window protocols..
basic unit of switching and has a circuit switchind ihe receivèp: t i Ngement trahsmit
from Wait: This
eacknowledgementofthe
frameto
transmitting a data data i In sliding window protocols the sender's data link
orientation. The main important device in the Flow
after
layer maintains a »sending window' which çonsists
narrowband ISDN is the frame relay. The second related tocontrol is another
important design issge
sender
the
until
:
ofa set of sequence numbers corresponding to
the
generation of ISDN is referred to as the broadband handled the is data
what tolinkdolayer.
with The
the sender which sent
is received.
problem'to:k d
wait control the receiver
ISDN (B-ISDN). It supports very high ata Window : In this
flow frames it is permitted to send.Similarly, to the
maintains a receiving window' coesponding
the
typically hundreds of Mbps. It has a packet ratesystematicaly wants to receiver agree on
switching
orientation. The main important technical happens faster rate than transmit frames at oiiding sender and which the
is permitted to accept, The window
the capacity ofthe receiver, Thie sunistn,
both
data-frames aftër set of frames it policy and it
contribution of B-ISDN is When The sender is- 4sing Stop and wait
should be sent. resources this size is dependent
on the retransnission
transfer mode (ATM) which is the
a faster
asynchronous computet thùn the
called cell relay. swamp the receiver.receiver. This will completelv oi
pwledgemeint may differ in values for the receiver's and the
ISDN stands for Integratedalso The receiver
Services Digital som oftheframes simply because they keep will ontrol
mechanisA wastes
underlying resources sender's window. Th sequence numbers within the
Network. It is a design for completely make use of
sender's window represent the frames sent but as
digital: too-quicklyThe soluion to,this are arriving aUchas triesto a new packet
telephone/telecommunications
designed to carry voice, data, imagesnetwork.
and
It is introduce the flow çontrol Thè flow,contro problem possible.
Wait Protocol :.
yet not acknowledged.
network
Whenever
layer, the upper edge of
we could ever need. The 'èverything control:the: Tate of frame transmission, to:a, value op and is the simplest form
arrives from the
advancd by one. When an
Digital Network is a setIntgrated Jervices
of international which.can be hand<ed by the
receiver. It reguires Sop-and-waitflow control the window, is arrives from the receiver the
the,receiver acknowledgement
standards for access to advanced, al igitaiÍ receiver to the some kind of a feedback control. In this method,
one. The receiver's
public teleconmunications networks. sender mechanism from the ieates ow readinessto receivedata for each frame, edge is advanced by the
The key elements ofthis The flow of data must not be allowedtoova its into multipl frames. The lower corresponds to the frames th¡tframe
definition ar-:
1. Integrated services (Voice, the receiver. For this reason, message is broken (acknowledgement) after window receiver's data link layermay accept., Whenedge
a
of
Data and Mixed Media atVideo, Image,has a block èCnemory; calledcach receiving device nder waits for specified
aSbufferreserved
an ACK out). It
ime (called time the with sequence number equalpassed to the lower
network
a number of for stöfing incoming frame for received received, it is tothe
standard data rates). i I f the buffer begins todata until they are processed. lery sent to ensure that
the reçeiver has next frane the window is
acknowledgement is generated
and the
2. Digital (Digital terminal
equipment, Digital fill:up, the receivermust be me correctly. It will then send
the a frame falling
layer, an rotated by one. Ifhowever,receiver's
local loops, Digital trunks, Digital ableto tell the sendertohalt transmission ont itis 'aly after the ACK has been received. windowis window is received, the data
and Digital signaling). switching once again ready to receive. : g t shi outside the optipns.ltmay eitherdi_card this
3. Network The simplest way of flow control is a |Operations : frame ata time. link layerhas two untilthedesired
(Worldwide,
communications fabric interoperating
under
Go 'Stop
protocol' in which,a sender waits for an |1. Sender : and kecelver. Transmits
:Transmits a single
acknowledgement.,
frame and all subsequent främes
accept these
frames
control using common standards.distributed acknowledgement by the receiver before sending a frame.
or it may
frame is.received until the appropriate network
framne, is
ISDN integrates all services like another packet. Stop and.Go protocol' utílize only (ACK) as it receives
within time out. and buffer them
the frames to the
_witched voice 4% of the network bandwidth. To obtain
telephony, Centrex, Dedicated point-to-point 3. Sender
receive ACK
ueii and then pass
received sequençe.itr
carrier, packet switched data carrier etc by data throughput tates, sliding window high 1.. tiyy9l. employARO
Protocol is 4. Go to step protocolsalso
a small set of providing The sender and receiver are used. of Stop & Wait : layer in
methodof Mostslidingwindow mechanism. In ARO.
standard
protocols that tapply to all interfaces ánd access fixed window size, which is the programmed to use,a Pros and Cons
advantage'of this reQuest ) acknowledgement
services. Because ISDN of data that can be sent maximum amount Pros :The only ACK(AutomaticRepeat for,a positive frame. If no
is an international
standard, the same before an flow control is its simplicity. waitfor the the sender waits
t e x t certain time
access protocols should be interfaces. and acknowledgement arrives, sender needs to'
source acknowledoement
before received within a
he world. available anywhere in Why Flow Cons :The frame ittransmits. This is a when is
frame.
3 Control is Used : after every particularlybad
andis muchlongerthonh interval it
retransmits the
Considera situation in which the sender transmits of
inefficiency,
delay is oftvo
types :
lost or received
'n': If a frame is
ARQ is
naPlease Refer Q17 Uni-II Page-42) frames faster than the reçeiver can accept them. f
the sender keeps pumping out frames at high rate,
the Propagation
transmission delay, ta) Go Back receiver may simply discard
in error, the
all
FDM List allthe layers of OSI model and also explain each layer in
(iin) ATM and X.25 isOSI model ?
What
(iv) Network Security
Ans.
() OSI
Model : Please Refer Q12 Unit-l Page-15j
What is Time Division
Multiplexing?
(Please Refer Q12 Unit-I Multiplexing (TDM)-:
(iü)) TDM and
FDM: Page-15] Time Division
Division Multiplexing (TDM) is a communications process that
transmits tvo or more
common channel. TDM, incoming signal are divided into equal
(Please Refer Q20 Unit-II Page 45] aaming digital signal over
a shared medium and
these signals are transmitted over a
(iii) ATM and .length time slots. After multiplexing,demultiplexing. Time slot selection is directly proportional to
X.25: embled into their original format after
ATM Overview: 'erall system efficiency. Digital Circuit Switching. TDM wasTDM for
initially
ATM is (TDM) is also known as a switching network use
Tme division multiplexing
packet aconnectiIton-ori
switching ented, unreliable guaranteedacknowledge
networking system.technology.
Unlike most
(does not
provides predictable, connectionless the receipt of cells sent),
qualitynetworking
of service. protocols,
system telegraphy
implementation. Packet
assigned fixed tíme slots for
yeloped in 1870 for large packets are divided into fixed lengths andwithin assigned time slots, are
From end to end, every componentassembled into acomplete signal at the destination. TDMis comprisedoftwo major categories :
virtual circui ecommunication links, i.e. transmitted
in an ATM network ATM is a and packet, which must be
provides a Sansmission. Each divided signal
deterministic traffic loads
Asynchronous Transfer Mode, a
high-level
of control.
long-distance communication
links and bears heavy data
fixed size. ATM sought to network technology
based on transfèrring
data in cells or packets of a 1. from TDM:TDM is used for
Sync TDM is used for
high-speed
networks. To provide fast resolve the conflict between
data circuit-switched end users.
networks and packet-switched 2. Synchronous Time Division Multiplexing (syne TDM):
sized packets called ATM cell.transfer, the ATM switch divides the data received from sender the signal ofa
givensub
created as asampleof error correctionchannel.
ATM network uses an ATM switch into small transmission. packet) is
transfer from different computers. which receives the request for data TDM frame (or
data
During each time slot aconsists ofasynchronization
channelandsometime
an
errorcorrection
and newBycreated
whena samplewhen
also with its associated
(For More Information Please Refer Q17 channel. The frame sub-channel(along repeatedfora secónd sample interleaved one afer
ofgiven is
X.25 : Unit-IVPage-80j the first samplechannel)aretaken, the process frame, etc. andtheframessub-channel.
Atersynchronisation
repeated for athird repeatedfor the next
are
inr# multiplexed system, n lines share the bandwidth of one link. The basic format of a multiplexed
itiw systemis:
21qmsta i Mux: Multiplexer
.n9qo 9vieat sbotisp Internet
MDemux: Demultiplexer between a LAN
and
n input n output Gateway
M
lines
Ilink, nchannels
other eilu,
regeneratedatt the
network.
BCA Vth Semester/ Computur Network/2020-21/ 156 Ii s d one
alache
i to
four:
Types of Gateways: notes onany
Communication
On basis of direction of data flow, gateways are broadly short
1. Unidirectional Gateways : They allow data to flowdivided into two categories :
in only one direction.
tuireless
e
Mode!
source node are replicated in the destination node, but not vice versa. They Changes made in thajDomain
0SI
namesystem
tools. can be cSMA/CD
used as archiving
2. Bidirectional Gateways: They allow data to flow in bothdirections. They can he ea Bridge
synchronization tools. WirelessCommunication:
Unit-IPage-32/
On basis of functionalities, there can be a
follows: variety of gateways, the prominent among them are [PleaseReferQ10
a)
> Network Gateway : This is the
most common type of gateway that provides as
two dissimilar networks operating with
different interface betweor Model: [PleaseRefer Q12 Unit-IPage-15)
without specifying the type, it indicates a networkprotocols. Whenever the term gateway is mentionedisl
Cloud Storage Gateway : is a network node gateway. or server that translates UnitIIIPage-62)
different cloud storage service API calls, such as SOAP storage requests RESCSMA/CD
(Simple Object Access Protocol) with :
(PleaseReferQ17
(Representational State Transfer). It automatically converts the
without necessitating transfer of thefacilitates integration of private cloud storage into applications System :
applications into any public cloud, thus simplifying data Domain Name Internet domain and host names to IP addresses. DNS
servers hosting thosesites.
of web hostson
communication.
translates the IP addresses
bar to forallpublic
information
DNS browser address andaddress hierarchy of special
There are some Features of Gateways are as follows: ie tyne in our web
a database tostorethisname databaseresides on a a piece
> Gateway is located at the boundary of a network and distributed change.The Internethostnames,
from that network.
manages all data that inflows or outflowe nlementsaassumnes IP addressesdo not issue requests involving theserver'sIPaddress. If
browsers determine different
It forms a passage between two different networks operating with different loternet. DNS clientslike web contactsa DNSserverto the requesttoa
transmission protocnls servers. When resolverfirst turn forward
Agateway operates as aprotocol converter, providing compatibility between the different protocnls knce the DNS mapping, it will in
ofware called
contain the
needed hierarchy,theIP
used in the two different networks. doesnot thehierarchy. messagesaresentwithin theDNS requestover
The feature that differentiates a gateway from other network devices is that it can DNS server higher level in completes the
operate at any S serveratthenext forwardinganddelegation resoBver, that in turn
layer of the OSI model. potentiallyseveral arrives at the
> It also stores information about the routing paths of the communicating networks. After given host eventually redundancy.
When used in enterprise scenario, a gateway node may be supplemented as proxy server or ress for the requests andfor the
iernetProtocol. suppor for caching procedure called
firewall. additionallyincludes work as follows : program calls a library
DNS application returnsthe
Agateway is generally implemented as a node with multiple NICs (network interface cards) DNS Work? DNS an
IP address, resolveras a
parameter. the name
and
connected to different networks. However, it can also be configured using software. Bow does whichlooks up
imap a name ontoan passed on to the server connection
> It usces packet switching technique to transmit data across the networks. I. To name is local DNS establisha TCP
resolver.The UDP packettoa can
Link host to X.25 with LANS : resolversends a resolver. program
The addresstothe caller.Thenthe
(a) This type of gateway costs about the same as a router. The difference will be in line-cost savings. . correspondingIP sendsthisaddresstothe
If the level of traffic to be transferred between LANs is low, the X.25 gateway is the most cost Theresolverthen sendsin theUDPpackets.
effective solution. If the levels of traffic are large enough to justify leased lines, or LAN-to-LAN J. destinationor
communication is required, a routing bridge or router would be the right choice. X.25 networks are withthe Unit-IV Page-72)
used when there is not enough traffic to justify leased lines or the remote nodes are so small and v Bridge : PleaseRefer09
geographically spread out that leased lines would simply be too ineficient.
(b) To allow devices made by different vendors in the same LÀN to talk to each other, a set ofinternet
protocols, such as TCPAP (°ransmission Control Protoco/Internet Protocol), is used. The gateway
converts the TCP/IP protocol into X.25. Then, at the remote node, X.25 traffic is converted into
whatever protocol is required.
(c) It can communicate with terminals attached to Ethermet using a DEC/LAT (DEC Local Area
Transport) protocol for better response times: the transmitting device need not wait for remote
acknowledgements. The gateway locally generates responses to the TCP/IP or LAT protocol. The
about! network layer
in| brief tunneling.
lsDNservices
Write
p2cketcircuitswitching
Ans. Design issues of Network Layer :
Computer Network 1SDN
services:
Page-42] [Please Refer Q1 Uni-VPage-85]
Year- 2021-22 Q17 Uni-lI Tunneling
BCA N-502 Refer
[Time: Three Hoursl
ase.
Circuit
Switching:
Page-34] [Please Refer Q15 Unit-V Page-99)
[Maximum Marks:70 scket
Q122Uni-II Describe different function
Note: Attempt anyFive questions. All questions carry equal marks. Refer detection Q7(a).
performed by transport layer.
hase
error
Summarizevvarious
o1(a). What are the uses of computer networks in general life ? rectionprotocols, Ans.
Page-114]
Ans. Protocol: [PleaseRefer Q1 Uni-VI
Detection
[Please Refer 08 Unit-I Page-7] Crror Unit-IIPage-49] Q7(b), Explain the concept of Domain
Refer 04 proper example.
Q1(b). Differentiate LAN, MAN &WAN. please Protocol: Name systemn with
System :
Unit-IIIPage-5I) Ans,
Ans. Difference between LAN, MAN and WAN : Correction Domaia Name host
Lor Internet domain and
Q5 The DNS translates converts
BASIS OF
LAN Please Refer ? addresses. DNS
automatically
COMPARISON MAN WAN protocol works namesto IP web browser
address bar
Expands to Local Area Network Metropolitan Area Wide Area Network ALOHA the names we type inour servers hosting those
How
ib), in
plain detail. addresses of webdistributed database to
Network to the IP implements a
informationforallpublic
Unit-IIIPage-60]
Meaning A network that connects a It covers relatively|It spans large locality and sites. DNS
andaddress addreses
PleaseReferQ14
group of computers in a large region such as connects countries storethisameInternet.
small geographical area. cities, towns. the DNS assumes IP hierarchy
together, Example Intemet Witn hosts on resides on a
the following
database
Ownership of Netwok Private Private or Public Private or Public change.The likeweb
ela), Describe sublayer: donot databaseservers.When clients host
|Design and maintenance Easy Difficult Difficult medium access of special involving Internet
Propagation Delay |Short Moderate Long sferenceto802.3standard requests resolver
browsers issue softwarecalledtheDNS
Speed High Moderate Low )(iüi) IEEE
TokenRing piece of determine the
names, a server to
Fault Tolerance More Tolerant Less Tolerant Less Tolerant a DNS does not
(ii)TokenBus first coatacts DNS server forward
Congestion Less More More Standard : IP address. If the in turn
server's mapping,itwill at the next
|Used for |College, School, Hospital. Small towns, City. Country/Continent. IEEE 802.3 Unit-IVPage-67
Ans. (i) 03 containtheneeded differentDNS
server
Devices used for WiFi, Ethernet Cables Modem and Wire Optic wires, Microwaves, [Please Refer to a
the request thehierarchy.
Satellites
transmission of data Cable
Page-71] higherlevelin severalforwardinghierarchy, anddelegation
|Moderate High Ring : Unit-IV the
Data transmission errorsLeast D Token sAerotentially
[PleaseReferQ7
DNS
withintheeventually arrives at
and noise sent
Small towns or cities Country or a group of messages are host over
Area confined to Schools, hospitals or Bus : Page-69/ IP addressforthegiven completestherequest
buildings countries ii) Token 05 Unit-IV in turn
[Please Refer Transparent the
resolver,that
Internet Protocol..
support for
caching
Q2(a). Compare OSI-model with TCP/IP model. Differentiate
between
Bridges. additionally includes
DNS redundancy.
Ans. Q5(b), SourceRouting requestsand for work? DNS workasaddress, an
follows :
Bridgesand Page-75]
(Please Refer Q14 Unit-I Page-18] DNS
QlI UnitIV How does onto an IP
Ans. a name libraryprocedure
Q2(b). what are connection oriented and connectionless services ? (PleaseRefer conceptof
IP 1. To map programcalls a
application name is passed
on to
Ans. Elaborate the the resolver.The
called parameter.
(Please Refer Q9 Unit-VI Page-19] Q6(a).
addressesindetail. as a
Uni-VPage-1OI] the resolver
LosrsolcontTcont Re
del
liab
vler
e ye
:liveryEad- The
oort-denldivery
t :
roErhlerroterrolailnasblpeort tra nspof
The
(2)
(c)
(b) The free ThError
e Sequence
cont
Duplicatcontionrol an delivery End-to-end
The performs have terror-free
(d) ltaryeransmiasre sion Loss Loss Sequence ofThe
data upper On h e data deldatiavery. primCont
ary rol entire layer
DuplDuplicatiocnation
arrive
given
to ContControl
segments second
rol layers the been
routers, delivery layer
id ent
at sequence arive
the
ify sending the
of Control introduced then layer Therefore,
aspect
link link role
delivery.
layer :Control Error provihasdes messagetransmits
at a : can end, checking
the is a
ofreliability Addressing
destination.ContControl risol mis inumber
ng s thtirrdansmission usedbethe theof : errorthchecks
the isHowever, also reliability
four from the
the : destination,aspect transport betfowr een for provitrdansport es aspects:
source entire
a Transport
ServiLayerces
Sequence fourt h se gment . by rel
by i a bi li t y the wi l is Sequence
transport not of can bethe layer erors thenode-t o-node
a the message
Error Control services destination.
aspect relisaomebility. correctlylower is beginning notbe error the layer
error Reliable
Delivery
thto
e
Reliable
delivery
numbers of layer. of layers.sequence is end-to-end caught between protocolConts rol. by
to
reliabiare lity. Thesethem. The responsible reliabilityhandling the
retransmitting destination.
used tr ansport
On re assembl e d. On control and
to the each
by
are
real ity,
In
Control Loss
sequence the ensure end data mechanidoessdesi 1m, control
Flow
toThe sendi n
the
g recei v ensur
in g in
f o
g
r
which netwofork.linkfan not gned no
identtriansport
fy layer that the the Therefore,
numbers end,ensures is the li n k. layer. ensure transmi but
sto
sion lost
the layer al
imend,plementthat ed Therefore, packet Iterror the it provi d e Duplication
Control and
lost the onl y ensures end-to-end
itensuresthe Multiplexing
allow the that it
packet s has detectend-t is error-free wil
o-end damaged
guarant
packets; e es fragment
the s al ensures s
at arrived ithne troduced only 10be
the
ver?s the packets.
similarly, that recei retceihattvransport
ed transport thosereliability. percent
f ra gment s correct l y . transmi
node-t o-nodession.
no oftra nsmi s sio n the errors inside
it transport various from layer. layer that one error
aldupl
lowsicate of
a
the
ways:too n window
Multipiering responsible This wth
:ethcient 3. the
Addressing 5.
: " The 4. FiOW Flow
receiver
(TSAP).variable application
point correct
The According
known Many multiplexing
Dowaward
multiple
haveamong transmissionsUpward same transport increases too
Nowadays,
programis the The The Control
sendinga protocol as muchcontrol
IP transport transport protocols a network well for to
application as low network
several identify
protocol The UpperUpper|Upper StackLayer represents the multiplexing: layer network
flow
as data, is
is layer. to multiplexing:
or is it used :
processcalled transport layer Each layer application th e slowpaths bound
connection, uses
byte control.
controls then to and
operating
supports
system in Physical Network link Transport
Data Datacombine layered connections. congestion prevent BCA
a the StackLayer
protocols a on capacity. oriented th e
process.
to station provides
particular to f or the discard Vh
a network another
generatedlayer. model, improve the Upward
multiplexing
improve to the receiver
It
destination session, úses the
layer StackLayer has Downward same rather flow Semestor
When need machine.the Downward To and senderduplicate
the discards
layer is only TS In the the destination multiplexing make of
user these
presentation, than datasliding thus,
represented to user by transport throughput. from /Computer
a
process. host delivers Communication Peer know one address an multiplexing more frame reducing so segments.
of Incases, multiplexing window
that overwhelming the
multiuser transport application
sends and whichspecified a this delivery layer along
cost-effective,means oriented. the
packets
The a which case, and transmission receiver Network
datagram
a by This protocol the
transport
message upper-layerentity. interacts withe means th e system and
two addressing application typeallowsthe same multiple
station is onto asking the 2022-23/186 /
multiprocessing
environments,protocols:
an from specified one the of one path; does that receiver.
layer to Upper session the efficiency. performance.
H6 StackLayer
protocols known machine multiplexingtransport transport notmakes for
other a is layer transport transport
protocols source provided th is become the
host TCP Physical Data
linkTransport
Network StackLayerUpper as as layerfunctions
protocols is retransmissionIfthe
the
a a must layer layerachicved Muluplexing layer occurcan
means host are station
Transport means is overwhelmed. data 1he receiver
define and communicating. by be used layer
to StackLayerUpper the of connection to connections transmission transport
that th e transmitted
or th e into th e split through
upward is
some destination UDP. Servicetranisport
port. delivery session a
when
a
sends overloaded of
source single connection packete
connections The networks uses several use Sliding layer
executing more
access layer. to to layer.
proCess
host.
port the the layer the the is
itUDP when
does does ItUDP
16-byte
has
a :informatby
ttheriansport
on usedisDatagram
(ClieTELEET
posi tive a the
originating
pr o to col s proto
as
col
creating IDanfunctions protoco. and -51001 nt) protsareocol
transmis ion. prthoetocollayer i orsequencing
error
Total Source
addressport
header
UDP to when provides it
the level
integer
ports.
connection,servicesControsequenci
l ng has needed : Length bit16
s
Protocol. port-to-port
or protocol protdatrela oicolability address,
port used
16 which
occurred,
ocol. reordering for
meansProtto bits non-sequenced to to
the.IP delivera
number the is isfrom
applications.
TCP the
but end-to-end
Data
Destinataddrionpeoshown
ssrt known the that and 1PTCPUDP or and protocols
itservices,
Datlinak
connectes ion
generat offnct
it ions Checksùm bitl6
s upper securi
adds ty Physical
a as is packet
a
particular doesnot delandivery s below:
bit16
user layer.-level are transport
transport a TELNET
(Server)
of
16 and that from
23
estvitual
ablished speci
data fy does datagram. importfualenctntss ionality. bits. from work
circuit of IP source
on
segment.which traspecinsminfoytssiol. a addresses servics the
topofthe host
betweenbetween packethas than
to theto
seder bothne thedamaged checksum peed the
IP
been and destinatprotiondestination
ocols
and ends
receiver lost packet error ze.
st
of as
the
Features
that Ans.Q7(b).
with TCP
networkNetwork
" process A processes. Logical a ifferent
Multiplexing:
correct the theto acknowledgement
mechanism number in FlowKelabLIy: the ata toICP
Sream
can Segment thetime. ToFull logical the
Network all Conneçtion Establish
The Data
is ACK segments
segmentsDuplex; correct is goup of
comproise Sunnmhrize Control: destination.
FHandlingsecuriysearch HLEN4
bits is application retransmitted
in th e data TCP
exchanged wantsachËeve Cornections:
connection.
Full
Fprmat a< application. isthbytes
e the
Security connection also if TCP transfer: protocol
Reserved can TCP Multiplexing
differenton form When they
applications
bytes
issuesS. bits 6
these issues address.
Sourceport to it from TCP BCA
:
flow
send provides Each by refered ofcan arrive assigns to in
the al Checksum terminatèd. in receiving
bits16 both Duplex in TheusingThis the
receive the the itself the TCP :
issues Issues the bit16
s
confidentlallty, and RC
G
K
between and both connection highest
isa to
destination. out
receiving a form h
A thereceive combination
Full the
process sequencesegmentsprotocol Semestor
service, asa of
requires
challengesnetwork
and directions. the each logical process without TCPorder of
H P
Duplex sequence
number that
Acknowledgement number tw o
directions. window TCP
Challenges SY R the is ofaccepting is sends TheTCP. transfers the Computer /
TCPs. identified channels known overflowing or number segments
a padding
Options & Sequence
number computers.
of
Lntegrity, security data service, receiving to
IfACK data
multi-faceted
encompass N bits32 TCP sockets, mechanism. eliminate an
bits from TCP acknowledgement
as toand and theNetwork/
: should i.e., by known
ports.
demultiplexing. the as is
each data
and process is the sequence the At its TCP notforward then
issues a data internal
buffer. The the in
pair the receive received byte
approach wide a
availablilty Destination portconnection-oriented have data
address from can itduplicate uses passed the 2022-23
B. of receiving transmitted
to
form
and pointer
Urgent Window size Thesending flowsockets numbers, different the the
range back within it /
bits16 bits16
bits16
TCP sequence IP. to of
involving challenges. in segments.
following both used end, contiguous the 168
of of and problem.
without any to a
transmits
and applications the timeout IP
data and
threats recèiving the window by the number number layer
protocol. sender
various and stepsdirectionssending
occu: data expects
the interval, stream
for
resources and isand indicating of to
How buffers sizes, transmission
security Suppose and forwarded packet bytesreassemble a
vulnerabilties forwarding
at positive of
receiving then bytes
to the is is
sosame called to This sent the
within handle the to the
measures the that
a
Breaches:
Data 3. Unauthorized
Access:
, hem :and
5. 4.
MalViwarrueses:and and best
Threats:
Insider 6.
PhishingUnauthorized
encrySoUnptliuaoutnitohnosr:ized
Man-in-the-Middle
Attacks:7. DenialSolutions: Solutions:
to
SoluteiMaons:licious
Educat
10.
Interception:
Segmentation:
Network 9.
Data 8.
Solutions: Solutions:
Unauthorized Intercepting
(PKI)
Malicious
Solutions:
foster Solutions: phishing
Overwhelming
delivery
of
Deceptive limit
:
practices.
Failure Lack
Solutions:
prevention
syst emstransmitting
Inadeguate and data userssoftware Implement
Solutions:
systedevims,canesd of Here
culture actionsnetworks measures.
to
a Service Conduct tacticsexposure, Encrypt Deploy to users
secure Apply Implement Social access about
and and preventi gaining s
to
Patch Use and a
regularly Segment
Establish networksensitive Useaccess of network (DoS) trick
to
sensitive to safe strong a
communications
encryption altering security the or(CDNs)
encryption Verify
Engineering: sensitive
secårity and updatviruses
e horized
Management : unintentional
principle traffic
Attacks: users browsing unaut access
updateasegmentation
robust
networks data data to
for communication
over during (e.g., awareness distribute
to requests
or
service awareness into
filtering,
regularlydata, antivirus
that authetication
and of data, to
patchpatch based unsecured data HTTPS, least
mistakes to revealing
for implement
audit habits can access.
d
sensitive
allowing
on transmission.
in
disrupt
rate sensitive
training
leading software,infect 1
management sofware function, transit privilege, traffic and and methods
between
lateralchannels
(SSL/TLS,
VPNs), bylimiting,
its confidential monitor data to emai l Regularty data
systems,
firewall,
and employees
monitor information fo r
los
data (e.g, or
two availability. practices I
systems.implement digital
process movement and users, update network
parties. data leaks
prevention andsteal muiti-factor
VPNS), signatures, user or intrusion information.
to internal through use access orlintrusiondata, and
regularly firewalls, for Secure activity, email theft. resources.
attackers. prevention multiple (DLP) or patch
authentication),
and users. filtering., disrupt systems
detectionfprevention
update and enforce
Wi-Fi public tools,
use
systems. channels and operations. to
software, intrusion networks, key
access
segment fix
implerment vulnerabilities access
and
infrastructure controls, Use
operating dete&tion/ content networks systems. controls,
avoid and anti
from non-encrypted
IMAP : internet. SMTP Ans. Ans. Ans. Ans. Ans. Q8.emerging of
Internet Port 2525: This Port By
Port 'Simple 13. Security:
Cloud12. 11.
Tunneling
protocols v) (iv) (ii)
E-mail(Bridges protocol
X.(ü)2CSMA Addressing
(0) technological
5 Write
a default,
25 Standard
(v) (v) (ii) (ii) () Compliance
controls
Solutions:
Metingimplement
controls. Mobile
access Security ninerabilities
Solutions: to in
Solutions:
Security
local G56: isolate
Message is E-mail Bridges X.25 CSMA
client. ThiSMTP.
s with the the Mail Tunneling briefly
threats
and
emails default TransferProtocols : these to
industry-specific risks loT
IMAPAcçess is port isSMTP Protocol :
Protocol solutions,
and
network
ensure
informed
about
Stay Select
and associated Implement
devices loT
the : about best
port openedSMTP protocol compliance.Regulatory reputable Security:
and
Protocol : user
practices security BCA
used Protocol for : any device
POP3 non-encrypted [Please [Please [Please (Please education, regulations with Vh
if onworks Sending four
devices
mobileand
Challenges: cloud cloud management
are isa all toissues relevant Semester
we site (SMTP)'
the mail want on Emails Refer Refer Refer Refer continually
of
two
protocol ground three the policies, requires and providers,services datanda
Computer /
to port. regulations,
most send port. is
the :
Q15 09 Q18 Uni-IIQ16 following: compliance policies,
sender enhance and a
comprehensive us e Internetof
commonly used message standard Unit-V Unit-IV Unit-IV regular Network
in perform encryption update
for case our standards. stored
accessing using protocol Page-99) Page-72I Page-83/Page-62/ monitoring.
network' s Things
(10T)
used port firmware, /2022-23/
SMTP approach regular for the
in
internet 25
email is for security It's audits,and datacloud.
and
securely. filtered sending essential that at
devices. 170
protocol on use
restand
remote
a and posture. includes network
emails to implement
for we stay a transit,and in segmentation
retrieving web want across combination
updated
senoel to security
send the on