Your favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

Similar documents
Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

User Datagram Protocol

Data Link Control Protocols

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

STEVEN R. BAGLEY PACKETS

Part3. Local Area Networks (LAN)

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

1. Data Link Layer Protocols

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Internetwork Basic. Possible causes of LAN traffic congestion are

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CS 4453 Computer Networks Winter

23-3 TCP. Topics discussed in this section: TCP Services TCP Features Segment A TCP Connection Flow Control Error Control 23.22

Introduction to Protocols

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

ES623 Networked Embedded Systems

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Introduction to TCP/IP networking

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Introduction to Open System Interconnection Reference Model

The Transport Layer: TCP & Reliable Data Transfer

LAN PROTOCOLS. Beulah A AP/CSE

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Applied Networks & Security

CSE 123: Computer Networks

CPE 548 Exam #1 (50 pts) February 17, 2016

University of Southern California EE450: Introduction to Computer Networks

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Data Link Layer, Part 5. Medium Access Control

Summary of MAC protocols

1999, Scott F. Midkiff

The Link Layer II: Ethernet

UNIT IV -- TRANSPORT LAYER

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Chapter 5 Data-Link Layer: Wired Networks

QUESTION BANK EVEN SEMESTER

Data Communication Networks Final

Networking interview questions

Lecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

DATA LINK LAYER UNIT 7.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Unit 2.

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

NWEN 243. Networked Applications. Layer 4 TCP and UDP

===================================================================== Exercises =====================================================================

Section 1. General Networking Theory

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad

Chapter 09 Network Protocols

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Medium Access Control Sublayer

Direct Link Networks (II)

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

The Transport Layer. Part 1

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Table of Contents. Cisco Introduction to EIGRP

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay

Chapter 11 Data Link Control 11.1

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Reliable Transport I: Concepts and TCP Protocol

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

User Datagram Protocol (UDP):

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

Different Layers Lecture 20

ECE4110 Internetwork Programming. Introduction and Overview

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

TCP/IP Performance ITL

Lecture 11: Networks & Networking

Simulation of TCP Layer

QUIZ: Longest Matching Prefix

ECE4110, Internetwork Programming, QUIZ 2 - PRACTICE Spring 2006

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

THE TRANSPORT LAYER UNIT IV

ET4254 Communications and Networking 1

CS244a: An Introduction to Computer Networks

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

The MAC Address Format

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Layer 2 functionality bridging and switching

Chapter 4. The Medium Access Control Sublayer

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Transcription:

VISIT: Course Code : MCS-042 Course Title : Data Communication and Computer Network Assignment Number : MCA (4)/042/Assign/2014-15 Maximum Marks : 100 Weightage : 25% Last Dates for Submission : 15 th October, 2014 (For July 2014 Session) 15 th April, 2015 (For January 2015 Session) This assignment has nine questions. Answer all questions. Rest 20 marks are for viva voce. You may use illustration and diagrams to enhance the explanations. Please go through the guidelines regarding assignments given in the Programme Guide for the format of presentation. Q.1. Derive expressions for throughput in Aloha and slotted Aloha protocols. Show the vulnerability period of Aloha and also load vs. through graph for Aloha and slotted Aloha. (10 marks)

VISIT:

VISIT: Q.2. Explain functioning of the following protocols with the help of a diagram. 3 bit sequence numbers are used. Go back N

VISIT: Selective Repeat How these two protocols are different from stop and wait protocols? (10 marks) 1. Go Back N In this method, many frames can be transmitted during the process without waiting for acknowledgement. In this, we can send n frames without making the sender wait for acknowledgements. At the same time, the sender will maintain a copy of each sent frame till acknowledgement reaches it safely. As seen earlier in the Stop & Wait ARQ where, we used number mechanism, here also, we will use number method for transmission and receipt of frames. Each frame will have a sequence number that will be added with the frame. If, the frame can have k bit sequence number then the numbers will range between 0 to 2 k-1. For example if k is 2 bit then numbers will be 0,1,2,3,0,1,2,3,0,. The sender can send 4 frames continuously without waiting for acknowledgment. But, the receiver will look forward to only one frame that must be in order. If, the frame received is not in order, it will simply keep on discarding the frame till, it receives the desired sequence number frame. The receiver is not bound to send an individual acknowledgment for all frames received; it can send a cumulative acknowledgment also. The receiver will send a positive acknowledgement if, the received frame is the desired sequence number frame. Otherwise, it will keep on waiting if, the frame received is corrupted or out of order. As soon as the timer expires for the frame sent by the sender, the sender will GoBack and retransmit all frames including the frame for which the timer expired, till, the last sent frame. Hence, it is named as Go-Back-N ARQ. The process of retransmission for an error frame is shown in Figure.6.Go-Back- N is used in HDLC protocol.

VISIT: Selective Repeat ARQ This method increases the efficiency of the use of bandwidth. In this method, the receiver has a window with the buffer that can hold multiple frames sent by the sender. The sender will retransmit only that frame which has some error and not all the frames as in Go-Back-N ARQ. Hence, it is named as selective repeat ARQ. Here, the size of the sender and the receiver window will be same. The receiver will not look forward only to one frame as in Go-Back-N ARQ but it will look forward to a continuous range of frames. The receiver also sends NAK for the frame which had the error and required to be retransmitted by the sender before the time out event fires. As in the earlier section we discussed, each frame will have a sequence number that will be added with the frame. If, the frame can have k bit sequence number then the sequence number of frames will range between 0 to 2 k-1. For example, if k is 2 bit then numbers will be 0,1,2,3,0,1,2,3,0,.Size of sender and receiver window would be 2 k/2 i.e 4/2=2 or it can be written as 2 k-1. If the window size is 2 and acknowledgement for frame0 and frame1 both gets lost during transmission then, after timer expires the sender will retransmit frame0 though the receiver is expecting frame2 after frame1 was received without any error. Hence, frame0 will be discarded by the receiver as a duplicate frame. If the receiver window size is more than two, the receiver will accept duplicate frame0 as a new frame and hence, the size of window should be 2 k/2. The process is shown in figure 7:

VISIT: The problem with stop and wait is that only one frame can be transmitted at a time and this leads to inefficiency of transmission. To deal with this, we have another error and flow control method i.e. Go Back N and Selective Repeat ARQ. Q.3. A bit stream 101010101101 transmitted using standard CRC method. The generator polynomial is x 4 +1. Show the actual bit string transmitted. Suppose the fourth bit from the left is inverted during transmission. Show that this error is detected at the receiver s end. -----------------------send me if you have solved------------------------ Q.4. Sketch the Manchester and differentiate Manchester encodings for the bit stream: 100111010101 (10 marks) (5 marks)

VISIT: Q.5. Explain the Ethernet frame format. Why there is a requirement of maximum and minimum Ethernet frame length? (10 marks) Ans: Ethernet protocol is a MAC sublayer protocol. Ethernet stands for cable and IEEE 802.3 Ethernet protocol was designed to operate at 10 Mbps. Here, we will begin discussing the Ethernet with various types of cabling. With the help of Figure 9, we will try to summarise the cabling used for baseband 802.3 LANs.

VISIT: IEEE 802.3 Ethernet accesses the channel using 1-persistent CSMA/CD method in LAN. Now we will discuss MAC frame structure for IEEE 802.3 with the help of Figure 10. Each frame has seven fields explained as follows: Preamble: The first field of 802.3 frame is 7 byte (56 bits) long with a sequence of alternate 1 and 0 i.e., 10101010. This pattern helps the receiver to synchronise and get the beginning of the frame. Starting Delimiter (SD): The second field start delimiter is 1 byte (8 bit) long. It has pattern 10101011. Again, it is to indicate the beginning of the frame and ensure that the next field will be a destination address. Address, here, can be a single address or a group address. Destination Address (DA): This field is 6 byte (48 bit) long. It contains the physical address of the receiver. Source Address (SA): This filed is also 6 byte (48 bit) long. It contains the physical address of the sender. Length of Data Field: It is 2 byte (16 bit) long. It indicates the number of bytes in the information field. The longest allowable value can be 1518 bytes. Data: This field size will be a minimum of 46 bytes long and a maximum of 1500 bytes as will be explained later.

VISIT: Pad: This field size can be 0 to 46 bytes long. This is required if, the data size is less than 46 bytes as a 802.3 frame must be at least 64 bytes long. Frame Checksum (FCS): This field is 4 bytes (32 bit) long. It contains information about error detection. Here it is CRC-32. Minimum and Maximum Length of Frame Minimum frame length = 64 bytes = 512 bits Maximum frame length= 1518 bytes = 12144 bits Minimum length or lower limit for frame length is defined for normal operation of CSMA/CD. This is required so that, the entire frame is not transmitted completely before its first bit has been received by the receiver. If, this happens then the probability of the occurrence of collision will be high (the same has been explained earlier in the previous section CSMA/CD). Hence, Ethernet frame must be of 64 bytes long. Some of the bytes are header and trailer parts of the frame. If, we consider 6 bytes destination address, 6 bytes source address, 2 bytes length and 4 bytes FCS (6+6+2+4=18) then, the minimum length of data will be 64-18= 46 bytes. If, frame is less than 46 bytes then, padding bits fill up this difference. As per 802.3 standard, the frames maximum length or upper limit of frame is = 1518 bytes (excluding preamble and SD). If we subtract 18 bytes of header and trailer then, the maximum length will be 1500 bytes. Qns 6: How is OSPF implemented in IP network? Illustrate. Ans: OSPF: The Interior Gateway Routing Protocol Open Shortest Path First (OSPF) has become standard interior gateway routing protocol. It supports many advanced features to meet a long list of requirements. The protocol specification should be publicly available. O in OSPF stands for open. It means that OSPF is not a proprietary protocol. It is a dynamic algorithm one that adapts to changes in the topology automatically and quickly. Load distribution: When multiple paths to a destination have the same cost OSPF allows multiple paths to be used. Support for hierarchy within a single routing domain. By 1988, the internet had grown so large that no router was expected to know the entire topology. OSPF was designed so that no router would have to do so. Security: All exchanges between OSPF routers are authenticated and allows only trusted routers to participate. OSPF supports three kinds of connections and networks: (i) Point-to-point lines between two routers only. (ii) Multi-access networks with broadcasting (e.g., LANs).

VISIT: (iii) Multi-access networks without broadcasting (e.g., Packet Switched WANs). OSPF identifies four types of routers: (i) Internal routers (within one area). (ii) (ii) Area border routers (connects two or more areas). (iii) (iii) Backbone routers (performs routing within the backbone). (iv) (iv) AS boundary routers (exchanges routing information with routers in other ASes). (v) OSPF allows a longer AS to be divided into smaller areas. Topology and details of one area is not visible to others. Every AS has a backbone area (called Area 0) as shown in Figure3. All areas are connected to the backbone possibly by a tunnel, so it is possible to move from one area toanother area through a backbone. The primary role of the backbone area is to route traffic between the

VISIT: other areas in the AS. Inter area routing within the AS requires the follows movement of packets as shown below by arrows. After having described all the components of OSPF, let us now conclude the topic by describing its operation. Q.7. Consider the following network with the indicated link cost. Use Dijkstra s and Bellman s shortest path algorithm to find the shortest path from source node A to all other nodes. (15 marks) ------------------send me if you have solved------------------ Q.8. What are the benefits of using digital certificate? (5 marks)

VISIT: A Digital Certificate is an electronic card, or the digital equivalent of an identification card, that certifies online transactions, e-commerce and other authentications on the Internet. A third-party Certificate Authority (CA) issues a public key on high-volume e-commerce sites, in emails send by financial services, banks and other online privacy-based businesses. These certificates are meant to authenticate the legitimacy of the communications, interactions and possible transactions between the sender and the receiver. These certificates also authenticate casual surfing of portals, sites and forums. 1. Minimal involvement needed from end users 2. No additional hardware needed 3. Easy to manage 4. Certificates are natively supported by many enterprise applications and networks Q.9. How does TCP 3-way handshake mechanism handle the following: (i) Delayed arrived and SYN packets (ii) Delayed ACK Packet The Transmission Control Protocol (TCP) level of the TCP/IP transport protocol is connection-oriented. That means that, before any data can be transmitted, a reliable communication channel must be created. To establish a connection, TCP uses a 3- way handshake. Before a client attempts to connect with a server, the server must first bind to a port to open it up for connections: this is called a passive open. Once the passive open is established, a client may initiate an active open. To establish a connection, the 3-step handshake occurs (Explanation of the Three-Way Handshake via TCP-IP)

VISIT: 1. The active open is performed by sending a SYN packet to the server. In this packet Synchronize sequence number flag set to 1. This make it the request to the server to synchronize the sequence numbers. It specifies its initial sequence number (ISN), which is incremented by 1, For example 8221821+1=8221822, and that is sent to the server. 2. In response, the server replies with a SYN-ACK packet in which both Acknowledgement field and Synchronize sequence number field set to 1. the server is acknowledging the request of the client for synchronization. At the same time, the server is also sending its request to the client for synchronization of its sequence numbers. There is one major difference in this segment. The server transmits an acknowledgement number (8221823) to the client. The acknowledgement is just proof to the client that the ACK is specific to the SYN the client initiated. The process of acknowledging the client's request allows the server to increment the client's sequence number by one and uses it as its acknowledgement number. 3. Finally the client sends a packet with ACK bit (Acknowledgement field) set back to the server. In this packet, the client is acknowledging the request from the server for synchronization. The client uses the same algorithm the server implemented in providing an acknowledgement number. The client's acknowledgment of the server's request for synchronization completes the process of establishing a reliable connection, thus the three-way handshake. Please note that for each connection there is a send sequence number and a receive sequence number. The initial send sequence number (ISN or ISS) is chosen by the data sending TCP, and the initial receive sequence number (IRS) is learned during TCP handshake.