Mod 1
Mod 1
Mod 1
S7 ECE
SYLLABUS
PART A
Access network—the network that physically connects an end system to the first router (also
known as the “edge router”) on a path from the end system to any other distant end system.
Residential access: point to point access
Dialup via modem
- up to 56Kbps direct access to router (often less)
- Can’t surf and phone at same time: can’t be “always on”
DSL: digital subscriber line
- deployment: telephone company (typically)
- up to 1 Mbps upstream (today typically < 256 kbps)
- up to 8 Mbps downstream (today typically < 1 Mbps)
- dedicated physical line to telephone central office
Home networks
Coaxial cable
- baseband:
- single channel on cable
- legacy Ethernet
- broadband:
- multiple channels on cable
- HFC
8. Explain SMTP
SMTP is the principal application-layer protocol for Internet electronic mail. It uses the reliable
data transfer service of TCP to transfer mail from the sender’s mail server to the recipient’s
mail server. As with most application-layer protocols, SMTP has two sides: a client side, which
executes on the sender’s mail server, and a server side, which executes on the recipient’s mail
server. Both the client and server sides of SMTP run on every mail server. When a mail server
sends mail to other mail servers, it acts as an SMTP client. When a mail server receives mail
from other mail servers, it acts as an SMTP server.
SMTP uses persistent connections
SMTP requires message (header & body) to be in 7-bit ASCII
SMTP server uses CRLF.CRLF to determine end of message
9. Explain POP3
POP3 is an extremely simple mail access protocol.
It is defined in [RFC 1939], which is short and quite readable.
Because the protocol is so simple, its functionality is rather limited.
POP3 begins when the user agent (the client) opens a TCP connection to the mail server
(the server) on port 110.
With the TCP connection established, POP3 progresses through three phases:
authorization, transaction, and update.
During the first phase, authorization, the user agent sends a username and a password
(in the clear) to authenticate the user.
During the second phase, transaction, the user agent retrieves messages; also during this
phase, the user agent can mark messages for deletion, remove deletion marks, and
obtain mail statistics.
The third phase, update, occurs after the client has issued the quit command, ending the
POP3 session; at this time, the mail server deletes the messages that were marked for
deletion
Root DNS
PART B
1. Explain circuit switched network
The end systems, such as computers or telephones, are directly connected to a switch
When end system A needs to communicate with end system M, system A needs to request
a connection to M that must be accepted by all switches as well as by M itself. This is called
the setup phase; a circuit (channel) is reserved on each link, and the combination of circuits
or channels defines the dedicated path. After the dedicated path made of connected circuits
(channels) is established, data transfer can take place. After all data have been transferred,
the circuits are torn down.
o Circuit switching takes place at the physical layer.
o Before starting communication, the stations must make a reservation for the
resources to be used during the communication. These resources, such as channels
(bandwidth in FDM and time slots in TDM), switch buffers, switch processing
time, and switch input/output ports, must remain dedicated during the entire
duration of data transfer until the teardown phase.
3. Teardown Phase
When one of the parties needs to disconnect, a signal is sent to each switch to
release theresources.
Efficiency
circuit-switched networks are not as efficient as the other two types of networks because
resources are allocated during the entire duration of the connection.
These resources are unavailable to other connections.
Delay
Although a circuit-switched network normally has low efficiency, the delay in this type
of networkis minimal.
During data transfer the data are not delayed at each switch; the resources are allocated
for theduration of the connection.
The total delay is due to the time needed to create the connection, transfer data, and
disconnectthe circuit
The delay caused by the setup is the sum of four parts: the propagation time of the source
computer request (slope of the first gray box), the request signal transfer time (height of the
first gray box), the propagation time of the acknowledgment from the destination computer
(slope of the second gray box), and the signal transfer time of the acknowledgement (height
of the second gray box).
The delay due to data transfer is the sum of two parts: the propagation time (slope of the
colored box) and data transfer time(height of the colored box),
The third box shows the time needed to tear down the circuit.
o Figure shows how the datagram approach is used to deliver four packets from on
A to station X.
o The switches in a datagram network are traditionally referred to as routers.
o In this example, all four packets (or datagrams) belong to the same message, but
may travel different paths to reach their destination. This is so because the links
may be involved in carrying packets from other sources and do not have the
necessary bandwidth available to carry all the packets from A to X. This approach
can cause the datagrams of a transmission to arrive at their destination out of order
with different delays between the packets. Packets may also be lost or dropped
because of a lack of resources.
o The datagram networks are referred to as connectionless networks. The
connectionless means that the switch (packet switch) does not keep information
about the connection state.
o Routing tables
o In this type of network each switch has a routing table which is based on the
destination address. The routing tables are are updated periodically. The destination
addresses and the corresponding forwarding output ports are recorded in the tables.
o Destination Address
o Addressing
o In a virtual-circuit network, two types of addressing are involved: global and
local(virtual- circuit identifier).
Global Addressing : A source or a destination needs to have a global
address anaddress that can in the scope of the network
Virtual-Circuit Identifier :The identifier that is actually used for data
transfer is called the virtual -circuit identifier (VCI).
A VCI, unlike a global address, is a small number that has only switch scope;
It is used by a frame between two switches. When a frame arrives at a
The packet is traveling through two switches (routers). There are three
transmission times (3T), three propagation times (3t), data transfer depicted
by sloping lines, a setup delay (which includes transmission and
propagation in two directions and a teardown delay (which includes
transmission and propagation in one direction). We ignore the processing
time in each switch.
The total delay time is
Total delay = 3T + 3t + setup delay + teardown delay
A packet can be transmitted on a link only if there is no other packet currently being transmitted on the
link and if there are no other packets preceding it in the queue; if the link is currently busy or if there are
other packets already queued for the link, the newly arriving packet will then join the queue.
Processing Delay
The time required to examine the packet’s header and determine where to direct the packet is part of the
processing delay. The processing delay can also include other factors, such as the time needed to check
for bit-level errors in the packet that occurred in transmitting the packet’s bits from the upstream node
to router A. Processing delays A B Nodal processing Queueing (waiting for transmission) Transmission
Propagation.The nodal delay at router A in high-speed routers are typically on the order of microseconds
or less. After this nodal processing, the router directs the packet to the queue that precedes the link to
router B. (In Chapter 4 we’ll study the details of how a router operates.)
Queuing Delay
At the queue, the packet experiences a queuing delay as it waits to be transmitted onto the link. The
length of the queuing delay of a specific packet will depend on the number of earlier-arriving packets
that are queued and waiting for transmission onto the link. If the queue is empty and no other packet is
currently being transmitted, then our packet’s queuing delay will be zero. On the other hand, if the traffic
is heavy and many other packets are also waiting to be transmitted, the queuing delay will be long. We
will see shortly that the number of packets that an arriving packet might expect to find is a function of
the intensity and nature of the traffic arriving at the queue. Queuing delays can be on the order of
microseconds to milliseconds in practice.
Transmission Delay
Assuming that packets are transmitted in a first-come-first-served manner, as is common in packet-
switched networks, our packet can be transmitted only after all the packets that have arrived before it
have been transmitted. Denote the length of the packet by L bits, and denote the transmission rate of the
link from router A to router B by R bits/sec. For example, for a 10 Mbps Ethernet link, the rate is R = 10
Mbps; for a 100 Mbps Ethernet link, the rate is R = 100 Mbps. The transmission delay is L/R. This is
the amount of time required to push (that is, transmit) all of the packet’s bits into the link. Transmission
delays are typically on the order of microseconds to milliseconds in practice.
Propagation Delay
Once a bit is pushed into the link, it needs to propagate to router B. The time required to propagate from
the beginning of the link to router B is the propagation delay. The bit propagates at the propagation speed
of the link. The propagation speed depends on the physical medium of the link (that is, fiber optics,
twisted-pair copper wire, and so on) and is in the range of 2 108 meters/sec to 3 108 meters/sec which is
equal to, or a little less than, the speed of light. The propagation delay is the distance between two routers
divided by the propagation speed. That is, the propagation delay is d/s, where d is the distance between
router A and router B and s is the propagation speed of the link. Once the last bit of the packet propagates
to node B, it and all the preceding bits of the packet are stored in router B. The whole process then
continues with router B now performing the forwarding. In wide-area networks, propagation delays are
on the order of milliseconds
DEPT OF ECE ECT423 CN
KTU 2019 SCHEME VERSION 1.0
5. Explain IP stack
Application Layer
The application layer is where network applications and their application-layer protocols reside. The
Internet’s application layer includes many protocols, such as the HTTP protocol (which provides for
Web document request and transfer), SMTP (which provides for the transfer of e-mail messages), and
FTP (which provides for the transfer of files between two end systems). We’ll see that certain network
functions, such as the translation of human-friendly names for Internet end systems like www.ietf.org
to a 32-bit network address, are also done with the help of a specific application-layer protocol,
namely, the domain name system (DNS). It is very easy to create and deploy our own new application-
layer protocols. An application-layer protocol is distributed over multiple end systems, with the
application in one end system using the protocol to exchange packets of information with the
application in another end system. We’ll refer to this packet of information at the application layer as a
message
Transport Layer
The Internet’s transport layer transports application-layer messages between application endpoints. In
the Internet there are two transport protocols, TCP and UDP, either of which can transport application-
layer messages. TCP provides a connection-oriented service to its applications. This service includes
guaranteed delivery of application-layer messages to the destination and flow control (that is,
sender/receiver speed matching). TCP also breaks long messages into shorter segments and provides a
congestion-control mechanism, so that a source throttles its transmission rate when the network is
DEPT OF ECE ECT423 CN
KTU 2019 SCHEME VERSION 1.0
congested. The UDP protocol provides a connectionless service to its applications. This is a no-frills
service that provides no reliability, no flow control, and no congestion control
Network Layer
The Internet’s network layer is responsible for moving network-layer packets known as datagrams
from one host to another. The Internet transport-layer protocol (TCP or UDP) in a source host passes a
transport-layer segment and a destination address to the network layer, just as you would give the
postal service a letter with a destination address. The network layer then provides the service of
delivering the segment to the transport layer in the destination host. The Internet’s network layer
includes the celebrated IP Protocol, which defines the fields in the datagram as well as how the end
systems and routers act on these fields. There is only one IP protocol, and all Internet components that
have a network layer must run the IP protocol. The Internet’s network layer also contains routing
protocols that determine the routes that datagrams take between sources and destinations. The Internet
has many routing protocols. As we saw in Section 1.3, the Internet is a network of networks, and
within a network, the network administrator can run any routing protocol desired. Although the
network layer contains both the IP protocol and numerous routing protocols, it is often simply referred
to as the IP layer, reflecting the fact that IP is the glue that binds the Internet together.
Link Layer
The Internet’s network layer routes a datagram through a series of routers between the source and
destination. To move a packet from one node (host or router) to the next node in the route, the network
layer relies on the services of the link layer. In particular, at each node, the network layer passes the
datagram down to the link layer, which delivers the datagram to the next node along the route. At this
next node, the link layer passes the datagram up to the network layer. The services provided by the link
layer depend on the specific link-layer protocol that is employed over the link. For example, some link-
layer protocols provide reliable delivery, from transmitting node, over one link, to receiving node.
Note that this reliable delivery service is different from the reliable delivery service of TCP, which
provides reliable delivery from one end system to another. Examples of linklayer protocols include
Ethernet, WiFi, and the cable access network’s DOCSIS protocol. As datagrams typically need to
traverse several links to travel from source to destination, a datagram may be handled by different link-
layer protocols at different links along its route. For example, a datagram may be handled by Ethernet
on one link and by PPP on the next link. The network layer will receive a different service from each
of the different link-layer protocols.
DEPT OF ECE ECT423 CN
KTU 2019 SCHEME VERSION 1.0
Physical Layer
While the job of the link layer is to move entire frames from one network element to an adjacent
network element, the job of the physical layer is to move the individual bits within the frame from one
node to the next. The protocols in this layer are again link dependent and further depend on the actual
transmission medium of the link (for example, twisted-pair copper wire, single-mode fiber optics). For
example, Ethernet has many physical-layer protocols: one for twisted-pair copper wire, another for
coaxial cable, another for fiber, and so on. In each case, a bit is moved across the link in a different
way
6. Explain HTTP
server program, executing on different end systems, talk to each other by exchanging HTTP messages.
HTTP defines the structure of these messages and how the client and server exchange the messages
HTTP defines how Web clients request Web pages from Web servers and how servers transfer Web
pages to clients. When a user requests a Web page (for example, clicks on a hyperlink), the browser
sends HTTP request messages for the objects in the page to the server. The server receives the requests
and responds with HTTP response messages that contain the objects. HTTP uses TCP as its underlying
transport protocol (rather than running on top of UDP). The HTTP client first initiates a TCP
connection with the server. Once the connection is established, the browser and the server processes
access TCP through their socket interfaces. On the client side the socket interface is the door between
the client process and the TCP connection; on the server side it is the door between the server process
and the TCP connection. The client sends HTTP request messages into its socket interface and receives
HTTP response messages from its socket interface. Similarly, the HTTP server receives request
messages from its socket interface and sends response messages into its socket interface. Once the
client sends a message into its socket interface, the message is out of the client’s hands and is “in the
hands” of TCP. TCP provides a reliable data transfer service to HTTP. This implies that each HTTP
request message sent by a client process eventually arrives intact at the server; similarly, each HTTP
response message sent by the server process eventually arrives intact at the client. Here we see one of
the great advantages of a layered architecture—HTTP need not worry about lost data or the details of
how TCP recovers from loss or reordering of data within the network. That is the job of TCP and the
protocols in the lower layers of the protocol stack.
It is important to note that the server sends requested files to clients without storing any state
information about the client. If a particular client asks for the same object twice in a period of a few
seconds, the server does not respond by saying that it just served the object to the client; instead, the
server resends the object, as it has completely forgotten what it did earlier. Because an HTTP server
maintains no information about the clients, HTTP is said to be a stateless protocol. A Web server is
always on, with a fixed IP address, and it services requests from potentially millions of different
browsers.