M5 Questions and Answers
M5 Questions and Answers
M5 Questions and Answers
1. Source Port: Source Port is a 2 Byte long field used to identify the port number of
the source.
2. Destination Port: It is a 2 Byte long field, used to identify the port of the destined
packet.
3. Length: It is the length of UDP including the header and the data. It is a 16-bits
field.
4. Checksum: Checksum is 2 Bytes long field. It is to verify that the end to end data is not
been corrupted by routers or bridges in the network.the algorithm to compute this is
known as the standard checksum algorithm.
2. What is TCP? Draw and explain TCP segment format. Explain TCP connection
establishment process
3.Multiplexing
● To allow for many processes within a single host to use TCP communication facilities
simultaneously, the TCP provides a set of addresses or ports within each host.
● Whenever an entity accepts items from more than one source, this is
referred to as multiplexing (many to one). • whenever an entity delivers items to more
● Sequence Number –
A 32-bit field that holds the sequence number.. It is used to reassemble the message at the
receiving end of the segments that are received out of order.
● Acknowledgement Number –
A 32-bit field that holds the acknowledgement number, the byte number that the receiver
expects to receive next. It is an acknowledgement for the previous bytes being received
successfully.
● Control flags –
These are 6 1-bit control bits that control connection establishment, connection termination,
connection abortion, flow control, mode of transfer etc. Their function is:
● Window size –
This field tells the window size of the sending TCP in bytes.
● Checksum –
This field holds the checksum for error control. It is mandatory in TCP as opposed to UDP.
● Urgent pointer –
This field (valid only if the URG control flag is set) is used to point to data that is urgently
required that needs to reach the receiving process at the earliest. The value of this field is
added to the sequence number to get the byte number of the last urgent byte.
3.What is DNS? Explain resource record and name server. Illustrate DNS working.
An application layer protocol defines how the application processes running on different
systems, pass the messages to each other:
● DNS is a directory service that provides a mapping between the name of a host on the network
and its numerical address.
● Each node in a tree has a domain name, and a full domain name is a sequence of symbols
specified by dots.
● This allows the users of networks to utilize user-friendly names when looking for other hosts
instead of remembering the IP addresses.
● The domain name space is divided into three different sections: generic domains, country
domains, and inverse domain.
—DNS is a directory lookup service that provides a mapping between the name of a host on the
Internet and its numerical address.
Name Servers
● Name servers are the repositories of information that make up the domain database. The
database is divided up into sections called zones, which are distributed among the name servers.
● Name servers can answer queries in a simple manner.
● The response can always be generated using only local data, and either contains the
answer to the question or a referral to other name servers "closer" to the desired
information.
● The simplest mode for the server is non-recursive, since it can answer queries using
only local information.
● The simplest mode for the client is recursive, since in this mode the name server acts in
the role of a resolver and returns either an error or the answer, but never referrals.
In iterative mode, on the other hand, if the server does not have the information
requested locally then it return the address of some name server who might have
the information about the query. .
Resource Records: Each domain name is associated with a record called the resource
record. The server database consists of resource records.
The resource records are used in the answer, authoritative and additional information
section of the response message. These are 4-tuples: (Name, Value, Type, TTL)
DNS WORKING:
4.Explain SNMP basic components and their functions. Describe the basic commands
used in SNMP
The Simple Network Management Protocol (SNMP) is a framework for managing devices in
an internet using the TCP/IP protocol suite.
SNMP agent –
It is a software management software module installed on a managed device.
Managed devices can be network devices like PC, routers, switches, servers,
etc.Defines the general rules for naming objects, defining object types
(includingrange and length), and showing how to encode objects and
values.
MIB creates a collection of named objects, their types, and their relationships to
each otherin an entity to be managed.
5.What is FTP? Explain its working in detail with the comments involved.
• File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying a file from
one host to another.
• Although transferring files from one system to another seems simple and straightforward, some
problems must be dealt with first.
• For example, two systems may use different file name conventions.
• Two systems may have different ways to represent text and data.
• All of these problems have been solved by FTP in a very simple and elegant approach.
WORKING OF FTP:
● The FTP connection is established between two systems and they communicate
with each other using a network.
● So, for the connection, the user can get permission by providing the credentials
to the FTP server or can use anonymous FTP.
● When an FTP connection is established, there are two types of communication
channels are also established and they are known as command channel and
data channel.
● The command channel is used to transfer the commands and responses from
client to server and server to client.
● As soon as the server and the client get connected to the network, the user
logins using User ID and password.
● The server verifies the user login and allows the client to access the files.
Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format
of email to support:
4.Header information in non-ASCII character sets Virtually all human-written Internet email and
a fairly large proportion of automated email is transmitted via SMTP in MIME format.
FEATURES OF MIME
1. SMTP
2. MIME
● SMTP defines 14 commands. The first five are mandatory; every implementation must
support these five commands.
● The next three are often used and highly recommended. The last six are seldom used.
● Responses are sent from the server to the client. A response is a three digit code that may
be followed by additional textual information.
Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format
of email to support:
4.Header information in non-ASCII character sets Virtually all human-written Internet email and
a fairly large proportion of automated email is transmitted via SMTP in MIME format.