ACN Merged
ACN Merged
ACN Merged
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 2 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 3 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 4 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
1. When the site receives a data chunk, it stores it at the end of the
buffer (queue) and subtracts the size of the chunk from winSize. The
TSN number of the chunk is stored in the cumTSN variable.
2. When the process reads a chunk, it removes it from the queue and
adds the size of the removed chunk to winSize (recycling).
3. When the receiver decides to send a SACK, it checks the value of
lastAck; if it is less than cumTSN, it sends a SACK with a cumulative
TSN number equal to the cumTSN. It also includes the value of
winSize as the advertised window size.
Sender Site:
The sender has one buffer (queue) and three variables: curTSN, rwnd,
and inTransit, as shown in the following figure. We assume each chunk
is 100 bytes long.
The buffer holds the chunks produced by the process that either have
been sent or are ready to be sent. The first variable, curTSN, refers to
the next chunk to be sent. All chunks in the queue with a TSN less than
this value have been sent, but not acknowledged; they are outstanding.
The second variable, rwnd, holds the last value advertised by the
receiver (in bytes). The third variable, inTransit, holds the number of
bytes in transit, bytes sent but not yet acknowledged. The following is
the procedure used by the sender.
2. When a SACK is received, the chunks with a TSN less than or equal
to the cumulative TSN in the SACK are removed from the queue and
discarded. The sender does not have to worry about them anymore.
Page 5 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 6 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Dynamic allocation
When the DHCP server is configured to use dynamic allocation, this
means that it uses a lease policy. This way, when an assigned IP
address from the available pool is no longer used, it will be transferred
back to the pool, making it available for someone else to use. The
advantage of this method is that the IP addresses are used to their
maximum - as soon as they are no longer used by the client, they are
instantly made available to others. The disadvantage of this method is
that a client will always have a random IP address.
Static allocation
The static allocation method is very popular in modern ISP networks,
which do not use dial-up methods. With the static allocation, the
DHCP sever keeps a database with all clients' LAN MAC addresses
and gives them an IP address only if their MAC address is in the
database. This way, the clients can be sure that they will be getting the
same IP address every time.
A DHCP server can be set to work using a combination of the
allocation methods. For example, in a public Wi-Fi network, all of the
known hosts and permanent clients can use the static allocation,
whereas for guests, the dynamic allocation is used. This way, known
hosts can always use the same IP address and the IP address pool is
equally available to everyone.
d) Give use of OSPF with its reason. 4M
Ans. Following are the uses of OSPF with its reason Any four
3 • Link state routing protocol like OSPF is that the complete uses with
reasons 1M
knowledge of topology allows routers to calculate routes that each
satisfy particular criteria. This can be useful for traffic engineering
purposes, where routes can be constrained to meet particular
quality of service requirements.
Page 7 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 8 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2. Renumbering:
To allow sites to change the service provider, renumbering of the
address prefix (n) was built into IPv6 addressing. Each site is given a
prefix by the service provider to which it is connected. If the site
changes the provider, the address prefix needs to be changed.
Page 9 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
A router to which the site is connected can advertise a new prefix and
let the site use the old prefix for a short time before disabling it. In
other words, during the transition period, a site has two prefixes.
The main problem in using the renumbering mechanism is the support
of the DNS, which needs to propagate the new addressing associated
with a domain name.
b) Draw and explain TCP segment structure. 4M
Ans. TCP is a reliable connection- oriented protocol i.e., connection is
4 established between the sender and receiver before the data can be
transmitted. Diagram 1M
A Packet in TCP is called a segment. TCP segment consists of data
bytes to be sent and a header that is added to the data by TCP as shown
in following figure. Explanation
3M
Any other
relevant
explanation
shall be
considered
The header of TCP segment can range from 20-60 bytes.40 bytes are
for option. if there are no options, header is of 20 bytes else it can be of
upmost 60 bytes.
Header Fields in TCP Segment Structure:
Page 10 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
3) Sequence Number: -
This 32-bit field defines the number assigned to the first byte of data
contained in this segment. As we said before, TCP is a stream transport
protocol. To ensure connectivity, each byte to be transmitted is
numbered. The sequence number tells the destination which byte in
this sequence comprises the first byte in the segment. During
connection establishment, each party uses a random number generator
to create an initial sequence number (ISN), which is usually different
in each direction.
4) Acknowledgment Number: -
This 32-bit field defines the byte number that the receiver of the
segment is expecting to receive from the other party. If the receiver of
the segment has successfully received byte number x from the other
party, it defines x + 1 as the acknowledgment number.
Acknowledgment and data can be piggybacked together.
5) Header length: -
This 4-bit field indicates the number of 4-byte words in the TCP
header. The length of the header can be between 20 and 60 bytes.
Therefore, the value of this field can be between 5 (5 x 4 = 20) and 15
(15 x 4 = 60).
6) Reserved:-
This is a 6-bit field reserved for future use.
7) Control Field:-
This field defines 6 different control bits or flags. These are 6, 1 bit
control bits that controls connection establishment, connection
termination, connection abortion, flow control, mode of transfer etc.
Page 11 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
8) Window Size: This field tells the window size of the sending TCP
in bytes.
10) Urgent Pointer: This field (valid only if the URG control flag is
set) used to point to data that is urgently required that needs to reach
the receiving process at the earliest. The value of this field is added to
the sequence number to get the byte number of the last urgent byte.
Page 12 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Client sends a request through its browser to the server using HTTP
protocol which specifies the way the browser and web server
communicates.
Then server receives request using HTTP protocol and checks its
search for the requested web page. If found it returns it back to the web
browser and close the HTTP connection.
Now the browser receives the web page, it interprets it and display the
contents of web page in web browser's window.
Page 13 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
For each
Ans. correct step
1M
Page 14 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 15 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 16 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Any
Relevant
A cookie can contain any type of information such as the time when answer shall
you visited the website, the items that you added into your shopping be
basket, all the links you clicked in website, etc. Cookies themselves considered
contain no personally identifiable information. Depending on the
publisher’s and the user’s settings, information associated with
cookies used in advertising may be added to the user’s Google
Account.
Page 17 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
List 1M
Any one
explanation
2M
Page 18 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 19 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Fig. RPF
Page 20 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 21 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 22 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 23 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 24 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 25 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
1) Status Line :
In the response message, the status line is the first line. The status
line contains three items:
a) HTTP Version Number: It is used to show the HTTP
specification to which the server has tried to make the message
comply.
b) Status Code: It is a three-digit number that indicates the
result of the request. The first digit defines the class of the response.
The last two digits do not have any categorization role. There are five
values for the first digit, which are as follows:
Page 26 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2xx: Success
It shows that the action was received successfully, understood, and
accepted.
3xx: Redirection
It shows that further action must be taken to complete the request.
4xx: Client Error
It shows that the request contains incorrect syntax, or it cannot be
fulfilled.
5xx: Server Error
It shows that the server failed to fulfil a valid request.
c) Reason Phrase: It is also known as the status text. It is a human-
readable text that summarizes the meaning of the status code.
2) Header Lines :
The HTTP Headers for the response of the server contain the
information that a client can use to find out more about the response,
and about the server that sent it. This information is used to assist the
client with displaying the response to a user, with storing the
response for the use of future, and with making further requests to the
server now or in the future. The name of the Response-header field
can be extended reliably only in combination with a change in the
version of the protocol.
3) Blank Line :
It contains cr (Carriage Return) & if (Line Feed)
4) Entire Body:
The body of the message is used for most responses. The exceptions
are where a server is using certain status codes and where the server
is responding to a client request, which asks for the headers but not
the response body.
Page 27 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Fig.TCP Timers
1) Retransmission Timer:
To retransmit lost segments, TCP uses Retransmission Time Out
(RTO). When TCP sends a segment the timer starts and stops when
the acknowledgment is received.
If the timer expires timeout occurs and the segment is retransmitted.
RTO (retransmission timeout is for 1 RTT) to calculate
retransmission timeout we first need to calculate the RTT.
Three Types of RTT:
1. Measured RTT (RTTm): The measured Round Trip Time (RTT)
for a segment is the time required for the segment to reach the
destination and be acknowledged, although the acknowledgment may
include other segments.
2. Smoothed RTT (RTTS): It is the weighted average of RTTm.
RTTM is likely to change and its fluctuation is so high that a single
measurement cannot be used to calculate RTO.
Page 28 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Retransmission Timeout:
RTO Calculation: The value of RTO is based on the smoothed
round-trip time and its deviation. Most implementations use the
following formula to calculate the RTO:
Initial value → Original (given in question).
After any measurement→RTO=RTTs +4*RTTd
2) Persistent Timer:
To deal with a zero-window-size deadlock situation, TCP uses a
persistence timer. When the sending TCP receives an
acknowledgment with a window size of zero, it starts a persistence
timer.
When the persistence timer goes off, the sending TCP sends a special
segment called a probe. This segment contains only 1 byte of new
data. It has a sequence number, but its sequence number is never
acknowledged; it is even ignored inCalculating the sequence number
for the rest of the data. The probe causes the receiving TCP to resend
the acknowledgment which was lost.
3) Keepalive Timer:
A keepalive timer is used to prevent a long idle connection between
two TCPs. If a client opens a TCP connection to a server transfers
some data and becomes silent the client will crash.
In this case, the connection remains open forever. So a keepalive
timer is used. Each time the server hears from a client, it resets this
timer. The time-out is usually 2 hours. . If the server does not hear
from the client after 2 hours, it sends a probe segment. If there is no
response after 10 probes, each of which is 75 s apart, it assumes that
the client is down and terminates the connection.
4) Time Wait Timer:
This timer is used during TCP connection termination. The timer
starts after sending the last Ack for 2nd FIN and closing the
Page 29 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 30 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 31 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
• Marker
If the Type of the message is OPEN, or if the Authentication Code
used in the OPEN message of the connection is zero, then the Marker
must be all ones. The Marker can be used to detect loss of
synchronization between a pair of BGP peers, and to authenticate
incoming BGP messages.
• Length
This 2-bytes unsigned integer indicates the total length of the message,
including the header, in bytes.
• Type
This 1-byte unsigned integer indicates the type code of the message.
The following type codes are defined:
1 - OPEN
2 - UPDATE
3 - NOTIFICATION
4 – KEEPALIVE
• OPEN Message
After a transport protocol connection is established, the first message
sent by each side is an OPEN message. If the OPEN message is
acceptable, a KEEPALIVE message confirming the OPEN is sent
back. Once the OPEN is confirmed, UPDATE, KEEPALIVE, and
NOTIFICATION messages may be exchanged.
• UPDATE Message
UPDATE messages are used to transfer routing information between
BGP peers. The information in the UPDATE packet can be used to
construct a graph describing the relationships of the various
Autonomous Systems.
Page 32 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
• NOTIFICATION Message
A NOTIFICATION message is sent when an error condition is
detected. The BGP connection is closed immediately after sending it.
• KEEPALIVE Message
BGP does not use any transport protocol-based keep-alive mechanism
to determine if peers are reachable. Instead, KEEPALIVE messages
are exchanged between peers often enough.
Page 33 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Flow Control
Flow control make it possible for sender to send the amount of data
bytes that can be sent without worrying an acknowledgment and is one
of the most important duties of the data link layer. In most protocols,
flow control is a set of procedures that tells the sender how much data
it can transmit before it must wait for an acknowledgment from the
receiver.
The flow Control procedures not allowed to overwhelm the receiver.
Any receiving device has a limited speed at which it can process
incoming data and a limited amount of memory in which to store
incoming data, if sender sends data in a much speed data loss may
occur to overcome this problem flow control procedures are needful.
Page 34 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2. Tunnelling
Tunnelling is a strategy used when two computers using IPv6 want to
communicate with each other and the packet must pass through a
region that uses IPv4.
• To pass through this region, the packet must have an IPv4 address.
So the IPv6 packet is encapsulated in an IPv4 packet when it enters
the region.
• To make it clear that the IPv4 packet is carrying an IPv6 packet as
data.
Fig. Tunnelling
3. Header Translation
In this case, the header format must be totally changed through header
translation. The header of the IPv6 packet is converted to an IPv4
header see figure.
Page 35 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 36 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
For example, a sample portion of the LSP (shown only for router A
about its neighbors) could take the form as shown below
For example, the first row says that between router A (the first column)
and router B (the fourth column), there is network 1 (the second
column), and that the cost of going from router A to router B is 1 (the
fourth column).
Every router receives every LSP packet, and uses it to create a local
database called link state database. Thus, a link state database is a
collection of all LSPs. Every router stores such a database on its disk,
and uses it for routing packets. A sample link state database for our
example Internet is shown below
Page 37 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Drawbacks
• Memory Requirements − the link-state routing algorithm creates
and maintains a database and SPF tree. The database and SPF tree
required more memory than a distance vector algorithm.
• Processing Requirements − to build a complete map of the
topology Link-state routing protocols also require more CPU
processing.
• Bandwidth Requirements − The link-state routing protocol floods
link-state packet during initial start-up and also at the event like
network breakdown, and network topology changes, which affect
the available bandwidth on a network. If the network is not stable it
also creates issues on the bandwidth of the network.
•
b) For the IP addresses given below 6M
1. Identify the classes to which the following IP address belongs to
2. Identify network address sections
3. Identify host address section
4. Calculate number of hosts that can be assigned with each
network
i. 22.34.45.133
ii. 12.12.12.12
iii. 192.0.233.26
iv. 126.123.16.87
Ans. Each IP
22.34.45.133= 00010110.00100010.00101101.10000101 address
1
IP address class = Class A description
Network Section = 00010110 = 22 𝟏
1 M
Host Section = 00100010.00101101.10000101= 34.45.133 𝟐
Number of Host/Network = 2²⁴-2 = 16,777,214
12.12.12.12= 00001100.00001100.00001100.00001100
IP address class = Class A
Network Section = 00001100 = 12
Page 38 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
192.0.233.26= 11000000.00000000.11101001.00011010
IP address class = Class C
Network Section = 11000000.00000000.11101001 = 192.0.233
Host Section = 00011010= 26
Number of Host = 28-2 = 154
126.123.16.87= 01111110.01111011.00010000.01010111
IP address class = Class A
Network Section = 01111110 = 126
Host Section = 01111011.00010000.01010111= 123.16.87
Number of Host = 2²⁴-2 = 16,777,214
c) Describe e-mail security over non-secure channel. 6M
(Note: Any other description of the concept shall be considered.)
Ans. • Email security describes different techniques for keeping sensitive Any six
5 information in email communication and accounts secure against points 1M
each
unauthorized access, loss or compromise.
• Email is often used to spread malware, spam and phishing attacks.
Attackers use deceptive messages to entice recipients to part with
sensitive information, open attachments or click on hyperlinks that
install malware on the victim’s device.
• Email encryption involves encrypting, or disguising, the content of
email messages to protect potentially sensitive information from
being read by anyone other than intended recipients. Email
encryption often includes authentication.
• Email allows attackers to use it as a way to cause problems in
attempt to profit. Whether through spam campaigns, malware and
phishing attacks, sophisticated targeted attacks, or business email
compromise (BEC), attackers try to take advantage of the lack of
security of email to carry out their actions.
• Since most organizations rely on email to do business, attackers
exploit email in an attempt to steal sensitive information.
• Because email is an open format, it can be viewed by anyone who
can intercept it. It can be easily read and the contents of an email by
intercepting it.
• Email Security Policies can be established by viewing the contents
of emails flowing through their email servers. It’s important to
Page 39 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 40 / 40
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2M
Diagram
Page 1 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 2 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 3 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
When the site receives a data chunk, it stores it at the end of the
buffer (queue) and subtracts the size of the chunk from winSize.
The TSN number of the chunk is stored in the cumTSN variable. 2.
When the process reads a chunk, it removes it from the queue and
adds the size of the removed chunk to winSize (recycling). 3. When
the receiver decides to send a SACK, it checks the value of lastAck;
if it is less than cumTSN, it sends a SACK with a cumulative TSN
number equal to the cumTSN. It also includes the value of winSize
as the advertised window size. Sender Site: The sender has one
buffer (queue) and three variables: curTSN, rwnd, and inTransit, as
shown in the following figure. We assume each chunk is 100 bytes
long. The buffer holds the chunks produced by the process that
either have been sent or are ready to be sent.
Page 4 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
The first variable, curTSN, refers to the next chunk to be sent. All
chunks in the queue with a TSN less than this value have been sent,
but not acknowledged; they are outstanding. The second variable,
rwnd, holds the last value advertised by the receiver (in bytes). The
third variable, inTransit, holds the number of bytes in transit, bytes
sent but not yet acknowledged. The following is the procedure used
by the sender.
Page 5 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 6 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
(c) Describe SMTP with suitable diagram 4M
❑ SMTP Commands:
1. HELO: Used by client to identify itself.
2. MAIL FROM: Identify sender.
3. RCPT TO: Identify intended recipient.
4. DATA: Send actual message.
5. QUIT: Terminate the message.
6. RSET: Reset the connection
7. VRFY: Verify the add of recipient
8. HELP: Mail
(d) a) For the block of IPv4 address given below build subnet mask, 4M
broadcast Address and Number of Hosts possible.
I. 10.0.199.237/22
II. 192.168.1487/26 2M for each
correct
Ans answer
1
Page 8 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Step 2: Let all edges are processed in the following order: (B, E),
(D, B), (B, D), (A, B), (A, C), (D, C), (B, C), (E, D). We get the
following distances when all edges are processed the first time.
The first row shows initial distances. The second row shows
distances when edges (B, E), (D, B), (B, D) and (A, B) are processed.
The third row shows distances when (A, C) is processed. The
fourth row shows when (D, C), (B, C) and (E, D) are processed.
Page 9 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Step 3: The first iteration guarantees to give all shortest paths which are at
most 1 edge long. We get the following distances when all edges are
processed second time (The last row shows final values.
Step 4: The second iteration guarantees to give all shortest paths which are at
most 2 edges long. The algorithm processes all edges 2 more times. The
distances are minimized after the second iteration, so third and fourth
iterations don’t update the distances.
WORKING
It makes available users by an interactive and bidirectional text-
oriented message system exploit an effective terminal connection
which is much more than 8 byte.
User data is sprinkled in the band long with telnet control information
above the TCP. It helps to achieve some functions in a remote manner.
The user joins the server beside using the TCP protocol, so that means
like the other side connection is also established using the
telnet hostname. These commands are used on the server by the
corresponding user to achieve the need task. These commands are used
Page 10 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
to end a telnet session or logoff a session or a user. Currently, both
virtual terminal and terminal emulators can be used for telnet, which is
fundamentally a modern computer that converses by means of the
identical Telnet protocol. This command helps telnet protocol to
achieve communication with a remote device and mainly various other
OS also provides a large amount of support for these systems
SYNTAX
telnet hostname port
Page 11 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SMTP POP3
Ans. SMTP stands for SIMPLE POP3 stands for POST
5 MAIL TRANSFER OFFICE PROTOCOL
PROTOCOL & is also called VERSION 3 & is also called a
Push Protocol. Pop Protocol.
SMTP is used for Sending POP3 is used to retrieve the
emails. emails.
SMTP transfers Email from POP3 retrieves Emails from Any 4
Sender’s Device to the the mailbox on the receipting’s points
mailbox on the recipient’s server to their device. 1M
server. each
It is a message transfer Agent. It is a message access Agent.
SMTP has two MTAS. POP3 has two MAAS.
SMTP uses Ports 25, 465 & POP3 uses Ports 110 or 995.
587.
Page 13 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 14 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
(e) Explain the process of resolving the given host name into IP 4M
address using DNS.
Ans. You can find the hostname of any computer with a public IP
5 address by passing the address to any Domain Name System (DNS)
server. However, since the computers on a small business network
have private IP addresses, you can only discover their hostnames if
the network has a local DNS server. To discover the hostname of a
computer with a private IP address and no local DNS server, you 4M for
need to use a Windows utility to query the host itself. Explanat
ion
Querying DNS
Page 17 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
➢ Tunnelling:
1. When two computers using IPV6 want to communicate with each other
& the packet
must pass through a region that uses IPV4.
2. The IPV6 packet is encapsulated in a IPV4 packet when it enter the
region & leaves its capsule when it exits the region.
➢ Header Translation:
1. It is used when some of the system uses IPV4. the sender wants to use
IPV6, but the receiver don’t understand IPV6
2. The header format must be totally changed through header translation.
The header of IPV6 packet is converted to IPV4 header.
Page 18 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
(b) Explain TCP with respect to flow control and error control. 6M
Ans.
4 TCP Flow Control is a protocol designed to manage the data flow
between the user and the server. It ensures that there is a specific
bandwidth for sending and receiving data so the data can be processed
without facing any major issues. In order to achieve this, the TCP
protocol uses a mechanism called the sliding window protocol.
Each
explan
ation
of flow
control
3M
and
error
control
3M
.
Error control in TCP is mainly done through the use of three simple
techniques :
1. Checksum – Every segment contains a checksum field which is
used to find corrupted segments. If the segment is corrupted,
then that segment is discarded by the destination TCP and is
considered lost.
2. Acknowledgement – TCP has another mechanism called
acknowledgement to affirm that the data segments have been
delivered. Control segments that contain no data but have
sequence numbers will be acknowledged as well but ACK
segments are not acknowledged.
3. Retransmission – When a segment is missing, delayed to
Page 19 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
deliver to a receiver, corrupted when it is checked by the
receiver then that segment is retransmitted again. Segments
are retransmitted only during two events: when the sender
receives three duplicate acknowledgements (ACK) or when a
retransmission timer expires.
• Retransmission after RTO: TCP always preserves one
retransmission time-out (RTO) timer for all sent but not
acknowledged segments. When the timer runs out of
time, the earliest segment is retransmitted. Here no timer
is set for acknowledgement. In TCP, the RTO value is
dynamic in nature and it is updated using the round trip
time (RTT) of segments. RTT is the time duration needed
for a segment to reach the receiver and an
acknowledgement to be received by the sender.
• Retransmission after Three duplicate ACK
segments: RTO method works well when the value of
RTO is small. If it is large, more time is needed to get
confirmation about whether a segment has been delivered
or not. Sometimes one segment is lost and the receiver
receives so many out-of-order segments that they cannot
be saved. In order to solve this situation, three duplicate
acknowledgement method is used and missing segment is
retransmitted immediately instead of retransmitting
already delivered segment. This is a fast retransmission
because it makes it possible to quickly retransmit lost
segments instead of waiting for timer to end.
• First Scenario
Page 20 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
When the sender and the receiver of an e-mail are on the same mail server, we
need only two user agents.
• Second Scenario
When the sender and the receiver of an e-mail are on different mail servers,
we need two UAs and a pair of MTAs (client and server).
• Third Scenario
When the sender is connected to the mail server via a LAN or a WAN, we
need two UAs and two pairs of MTAs (client and server).
Page 21 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
• Fourth Scenario
When both sender and receiver are connected to the mail server via a LAN or
a WAN, we need two UAs, two pairs of MTAs (client and server), and a pair
of MAAs (client and server). This is the most common situation today.
Ans
3 i. Bellman ford algorithm is a single-source shortest path algorithm.
ii. This algorithm is used to find the shortest distance from the single 3M for
vertex to all the other vertices of a weighted graph. explainati
on and 3M
iii. Various other algorithms are used to find the shortest path, like the for
Dijkstra algorithm. example
iv. If the weighted graph contains the negative weight values, then the
Dijkstra algorithm does not confirm whether it produces the correct
answer or not.
Page 22 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
vii. Consider the following example:-
Page 23 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 24 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
(b) For the IP address given below, find the range of addresses in the 6M
following blocks:
a. 123.56.77.32/29
b. 200.17.21.128/27
c. 17.34.16.0/23
d. 180.34.64.64/30
a. 123.56.77.32/29
Ans. • The subnet mask “/29” means the first 29 bits are network bits, 1𝟏 M
𝟐
1 and the remaining 3 bits are host bits. for
• The network address can be obtained by setting the host bits to each
zero: 123.56.77.32 sub-
• The broadcast address can be obtained by setting the host bits to questio
n
one: 123.56.77.39
• The range of addresses in this block is from 123.56.77.32 to
123.56.77.39
• Range of addresses: 123.56.77.32 to 123.56.77.39
b. 200.17.21.128/27
• The subnet mask "/27" means the first 27 bits are network
bits, and the remaining 5 bits are host bits.
• The network address can be obtained by setting the host bits to
zero: 200.17.21.128.
• The broadcast address can be obtained by setting the host bits
to one: 200.17.21.159.
• Range of addresses: 200.17.21.128 to 200.17.21.159
c. 17.34.16.0/23:
• The subnet mask "/23" means the first 23 bits are network bits,
and the remaining 9 bits are host bits.
• The network address can be obtained by setting the host bits to
zero: 17.34.16.0.
• The broadcast address can be obtained by setting the host bits
to one: 17.34.17.255.
• Range of addresses: 17.34.16.0 to 17.34.17.255
Page 25 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
d. 180.34.64.64/30
• The subnet mask "/30" means the first 30 bits are network bits,
and the remaining 2 bits are host bits.
• The network address can be obtained by setting the host bits to
zero: 180.34.64.64.
• The broadcast address can be obtained by setting the host bits
to one: 180.34.64.67.
• Range of addresses: 180.34.64.64 to 180.34.64.67
Ans SCTP transmits data in the form of messages and each message 3M for
4 contains one or more packets. The control come before data chunks. describi
ng
fields &
3M for
associat
ion
establis
hment
process
Page 27 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 28 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 29 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2022
EXAMINATION MODEL
ANSWER
22520
Subject: Advanced Computer Network (Elect) Subject Code:
It is reliable It is unreliable
Page 2 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 3 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 4 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SMTP Commands:
1. HELO: Used by client to identify itself.
2. MAIL FROM: Identify sender.
3. RCPT TO: Identify intended recipient.
4. DATA: Send actual message.
5. QUIT: Terminate the message.
6. RSET: Reset the connection.
7. VRFY: Verify the add of recipient
8. HELP: Mail
Page 5 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 6 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ans. Diagram
2 2M
Explanation
2M
Any other
relevant
Explanation
Shall be
considere
d
1. Version: This 4 bits field defines the version number of IP. The
value is 6 for IPV6.
2. Priority: This 4 bits priority field defines the priority of packet
with respect to traffic congestion.
3. Flow Label: It is 24 bits field that is designed to provide special
handling for a particular flow of data.
4. Payload Length: The 16 bits payload length field defines the
length of the IP datagram excluding the base header.
Page 7 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
5. Next Header: It is an 8 bits field defining the header that
follows the base header in datagram.
6. Hop Limit: This 8 bits field serves the same purpose as
the TTL field in IPV4.
7. Source Address: The source address field is a 128 bits
internet address that identifies the original.
8. Destination Address: It is 128 bits internet address that
usually identifies the final destination of datagram.
9. Payload: Is combination of zero or more extension
headers(options) which is followed by data from other
protocols such as UDP, TCP etc
EXTENSION HEADERS
• The length of the base header is fixed at 40 bytes.
• Types of extension headers are:
1. Hop by Hop option
2. Source routing
3. Fragmentation
4. Authentication
5. Encrypted security payload
6. Destination option
Page 8 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 9 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Full-Duplex Service
TCP offers a full-duplex service where the data can flow in both
directions simultaneously. Each TCP will then have a sending buffer
and receiving buffer. The TCP segments are sent in both directions.
Connection-Oriented Service
Reliable Servic
Page 10 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
i)10.0.199.237/22
ii)192.168.14.87/26
Page 11 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
4M
.
Ans
2M for
each
Calculation
Page 12 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
d) Use Bellman – Fort algorithm to find the shortest distance for all 4M
nodes in the graphs
Ans
3
1M each
for each
iteration
Page 13 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 14 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Working of Browsers-
• WWW works on client-server interaction.
• The browser program acts as a client that uses the internet
to contact a remote server for a copy of the requested page.
• The server on the remote system returns a copy of page
along with the additional information.
Web Documents-
1. STATIC DOCUMENTS-
• The contents of static documents are fixed. These contents are created
and stored in a server.
• If required the client can get a copy of static documents.
• The contents of static documents are determined when it is
created.
Page 16 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2. DYNAMIC DOCUMENT-
• It is not defined in a pre-define format, like static
documents.
• It is created by a web browser on the request for the
document from a browser.
Explainati
on 2M
Page 17 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ans Cookies are small files which are stored on a user’s computer. They are 2M for
5 used to hold a modest amount of data specific to a particular client and Explan
website and can be accessed either by the web server or by the client ation
computer. & 2M
for
Diagra
m
That way the website could remember your language and let you
view the website in your preferred language without having to
select the language again.
A cookie can contain any type of information such as the time when
you visited the website, the items that you added into your shopping
basket, all the links you clicked in website, etc. Cookies themselves
contain no personally identifiable information. Depending on the
publisher’s and the user’s settings, information associated with
cookies used in advertising may be added to the user’s Google
Account.
Page 19 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 20 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
STATIC ALLOCATION
The static allocation method is very popular in modern ISP networks, which do
not use dial-up methods. With the static allocation, the DHCP sever keeps a
database with all clients' LAN MAC addresses and gives them an IP address
only if their MAC address is in the database. This way, the clients can be sure
that they will be getting the same IP address every time.
DYNAMIC ALLOCATION
When the DHCP server is configured to use dynamic allocation, this
means that it uses a lease policy. This way, when an assigned IP address
from the available pool is no longer used, it will be transferred back to the
pool, making it available for someone else to use. The advantage of this
method is that the IP addresses are used to their maximum - as soon as
they are no longer used by the client, they are instantly made available to
others. The disadvantage of this method is that a client will always have a
random IP address.
1. Dual Stack
In this kind of strategy, a station has a dual stack of protocols
run IPv4 and IPv6 simultaneously.
To determine which version to use when sending a packet to a
destination, the source host queries the DNS.
If the DNS returns an IPv4 address, the source host sends an
IPv4 packet.
If the DNS returns an IPv6 address, the source host
sends an IPv6 packet.
Page 23 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2. Tunnelling
Tunnelling is a strategy used when two computers using IPv6
want to communicate with each other and the packet must
pass through a region that uses IPv4.
• To pass through this region, the packet must have an IPv4
address. So the IPv6 packet is encapsulated in an IPv4 packet
when it enters the region.
• To make it clear that the IPv4 packet is carrying an IPv6
packet as data.
3.Header Translation
In this case, the header format must be totally changed
through header translation. The header of the IPv6 packet is
converted to an IPv4 header see figure.
Page 24 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
• The dotted black lines in the figure represent the transition that a server
normally goes through.
• The solid black lines show the transitions that a client normally goes
through.
Page 25 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
• Sometimes in some situations, a server transitions through a solid line
or a client transition through a dotted line.
Page 26 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
B) In each IP address, the network address section is
determined by the class of the IP address.
i. 132.34.45.133
Network address: 132.34
ii. 14.142.20.20
Network address: 14
iii. 191.0.200.45
Network address: 191.0
iv. 129.16.123.85
Network address: 129.16
Page 27 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 28 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 2 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 3 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 4 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Sender Site:
The sender has one buffer (queue) and three variables: curTSN, rwnd,
and inTransit, as shown in the following figure. We assume each chunk
is 100 bytes long.
The buffer holds the chunks produced by the process that either have
been sent or are ready to be sent. The first variable, curTSN, refers to
the next chunk to be sent. All chunks in the queue with a TSN less than
this value have been sent, but not acknowledged; they are outstanding.
The second variable, rwnd, holds the last value advertised by the
receiver (in bytes). The third variable, inTransit, holds the number of
bytes in transit, bytes sent but not yet acknowledged. The following is
the procedure used by the sender.
2. When a SACK is received, the chunks with a TSN less than or equal
to the cumulative TSN in the SACK are removed from the queue and
discarded. The sender does not have to worry about them anymore.
Page 5 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 6 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Dynamic allocation
When the DHCP server is configured to use dynamic allocation, this
means that it uses a lease policy. This way, when an assigned IP
address from the available pool is no longer used, it will be transferred
back to the pool, making it available for someone else to use. The
advantage of this method is that the IP addresses are used to their
maximum - as soon as they are no longer used by the client, they are
instantly made available to others. The disadvantage of this method is
that a client will always have a random IP address.
Static allocation
The static allocation method is very popular in modern ISP networks,
which do not use dial-up methods. With the static allocation, the
DHCP sever keeps a database with all clients' LAN MAC addresses
and gives them an IP address only if their MAC address is in the
database. This way, the clients can be sure that they will be getting the
same IP address every time.
A DHCP server can be set to work using a combination of the
allocation methods. For example, in a public Wi-Fi network, all of the
known hosts and permanent clients can use the static allocation,
whereas for guests, the dynamic allocation is used. This way, known
hosts can always use the same IP address and the IP address pool is
equally available to everyone.
d) Give use of OSPF with its reason. 4M
Ans. Following are the uses of OSPF with its reason Any four
Link state routing protocol like OSPF is that the complete uses with
reasons 1M
knowledge of topology allows routers to calculate routes that each
satisfy particular criteria. This can be useful for traffic engineering
purposes, where routes can be constrained to meet particular
quality of service requirements.
Page 7 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 8 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2. Renumbering:
To allow sites to change the service provider, renumbering of the
address prefix (n) was built into IPv6 addressing. Each site is given a
prefix by the service provider to which it is connected. If the site
changes the provider, the address prefix needs to be changed.
Page 9 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
A router to which the site is connected can advertise a new prefix and
let the site use the old prefix for a short time before disabling it. In
other words, during the transition period, a site has two prefixes.
The main problem in using the renumbering mechanism is the support
of the DNS, which needs to propagate the new addressing associated
with a domain name.
b) Draw and explain TCP segment structure. 4M
Ans. TCP is a reliable connection- oriented protocol i.e., connection is
established between the sender and receiver before the data can be
transmitted. Diagram 1M
A Packet in TCP is called a segment. TCP segment consists of data
bytes to be sent and a header that is added to the data by TCP as shown
in following figure. Explanation
3M
Any other
relevant
explanation
shall be
considered
The header of TCP segment can range from 20-60 bytes.40 bytes are
for option. if there are no options, header is of 20 bytes else it can be of
upmost 60 bytes.
Header Fields in TCP Segment Structure:
Page 10 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
3) Sequence Number: -
This 32-bit field defines the number assigned to the first byte of data
contained in this segment. As we said before, TCP is a stream transport
protocol. To ensure connectivity, each byte to be transmitted is
numbered. The sequence number tells the destination which byte in
this sequence comprises the first byte in the segment. During
connection establishment, each party uses a random number generator
to create an initial sequence number (ISN), which is usually different
in each direction.
4) Acknowledgment Number: -
This 32-bit field defines the byte number that the receiver of the
segment is expecting to receive from the other party. If the receiver of
the segment has successfully received byte number x from the other
party, it defines x + 1 as the acknowledgment number.
Acknowledgment and data can be piggybacked together.
5) Header length: -
This 4-bit field indicates the number of 4-byte words in the TCP
header. The length of the header can be between 20 and 60 bytes.
Therefore, the value of this field can be between 5 (5 x 4 = 20) and 15
(15 x 4 = 60).
6) Reserved:-
This is a 6-bit field reserved for future use.
7) Control Field:-
This field defines 6 different control bits or flags. These are 6, 1 bit
control bits that controls connection establishment, connection
termination, connection abortion, flow control, mode of transfer etc.
Page 11 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
8) Window Size: This field tells the window size of the sending TCP
in bytes.
10) Urgent Pointer: This field (valid only if the URG control flag is
set) used to point to data that is urgently required that needs to reach
the receiving process at the earliest. The value of this field is added to
the sequence number to get the byte number of the last urgent byte.
Page 12 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Client sends a request through its browser to the server using HTTP
protocol which specifies the way the browser and web server
communicates.
Then server receives request using HTTP protocol and checks its
search for the requested web page. If found it returns it back to the web
browser and close the HTTP connection.
Now the browser receives the web page, it interprets it and display the
contents of web page in web browser's window.
Page 13 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
For each
Ans. correct step
1M
Page 14 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 15 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Any
Relevant
When cookies were invented, they were basically little documents
answer shall
containing information about you and your preferences. For
be
instance, when you select your language in which you want to view
considered
your website, the website would save the information in a document
called a cookie on your computer, and the next time when you visit
the website, it would be able to read a cookie saved earlier.
That way the website could remember your language and let you
view the website in your preferred language without having to
select the language again.
A cookie can contain any type of information such as the time when
you visited the website, the items that you added into your shopping
basket, all the links you clicked in website, etc. Cookies themselves
contain no personally identifiable information. Depending on the
publisher’s and the user’s settings, information associated with
cookies used in advertising may be added to the user’s Google
Account.
Page 16 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
List 1M
Any one
explanation
2M
Page 17 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 18 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Fig. RPF
Page 19 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 20 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 21 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 22 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 23 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 24 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
1) Status Line :
In the response message, the status line is the first line. The status
line contains three items:
a) HTTP Version Number: It is used to show the HTTP
specification to which the server has tried to make the message
comply.
b) Status Code: It is a three-digit number that indicates the
result of the request. The first digit defines the class of the response.
The last two digits do not have any categorization role. There are five
values for the first digit, which are as follows:
Page 25 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2xx: Success
It shows that the action was received successfully, understood, and
accepted.
3xx: Redirection
It shows that further action must be taken to complete the request.
4xx: Client Error
It shows that the request contains incorrect syntax, or it cannot be
fulfilled.
5xx: Server Error
It shows that the server failed to fulfil a valid request.
c) Reason Phrase: It is also known as the status text. It is a human-
readable text that summarizes the meaning of the status code.
2) Header Lines :
The HTTP Headers for the response of the server contain the
information that a client can use to find out more about the response,
and about the server that sent it. This information is used to assist the
client with displaying the response to a user, with storing the
response for the use of future, and with making further requests to the
server now or in the future. The name of the Response-header field
can be extended reliably only in combination with a change in the
version of the protocol.
3) Blank Line :
It contains cr (Carriage Return) & if (Line Feed)
4) Entire Body:
The body of the message is used for most responses. The exceptions
are where a server is using certain status codes and where the server
is responding to a client request, which asks for the headers but not
the response body.
Page 26 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Fig.TCP Timers
1) Retransmission Timer:
To retransmit lost segments, TCP uses Retransmission Time Out
(RTO). When TCP sends a segment the timer starts and stops when
the acknowledgment is received.
If the timer expires timeout occurs and the segment is retransmitted.
RTO (retransmission timeout is for 1 RTT) to calculate
retransmission timeout we first need to calculate the RTT.
Three Types of RTT:
1. Measured RTT (RTTm): The measured Round Trip Time (RTT)
for a segment is the time required for the segment to reach the
destination and be acknowledged, although the acknowledgment may
include other segments.
2. Smoothed RTT (RTTS): It is the weighted average of RTTm.
RTTM is likely to change and its fluctuation is so high that a single
measurement cannot be used to calculate RTO.
Page 27 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Retransmission Timeout:
RTO Calculation: The value of RTO is based on the smoothed
round-trip time and its deviation. Most implementations use the
following formula to calculate the RTO:
Initial value → Original (given in question).
After any measurement→RTO=RTTs +4*RTTd
2) Persistent Timer:
To deal with a zero-window-size deadlock situation, TCP uses a
persistence timer. When the sending TCP receives an
acknowledgment with a window size of zero, it starts a persistence
timer.
When the persistence timer goes off, the sending TCP sends a special
segment called a probe. This segment contains only 1 byte of new
data. It has a sequence number, but its sequence number is never
acknowledged; it is even ignored inCalculating the sequence number
for the rest of the data. The probe causes the receiving TCP to resend
the acknowledgment which was lost.
3) Keepalive Timer:
A keepalive timer is used to prevent a long idle connection between
two TCPs. If a client opens a TCP connection to a server transfers
some data and becomes silent the client will crash.
In this case, the connection remains open forever. So a keepalive
timer is used. Each time the server hears from a client, it resets this
timer. The time-out is usually 2 hours. . If the server does not hear
from the client after 2 hours, it sends a probe segment. If there is no
response after 10 probes, each of which is 75 s apart, it assumes that
the client is down and terminates the connection.
4) Time Wait Timer:
This timer is used during TCP connection termination. The timer
starts after sending the last Ack for 2nd FIN and closing the
Page 28 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 29 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 30 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Marker
If the Type of the message is OPEN, or if the Authentication Code
used in the OPEN message of the connection is zero, then the Marker
must be all ones. The Marker can be used to detect loss of
synchronization between a pair of BGP peers, and to authenticate
incoming BGP messages.
Length
This 2-bytes unsigned integer indicates the total length of the message,
including the header, in bytes.
Type
This 1-byte unsigned integer indicates the type code of the message.
The following type codes are defined:
1 - OPEN
2 - UPDATE
3 - NOTIFICATION
4 – KEEPALIVE
OPEN Message
After a transport protocol connection is established, the first message
sent by each side is an OPEN message. If the OPEN message is
acceptable, a KEEPALIVE message confirming the OPEN is sent
back. Once the OPEN is confirmed, UPDATE, KEEPALIVE, and
NOTIFICATION messages may be exchanged.
UPDATE Message
UPDATE messages are used to transfer routing information between
BGP peers. The information in the UPDATE packet can be used to
construct a graph describing the relationships of the various
Autonomous Systems.
Page 31 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
NOTIFICATION Message
A NOTIFICATION message is sent when an error condition is
detected. The BGP connection is closed immediately after sending it.
KEEPALIVE Message
BGP does not use any transport protocol-based keep-alive mechanism
to determine if peers are reachable. Instead, KEEPALIVE messages
are exchanged between peers often enough.
Page 32 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Flow Control
Flow control make it possible for sender to send the amount of data
bytes that can be sent without worrying an acknowledgment and is one
of the most important duties of the data link layer. In most protocols,
flow control is a set of procedures that tells the sender how much data
it can transmit before it must wait for an acknowledgment from the
receiver.
The flow Control procedures not allowed to overwhelm the receiver.
Any receiving device has a limited speed at which it can process
incoming data and a limited amount of memory in which to store
incoming data, if sender sends data in a much speed data loss may
occur to overcome this problem flow control procedures are needful.
Page 33 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2. Tunnelling
Tunnelling is a strategy used when two computers using IPv6 want to
communicate with each other and the packet must pass through a
region that uses IPv4.
To pass through this region, the packet must have an IPv4 address.
So the IPv6 packet is encapsulated in an IPv4 packet when it enters
the region.
To make it clear that the IPv4 packet is carrying an IPv6 packet as
data.
Fig. Tunnelling
3. Header Translation
In this case, the header format must be totally changed through header
translation. The header of the IPv6 packet is converted to an IPv4
header see figure.
Page 34 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 35 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
For example, a sample portion of the LSP (shown only for router A
about its neighbors) could take the form as shown below
For example, the first row says that between router A (the first column)
and router B (the fourth column), there is network 1 (the second
column), and that the cost of going from router A to router B is 1 (the
fourth column).
Every router receives every LSP packet, and uses it to create a local
database called link state database. Thus, a link state database is a
collection of all LSPs. Every router stores such a database on its disk,
and uses it for routing packets. A sample link state database for our
example Internet is shown below
Page 36 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Drawbacks
Memory Requirements − the link-state routing algorithm creates
and maintains a database and SPF tree. The database and SPF tree
required more memory than a distance vector algorithm.
Processing Requirements − to build a complete map of the
topology Link-state routing protocols also require more CPU
processing.
Bandwidth Requirements − The link-state routing protocol floods
link-state packet during initial start-up and also at the event like
network breakdown, and network topology changes, which affect
the available bandwidth on a network. If the network is not stable it
also creates issues on the bandwidth of the network.
b) For the IP addresses given below 6M
1. Identify the classes to which the following IP address belongs to
2. Identify network address sections
3. Identify host address section
4. Calculate number of hosts that can be assigned with each
network
i. 22.34.45.133
ii. 12.12.12.12
iii. 192.0.233.26
iv. 126.123.16.87
Ans. Each IP
22.34.45.133= 00010110.00100010.00101101.10000101 address
IP address class = Class A description
Network Section = 00010110 = 22 𝟏
1 𝟐M
Host Section = 00100010.00101101.10000101= 34.45.133
Number of Host/Network = 2²⁴-2 = 16,777,214
12.12.12.12= 00001100.00001100.00001100.00001100
IP address class = Class A
Network Section = 00001100 = 12
Page 37 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
192.0.233.26= 11000000.00000000.11101001.00011010
IP address class = Class C
Network Section = 11000000.00000000.11101001 = 192.0.233
Host Section = 00011010= 26
Number of Host = 28-2 = 154
126.123.16.87= 01111110.01111011.00010000.01010111
IP address class = Class A
Network Section = 01111110 = 126
Host Section = 01111011.00010000.01010111= 123.16.87
Number of Host = 2²⁴-2 = 16,777,214
c) Describe e-mail security over non-secure channel. 6M
(Note: Any other description of the concept shall be considered.)
Ans. Email security describes different techniques for keeping sensitive Any six
information in email communication and accounts secure against points 1M
each
unauthorized access, loss or compromise.
Email is often used to spread malware, spam and phishing attacks.
Attackers use deceptive messages to entice recipients to part with
sensitive information, open attachments or click on hyperlinks that
install malware on the victim’s device.
Email encryption involves encrypting, or disguising, the content of
email messages to protect potentially sensitive information from
being read by anyone other than intended recipients. Email
encryption often includes authentication.
Email allows attackers to use it as a way to cause problems in
attempt to profit. Whether through spam campaigns, malware and
phishing attacks, sophisticated targeted attacks, or business email
compromise (BEC), attackers try to take advantage of the lack of
security of email to carry out their actions.
Since most organizations rely on email to do business, attackers
exploit email in an attempt to steal sensitive information.
Because email is an open format, it can be viewed by anyone who
can intercept it. It can be easily read and the contents of an email by
intercepting it.
Email Security Policies can be established by viewing the contents
of emails flowing through their email servers. It’s important to
Page 38 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 39 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Advantages of IPv6:
Larger address space.
Better header format.
New options for additional functionalities. Any
Allowance for extension. four
Support for more security. advanta
More efficient routing ges ½M
More efficient packet processing each
Directed data flows
Simplified Network configuration
Support for new services
Support for Security
Auto configuration
(c) State the need of domain name system. 2M
Ans. Need of domain name system:
Since IP addresses are difficult to remember and names are easier
to remember Domain Name System is used and DNS servers are
used for converting these names into IP addresses. Any one
Large number to hosts and servers connected in the internet can Need
be classified using Domain name system so that hierarchical 2M
naming system is implemented.
To identify an entity, TCP/IP protocols use the IP address. An IP
is uniquely identifies the connection of a host to internet. Use for
mapping can map a name to an address or an address to a name.
(d) State the use of 6 flags in TCP header. 2M
Ans. There are 6, 1-bit control bits that control connection establishment,
termination, abortion, flow control etc..
URG ACK PSH RST SYN FIN
Page 2 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 3 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 4 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Header Format:
Format
1M
Page 5 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 6 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
200.45.34.56
Destination address 11001000 . 00101101 . 00100010.00111000
With subnet mask as 255.255.240.0, network bits are 20 and host bits
are 12.
Keeping first 20 bits as it is, and making host bits as 0, the subnet
address is obtained as given below.
Subnet address 11001000 . 00101101 . 00100000.00000000
Thus subnet address is 200.45.32.0
3. Attempt any THREE of the following: 12
(a) Explain difference between distance vector and link state routing. 4M
(Any four points).
Ans.
Sr. Distance Vector Routing Link State Routing
No.
1 Routing tables are updated Complete topology is
by exchanging information distributed to every router to
with the neighbours. update a routing table.
2 It update full routing table. It updates only link states. Any
3 It uses Bellman-Ford It uses Dijkstra algorithm. four
algorithm points
4 Distance Vector routing Link state routing works best 1M each
doesn‟t have any hierarchical for hierarchical routing
structure. design.
5 CPU and memory utilization Higher utilization of CPU
is lower than Link state and memory than distance
routing. vector routing.
6 Bandwidth required is less Bandwidth required is more
due to local sharing, small due to flooding and sending
packets and no flooding. of large link state packets.
7 Example protocols are RIP Example protocols are OSPF
and IGRP. and IS-IS.
8 Slow convergence. Fast convergence.
9 Summarization is automatic Summarization is manual.
10 Easier to configure Harder to configure
11 Count to infinity problem No count to infinity problem
Page 7 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
1. DUAL STACK
In this kind of strategy a station has a dual stack of protocols run IPv4
and IPv6 simultaneously.
To determine which version to use when sending a packet to a
destination, the source host queries the DNS. If the DNS returns an
IPv4 address, the source host sends an IPv4 packet. If the DNS
returns an IPv6 address, the source host sends an IPv6 packet.
1M for
each
transitio
n
method
2. Tunnelling
Tunnelling is a strategy used when two computers using IPv6 want to
communicate with each other and the packet must pass through a
region that uses IPv4.
To pass through this region, the packet must have an IPv4
address. So the IPv6 packet is encapsulated in an IPv4 packet
when it enters the region.
To make it clear that the IPv4 packet is carrying an IPv6 packet as
data the protocol value is set to 41.
Page 8 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Header Translation
In this case, the header format must be totally changed through
header translation. The header of the IPv6 packet is converted to an
IPv4 header see figure.
TELNET Working:
TELNET is a client-server application that allows a user to log on
to a remote machine, giving the user access to the remote system. Working
The user sends the keystrokes to the terminal driver, where the descripti
local operating system accepts the characters but does not on 2M
interpret them.
A terminal driver correctly interprets the keystrokes on the local
terminal or terminal emulator.
The characters are sent to the TELNET client, which transforms
Page 9 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Working
diagram
2M
Page 10 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ans. The UDP header has four parts, each of two bytes.
That means we get the following interpretation of the header. Each
i) Source port number = BC8216 = 48258 correct
ii) Destination port number = 000D16= 13 answer
iii) Total length = 002B16 = 43 bytes carries
iv) Since the header is 8 bytes the data length is 43 − 8 =35 bytes. 1M
Page 11 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagram
3M
Page 12 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Message
format
diagram
2M
Page 13 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Response Header
The response header can be present only in a response message. It
specifies the server's configuration and special information about
the request.
e.g. Server: Apache/2.2.14 (Win32)
Entity Header
The entity header gives information about the body of the
document.
e.g. Content-Length: 88
e.g. Content-Type: text/html
Blank Line
An empty line (i.e., a line with nothing preceding the CRLF)
indicating the end of the header fields
Body
It contains actual content. This part is optional.
Diagram
2M
Page 14 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
OR
Page 15 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagram
1M
Page 16 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
TELNET
• TELNET is an abbreviation for TErminaLNETwork. It is the
standard TCP/IP protocol for virtual terminal service
• TELNET enables the establishment of a connection to a remote
system in such a way that the local terminal appears to be a
terminal at the remote system.
• There are two parties involved TELNET Client and TELNET
server.
DNS
• It stands for Domain Name Service. Every time you use a domain
name, therefore, a DNS service must translate the name into the
corresponding IP address.
• For example, the domain name www.abc.com might translate to
198.105.232.4.
• Port number for DNS is 53.
DHCP
• It stands for Dynamic Host Configuration Protocol (DHCP). It
gives IP addresses to hosts.
• There is a lot of information a DHCP server can provide to a host
when the host is registering for an IP address with the DHCP
server.
• Port number for DHCP is 67, 68.
POP3
• Post Office Protocol, version 3 (POP3) is simple and limited in
functionality.
• POP works as a Message Access Agent.
• The client POP3 software is installed on the recipient computer;
the server POP3 software is installed on the mail server.
• Mail access starts with the client when the user needs to
download e-mail from the mailbox on the mail server.
5. Attempt any TWO of the following: 12
(a) Explain how TCP connections are established using the 3 way 6M
handshake. What happens when 2 hosts simultaneously try to
establish a connection?
(Note: Any other explanation of the concept shall be considered).
Ans.
Page 17 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Connection Establishment
TCP uses a Three way handshaking mechanism to establish a
connection between client and server machines. 1M
The three steps in three way handshaking mechanism are as follows. Diagra
SYN: m
The client sends the first segment, a SYN segment, in which only the
SYN flag is set. This segment is for synchronization of sequence 3M
numbers. Steps
SYN + ACK
2M for
The server sends the second segment, a SYN +ACK segment, with 2
simulta
flag bits set.
neous
ACK connect
The client sends the third segment. This is just an ACK segment. It ion
guarantees the completion of three way handshaking.
Page 18 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
3M for
diagra
m
Page 19 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 20 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
(c) Explain the addressing scheme in IPv4 and IPv6. When IPv6 6M
protocol is introduced, does the ARP protocol have to be
changed? Explain in details.
Ans. An IPv4 Address:
An IP address is a 32-bit address.
The IP addresses are unique. IPv4 2M
Address space rule
The address space in a protocol That uses N-bits to define
an Address is = 2N
The address space of IPv4 is 232or4,294,967,296.
Address Space Notations:
Binary Notation :
01110101 10010101 00011101 11101010
Dotted-decimal notation
Dotted-decimal notation
Hexadecimal Notation
Hexadecimal Notation
Page 21 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 22 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
iii) RIPv2:
_ Runs over UDP port 520
_ Limits networks to 15 hops (16 = 1)
_ Depends on count to infinity for loops
_ Supports split horizon, poison reverse
_ RFC 1812 specifies what options routers should or must have.
Page 23 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 24 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 25 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Example:
Page 26 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 27 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 28 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 29 / 29