Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Issue for layer *Transport Layer:

*Reliability- Network channels and components may be unreliable, resulting in loss of a) The basic function of the transport layer is to accept data from above it, split it up into
bits while data transfer. So, an important design issue is to make sure that the smaller units, pass these to the network layer, and ensure that all the pieces arrive
information transferred is not distorted. correctly at the other end
*Addressing- At a particular time, innumerable messages are being transferred between b)Error recovery is done in the layer
large numbers of computers. So, a naming or addressing system should exist so that each *Session Layer
layer can identify the sender and receivers of each message. a) The session layer allows users on different machines to establish sessions betn them.
*Error Control- Unreliable channels introduce a number of errors in the data streams that b) Session layer, establishes manages and terminates sessions between application.
are communicated. So, the layers need to agree upon common error detection and error *Presentation layer
correction methods so as to protect data packets while they are transferred. a) The presentation layer is concerned with syntax and semantics of the info transmitted.
*Routing- There may be multiple paths from the source to the destination. Routing b) The presentation layer manages these data structures and allows higher-level data
involves choosing an optimal path among all possible paths, in terms of cost and time. structures to be defined & exchanged through network with a standard encoding format.
There are several routing algorithms that are used in network systems. *Application Layer
*Scalability- Networks are continuously evolving. The sizes are continually increasing a)Application layer defines the communications services used by the user's applications
leading to congestion. Also, when new technologies are applied to the added to transmit data over the network
components, it may lead to incompatibility issues. Hence, the design should be done so b)This layer defines application protocols such as FIP, Email clients, Web browsers, Telnet
that the networks are scalable and can accommodate such additions and alterations.
*Flow Control- If the rate at which data is produced by the sender is higher than the rate IPV4 protocol
at which data is received b the receiver, there are chances of overflowing the receiver. So, -VERSION: Version of the IP protocol (4 bits), which is 4 for IPv4
a proper flow control mechanism needs to be implemented. -HLEN: IP header length (4 bits), which is the number of 32 bit words in the header. The
*Resource Allocation- Computer networks provide services in the form of network minimum value for this field is 5 and the maximum is 15.
resources to the end users. The main design issue is to allocate and deallocate resources -Type of service: Low Delay, High Throughput, Reliability (8 bits)
to processes, The allocation/ deallocation should occur so that minimal interference -Total Length: Length of header + Data (16 bits), which has a minimum value 20 bytes and
among the hosts occurs and there is optimal usage of the resources. the maximum is 65,535 bytes.
-Identification: Unique Packet Id for identifying the group of fragments of a single IP
Osi layer datagram (16 bits)
*Physical Layer -Flags: 3 flags of 1 bit each : reserved bit (must be zero), do not fragment flag, more
a) The physical layer of the 0sI model defines electrical and mechanical specifications fragments flag (same order)
used in networking including transmission distances, the various types of media available -Fragment Offset: Represents the no. of Data Bytes ahead of the particular fragment in
and electrical issues the particular Datagram. Specified in terms of no. of 8 bytes, which has the max value of
b) This layer is concerned with transmitting raw bits over a communication Channel. 65,528 bytes.
*Data Link Layer -Time to live: Datagram’s lifetime (8 bits), It prevents the datagram to loop through the
a) The main task of the data link layer is to transform the raw input data into data frames network by restricting the no of Hops taken by Packet before delivering to Destination.
and transmit the frames sequentially -Protocol: Name of the protocol to which the data is to be passed (8 bits)
b) It takes care of flow control a fast transmitter should not drown a slow receiver of data -Header Checksum: 16 bits header checksum for checking errors in the datagram header
¢) This layer also controls the access to the shared channel. -Source IP address: 32 bits IP address of the sender
*Network Layer -Destination IP address: 32 bits IP address of the receiver
a) The main task of the network layer is to determine how packets are routed from -Option: Optional information such as source route, record route. Used by the Network
source to destination administrator to check whether a path is working or not.
Explain csma protocol Framing methods
The CSMA protocol operates on the principle of carrier sensing. In this protocol, a *Character Count :
station listens to see the presence of transmission on the cable and decides to act This method is rarely used and is generally required to count total number of characters
accordingly. that are present in frame. This is done by using field in header. Character count method
*Non-Persistent CSMA: In this scheme, if a station wants to transmit a frame and it ensures data link layer at the receiver or destination about total number of characters
that follow, and about where the frame ends.
finds that the channel is busy then it will wait for fixed interval of time.
*Character stuffing :
-After this time, it again checks the status of the channel and if the channel is free Character stuffing is also known as byte stuffing or character-oriented framing and is
it will transmit. same as that of bit stuffing but byte stuffing actually operates on bytes whereas bit
*1-Persistent CSMA: In this scheme station which wants to transmit, continuously stuffing operates on bits. In byte stuffing, special byte that is basically known as ESC that
monitors the channel until it is idle and then transmits immediately. has predefined pattern is generally added to data section of the data stream or frame
-The disadvantage of this strategy is that if two stations are waiting then they will when there is message or character that has same pattern as that of flag byte. But
transmit simultaneously and collision will take place. This will then require receiver removes this ESC and keeps data part that causes some problems or issues. In
retransmission. simple words, we can say that character stuffing is addition of 1 additional byte if there is
*P.-Persistent CSMA: The possibility of such collisions and retransmissions is presence of ESC or flag in text.
reduced in the p-persistent CSMA. In this scheme all the waiting stations are not *Bit stuffing :
allowed to transmit simultaneously as soon as the channel becomes idle. Bit stuffing is also known as bit-oriented framing or bit-oriented approach. In bit stuffing,
-A station is assumed to be transmitting with a probability "p". For example if p = extra bits are being added by network protocol designers to data streams. It is generally
insertion or addition of extra bits into transmission unit or message to be transmitted as
1/6 and if 6 stations are waiting then on an average only one station will transmit
simple way to provide and give signaling information and data to receiver and to avoid or
and others will wait ignore appearance of unintended or unnecessary control sequences. It is type of protocol
management simply performed to break up bit pattern that results in transmission to go
How collision handle in csma/cd out of synchronization. Bit stuffing is very essential part of transmission process in
-The problem in CSMA explained earlier is that transmitting station continues to transmit network and communication protocol. It is also required in USB.
its frame even though a collision occurs. *Physical Layer Coding Violations :
-The channel time is unnecessarily wasted due to this. In CSMA/CD, if a station receives Encoding violation is method that is used only for network in which encoding on physical
other transmissions when it is transmitting, then a collision can be detected as soon as it medium includes some sort of redundancy
occurs and the transmission time can be saved.
-As soon as a collision is detected, the transmitting stations release a jam signal. *Advantages of variable size framing :
-The jam signal will alert other stations. The stations then are not supposed to transmit I. Although the whole message could be packed in one big frame, it is not done
immediately after the collision has occurred. practically because for large frames the flow and error. control becomes inefficient. Also
-Otherwise there is a possibility that the same frames would collide again. even for a single error the whole message needs to be retransmitted.
-After some "back off' delay time the stations will retry the transmission. If again the When the same message is divided into smaller frames, the flow and error control
collision takes place then the back off time is increased progressively. become efficient.
-A careful design can achieve efficiencies of more than 90% using CSMA/CD. 2. In LANs there are more than one senders. The messages sent by them could be of
different size. Hence it makes system efficient by keeping frame size variable as it is
possible to select an optimum frame size as per requirements.
Guided media What is Congestion Control?
*Twisted pair: Congestion control is a crucial aspect of network management that deals with the
-Twisted pair is a physical media made up of a pair of cables twisted with each other. A prevention and alleviation of congestion within a computer network. The goal of
twisted pair cable is cheap as compared to other transmission media. Installation of the congestion control mechanisms is to optimize the utilization of network resources,
twisted pair cable is easy, and itis a lightweight cable. The frequency range for twisted ensure fair sharing among users, and maintain the overall stability and efficiency of the
pair cable is from0to 3.3KHz. network. Key components and techniques involved in congestion control include:
-A twisted pair consists of two insulated copper wires arranged in a regular spiral pattern. *Traffic Monitoring:
-The degree of reduction in noise interference is determined by the number of turns per Network devices monitor the traffic flow to detect signs of congestion. Metrics such as
foot. Increasing the number of turns per foot decreases noise interference. packet loss, round-trip time, and queue lengths may be observed.
*Unshielded Twisted Pair: An unshielded twisted pair is widely used in *Feedback Mechanisms:
telecommunication Feedback mechanisms provide information to both endpoints and intermediate network
*Shielded Twisted Pair: A shielded twisted pair is a cable that contains the mesh devices about the current state of the network. This information helps adjust the rate of
surrounding the wire that allows the higher transmission rate. data transmission to prevent or alleviate congestion.
*Coaxial Cable *Flow Control:
- Coaxial cable is very commonly used transmission media, for example, TV wire is usually Flow control mechanisms regulate the rate at which data is transmitted to prevent a fast
a coaxial cable sender from overwhelming a slower receiver or the network. This can be implemented at
- The name of the cable is coaxial as it contains two conductors parallel to each other. various layers of the network stack.
- It has a higher frequency as compared to Twisted pair cable. *Quality of Service (QoS):
- The inner conductor of the coaxial cable is made up of copper, and the outer conductor QoS mechanisms prioritize certain types of traffic over others, ensuring that critical
is made up of copper mesh. The middle core is made up of non-conductive cover that applications receive preferential treatment in terms of bandwidth and latency.
separates the inner conductor from the outer conductor. *Congestion Avoidance:
- The middle core is responsible for the data transferring whereas the copper mesh Congestion avoidance mechanisms aim to prevent congestion from occurring in the first
prevents from the EM(Electromagnetic interference) place by dynamically adjusting the transmission rate based on the perceived state of the
*Fiber Optic network.
-Fiber optic cable is a cable that uses electrical signals for communication.
-Fiber optics cable that holds the optical fibers coated in plastic that are used to send the
data by pulses of light.
-The plastic coating protects the optical fibers from heat, cold, electromagnetic
interference from other types of wiring.
-Fiber optics provide faster data transmission than copper wires.

*Core: The optical fiber consists of a narrow strand of glass or plastic known as a core. A
core is a light transmission area of the fiber. The more the area of the core, the more light
will be transmitted into the fiber.
*Cladding: The concentric layer of glass is known as cladding. The rain functionality of
the cladding is to provide the lower refractive index at the core interface as to cause the
reflection within the core so that the light waves are transmitted through the fiber
*Jacket: The protective coating consisting of plastic is known as a jacket. main purpose of
a jacket is to preserve the fiber strength, absorb shock and extra fiber protection.
ARP and RARP protocol in detail What are Berkley Socket Primitive?
*Address Resolution Protocol (ARP) Berkeley Sockets are widely used for network programming and are the foundation for
Address Resolution Protocol is a communication protocol used for discovering physical developing applications that communicate over a network using protocols like TCP/IP
address associated with given network address. Typically, ARP is a network layer to data (Transmission Control Protocol/Internet Protocol). Here are some key features and
link layer mapping process, which is used to discover MAC address for given Internet concepts associated with Berkeley Sockets:
Protocol Address. In order to send the data to destination, having IP address is necessary *Socket Creation:
but not sufficient; we also need the physical address of the destination machine. ARP is The socket() system call is used to create a new socket. It returns a socket descriptor that
used to get the physical address of destination machine. is used in subsequent socket operations.
Before sending the IP packet, the MAC address of destination must be known. If not so, *Socket Types:
then sender broadcasts the ARP-discovery packet requesting the MAC address of Berkeley Sockets support different types of sockets, including stream sockets
intended destination. Since ARP-discovery is broadcast, every host inside that network (SOCK_STREAM) for reliable, connection-oriented communication (e.g., TCP) and
will get this message but the packet will be discarded by everyone except that intended datagram sockets (SOCK_DGRAM) for connectionless, unreliable communication (e.g.,
receiver host whose IP is associated. Now, this receiver will send a unicast packet with its UDP).
MAC address (ARP-reply) to the sender of ARP-discovery packet. After the original sender *Addressing:
receives the ARP-reply, it updates ARP-cache and start sending unicast message to the Sockets are associated with network addresses using structures like struct sockaddr and
destination. struct sockaddr_in for IPv4 addresses. These structures hold information about the local
and remote addresses of the communication endpoints.
*Reverse Address Resolution Protocol (RARP) *Binding:
Reverse ARP is a networking protocol used by a client machine in a local area network to The bind() system call is used to associate a socket with a specific local address and port.
request its Internet Protocol address (IPv4) from the gateway-router’s ARP table. The *Listening and Accepting:
network administrator creates a table in gateway-router, which is used to map the MAC For servers, the listen() function prepares a socket to accept incoming connections, and
address to corresponding IP address. When a new machine is setup or any machine the accept() function is used to accept a connection from a client.
which don’t have memory to store IP address, needs an IP address for its own use. So the *Connecting:
machine sends a RARP broadcast packet which contains its own MAC address in both For clients, the connect() function establishes a connection to a remote server.
sender and receiver hardware address field. *Data Transmission:
A special host configured inside the local area network, called as RARP-server is Data can be sent and received using functions like send(), recv(), write(), and read().
responsible to reply for these kind of broadcast packets. Now the RARP server attempt to *Closing Connections:
find out the entry in IP to MAC address mapping table. If any entry matches in table, The close() function is used to close a socket and release associated resources.
RARP server send the response packet to the requesting device along with IP address.
-LAN technologies like Ethernet, Ethernet II, Token Ring and Fiber Distributed Data
Interface (FDDI) support the Address Resolution Protocol.
-RARP is not being used in today’s networks. Because we have much great featured
protocols like BOOTP (Bootstrap Protocol) and DHCP( Dynamic Host Configuration
Protocol).
channel Allocation Problem in Computer Network Aloha and its type
-Channel allocation is a process in which a single channel is divided and allotted to pure Aloha:
multiple users in order to carry user specific tasks. There are user’s quantity may vary *Operation:
every time the process takes place. If there are N number of users and channel is divided In Pure Aloha, stations transmit data whenever they have a frame to send without
into N equal-sized sub channels, Each user is assigned one portion. If the number of users checking for the availability of the channel.
are small and don’t vary at times, then Frequency Division Multiplexing can be used as it After transmitting a frame, the station waits for an acknowledgment (ACK) from the
is a simple and efficient channel bandwidth allocating technique. receiver.
-Static Channel Allocation in LANs and MANs: If the ACK is not received within a certain time window, the station assumes a collision
It is the classical or traditional approach of allocating a single channel among multiple has occurred and retransmits the frame after a random back off time.
competing users using frequency division multiplexing if there are N users, the frequency *Efficiency:
channel is divided into N equal sized portions (bandwidth), each user being assigned one Pure Aloha is not very efficient, as the probability of collision is relatively high, especially
portion. since each user has a private frequency band, there is no interference between as the load on the channel increases.
users. *Throughput:
*Dynamic Channel Allocation: The maximum throughput of Pure Aloha is around 18.4% of the channel capacity.
Possible assumptions include: Slotted Aloha:
*Station Model: Assumes that each of N stations independently produce frames. The *Operation:
probability of producing a packet in the interval IDt where I is the constant arrival rate of Slotted Aloha divides time into discrete slots, and stations are required to transmit only
new frames. at the beginning of a time slot. Stations must be synchronized to the slot boundaries.
*Single Channel Assumption: In this allocation all stations are equivalent and can send If a station has a frame to transmit, it waits until the beginning of the next time slot.
and receive on that channel. *Efficiency:
*Collision Assumption: If two frames overlap in time-wise, then that’s collision. Any Slotted Aloha is more efficient than Pure Aloha because it reduces the probability of
collision is an error, and both frames must re transmitted. Collisions are only possible collisions.
error. *Throughput:
*Time can be divided into Slotted or Continuous. The max throughput of Slotted Aloha is approximately 36.8% of the channel capacity.
*Stations can sense a channel is busy before they try it. Comparison:
*Collision Handling:
Pure Aloha detects collisions by monitoring the channel after transmission.
Slotted Aloha reduces the probability of collisions by having stations transmit only at
specific time slots.
*Efficiency:
Slotted Aloha is more efficient than Pure Aloha due to reduced collision probabilities and
improved channel utilization.
*Implementation Complexity:
Pure Aloha is simpler to implement because it does not require synchronization to time
slots.
Slotted Aloha requires synchronization, which adds a level of complexity.
*Throughput:
Slotted Aloha achieves a higher throughput compared to Pure Aloha.
TCP 3-Way Handshake Process The receipt of a FIN only means that there will be no more data flowing in that direction. A TCP
-The process of communication between devices over the internet happens according to can send data after receiving a FIN. The end that first issues the close (example, send the first FIN)
the current TCP/IP suite model(stripped out version of OSI reference model). The executes the active close. The other end (that receives this FIN) manages the passive close.
Application layer is a top pile of a stack of TCP/IP models from where network referenced
applications like web browsers on the client-side establish a connection with the server. Leaky bucket algorithm and difference.
From the application layer, the information is transferred to the transport layer where -Step 1 − Let us imagine a bucket with a small hole at the bottom where the rate at which
our topic comes into the picture. The two important protocols of this layer are – water is poured into the bucket is not constant and can vary but it leaks from the bucket
TCP, UDP(User Datagram Protocol) out of which TCP is prevalent(since it provides at a constant rate.
reliability for the connection established). However, you can find an application of UDP in -Step 2 − So (up to water is present in the bucket), the rate at which the water leaks does
querying the DNS server to get the binary equivalent of the Domain Name used for the not depend on the rate at which the water is input to the bucket.
website. -Step 3 − If the bucket is full, additional water that enters into the bucket that spills over
-TCP provides reliable communication with something called Positive Acknowledgement the sides and is lost.
with Re-transmission(PAR). The Protocol Data Unit(PDU) of the transport layer is called a -Step 4 − Thus the same concept applied to packets in the network. Consider that data is
segment. a device using PAR resend the data unit until it receives acknowledgement. If coming from the source at variable speeds. Suppose that a source sends data at 10 Mbps
the data unit received at the receiver’s end is damaged(It checks the data with checksum for 4 seconds. Then there is no data for 3 seconds. The source again transmits data at a
functionality of the transport layer that is used for Error Detection), the receiver discards rate of 8 Mbps for 2 seconds. Thus, in a time span of 8 seconds, 68 Mb data has been
the segment. So sender has to resend the data unit for which positive acknowledgement transmitted.
is not received. You can realize from the above mechanism that three segments are That’s why if a leaky bucket algorithm is used, the data flow would be 8 Mbps for 9
exchanged between sender(client) and receiver(server) for a reliable TCP connection to seconds. Thus, the constant flow is maintained.
get established.
-Step 1 (SYN): In the first step, the client wants to establish a connection with a server, so Leaky bucket Token bucket
it sends a segment with SYN(Synchronize Sequence Number) which informs the server -Token independent. -Token dependent.
that the client is likely to start communication and with what sequence number it starts -If bucket full packet or data is discarded. -if bucket is full token are discarded but
segments with not the packet.
-Step 2 (SYN + ACK): Server responds to the client request with SYN-ACK signal bits set. -Packets are transmitted continuously. -Packets can only transmitted when there
Acknowledgement(ACK) signifies the response of the segment it received and SYN
are enough token.
signifies with what sequence number it is likely to start the segments with
-Step 3 (ACK): In the final part client acknowledges the response of the server and they -it sends packet at constant rate. -it allow large burst to be sent faster rate
both establish a reliable connection with which they will start the actual data transfer after constant rate.
-It does not save token. -It save token to send large burst.
Connection Termination Protocol (Connection Release)
While it creates three segments to establish a connection, it takes four segments to
terminate a connection. During a TCP connection is full-duplex, each direction should be
shut down alone.
The termination procedure for each host is shown in the figure. The rule is that either
end can share a FIN when it has finished sending data.
When a TCP receives a FIN, it should notify the application that the other end has
terminated that data flow direction. The sending of a FIN is usually the result of the
application issuing a close.
What is subnetting? what are the default subnet mask? *Name Resolution Process:
Subnetting is the process of dividing a larger network into smaller, more manageable When a user enters a domain name in a web browser or any application, the device
sub-networks or subnets. Its commonly use in IP networking to improve the efficiency of needs to resolve that domain name to an IP address for communication.
address allocation and to enhance network security and performance. Subnetting allows The device first checks its local cache to see if it already knows the corresponding
network administrators to create logical groupings of devices based on their IP addresses. IP address.
The default subnet mask for an IP address depends on the class of the IP address. IP *DNS Resolver:
addresses are divided into three main classes: A, B, and C. DNS resolvers are servers that receive DNS queries from clients and work to resolve the
1. Class A: domain name.
- Default Subnet Mask: 255.0.0.0 The resolver can be provided by your Internet Service Provider (ISP), or you can use
- Example IP Range: 1.0.0.1 to 126.255.255.254 public DNS resolvers like those operated by Google (8.8.8.8) or Cloudflare (1.1.1.1).
- Class A addresses are typically used for large networks with a large number of hosts. *Recursive Query:
2. Class B: If the DNS resolver doesn't have the requested IP address in its cache, it initiates a
- Default Subnet Mask: 255.255.0.0 recursive query to find the information.
- Example IP Range: 128.1.0.1 to 191.254.255.254
- Class B addresses are often used for medium sized networks. Go Back N ARQ Protocol
3. Class C: Go-Back-N Automatic Repeat request (ARQ) is specific type of Automatic Repeat request
- Default Subnet Mask: 255.255.255.0 protocol used for reliable data communication over a network, especially in situations
- Example IP Range: 192.0.1.1 to 223.255.254.254 where data may be lost or corrupted during transmission.
- Class C addresses are suitable for small networks. Here's an overview of how the Go-Back-N ARQ protocol works:
While these default subnet masks provide a starting point, subnetting allows for more *Sender Side:
flexibility. It enables network administrators to create subnets with different sizes to The sender maintains a sliding window of sent frames. The window size is a configurable
accommodate the specific requirements of their network. parameter that determines how many frames can be outstanding (in-flight) at any given
For example, with subnetting, a Class C network (default subnet mask 255.255.255.0) time. The sender sends a sequence of frames to the receiver, and each frame is
could be further divided into smaller subnets, each with its own unique subnet mask, to numbered. After sending a frame, the sender starts a timer.
efficiently allocate IP addresses and manage network traffic. *Receiver Side:
The receiver acknowledges received frames by sending back an acknowledgment (ACK)
DNS with the highest consecutively received frame number. If the receiver detects a gap in the
DNS, or Domain Name System, is a hierarchical and distributed naming system used to received frames it discards the out-of-sequence frames and sends a negative
translate user friendly domain names into IP addresses, which are numerical identifiers acknowledgment (NAK) for the last correctly received frame.
associated with networked devices on the Internet. In essence, DNS acts as a distributed The receiver also has a window size to control the flow of incoming frames.
database that allows users to access websites, send emails, and use various internet *Sender Behavior on Timeout:
services using human-readable domain names. If the sender's timer expires before receiving an acknowledgment, it assumes that some
Here's how DNS works: frames were lost or corrupted during transmission.
*Domain Name Structure: The sender retransmits all frames starting from the earliest unacknowledged frame
Domain names are organized into a hierarchical structure, with the top-level domain This "go-back" behavior means that the sender may retransmit frames that the receiver
(TLD) at the top, followed by second-level domains, subdomains, and individual has already successfully received.
hostnames. *Flow Control:
For example, in the domain name :- "www.example.com": , ".com" is the top-level The window size at both the sender and receiver helps control the flow of frames in the
domain. , "example" is the second-level domain. , "www" is a subdomain. network. The sender is allowed to have certain no of unacknowledged frames in transit.
Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP)
HTTP stands for Hypertext Transfer Protocol. It is used to access data on the WWW(World SMTP stands for Simple Mail Transfer Protocol, the procedure behind the email flow on
Wide web. It is a protocol which governs the communication between the client and the internet.
server *You send an email with your webmail or mail client from your address to a given
There are three important features of HTTP recipient In jargon, the webmail or client is called Message User Agent, Or MU’A.
*HTTP Connectionless *The message is sent normally via port 25 to an SMTP server which is given to your client
After a request is made, the client disconnects from the server and waits for a response. when you set it up and acts as a Message Transfer Agent or MTA. Client and server start a
The server must re-establish the connection after it processes the request. brief conversation where the latter checks all the data concerning the message's
*HTTP is Media Independent transmission Note that SMTP language defines only the message's transmission, and
Any type of data can be sent b HTTP long as both the client and server know how to doesn't deal with its body content
handle the data content *Then, if the domain where your recipient has his account is directly connected to
*HTTP is Stateless the server, the email is immediately delivered. fit's pot the case, the SMTP
This is a direct result of HTTP being connectionless. The server and client are aware of hands it to another incoming server loser to the recipient In our example, the Website
each other only during a request. Afterwards, each forgets the other. For this reason server connects with the Domain server, which receives the email and stores it
neither the client now the browser can retain information between different requests *What if the recipient's server is don or busy? The SMTP host simply drops the message
across the web pages. to a backup server: if none of them is available, the email is queued and the delivery is
*Working: retried periodically, After a determined period, however, the message is returned as
i. A browser contacts a server to establish a TCP connection with it undelivered.
ii. The HTTP software on the client sends a request to the server. The HTTP software on If there are no issues, however, the final segment is controlled by POP, another protocol
the server interprets this request and sends the response to the client that picks up the email from the receiving server and puts it into the recipient's inbox
iii. HTTP Commands
a. GET-Request by a client to obtain a web page from the server -Connection-oriented Service is necessary. -Connection-less Service is not compulsory.
b. PUT-Request by a client to store a web page on the server. -Connection-oriented Service is feasible. -Connection-less Service is not feasible.
c. POST-Request by a client to update contents of a web page on the server. -Congestion is not possible. -Congestion is possible.
d. DELETE-Request by a client to remove a web page from the server -gives the guarantee of reliability. -does not give a guarantee of reliability.
-Packets follow the same route. -Packets do not follow the same route.
-Transmission Control Protocol. -User Datagram Protocol. -require a bandwidth of a high range. -requires a bandwidth of low range.
-TCP is a connection-oriented protocol. -UDP is the Datagram-oriented protocol. -Connection-oriented requires -Connection-less Service does not require
-acknowledgment segment is present. -No acknowledgment segment. authentication. authentication.
-TCP is comparatively slower than UDP. -UDP is faster, simpler, and more efficient -preferred by long and steady -preferred by bursty communication.
than TCP. communication.
-TCP is heavy-weight. -UDP is lightweight. -Ex. TCP -Ex. UDP
-TCP doesn’t support Broadcasting. -UDP supports Broadcasting.
-TCP connection is a byte stream. -UDP connection is a message stream.
-Low but higher than UDP. -Very low.
-The size of TCP is 20 bytes. -The size of TCP is 8 bytes.
-Transmission Control Protocol. -User Datagram Protocol.
-TCP is a connection-oriented protocol. -UDP is the Datagram-oriented protocol.
-acknowledgment segment is present. -No acknowledgment segment.
-TCP is comparatively slower than UDP. -UDP is faster, simpler, and more efficient
than TCP.
-TCP is heavy-weight. -UDP is lightweight.
-TCP doesn’t support Broadcasting. -UDP supports Broadcasting.
-TCP connection is a byte stream. -UDP connection is a message stream.
-Low but higher than UDP. -Very low.
-The size of TCP is 20 bytes. -The size of TCP is 8 bytes.
-Connection-oriented Service is necessary. -Connection-less Service is not compulsory.
-Connection-oriented Service is feasible. -Connection-less Service is not feasible.
-Congestion is not possible. -Congestion is possible.
-gives the guarantee of reliability. -does not give a guarantee of reliability.
-Packets follow the same route. -Packets do not follow the same route.
-require a bandwidth of a high range. -requires a bandwidth of low range.
-Connection-oriented requires -Connection-less Service does not require
authentication. authentication.
-preferred by long and steady -preferred by bursty communication.
communication.
-Ex. TCP -Ex. UDP

You might also like