Professional Documents
Culture Documents
CSE 3 10 marks
CSE 3 10 marks
10 Marks
i)Define Network. ii)What are the components of a network? iii)Mention the criteria of
a network.
I) A network is a group of connected devices, such as computers and phones, that share
information and resources with each other.
Network Topologies
1. Bus Topology: All devices are connected to a single central cable, known as the bus.
2) ( i) Describe the functions of the layers in OSI model. ii) With suitable diagram,
explain the working principles of signal propagation through fiber optic cable.
Cladding: Outer optical material surrounding the core that reflects light back into the core.
Buffer Coating: Protective coating that cushions the fiber and prevents it from damage and moisture.
1. Simplex Mode:
○ Description: Data flows in one direction only. One device is the transmitter
and the other is the receiver.
○ Examples: Keyboard to computer, television broadcast.
○ Diagram:
2. Half-Duplex Mode:
○ Description: Data can flow in both directions, but not simultaneously.
Devices take turns transmitting and receiving.
○ Examples: Walkie-talkies, CB radios.
○ Diagram:
3. Full-Duplex Mode:
○ Description: Data can flow in both directions simultaneously. Both devices
can transmit and receive data at the same time.
○ Examples: Telephone conversations, modern Ethernet networks.
4. How many bits are there in physical address? In terms of addressing, what are the
types of addressing? Mention their purpose of uses.
A physical address, also known as a MAC (Media Access Control) address, is
typically 48 bits long.
ii) Physical Address Bits and Addressing Types
Physical Address: Identifies devices at the hardware level, typically using MAC addresses.
Logical Address: Identifies devices at the network layer, usually with IP addresses, for
routing data packets.
HTTP traffic typically uses port 80 and HTTPS traffic uses port 443
II) Its most basic form as a function of time (t) is y(t) = Asin(2πft + φ) = Asin(ωt + φ)
Where:
The ALOHA protocol is a simple communication scheme used in networks for data packet
transmission. It allows multiple users to access a shared communication channel. There are
two types of ALOHA protocols: Pure ALOHA and Slotted ALOHA.
Pure ALOHA Protocol-Pure ALOHA allows users to transmit data at any time, but if a
collision occurs (two or more users transmit at the same time), the data must be
retransmitted after a random time delay. Flow Diagram of Pure ALOHA
7. Suppose an IP datagram arrives at a router with a TTL field value of zero. What
will the router do?
● Router's Response: When an IP packet arrives at a router with TTL set to zero:
○ Action: The router discards the packet.
○ Reason: Prevents the packet from looping indefinitely.
○ Feedback: Sends an ICMP Time Exceeded message to the sender.
This ensures network stability and prevents packets from causing unnecessary congestion.
8. ii) How many bits are there with IPv4 addressing? How to represent an IPv4 address
in dotted decimal format? Mention the highest valued and lowest valued IPv4 address
in dotted decimal format. iii) Explain, what type of addresses are used in a LAN
without having a internet connection? iv)How a router works in a network?
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It can generate 4.29×109 address The address space of IPv6 is quite large it can
space produce 3.4×1038 address space
IPv4 has a header of 20-60 bytes. IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consists of 4 fields which IPv6 consists of 8 fields, which are separated by
are separated by addresses dot a colon (:)
(.)
Scalability Scales well in large, dynamic More suitable for smaller, stable
networks networks
Flags: 3 flags of 1 bit each : reserved bit (must be zero), do not fragment flag, more
fragments flag (same order)
Fragment Offset: Specifies the position of the fragment in the original packet.
Header Checksum: header checksum for checking errors in the datagram header
Key Usage Uses one shared secret Uses a pair of keys: a public key for
key encrypting and a private key for
decrypting.
Key Both parties need the One key (the public key) is freely
Distribution same key, securely distributed, while the other (the private
shared. key) is kept secret.
Efficiency Fast and efficient for Slower, especially with large data.
large data.
Scalability More scalable for large May have scalability issues with large
volumes of data. datasets.
Secure Key Not applicable; key Enables secure key exchange without
Exchange exchange is a challenge. prior interaction.
A firewall proxy provides security by controlling the information going in and out of the
network. Firewall proxy servers filter, cache, log, and control requests coming from a client to
keep the network secure and free of intruders and viruses. Proxy firewall has its own IP
(internet protocol) address so that internal network never makes a direct connection with
outside internet. Since it monitors information at the application level, it is also known as
application firewall.
1. The proxy firewall acts as intermediary between trusted internal network and outside
internet.
2. If computers in internal network wish to make a connection with outside internet, they
first communicate with the proxy.
3. Proxy then forwards data from internal network to the internet and sends data
received from internet to internal network.
4. In this way the proxy firewall shields internal network from intruders in the outside
internet and prevents direct connections between internal network and internet.
10. Mention and describe in brief about the system calls using UDP for client and
server processes in client-server paradigm.
System Calls using UDP for Client and Server Processes:
Server Process
1. socket():
○ Description: Creates a new socket.
○ Purpose: Establishes a socket for communication
2. bind():
○ Description: Binds the socket to a specific port number and IP address.
○ Purpose: Associates the socket with the server's address and port number
3. recvfrom():
○ Description: Receives a datagram from a client.
○ Purpose: Waits for a datagram from a client and captures the client's address
for sending responses.
4. sendto():
○ Description: Sends a datagram to a client.
○ Purpose: Sends a response datagram back to the client using the client's
address obtained from recvfrom().
5. close():
○ Description: Closes the socket.
○ Purpose: Releases the socket and frees up resources.
Client Process
1. socket():
○ Description: Creates a new socket.
○ Purpose: Establishes a socket for communication
2. sendto():
○ Description: Sends a datagram to the server.
○ Purpose: Sends a datagram containing data to the server's address and port.
3. recvfrom():
○ Description: Receives a datagram from the server.
○ Purpose: Waits for a response datagram from the server.
4. close():
○ Description: Closes the socket.
○ Purpose: Releases the socket descriptor and frees up resources.
11. Describe the leaky bucket mechanism toward traffic shaping with a suitable
diagram.
The leaky bucket mechanism is a traffic shaping algorithm used in computer networks to
control the rate at which packets are transmitted. It helps to prevent network congestion.
Description
The leaky bucket algorithm can be visualized using a simple analogy of a bucket with a
small hole at the bottom:
1. Bucket: Represents the buffer or queue where incoming packets are stored.
2. Water (Packets): Represents the data packets arriving at the bucket.
3. Hole: Represents the fixed rate at which packets are transmitted from the
bucket.
● How It Works:
1. Arrival: Packets arrive and are added to the bucket (queue) at varying rates.
2. Leak: Packets are transmitted (leak out) from the bucket at a constant rate.
3. Overflow: If the bucket is full and more packets arrive, the excess packets are
discarded (representing packet loss).
12. Describe the token bucket mechanism toward traffic shaping with a suitable
diagram.
● Description:
○ The token bucket is another method for controlling data transmission rates in
a network. It uses tokens to regulate when and how much data can be sent.
● The token bucket mechanism can be visualized using the analogy of a bucket that
holds tokens:
○ Token Generation: Tokens are generated at a constant rate and stored in the
token bucket.
○ Data Transmission: Data packets can only be sent if there are enough tokens
available in the bucket.
○ Token Consumption: Tokens are consumed as data packets are transmitted.
If no tokens are available, transmission is delayed until tokens accumulate.
<!DOCTYPE html>
<!-- Specifies the document type and version of HTML (HTML5) →
<html>
<!-- Root element of the HTML document -->
<head>
<!-- Container for metadata and links to external resources →
<meta charset="UTF-8">
<!-- Defines the character encoding for the document as UTF-8 -->
<title>Document</title>
<!-- Sets the title of the document, shown in the browser's title bar or tab -->
</head>
<body>
<!-- Main content of the HTML document -->
</body>
</html>
<!-- Closes the root element of the HTML document -->
● Definition:
● HTTP stands for HyperText Transfer Protocol.
● It is a protocol used to access the data on the World Wide Web (www).
● The HTTP protocol can be used to transfer the data in the form of plain text,
hypertext, audio, video, and so on.
● Uses:
○ Web Communication: it helps web browsers and servers talk to each
other.
○ Retrieving Content: Helps users get web pages, images, videos, etc.,
from servers.
○ Independent Requests: Each user request is separate,
○ Foundation of Web Services: Forms the basis for many web
applications and APIs.
5. If data string is: 1001101 then derive redundant bits are to be added to the data
string and place them to their right places to generate the code to be transmitted.