Download - KU BSCIT 63 - Advance computer networks
-
8/13/2019 KU BSCIT 63 - Advance computer networks
1/13
BSIT 63 (Advanced Computer Networks)
CHAPTER! (App"#cat#on $a%er)
!& $#st t'e unct#ons o app"#cat#on "a%er&
Answer-
The functions of the application layer are:
It is responsible for facilitating interaction between many applications like WWW, EMAIL, T!,
an" #$%, an" ser&ers like mail ser&er an" T! ser&er'
It interfaces "irectly to an" performs common application ser&ices for the application processes( it
also issues re)uests to the presentation layer'
*& +'at #s ,NS
Answer-
#$% is a name resolution ser&ice that resol&es host names to the I! a""resses' #$% has a hierarchical an"
"istribute" "atabase that contains mappings of host names with the correspon"ing I! a""resses'
3& E-p"a#n t'e work#n. o ,NS w#t' an e-amp"e&
Answer-
#$% is a name resolution ser&ice that resol&es host names to I! a""resses' A #$% ser&er resol&es host
names to I! a""resses for #$% )ueries sent by the #$% clients' These )ueries can be in the form of a name
resolution )uery or a resource recor"' The resol&er sen"s a *ser #atagram !rotocol +*#! packet to the
local #$% ser&er' The #$% ser&er searches its table an" returns the I! a""ress, which matches the "omainname' #$% has a hierarchical an" "istribute" "atabase that contains mappings of host names with the
correspon"ing I! a""resses'
esource recor"s are store" in a specific portion of the #$% "atabase calle" the #$% .one' A #$% .one
contains resource recor"s along with the owner names'
or e/ample, an application program calls a proce"ure with its "omain name as parameter' The proce"ure
sen"s an *#! packet to the local #$% ser&er' The #$% ser&er searches its table an" returns the I! a""ress
which matches the #omain name' The program can now establish a T0! connection or sen" *#! packets'
/& +'at #s #terat#ve reso"ut#on 0#ve e-amp"e&
Answer-
Iterati&e resolution refers to the name resolution techni)ue in which a ser&er sen"s back the information to a
client or sen"s the name of the ser&er that has the information' The client then iterates by sen"ing a re)uest
to this referre" ser&er' This ser&er may return the information itself or sen" the name of another ser&er' This
process continues till the time the client recei&es the re)uire" information'
1& +'at are t'e unct#ons o t'e user a.ent #n t'e Ema#" arc'#tecture
Answer-
In the e-mail architecture, the user agent helps users to interact with the e-mail systems' The functions of the
user agent in e-mail architecture are:
Compos#t#on: It refers to writing the mail' 1ere users type the message that they want to con&ey'The users ha&e to mention the recipient2s e-mail a""ress'
Rece#v#n.: It refers to retrie&ing the e-mails from the !3!4 ser&er'
Rep"%#n. to messa.es: It refers to replying to a recei&e" e-mail' To reply to the e-mail, the user has
to click reply, type the message, an" sen" it back'
http://0.0.0.22/post/2013/10/bsit-63-advanced-computer-networks.htmlhttp://0.0.0.22/post/2013/10/bsit-63-advanced-computer-networks.html -
8/13/2019 KU BSCIT 63 - Advance computer networks
2/13
Support man#pu"at#on o ma#" 2o-: It refers to customi.ation of the mail bo/' 1ere users can create
fol"ers an" manage the mail accor"ing to the sen"er'
6& ,#scuss t'e send#n. and rece#v#n. process #n Ema#"
Answer-
The prere)uisites for sen"ing an" recei&ing an e-mail are:
5oth the sen"er an" recipient shoul" ha&e an e-mail account'
The sen"er must pro&i"e the "estination a""ress an" write a message'
The following is the se)uence of the e-mail sen"ing process:
6' When the sen"er clicks send, the machine establishes a connection with the %MT! ser&er by using
port 78'
7' An %MT! configure" e-mail "aemon9process uses this port' This "aemon9process accepts incoming
connections an" sen"s the mails to its appropriate "omain' or e/ample if you sen" the mail from
yahoo'com to hotmail'com, the mail goes to the yahoo %MT! ser&er, an" then the %MT! ser&er
sen"s it to the !3!4 ser&er of hotmail'com'
4' If a message cannot be "eli&ere", an error report containing the first part of the un"eli&erablemessage is returne" to the sen"er'
In the implementations of !3!4, the ser&er maintains a collection of te/t files, one for each e-mail
account' When a message arri&es, the !3!4 ser&er simply appen"s it to the bottom of the recipients file'
The following is the se)uence of the e-mail recei&ing process:-
6' The e-mail client connects to the !3!4 ser&er by using port 66;' The !3!4 ser&er re)uires an
account name an" a passwor"'
7' After pro&i"ing a &ali" username an" passwor", the user gets &erifie" by the !3!4 ser&er'4' If the username an" passwor" are &ali", the !3!4 ser&er opens your te/t file an" allows you to
access it'
& +r#te a 2r#e note on S4TP
Answer-
%MT! is a protocol that transfers mail reliably an" efficiently' %MT! is in"epen"ent of a particular
transmission subsystem an" nee"s only a reliable or"ere" "ata stream channel' An important feature of
%MT! is its capability to relay mail across transport ser&ice en&ironments'
5& ,#scuss t'e work#n. o PP3 #n an Ema#" s%stem +'at are #ts "#m#tat#onsAnswer-
When users check their e-mail, the e-mail client connects to the !3!4 ser&er by using port 66;' The !3!4
ser&er re)uires an account name an" a passwor"'
The !3!4 ser&er issues a series of comman"s to bring copies of user e-mail messages to user2s local
machine'
-
8/13/2019 KU BSCIT 63 - Advance computer networks
3/13
be "elete"' #uring the authori.ation state, at times, when the ser&er is set for three passwor"s trials, if you
gi&e the wrong passwor" thrice, your mail bo/ will get locke"'
!3!4 ser&ers ha&e certain limitations such as :-
There is no fol"er structure for sorting e-mail messages that are sa&e" on the !3!4 ser&er' The
ser&er has only one fol"er for incoming mails, which is the inbo/'
$o rules can be set at the !3!4 ser&er' All rules are set at the client en" only' If a user2s machine
crashes, e-mail messages can only be reco&ere" if a copy of them is left on the ser&er' To check e-mail, users ha&e to "ownloa" them first an" only then they can &iew their mails on the
e-mail client software' *ser cannot see mails first an" then "ownloa" the re)uire" mails' If there are
spam e-mail messages in the inbo/ that can be "angerous for the computer, these will also get
"ownloa"e" an" the user has to "elete them'
7& +'at #s www
Answer-
WWW is a hyperte/t-base" system that pro&i"es a uniform an" a user-frien"ly interface for accessing the
resources on the Internet' It is an information space in which the items of interest, referre" to as resources,are i"entifie" by global i"entifiers calle" *niform esource I"entifiers +*I'
!8& ,#scuss t'e arc'#tecture o +++
Answer-
The architecture of WWW is two tiere"' It consists of the client an" the ser&er' The client +web browser
re)uests for a web page' This page is retrie&e" from the ser&er' The architecture "epen"s on three key
stan"ar"s: 1TML for enco"ing "ocument content, *niform esource Locator +*L for naming remote
information ob=ects in a global namespace, an" 1TT! for staging the transfer' The following figure shows
the two-tiere" architecture of WWW
e)uest0LIE$T ------------------ >%E?E @--------------
esponse
Two-Tier Architecture of WWW
If the web pages are interacting with the "atabase, then the architecture becomes three-tiere", as shown in
the following figure'
e)uest
C$IENT ---------------> SER9ER -----------------> ,ATA BASE
@--------------- @----------------
esponse
three-Tier Architecture of WWW
!!& E-p"a#n t'e c"#ent s#de and server s#de events w'en a user c"#ck on a :R$
Answer-
The client si"e e&ents when a user clicks on a *L are as follows:
6' The browser locates the *L'
7' The browser asks #$% for the I! a""ress'
4' #$% replies with the I! a""ress'
' The browser makes the Transmission 0ontrol !rotocol +T0! connection to !ort B; on the machine
-
8/13/2019 KU BSCIT 63 - Advance computer networks
4/13
with the abo&e I! a""ress'
8' The browser sen"s a re)uest for the specific file'
C' The ser&er sen"s the re)uire" file'
D' The T0! connection is close"'
B' The browser "isplays all te/t information'
' The browser "isplays all images'
When a user clicks on a *L, the ser&er si"e e&ents are as follows:
6' %er&er accepts a T0! connection from a client'
7' %er&er searches the file associate" with the web page'
4' ile from the "isk is retrie&e"'
' The web page is returne" to the client'
8' T0! connection is release"'
!*& E-p"a#n w'at #s a server arm 0#ve an e-amp"e&
Answer-
A ser&er farm is a group of networke" ser&ers that are house" in one location' A ser&er farm streamlinesinternal processes by "istributing the workloa" between the in"i&i"ual components of the farm an"
e/pe"ites computing processes by harnessing the power of multiple ser&ers' The farms rely on loa"
balancing software that accomplishes the following tasks:
Tracking "eman" for processing power from "ifferent machines'
!rioriti.ing the tasks'
%che"uling an" resche"uling tasks "epen"ing upon priority an" "eman" that users put on the
network'
When one ser&er in the farm fails, another can step in as a backup'
0ombining ser&ers an" processing power into a single entity has been relati&ely common for many
years in research an" aca"emic institutions' To"ay, more an" more companies are utili.ing ser&er
farms as a way of han"ling the enormous amount of computeri.ation of tasks an" ser&ices that they
re)uire'
%er&er farm, or web farm, refers to either a web site that runs on more than one ser&er or an Internet
%er&ice !ro&i"er +I%! that pro&i"es web hosting ser&ices by using multiple ser&ers'
%er&er compute farms are making their way into large manufacturing en&ironments for electronic
"esign automation, an" to accelerate processes an" complete tasks' A ser&er farm accomplishes this by harnessing computing power from multiple machines an"
combining that power' E/ample of a ser&er farm inclu"es
-
8/13/2019 KU BSCIT 63 - Advance computer networks
5/13
the same physical network or if the packet "eli&ery is between the last router an" the "estination
host A$# In in"irect routing, the packet goes from router to router until it reaches the router
connecte" to the same physical network as its final "estination'
7' In "irect routing, the a""ress mapping is between the I! a""ress of the final "estination an" the
physical a""ress of the final "estination A$# In an in"irect routing, the a""ress mapping is between
the I! a""ress of the ne/t router an" the physical a""ress of the ne/t router'
4' A packet "eli&ery always in&ol&es one "irect routing A$# A packet "eli&ery may or may not
in&ol&e in"irect routing'
*& ,#scuss d#erent approac'es used to make t'e rout#n. ta2"e more e#c#ent
Answer-
There are many approaches to make a routing table efficient such as:
Ne-t 'op rout#n.: In this techni)ue, the routing table hol"s only the a""ress of the ne/t hop instea"
of hol"ing information about the complete route' outing tables are thereby consistent with each
other'
Network spec##c rout#n.: In this techni)ue, routing tables are ma"e smaller so that the search
process becomes simpler' Instea" of ha&ing an entry for e&ery host connecte" to the same physical
network, we ha&e only one entry to "efine the a""ress of the network itself'
3& Name RIP;s var#ous sta2#"#t% eatures&
Answer-
The stability features of I! are:
Hopcount "#m#t: This feature limits the number of hops allowe" in a path from source to
"estination' The ma/imum number of hops in a path is 68' If for some reasons the router recei&es a
routing up"ate that contains a new or change" entry, an" if increasing the metric &alue by 6 causes
the metric to be infinity +that is, 6C, the network "estination is consi"ere" unreachable' Ho"ddown t#mers: This feature is useful in pre&enting routing information from floo"ing the
network when network links are unstable'
Sp"#t 'or#
-
8/13/2019 KU BSCIT 63 - Advance computer networks
6/13
-
8/13/2019 KU BSCIT 63 - Advance computer networks
7/13
*& +'at #s an aud#o +'at #s a v#deo
Answer-
Aud#o: It "eals with only &oice' or e/ample, a song or a lecture on any uni&ersity site'
9#deo: It has got both &oice an" li&e image, such as a mo&ie, a song, or a clipping of a lecture'
3& +'at #s stream#n.
Answer-
%treaming is the process of recei&ing store" au"io9&i"eo application from a ser&er where they are place"' Aclient begins to play either an au"io or a &i"eo once the me"ia player of the client2s !0 begins recei&ing the
au"io or &i"eo file from the ser&er' #uring the process, the client will be playing au"io9&i"eo from one
location in the file while it is recei&ing the remaining parts of the file from the ser&er' In other wor"s,
streaming a&oi"s long "ownloa" times an" the nee" to store the entire file on the users computer'
/& $#st t'e draw2acks o t'e current #nternet to dr#ve t'e mu"t#med#a data
Answer-
The Internet has some "rawbacks with regar" to multime"ia "ata' or e/ample, the me"ia player "oes not
communicate with the streaming ser&er "irectly' This "elay, before play-out begins, is typically
unacceptable for au"io9&i"eo clips of mo"erate length' or this reason, au"io9&i"eo streaming
implementations typically ha&e the ser&er sen" the au"io9&i"eo file "irectly to the me"ia player process' Inother wor"s, a "irect socket connection is ma"e betwen the ser&er process an" the me"ia player process'
1& How t'e e-#st#n. #nternet can 2e made to port mu"t#med#a data
Answer-
or making the e/isting Internet portable to multime"ia "ata, the following mo"ifications nee" to be "one:
6' A protocol is re)uire" that reser&es ban"wi"th on behalf of the streaming ser&er applications'
7' The sche"uling policies in the router )ueues shoul" be mo"ifie" so that the ban"wi"th reser&ations
can be "one' With the new sche"uling policies, not all packets get e)ual treatment, instea" the
packets from the multime"ia pro&i"er sites that reser&e an" pay more, get more ban"wi"th'
4' The applications must gi&e the network a "escription of the traffic that they inten" to sen" to the
network'
' The ban"wi"th an" switching capacity shoul" be enhance" to pro&i"e satisfactory "elay an" packet
loss performance within the network'
8' 0aches must be installe" in the networks' 0aches bring store" content +web pages as well as store"
au"io an" &i"eo closer to users, thereby re"ucing the traffic in the higher-tier I%!s'
C' 0ontent pro&i"ers that pay for a 0ontent #istribution $etworks +0#$ ser&ice shoul" "eli&er
content faster an" more effecti&ely'
D' Multicast o&erlay networks can be "eploye"' A multicast o&erlay network consists of ser&ers
scattere" throughout the I%! network an" potentially throughout the entire Internet' %er&ers an" the
logical links between ser&ers collecti&ely form an o&erlay network, which multicasts traffic from asource to millions of users'
6& E-p"a#n t'e +'% Aud#o and 9#deo need to 2e compressed
Answer-
0ompression is re)uire" to re"uce the si.e of au"io an" &i"eo so that they can be easily transmitte" o&er the
Internet' or e/ample, a single image consisting of 6;7 pi/el 6;7 pi/els, with each pi/el enco"e" into
7 bits re)uires 4 M5 of storage without compression' There are eight bits, three each for the colors re",
green, an" blue' It woul" take appro/imately se&en minutes to sen" the image o&er a C kbps link' If the
image is compresse" at a mo"est 6;:6 compression ratio, the storage re)uirement is re"uce" to 4;; Jbytes
an" the transmission time also "rops by a factor of 6;'
& E-p"a#n aud#o stream#n. process
Answer-
Au"io streaming is the transfer of au"io-enco"e" packets that are "eco"e" an" sent to the client2s soun"car"
-
8/13/2019 KU BSCIT 63 - Advance computer networks
8/13
upon reception' The host si"e is responsible for enco"ing an" packeti.ing the au"io stream' The client si"e
is responsible for "eco"ing the packets an" sen"ing the "eco"e" au"io to the soun" car"' There are "elays
inherent in the o&erall system' These "elays are contribute" by the enco"e9"eco"e "elay, transfer "elay,
buffer "elay, mo"em "elay, soun" car" "elay, an" other "elays' As long as the "elays are kept constant, then
the au"io will be "eli&ere" uninterrupte"'
5& +'at #s a stream#n. server
Answer-
%treaming ser&ers are meant for the au"io9&i"eo streaming applications' *pon client re)uest, a ser&er "irectsan au"io or a &i"eo file to the client by sen"ing the file into a socket' 5oth the T0! an" *#! socket
connections are use"' 5efore sen"ing the au"io9&i"eo file to a network, the file is segmente", an" the
segments are typically encapsulate" with special hea"ers appropriate for au"io an" &i"eo traffic' %treaming
ser&ers sen" "igital &i"eo for news, entertainment, or e"ucational content o&er the Internet by using
T!9T%!' A multime"ia file gets uploa"e" on the ser&er an" streaming ser&ers enco"es content in the
latest me"ia formats inclu"ing M!E
-
8/13/2019 KU BSCIT 63 - Advance computer networks
9/13
-
8/13/2019 KU BSCIT 63 - Advance computer networks
10/13
6& Compare 58*&!!a> 58*&!!2> 58*&!!. and 2"ue toot'&
Answer-
=eature 58*&!!a 58*&!!2 58*&!!. B"uetoot'
,ata rate-- 1/*42ps- !!42ps 1/42ps-- *!2ps--16 2ps
=reDuenc%--10'
-
8/13/2019 KU BSCIT 63 - Advance computer networks
11/13
transmission A$# In this case, shiel"ing is not so simple' Therefore, ra"io transmission can interfere
with other sen"ers an" electrical "e&ices can "estroy "ata transmission &ia ra"io'
8' $o licenses are re)uire" for infrare" technology 5*T a"io transmission is only permitte" in certain
fre)uency ban"s' ?ery limite" ranges of license-free ban"s are a&ailable worl"wi"e, an" those
a&ailable are typically not the same in all countries'
C' Infrare" technology is normally use" for "e&ices like !#As, laptops, notebooks, mobile phones, an"
so on A$# a"io transmission is use" for wi"e area networks +WA$ such as microwa&e links an"
mobile cellular phones'
D' In Infrare" 3nly IEEE B;7'66 makes use of this type of transmission A$# In a"io transmissionWLA$ technologies such as IEEE B;7'66, 1I!ELA$, an" 5luetooth make use of this type of
transmission'
7& ,#scuss t'e arc'#tecture o +$AN
Answer-
WLA$ architecture consists of three components:
6' Wireless en" stations
7' Access points
4' 5asic ser&ice sets +5%%
The wireless en" station can be any "e&ice that can communicate using the B;7'66 stan"ar"' These "e&ices
inclu"e laptops, workstations, an" !#As, as well as printers an" scanners'
The access point +A! is a "e&ice' It acts as a network platform for connections between WLA$s or to a
wire" LA$ an" as a relay between stations attache" to the same A!'
5%% is the logical component of wireless architecture' In general, it is a set of wireless stations controlle" by
a single management function an" has two configuration options that is, Infrastructure 5%% +I5%% an"
E/ten"e" %er&ice %et +E%%'
In an I5%%, the stations communicate "irectly to one another without the nee" for an access point' An E%%
is a set of infrastructure 5%%s that appear as a single 5%%' This is important for connection re"un"ancy but
has some security issues that nee" to be a""resse"'
!8& Br#e"% e-p"a#n t'e +$AN protoco" arc'#tecture
Answer-
In a typical WLA$ setup, the IEEE B;7'66 stan"ar" WLA$ +Access !oint gets connecte" to an IEEE
B;7'4 stan"ar" Ethernet +%witch91*5 &ia a bri"ge' The higher layers +application, T0!, I! look the same
for the wireless no"e as for the wire" no"e' The IEEE B;7'66 stan"ar" only co&ers the physical layer +!1G
an" me"ium access layer +MA0 like the other B;7'/ LA$s "o' The physical layer is sub "i&i"e" into the!hysical Layer 0on&ergence !rotocol +!L0! an" the !hysical Me"ium #epen"ent %ub Layer' The basic
tasks of the MA0 layer comprise me"ium access, fragmentation of user "ata, an" encryption' The !L0!
sublayer pro&i"es a carrier sense signal calle" 0lear 0hannel Assessment +00A, an" pro&i"es a common
!1G interface for the MA0, which is in"epen"ent of the transmission technology'
!!& +r#te a note on ,SSS
Answer-
#irect %e)uence %prea" %pectrum +#%%% is the alternati&e sprea" spectrum metho", in which the signal is
sprea" o&er a wi"e range of fre)uencies using a chipping co"e' In the case of IEEE B;7'66 #%%%, sprea"ing
is achie&e" by using the 66-chip se)uence +6,-6,6,6,-6,6,6,6,-6,-6,-6, which is also calle" the
5arker co"e'
!*& ,#scuss 4AC "a%er o +$AN&
Answer-
MA0 layer controls me"ium access, an" also offers support for roaming, authentication, an" power
-
8/13/2019 KU BSCIT 63 - Advance computer networks
12/13
conser&ation' The ser&ices offere" by MA0 are man"atory asynchronous "ata ser&ice an" an optional time-
boun"e" ser&ice'
--------------------
CHAPTER1 (Cr%to.rap'% and Network Secur#t%)
!& +'at #s cr%pto.rap'%
Answer-0ryptography is the science of using mathematics to encrypt an" "ecrypt "ata' 0ryptography enables us to
store or transmit sensiti&e information across insecure networks +like the Internet so that unauthori.e" users
e/cept the inten"e" recipient cannot rea" it'
*& E-p"a#n cr%pto.rap'#c a".or#t'ms&
Answer- A cryptographic algorithm, also referre" to as cipher, is a mathematical function use" in the
encryption an" "ecryption process' A cryptographic algorithm works in combination with a key' The key
may be a wor", number, or phrase use" to encrypt the plain te/t, also calle" a message' The plain te/t
encrypts to cipher te/t with "ifferent keys' The security of encrypte" "ata is entirely "epen"ent on the
strength of the cryptographic algorithm an" the secrecy of the key'
3& E-p"a#n d#erent t%pes o attacks&
Answer-
Attacks are of two types' The types are:
!&Pass#ve attack: In this attack, the goal of the unauthori.e" user is to obtain information that is being
transmitte"' !assi&e attacks ha&e two subtypes, release of message contents an" traffic analysis'
The release of message contents inclu"es con&ersation o&er the phone or through email or
transferring a file from one place to another, which might contain sensiti&e information'
The traffic analysis is more "elicate' %uppose that we ha" a way of masking the contents of
messages or other information traffic so that unauthori.e" users coul" not e/tract the informationfrom the message' The common techni)ue for masking contents is encryption' If we ha" encryption
protection in place, an opponent might still be able to obser&e the pattern of these messages' The
opponent coul" "etermine the location an" i"entity of communication hosts, an" coul" obser&e the
fre)uency an" length of messages being e/change"' This information might be useful in guessing the
nature of the communication that was taking place'
!assi&e attacks are &ery "ifficult to "etect because they "o not in&ol&e any alteration of the "ata' The
emphasis in "ealing with passi&e attacks is to pre&ent the attack rather than to "etect it'
*&Act#ve attacks: These attacks in&ol&e some mo"ification of the "ata stream or the creation of a false
stream' These attacks are "i&i"e" into four categories such as mas)uera"e, replay, mo"ification ofmessages, an" "enial of ser&ice +#o%'
4asDuerade: It takes place when an entity preten"s to be "ifferent than the other entity' This
inclu"es one of the other forms of an acti&e attack, which is mo"ification of messages or "enial of
ser&ice'
Rep"a%: It in&ol&es the passi&e capture of a "ata unit an" its subse)uent retransmission to pro"uce an
unauthori.e" effect'
4od##cat#on o messa.es: It implies that some portion of the message is altere" or messages are
"elaye" or reor"ere" to pro"uce an unauthori.e" effect'
,oS: It pre&ents or inhibits the normal use or the management of communications facilities' Thistype of attack has a specific target' or e/ample, an entity may suppress all messages "irecte" to a
particular "estination' Another form of #o% is the "isruption of an entire network, either by "isabling
the network or by o&erloa"ing it with messages to "egra"e the performance of the network'
-
8/13/2019 KU BSCIT 63 - Advance computer networks
13/13