format assignment

Upload: vajahat07

Post on 14-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 Format Assignment

    1/35

    Computer Networks - MC0075 Roll No. 521150974

    Master of Computer Application (MCA) Semester 3

    Computer Networks

    Assignment Set 1

    Que 1. Discuss the following Switching Mechanisms:

    a. Circuit switching

    b. Message switching

    c. Packet switching

    Ans:

    a. Circuit switching

    A type of communications in which a dedicated channel (or circuit) is established for the duration of a

    transmission. The most ubiquitous circuit-switching network is the telephone system, which linkstogether wire segments to create a single unbroken line for each telephone call. The other common

    communications method is packet switching, which divides messages into packets and sends each

    packet individually. The Internet is based on a packet-switching protocol, TCP/IP.

    Circuit-switching systems are ideal for communications that require data to be transmitted in real-time

    Packet-switching networks are more efficient if some amount of delay is acceptable. Circuit-switching

    networks are sometimes called connection-oriented networks. Note, however, that although packet

    switching is essentially connectionless, a packet switching network can be made connection-oriented

    by using a higher-level protocol. TCP, for example, makes IP networks connection-oriented.

    A networking technology that provides a temporary, but dedicated, connection between two stations

    no matter how many switching devices the data are routed through. Circuit switching was originally

    developed for the analog-based telephone system in order to guarantee steady, consistent service for

    two people engaged in a phone conversation. Analog circuit switching (FDM) has given way to digital

    circuit switching (TDM), and the digital counterpart still maintains the connection until broken (one side

  • 7/30/2019 Format Assignment

    2/35

    Computer Networks - MC0075 Roll No. 521150974

    hangs up). This means bandwidth is continuously reserved and "silence is transmitted" just the same as

    digital audio.

    b. Message switching

    A computer system used to switch data between various points. Computers have always been ideal

    switches due to their input/output and compare capabilities. It inputs the data, compares its

    destination with a set of stored destinations and routes it accordingly. Note: A "message" switch is a

    generic term for a data routing device, but a "messaging" switch converts mail and messaging

    protocols.

    message switching: A method of handling message traffic through a switching center, either from local

    users or from other switching centers, whereby the message traffic is stored and forwarded through

    the system.

    Every input from the terminal receives a response. Most responses are preceded by indicators where

    the letters before OK represent the first character of each of the CMSG options (except CANCEL) as

    follows:

    D DATE

    E ERRTERM

    H HEADING

    I ID

    M MSG

    O OPCLASS

    P PROTECT

    R ROUTE

    S SEND

    T TIME

  • 7/30/2019 Format Assignment

    3/35

    Computer Networks - MC0075 Roll No. 521150974

    These indicators identify the options that have been processed and that are currently in effect.

    Errors may occur because of:

    Syntax (for example, misspelled option, unbalanced parentheses, terminal identifier more than 4

    characters, invalid option separator, and message and destination not provided).

    Specification (for example, the specified terminal has not been defined to CICS).

    Operation (for example, operator not currently signed on to the system).

    Syntax errors within an option cause it to be rejected by the message-switching routine. To correct a

    known error, reenter the option before typing the SEND keyword.

    c. Packet switching

    Refers to protocols in which messages are divided into packets before they are sent. Each packet is

    then transmitted individually and can even follow different routes to its destination. Once all the

    packets forming a message arrive at the destination, they are recompiled into the original message.

    Most modern Wide Area Network (WAN) protocols, including TCP/IP, X.25, and Frame Relay, are based

    on packet-switching technologies. In contrast, normal telephone service is based on a circuit-switching

    technology, in which a dedicated line is allocated for transmission between two parties. Circuit-

    switching is ideal when data must be transmitted quickly and must arrive in the same order in which it's

    sent. This is the case with most real-time data, such as live audio and video. Packet switching is more

    efficient and robust for data that can withstand some delays in transmission, such as e-mail messages

    and Web pages.

    A new technology, ATM, attempts to combine the best of both worlds -- the guaranteed delivery of

    circuit-switched networks and the robustness and efficiency of packet-switching networks. Packet

    switching is the dividing of messages into packets before they are sent, transmitting each packet

    individually, and then reassembling them into the original message once all of them have arrived at the

    intended destination. Packets are the fundamental unit of information transport in all moderncomputer networks, and increasingly in other communications networks as well. Each packet, which

    can be of fixed or variable size depending on the protocol, consists of a header, body (also called a

    payload) and a trailer. The body contains a segment of the message being transmitted.

    This contrasts with circuit switching, in which a dedicated, but temporary, circuit is established for the

    duration of the transmission of each message. The most familiar circuit-switching network is the

  • 7/30/2019 Format Assignment

    4/35

    Computer Networks - MC0075 Roll No. 521150974

    telephone system when used for voice communications. Circuit-switching is ideal when data must be

    transmitted quickly and must arrive in the same order in which it is sent, as is the case with most real-

    time data, such as live audio and video. Packet switching is used to optimize the use of the bandwidth

    available in a network, to minimize the transmission latency (i.e. the time it takes for data to pass

    across the network) and to increase robustness of communication. It is more efficient and robust fordata that can withstand some delays in transmission, such as web pages and e-mail messages.

    Que 2. Discuss the following IEEE standardso Ethernets

    o Fast Ethernet

    o Gigabit Ethernet

    o IEEE 802.3 frame format.

    Ans:

    Ethernets

    Ethernet was originally based on the idea of computers communicating over a shared coaxial cable

    acting as a broadcast transmission medium. The methods used show some similarities to radio systems

    although there are major differences, such as the fact that it is much easier to detect collisions in a

    cable broadcast system than a radio broadcast. The common cable providing the communication

    channel was likened to the ether and it was from this reference that the name "Ethernet" was derived.

    From this early and comparatively simple concept, Ethernet evolved into the complex networking

    technology that today powers the vast majority of local computer networks. The coaxial cable was later

    replaced with point-to-point links connected together by hubs and/or switches in order to reduce

    installation costs, increase reliability, and enable point-to-point management and troubleshooting. Star

    LAN was the first step in the evolution of Ethernet from a coaxial cable bus to a hub-managed, twisted-

    pair network.

    Above the physical layer, Ethernet stations communicate by sending each other data packets, small

    blocks of data that are individually sent and delivered. As with other IEEE 802 LANs, each Ethernet

    station is given a single 48-bit MAC address, which is used both to specify the destination and the

    source of each data packet. Network interface cards (NICs) or chips normally do not accept packets

    addressed to other Ethernet stations. Adapters generally come programmed with a globally unique

    http://en.wikipedia.org/wiki/Luminiferous_aetherhttp://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/MAC_addresshttp://en.wikipedia.org/wiki/MAC_addresshttp://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/Luminiferous_aether
  • 7/30/2019 Format Assignment

    5/35

    Computer Networks - MC0075 Roll No. 521150974

    address, but this can be overridden, either to avoid an address change when an adapter is replaced, or

    to use locally administered addresses.

    Fast Ethernet

    Fast Ethernet is a collective term for a number ofEthernet standards that carry traffic at the nominalrate of 100 Mbit/s, against the original Ethernet speed of 10 Mbit/s. Of the 100 megabit Ethernet

    standards 100baseTX is by far the most common and is supported by the vast majority of Ethernet

    hardware currently produced. Full duplex fast Ethernet is sometimes referred to as "200 Mbit/s"

    though this is somewhat misleading as that level of improvement will only be achieved if traffic

    patterns are symmetrical. Fast Ethernet was introduced in 1995 and remained the fastest version of

    Ethernet for three years before being superseded by gigabit Ethernet.

    A fast Ethernet adaptor can be logically divided into a medium access controller (MAC) which deals

    with the higher level issues of medium availability and a physical layer interface (PHY). The MAC may be

    linked to the PHY by a 4 bit 25 MHz synchronous parallel interface known as MII. Repeaters (hubs) are

    also allowed and connect to multiple PHYs for their different interfaces.

    100BASE-T is any of several Fast Ethernet standards for twisted pair cables.

    100BASE-TX (100 Mbit/s over two-pair Cat5 or better cable),

    100BASE-T4 (100 Mbit/s over four-pair Cat3 or better cable, defunct),

    100BASE-T2 (100 Mbit/s over two-pair Cat3 or better cable, also defunct).

    The segment length for a 100BASE-T cable is limited to 100 metres. Most networks had to be rewired

    for 100-megabit speed whether or not they had supposedly been CAT3 or CAT5 cable plants. The vast

    majority of common implementations or installations of 100BASE-T are done with 100BASE-TX.

    100BASE-TX is the predominant form of Fast Ethernet, and runs over two pairs ofcategory 5 or above

    cable. A typical category 5 cable contains 4 pairs and can therefore support two 100BASE-TX links. Each

    network segment can have a maximum distance of 100 metres. In its typical configuration, 100BASE-TX

    uses one pair of twisted wires in each direction, providing 100 Mbit/s of throughput in each direction

    (full-duplex).

    The configuration of 100BASE-TX networks is very similar to 10BASE-T. When used to build a local area

    network, the devices on the network are typically connected to a hub or switch, creating a star

    network. Alternatively it is possible to connect two devices directly using a crossover cable.

    In 100BASE-T2, the data is transmitted over two copper pairs, 4 bits per symbol. First, a 4 bit symbol is

    expanded into two 3-bit symbols through a non-trivial scrambling procedure based on a linear feedback

    shift register.

    http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Gigabit_Ethernethttp://en.wikipedia.org/wiki/Medium_access_controllerhttp://en.wikipedia.org/wiki/Media_Independent_Interfacehttp://en.wikipedia.org/wiki/Twisted_pair_cablehttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/Category_3_cablehttp://en.wikipedia.org/wiki/Category_5http://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Full-duplexhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Star_networkhttp://en.wikipedia.org/wiki/Star_networkhttp://en.wikipedia.org/wiki/Ethernet_crossover_cablehttp://en.wikipedia.org/wiki/Ethernet_crossover_cablehttp://en.wikipedia.org/wiki/Star_networkhttp://en.wikipedia.org/wiki/Star_networkhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Full-duplexhttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Category_5http://en.wikipedia.org/wiki/Category_3_cablehttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/Twisted_pair_cablehttp://en.wikipedia.org/wiki/Media_Independent_Interfacehttp://en.wikipedia.org/wiki/Medium_access_controllerhttp://en.wikipedia.org/wiki/Gigabit_Ethernethttp://en.wikipedia.org/wiki/Ethernet
  • 7/30/2019 Format Assignment

    6/35

    Computer Networks - MC0075 Roll No. 521150974

    100BASE-FX is a version of Fast Ethernet over optical fiber. It uses two strands ofmulti-mode optical

    fiber for receive (RX) and transmit (TX). Maximum length is 400 metres for half-duplex connections or 2

    kilometers for full-duplex.

    100BASE-SX is a version of Fast Ethernet over optical fiber. It uses two strands of multi-mode optical

    fiber for receive and transmit. It is a lower cost alternative to using 100BASE-FX, because it uses short

    wavelength optics which are significantly less expensive than the long wavelength optics used in

    100BASE-FX. 100BASE-SX can operate at distances up to 300 metres.

    100BASE-BX is a version of Fast Ethernet over a single strand of optical fiber (unlike 100BASE-FX, which

    uses a pair of fibers). Single-mode fiber is used, along with a special multiplexer which splits the signal

    into transmit and receive wavelengths.

    Gigabit Ethernet

    Gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for transmitting Ethernetpackets at a rate of a gigabit per second, as defined by the IEEE 802.3-2005 standard. Half duplex

    gigabit links connected through hubs are allowed by the specification but in the marketplace full duplex

    with switches is the norm.

    Gigabit Ethernet was the next iteration, increasing the speed to 1000 Mbit/s. The initial standard for

    gigabit Ethernet was standardized by the IEEE in June 1998 as IEEE 802.3z. 802.3z is commonly referred

    to as 1000BASE-X (where -X refers to either -CX, -SX, -LX, or -ZX).

    IEEE 802.3ab, ratified in 1999, defines gigabit Ethernet transmission over unshielded twisted pair (UTP)

    category 5, 5e, or 6 cabling and became known as 1000BASE-T. With the ratification of 802.3ab, gigabitEthernet became a desktop technology as organizations could utilize their existing copper cabling

    infrastructure.

    Initially, gigabit Ethernet was deployed in high-capacity backbone network links (for instance, on a high

    capacity campus network). Fiber gigabit Ethernet has recently been overtaken by 10 gigabit Ethernet

    which was ratified by the IEEE in 2002 and provided data rates 10 times that of gigabit Ethernet. Work

    on copper 10 gigabit Ethernet over twisted pair has been completed, but as of July 2006, the only

    currently available adapters for 10 gigabit Ethernet over copper requires specialized cabling.

    http://en.wikipedia.org/wiki/Multi-mode_optical_fiberhttp://en.wikipedia.org/wiki/Multi-mode_optical_fiberhttp://en.wikipedia.org/wiki/Half-duplexhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Gigabit_per_secondhttp://en.wikipedia.org/wiki/IEEE_802.3-2005http://en.wikipedia.org/wiki/IEEEhttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/Category_6_cablehttp://en.wikipedia.org/wiki/Internet_backbonehttp://en.wikipedia.org/wiki/10_gigabit_Ethernethttp://en.wikipedia.org/wiki/2002http://en.wikipedia.org/wiki/As_of_2006http://en.wikipedia.org/wiki/As_of_2006http://en.wikipedia.org/wiki/2002http://en.wikipedia.org/wiki/10_gigabit_Ethernethttp://en.wikipedia.org/wiki/Internet_backbonehttp://en.wikipedia.org/wiki/Category_6_cablehttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/IEEEhttp://en.wikipedia.org/wiki/IEEE_802.3-2005http://en.wikipedia.org/wiki/Gigabit_per_secondhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Half-duplexhttp://en.wikipedia.org/wiki/Multi-mode_optical_fiberhttp://en.wikipedia.org/wiki/Multi-mode_optical_fiber
  • 7/30/2019 Format Assignment

    7/35

    Computer Networks - MC0075 Roll No. 521150974

    InfiniBand connectors and is limited to 15 m. However, the 10GBASE-T standard specifies use of the

    traditional RJ-45 connectors and longer maximum cable length. Different gigabits Ethernet are listed in

    table

    Name medium

    1000BASE-T unshielded twisted pair

    1000BASE-SX multi-mode fiber

    1000BASE-LX single-mode fiber

    1000BASE-CX balanced copper cabling

    1000BASE-ZX single-mode fiber

    Que: 3. Describe the classification of computer networks based on:

    o Transmission Technologies

    o Scalability

    o Geographical Distance covered

    Ans:

    Transmission Technology

    Broadcast links

    Point-to-point links

    Broadcast networks have a single communication channel that is shared by all the users on the

    network. Short messages are commonly called as packets or frames (in certain context). The user on

    the network sends packets. All other machines receive these packets. An address field within the

    packet or frame specifies the address of the destination machine. So upon receiving the packet, all

    machines check the address field. Only intended user uses or processes the packet or frame and others

    neglect and discard it. As an example in a class of 50 students, the teacher puts question to say X

    student (where X is the name of the student). All the students hear to the question but will not answer

    as the question is intended to X only. Hence only X will analyze the question and others will not

    respond.

    http://en.wikipedia.org/wiki/RJ-45http://en.wikipedia.org/wiki/RJ-45
  • 7/30/2019 Format Assignment

    8/35

    Computer Networks - MC0075 Roll No. 521150974

    Broadcast system generally allows the possibility of addressing a packet to all the destinations by using

    a special code in the address field. When this code is transmitted, it is received and processed by every

    machine on the network. Again considering the above example: A teacher put forth the question in a

    class to all students. That is the teacher does not ask to a specific student by any unique name. Then, al

    are supposed to analyze the question and answer. This mode of operation is referred to broadcasting.Some broadcasting systems also support transmission to a subset of the users, which is a group of

    users. This mode is called as multicasting.

    In contrast the point-to-point network consists of many connections between individual pairs of

    machines. A packet to be sent from source to destination may have to first visit one or more

    intermediate machines. Usually different routes of different length are possible. So finding the best

    path or route is important in point-to-point networks. This type of transmission with one sender and

    one receiver is also referred to as unicasting.

    Geographically localized networks or smaller networks tend to use broadcasting where as largernetworks usually are point-to-point networks.

    Scalability

    We classify multiple processor system based on physical size.

    At the top we have personal area networks (PAN), networks meant for a single person. For example a

    wireless network connecting a computer with its mouse, keyboard and a printer can constitute a

    personal area network.

    Beyond the personal area network we have longer-range networks which are broadly classifiednetworks as

    LAN

    MAN

    WAN

    We will see these three networks in detail later. Finally the connection of two or more networks is

    called an inter-network. The world wide Internet is a well known example of inter-network. Distance is

    important as a classification metric as different techniques are used at different scales.

  • 7/30/2019 Format Assignment

    9/35

    Computer Networks - MC0075 Roll No. 521150974

    Geographical Distance covered

    Local Area Networks

    LANs using (a) Bus topology (b) Ring topology

    Local Area Networks are generally called LANs. They are privately owned networks within a single

    building or campus of up to few kilometers in size. Most of LANs use Bus or ring topology for

    connection and is illustrated as shown in fig. 1.5. They are used to connect personal computers and

    workstations in company offices and factories to share resources and exchange information. Traditiona

    LANs run at speeds of 10Mbps to 100Mbps, have low delay (microseconds and nanoseconds) and make

    very few errors. Newer LANs operate at 10Gbps. Various topologies are possible for broadcast LANs.

    Metropolitan Area Networks

    MAN based on cable TV

    A Metropolitan Area Networks, referred as MANs covers a city. The best known example is cable

    television network available in many cities. Earlier these were used for TV reception only but with

    changes a two way internet service could be provided. A MAN might look something like the system

    shown in figure 1.6. In this system both television signals and internet being fed into centralized head

    end for distribution to peoples home.

    Cable television is not the only MAN. Recent developments in high speed wireless internet access also

    resulted in MAN.

    http://edunxt.smude.edu.in/FileRepository/Community/921/Slm%20Unit/clip-image01436.gifhttp://edunxt.smude.edu.in/FileRepository/Community/921/Slm%20Unit/clip-image01266.gifhttp://edunxt.smude.edu.in/FileRepository/Community/921/Slm%20Unit/clip-image01436.gifhttp://edunxt.smude.edu.in/FileRepository/Community/921/Slm%20Unit/clip-image01266.gif
  • 7/30/2019 Format Assignment

    10/35

    Computer Networks - MC0075 Roll No. 521150974

    Wide Area Network

    WAN system

    A wide area network is referred as WAN. WAN spans a large geographical area often a continent or

    country. WAN contains a collection of machines, traditionally called as hosts. As illustrated in figure 1.7

    these hosts can be on LANs and are connected by a subnet or also called communication subnet. The

    hosts are owned by customers or are personal computers. The communication subnets are owned by a

    telephone company or internet service provider. The subnet carries the messages from hosts to hosts,

    just as telephone system carries words from speaker to listener. Each host is connected to a LAN on

    which a router is present. Sometimes a host may be connected directly to a router. The collection of

    communication lines and routers is called a communication subnet.

    In most WANs, the network contains many transmission lines each connecting a pair of routers. As

    illustrated in figure 1.8, a packet is sent from one router to another via one or more intermediate

    routers. The packet is received at each intermediate router in its entirety. That is store the packet in ful

    until the required output line is free, and then forwards it. A subnet that works according to this

    principle is called store and forward or packet switched subnet. Not all WANs are packet switched. A

    second possibility for a WAN is a satellite system. Satellite networks are inherently broadcast networks

    http://edunxt.smude.edu.in/FileRepository/Community/921/Slm%20Unit/clip-image01827.gifhttp://edunxt.smude.edu.in/FileRepository/Community/921/Slm%20Unit/clip-image01630.gifhttp://edunxt.smude.edu.in/FileRepository/Community/921/Slm%20Unit/clip-image01827.gifhttp://edunxt.smude.edu.in/FileRepository/Community/921/Slm%20Unit/clip-image01630.gif
  • 7/30/2019 Format Assignment

    11/35

    Computer Networks - MC0075 Roll No. 521150974

    Que 4. Explain the different classes of IP addresses with suitable examples.

    Ans:

    Different classes of IP addresses

    In order to provide the flexibility required to support different size networks. The designers decided

    that the IP address space should be divided into five different address classes. They are

    1. Class A

    2. Class B

    3. Class C

    4. Class D

    5. Class E

    Class A Networks (/8 Prefixes)

    Each Class A network address has an 8-bit network-prefix with the highest order bit set to 0 and a

    seven-bit network number, followed by a 24-bit host-number. Today, it is no longer considered

    'modern' to refer to a Class A network. Class A networks are now referred to as "/8s" (pronounced

    "slash eight" or just "eights") since they have an 8-bit network-prefix.

    A maximum of 126 (27

    -2) /8 networks can be defined as shown in figure 2.1(b). The calculation

    requires that the 2 is subtracted because the /8 network 0.0.0.0 is reserved for use as the default routeand the /8 network 127.0.0.0 (also written 127/8 or 127.0.0.0/8) has been reserved for the "loop back"

    function. Each /8 supports a maximum of 16,777,214 (224

    -2) hosts per network. The host calculation

    requires that 2 is subtracted because the all-0s ("this network") and all-1s ("broadcast") host-numbers

    may not be assigned to individual hosts.

    Since the/8 address block contains 231

    (2,147,483,648) individual addresses and the IPv4 address space

    contains a maximum of 232

    (4,294,967,296) addresses, the /8 address space is 50% of the total IPv4

    unicast address space.

    Class B Networks (/16 Prefixes)

    Each Class B network address has a 16-bit network-prefix with the two highest order bits set to 1-0 and

    a 14-bit network number, followed by a 16-bit host-number as illustrated in figure 2.1(b). Class B

    networks are now referred to as"/16s" since they have a 16-bit network-prefix.

  • 7/30/2019 Format Assignment

    12/35

    Computer Networks - MC0075 Roll No. 521150974

    A maximum of 16,384 (214

    ) /16 networks can be defined with up to 65,534 (216

    -2) hosts per network.

    Since the entire /16 address block contains 230

    (1,073,741,824) addresses, it represents 25% of the

    total IPv4 unicast address space.

    Class C Networks (/24 Prefixes)

    Each Class C network address has a 24-bit network-prefix with the three highest order bits set to 1-1-0

    and a 21-bit network number, followed by an 8-bit host-number as shown in figure 2.1(b). Class C

    networks are now referred to as "/24s" since they have a 24-bit network-prefix. A maximum of

    2,097,152 (221

    ) /24 networks can be defined with up to 254 (28

    -2) hosts per network. Since the entire

    /24 address block contains 229

    (536,870,912) addresses, it represents 12.5% (or 1/8th) of the total IPv4

    unicast address space.

    Class D Networks

    These addresses have their leading four-bits set to 1-1-1-0 and the remaining 28 bits are used tosupport IP Multicasting.

    Class E addresses

    They have their leading four-bits set to 1-1-1-1 and are reserved for experimental use or future use.

  • 7/30/2019 Format Assignment

    13/35

    Computer Networks - MC0075 Roll No. 521150974

    Que 5. Discuss the following with respect to Internet Control Message Protocols:

    a. Congested and Datagram Flow control

    b. Route change requests from routers

    c. Detecting circular or long routes

    Ans:

    a. Congested and Datagram Flow control

    IP implementations are required to support this protocol. ICMP is considered an integral part of IP,

    although it is architecturally layered upon IP. ICMP provides error reporting, flow control and first-hop

    gateway redirection.

    Some of ICMP's functions are to:

    Announce network errors.

    Such as a host or entire portion of the network being unreachable, due to some type of failure. A TCP

    or UDP packet directed at a port number with no receiver attached is also reported via ICMP.

    Announce network congestion.

    When a router begins buffering too many packets, due to an inability to transmit them as fast as they

    are being received, it will generate ICMP Source Quench messages. Directed at the sender, these

    messages should cause the rate of packet transmission to be slowed. Of course, generating too many

    Source Quench messages would cause even more network congestion, so they are used sparingly.

    Assist Troubleshooting.

    ICMP supports an Echo function, which just sends a packet on a round--trip between two hosts. Ping, a

    common network management tool, is based on this feature. Ping will transmit a series of packets,

    measuring average round--trip times and computing loss percentages.

    Announce Timeouts.

    If an IP packet's TTL field drops to zero, the router discarding the packet will often generate an ICMP

    packet announcing this fact. TraceRoute is a tool which maps network routes by sending packets with

    small TTL values and watching the ICMP timeout announcements.

  • 7/30/2019 Format Assignment

    14/35

    Computer Networks - MC0075 Roll No. 521150974

    An ICMP error message is never generated inresponse to:

    A datagram whose source address does not define a single host (address cannot be zero, loopback,

    broadcast, multicast). A datagram whose destination address is an IP broadcast address. A datagram

    sent as a link-layer broadcast A fragment other than the first one of a datagram.

    (b) Route change requests from routers:

    Network Address Translation (NAT) is a standard IP service which allows for the translation of one IP

    address into another IP address. NAT has been enhanced to provide a set of advanced services called

    SuperNAT. SuperNAT includes a powerful Proxy Service, Port Address translation (sometimes called

    PAT) and Application Specific Gateways (ASGs) as well as other capabilities defines below.

    Up to 32 internal to external host IP address mappings

    SuperNAT allows local hosts to be excluded from external services.

    SuperNAT Thin Proxy allows single IP for unlimited local hosts.

    SuperNAT allows NAT translations plus a nominated IP address to be used as a Thin Proxy for all

    other hosts

    Port Maps (PAT) allow support of multiple types of servers on a single IP

    Context sensitive support for active (PORT) or Passive (PASV) FTP modes.

    Automatic support for remote NETBIOS (WINS) networks and remote DHCP servers

    Proxy DNS Feature simplifies re-configuration.

    User definable NAT route(s) allow router to be used in LAN to LAN, LAN to WAN, WAN to WAN

    configurations.

    NAT services are defined at the 'Logical Route' level. It is possible to define any Route to use NAT

    services. To illustrate, assume an Intranet where WarpTwo is being used as an concentrator for a group

    of LAN and remote Hosts (PCs). These IP addresses communicate with each without using a NAT service

    (an Intranet) when external communication is required WarpTwo forwards the traffic to another LAN

    router. This LAN to LAN route is defined as the NAT route and uses a NAT service. There are many othe

    network scenarios where this capability can be used to both increase efficiency and to provide flexible

    responses to network needs.

  • 7/30/2019 Format Assignment

    15/35

    Computer Networks - MC0075 Roll No. 521150974

    (c) Detecting circular or long routes:

    IP networks are structured similarly. The whole Internet consists of a number of proper networks,

    called autonomous systems. Each system performs routing between its member hosts internally so thathe task of delivering a datagram is reduced to finding a path to the destination host's network. As soon

    as the datagram is handed to any host on that particular network, further processing is done

    exclusively by the network itself.

    Identifying critical nodes in a graph is important to understand the structural characteristics and the

    connectivity properties of the network. In this paper, we focus on detecting critical nodes, or nodes

    whose deletion results in the minimum pair-wise connectivity among the remaining nodes. This

    problem, known as the critical node problem.

    IP uses a table for this task that associates networks with the gateways by which they may be reached.A catch-all entry (the default route) must generally be supplied too; this is the gateway associated with

    network 0.0.0.0. All destination addresses match this route, since none of the 32 bits are required to

    match, and therefore packets to an unknown network are sent through the default route. On sophus,

    the table might look like this:

    If you need to use a route to a network that sophus is directly connected to, you don't need a gateway;

    the gateway column here contains a hyphen. The process for identifying whether a particular

    destination address matches a route is a mathematical operation. The process is quite simple, but it

    requires an understanding of binary arithmetic and logic: A route matches a destination if the network

    address logically ANDed with the netmask precisely equals the destination address logically ANDed

    with the netmask. Translation: a route matches if the number of bits of the network address specified

    by the netmask (starting from the left-most bit, the high order bit of byte one of the address) match

    that same number of bits in the destination address.

    We depend on dynamic routing to choose the best route to a destination host or network based on the

    number of hops. Hops are the gateways a datagram has to pass before reaching a host or network. The

    shorter a route is, the better RIP rates it. Very long routes with 16 or more hops are regarded as

    unusable and are discarded.

    RIP manages routing information internal to your local network, but you have to run gated on all hosts.

    At boot time, gated checks for all active network interfaces. If there is more than one active interface

    (not counting the loopback interface), it assumes the host is switching packets between several

  • 7/30/2019 Format Assignment

    16/35

    Computer Networks - MC0075 Roll No. 521150974

    networks and will actively exchange and broadcast routing information. Otherwise, it will only passively

    receive RIP updates and update the local routing table.

    Que: 6.Discuss the architecture and applications of E-mail.Ans:

    E-Mail

    Electronic mail or e-mail, as it is known by its fans b

    ecame known to the public at large and its use grew exponentially. The first e-mail systems consisted o

    file transfer protocols, with the convention that the first line of the message contained the recipients

    address. It is a store and forward method of composing, sending, storing, and receiving messages over

    electronic communication systems. The term e-mail applies both to the Internet e-mail system based

    on the Simple Mail Transfer Protocol (SMTP) and to intranet systems allowing users within one

    organization to e-mail each other.

    Often workgroup collaboration organizations may use the Internet protocols for internal e-mail service

    E-mail is often used to deliver bulk unwanted messages, or spam, but filter programs exist which can

    automatically delete most of these. E-mail systems based on RFC 822 are widely used.

    Architecture :

    E-mail system normally consists of two sub systems

    1. the user agents

    2. the message transfer agents

    The user agents allow people to read and send e-mails. The message transfer agents move the

    messages from source to destination. The user agents are local programs that provide a command

    based, menu-based, or graphical method for interacting with e-mail system. The message transfer

    agents are daemons, which are processes that run in background. Their job is to move datagram e-mail

    through system.

    A key idea in e-mail system is the distinction between the envelope and its contents. The envelope

    encapsulates the message. It contains all the information needed for transporting the message like

    destinations address, priority, and security level, all of which are distinct from the message itself.

    The message transport agents use the envelope for routing. The message inside the envelope consists

    of two major sections:

  • 7/30/2019 Format Assignment

    17/35

    Computer Networks - MC0075 Roll No. 521150974

    The Header:

    The header contains control information for the user agents. It is structured into fields such as

    summary, sender, receiver, and other information about the e-mail.

    Body:

    The body is entirely for human recipient. The message itself as unstructured text; sometimes

    containing a signature block at the end

    Header format

    The header is separated from the body by a blank line.

    consists of following fields

    From: The e-mail address, and optionally name, of the sender of the message.

    To: one or more e-mail addresses, and optionally name, of the receivers of the message.

    Subject: A brief summary of the contents of the message.

    Date: The local time and date when the message was originally sent.

    Applications of E-mail

    Basic services:

    E-mail systems support five basic functions. These basic functions are:

    1. Composition:

    It refers to the process of creating messages and answers. Any text editor can be used for the body of

    the message, the system itself can provide assistance with addressing and the numerous header fields

    attached to each message.

    For example: when answering a message, the e-mail system can extract the originators address from

    the incoming e-mail and automatically insert it into the proper place in the reply.

    2. Transfer:

  • 7/30/2019 Format Assignment

    18/35

    Computer Networks - MC0075 Roll No. 521150974

    It refers to moving messages from the originator to the recipient. This requires establishing a

    connection to the destination or some intermediate machine, outputting the message, and finally

    releasing the connection. E-mail does it automatically without bothering the user.

    3. Reporting:

    It refers to acknowledging or telling the originator what happened to the message. Was the message

    delivered? Was it rejected? Numerous applications exist in which confirmation of delivery is important

    and may even have a legal significance. E-mail system is not very reliable.

    4. Displaying

    The incoming message has to be displayed so that people can read their e-mail. Sometimes

    conversation is required or a special viewer must be invoked. For example: if message is a postscript

    file or digitized voice. Simple conversations and formatting are sometimes attempted.

    5. Disposition

    It is the final step and concerns what the recipient does with the message after receiving it. Possibilities

    include throwing it away before reading, throwing it away after reading, saving it, and so on. It should

    be possible to retrieve and reread saved messages, forward them or process them in other ways.

    Advanced services:

    In addition to these basic services, some e-mail systems provide a variety of advanced features.

    When people move or when they are away for some period of time, they want their e-mail to beforwarded, so the system should do it automatically.

    Most systems allow user to create mailboxes to store incoming e-mails. Commands are needed to

    create and destroy mailboxes, inspect the contents of mailboxes, insert and delete messages from the

    mailboxes.

    Corporate managers often need to send messages to each of their subordinates, customers, or

    suppliers. This gives rise to the idea of mailing list, which is a list of e-mail addresses. When a message

    is sent to the mailing list, identical copies are delivered to everyone on the list.

    Carbon copies, blind Carbon copies, high priority e-mail, secret e-mail, alternative recipients if

    primary one is not currently available, and the ability for secretaries to read and answer their bosses e-

    mail.

    E-mail is now widely used within an industry for intra company communication. It allows far-flung

    employees to cooperate on projects.

  • 7/30/2019 Format Assignment

    19/35

    Computer Networks - MC0075 Roll No. 521150974

    Master of Computer Application (MCA) Semester 3

    Computer Networks

    Assignment Set 2

    Que: 1. Discuss the following design issues of DLL:

    a. Framing

    b. Error control

    c. Flow control

    Ans:

    a. Framing

    Software design is a process of problem-solving and planning for a software solution. After the purpose and

    specifications of software is determined, software developers will design or employ designers to develop a plan

    for a solution. It includes low-level component and algorithm implementation issues as well as the architectural

    view. The software requirements analysis (SRA) step of a software development process yields specifications

    that are used in software engineering. A software design may be platform-independent or platform-specific,

    depending on the availability of the technology called for by the design.

    Design is a meaningful engineering representation of something that is to be built. It can be traced to a

    customer's requirements and at the same time assessed for for quality against a set of predefined

    criteria for 'good' design. In the software engineering context, design focuses on four major areas of

    concern, data, architecture, interfaces, and components.

    Designing software is an exercise in managing complexity. The complexity exits within the software

    design itself, within the software organization of the company, and within the industry as a whole.

    Software design is very similar to systems design. It can span multiple technologies and often involves

    multiple sub-disciplines. Software specifications tend to be fluid, and change rapidly and often, usuallywhile the design process is still going on. Software development teams also tend to be fluid, likewise

    often changing in the middle of the design process. In many ways, software bears more resemblance to

    complex social or organic systems than to hardware. All of this makes software design a difficult and

    error prone process.

  • 7/30/2019 Format Assignment

    20/35

    Computer Networks - MC0075 Roll No. 521150974

    Software design documentation may be reviewed or presented to allow constraints, specifications and

    even requirements to be adjusted prior to programming. Redesign may occur after review of a

    programmed simulation or prototype. It is possible to design software in the process of programming,

    without a plan or requirement analysis, but for more complex projects this would not be considered a

    professional approach.

    Frame Technology is a language-neutral system that manufactures custom software from reusable,

    machine-adaptable building blocks, called frames.

    FT is used to reduce the time, effort, and errors involved in the design, construction, and evolution of

    large, complex software systems. Fundamental to FT is its ability to stop the proliferation of similar but

    subtly different components, an issue plaguing software engineering, for which programming language

    constructs (subroutines, classes, or templates/generics) or add-in techniques such as macros and

    generators failed to provide a practical, scalable solution.

    A number of implementations of FT exist. Netron Fusion specializes in constructing business software

    and is proprietary. XVCL is a general-purpose, open-source implementation of FT. Paul G. Bassett

    invented the first FT in order to automate the repetitive, error-prone editing involved in adapting

    (generated and hand-written) programs to changing requirements and contexts. Independent

    comparisons of FT to alternative approaches confirm that the time and resources needed to build and

    maintain complex systems can be substantially reduced. One reason: FT shields programmers from

    softwares inherent redundancies: FT has reproduced COTS object-libraries from equivalent XVCL frame

    libraries that are two-thirds smaller and simpler; custom business applications are routinely specifiedand maintained by Netron FusionSPC frames that are 5% - 15% of the size of their assembled source

    files.

    (b) Error control:

    Error control (error management, error handling) The employment, in a computer system or in a

    communication system, of error-detecting and/or error-correcting codes with the intention of

    removing the effects of error and/or recording the prevalence of error in the system. The effects of

    errors may be removed by correcting them in all but a negligible proportion of cases. Error control aims

    to cope with errors owing to noise or to equipment malfunction in which case it overlaps with fault

    tolerance (see fault-tolerant system) but not usually with the effects of errors in the design of

    hardware or software. An important aspect is the prevention of mistakes by users. Checking of data by

    software as it is entered is an essential feature of the design of reliable application programs.

  • 7/30/2019 Format Assignment

    21/35

    Computer Networks - MC0075 Roll No. 521150974

    Error control is expensive: the balance between the cost and the benefit (measured by the degree of

    protection) has to be weighed within the technological and financial context of the system being

    designed.

    Software Quality Control is the set of procedures used by organizations (1) to ensure that a software

    product will meet its quality goals at the best value to the customer, and (2) to continually improve the

    organizations ability to produce software products in the future. Software quality control refers to

    specified functional requirements as well as non-functional requirements such as supportability,

    performance and usability. It also refers to the ability for software to perform well in unforeseeable

    scenarios and to keep a relatively low defect rate.

    (c) Flow control:

    In computer networking, flow control is the process of managing the rate of data transmission between

    two nodes to prevent a fast sender from outrunning a slow receiver. It provides a mechanism for the

    receiver to control the transmission speed, so that the receiving node is not overwhelmed with data

    from tranceiving nodes. Flow control should be distinguished from congestion control, which is used

    for controlling the flow of data when congestion has actually occurred. Flow control mechanisms can

    be classified by whether or not the receiving node sends feedback to the sending node.

    Flow control is important because it is possible for a sending computer to transmit information at a

    faster rate than the destination computer can receive and process them. This can happen if the

    receiving computers have a heavy traffic load in comparison to the sending computer, or if the

    receiving computer has less processing power than the sending computer.

    In common RS 232 there are pairs of control lines:

    RTS flow control, RTS (Request To Send)/CTS (Clear To Send) and

    DTR flow control, DTR (Data Terminal Ready)/DSR (Data Set Ready),

    which are usually referred to as hardware flow control. Oppositely, XON/XOFF is usually referred to as

    software flow control. In the old mainframe days, modems were called "data sets.

  • 7/30/2019 Format Assignment

    22/35

    Computer Networks - MC0075 Roll No. 521150974

    Que 2. Discuss the following with respect to Routing algorithms:

    a. Shortest path algorithm

    b. Flooding

    c. Distance vector routing.

    Ans:

    A) Shortest path algorithm

    Dijkstra's algorithm, when applied to a graph, quickly finds the shortest path from a chosen source to a

    given destination. (The question "how quickly" is answered later in this article.) In fact, the algorithm is

    so powerful that it finds all shortest paths from the source to all destinations! This is known as the

    single-source shortest paths problem. In the process of finding all shortest paths to all destinations,

    Dijkstra's algorithm will also compute, as a side-effect if you will, a spanning tree for the graph. While

    an interesting result in itself, the spanning tree for a graph can be found using lighter (more efficient)

    methods than Dijkstra's.

    How It Works

    First let's start by defining the entities we use. The graph is made of vertices (or nodes, I'll use both

    words interchangeably), and edges which link vertices together. Edges are directed and have an

    associated distance, sometimes called the weight or the cost. The distance between the vertex u and

    the vertex v is noted [u, v] and is always positive.

    Dijkstra's algorithm partitions vertices in two distinct sets, the set of unsettled vertices and the set of

    settled vertices. Initially all vertices are unsettled, and the algorithm ends once all vertices are in the

    settled set. A vertex is considered settled, and moved from the unsettled set to the settled set, once its

    shortest distance from the source has been found.

    B) Routing:

    How do we get packets from one end point to another? Here's what would be nice for a routing

    algorithm: correctness, simplicity, robustness, stability, fairness, optimality.

    Robustness

    The world changes, software changes, use changes, topology and hardware change, things go wrong in

    lots of different ways. How well does the routing algorithm handle all this?

  • 7/30/2019 Format Assignment

    23/35

    Computer Networks - MC0075 Roll No. 521150974

    Stability

    Does the algorithm find a routing table quickly (convergence)? How does it adapt to abrupt changes in

    topology or state of the routers? Is it possible to have oscillations?

    Fairness & Optimality

    May be at odds with one another. What might be fair for a single link may hurt throughput. Must

    decide on what is meant by optimality before thinking about algorithms. For example, optimal could be

    for an individual packet (least amount of time in transit) or could be for the system as a whole (greatest

    throughput). Often times number of hops is chosen as the metric to minimize as this represents both in

    some sense.

    Algorithms may be static, i.e. the routing decisions are made ahead of time, with information about the

    network topology and capacity, then loaded into the routers, or dynamically, where the routers make

    decisions based on information they gather, and the routes change over time, adaptively.

    Optimality principle and sink trees Without regard to topology we can say:

    If a router J is on the optimal path from router I to router K, then the optimal path from J to K also

    follows the same route.

    Proof: if there was a better way from J to K, then you could use that with the path from I to J for a

    better path from I to K, so your starting point (the path from I to K was optimal) is contradicted.

    If you apply the optimality principle then you can form a tree by taking the optimal path from every

    other router to a single router, B. The tree is rooted at B. Since it is a tree you don't have loops, so you

    know that each frame will be delivered in a finite number of hops. Of course finding the set of optimal

    trees is a lot harder in practice than in theory, but it still provides a goal for all real routing algorithms.

    C) Distance vector routing:

    Distance Vector Routing is one of the two types of routing types. (The other type is Link State Routing).

    Basically, Distance Vector protocols determine best path on how far the destination is, while LinkState

    protocols are capable of using more sophisticated methods taking into consideration link variables,

    such as bandwidth, delay, reliability and load. Distance Vector protocols judge best path on how far it

    is. Distance can be hops or a combination of metrics calculated to represent a distance value. The IP

  • 7/30/2019 Format Assignment

    24/35

    Computer Networks - MC0075 Roll No. 521150974

    Distance Vector routing protocols still in use today are: Routing Information Protocol (RIP v1 and v2)

    and Interior Gateway Routing Protocol (IGRP C developed by Cisco).

    A very simple distance-vector routing protocol works as follows:

    1.Initially, the router makes a list of which networks it can reach, and how many hops it will cost. In the

    outset this will be the two or more networks to which this router is connected. The number of hops for

    these networks will be 1. This table is called a routing table.

    2.Periodically the routing table is shared with other routers on each of the connected networks via

    some specified inter-router protocol. This information is only shared inbetween physically connected

    routers ("neighbors"), so routers on other networks are not reached by the new routing tables yet.

    3.A new routing table is constructed based on the directly configured network interfaces, as before,

    with the addition of the new information received from other routers.

    4.Bad routing paths are then purged from the new routing table. If two identical paths to the same

    network exists, only the one with the smallest hop-count is kept.

    5.The new routing table is then communicated to all neighbors of this router. This way the routing

    information will spread and eventually all routers know the routing path to each network, which router

    it shall use to reach this network, and to which router it shall route next.

    Distance-vector routing protocols are simple and efficient in small networks, and require little, if any

    management. However, they do not scale well, and have poor convergence properties, which has led

    to the development of more complex but more scalable link-state routing protocols for use in large

    networks.

  • 7/30/2019 Format Assignment

    25/35

    Computer Networks - MC0075 Roll No. 521150974

    Que: 3. Discuss the following with respect to Wireless transmission:

    o Electromagnetic spectrum

    o Radio transmission

    o Microwave transmission

    Ans:

    Electro magnetic spectrum

    EM spectrums

    There are basically two types of configurations for wireless transmission: directional and omni

    directional. For the directional configuration, the transmitting antenna puts out a focused

    electromagnetic beam; the transmitting and receiving antennas must therefore be carefully aligned. In

    the omni-directional case, the transmitted signal spreads out in all directions and can be received by

    many antennas. In general, the higher the frequency of a signal, the more it is possible to focus into a

    directional beam. EM spectrum is as shown in figure 5.6.

    Three general ranges of frequencies are of interest for wireless transmission.

    1. Frequencies in the range of about 2GHz (giga hertz=109

    Hz) to 40GHz are referred to as microwave

    frequencies.

    At these frequencies, highly directional beams are possible, and microwave is quite suitable for pint-to-

    point transmission. Microwave is also used for satellite communications.

  • 7/30/2019 Format Assignment

    26/35

    Computer Networks - MC0075 Roll No. 521150974

    2. Frequencies in the range of 30MHz to 1GHz are suitable for omni directional applications.

    We will refer to this range as the broadcast radio range. The table given below summarizes the

    characteristics of unguided transmission at various frequency bands. Microwave covers part of UHF

    and the entire SHF band, and broadcast radio covers the VHF and part of the UHF band.

    3. Another important frequency range, for local applications, is the infrared portion of the spectrum.

    This covers, roughly, from 3x1011 to 2x1014Hz.

    Infrared is useful to local point-to-point and multipoint applications within confined areas, such as a

    single room

    Radio transmission

    Radio is a transmission medium with a large field of applications, and a medium that provides the user

    with great flexibility (for example, cordless telephones). Radio can be used locally, intercontinental, and

    for fixed as well as mobile communication between network nodes or between users and network

    nodes. In this subsection, we deal with radio link and satellite connections.

    The radio spectrum

    The radio spectrum, from 3 kHz to 300 GHz, is one range of the electromagnetic spectrum (infrared,

    visible and ultraviolet light, and X-ray frequencies are other ranges). The radio spectrum is divided into

    eight frequency bands as shown by Fig. from VLF (very low frequency) to EHF (extremely high

    frequency).

    Eight-frequency bands of the radio spectrum

    The propagation of a radio wave depends on its frequency. Radio waves with frequencies below 30

    MHz are reflected against different layers of the atmosphere and against the ground, allowing them to

  • 7/30/2019 Format Assignment

    27/35

    Computer Networks - MC0075 Roll No. 521150974

    be used for maritime radio, telegraphy and telex traffic. The capacity is limited to some tens or

    hundreds of bit/s.

    Above 30 MHz, the frequencies are too high to be reflected by the ionized layers in the atmosphere.

    The VHF and UHF frequency bands, which are used for TV, broadcasting and mobile telephony, belong

    to this group. Frequencies above 3 GHz suffer severe attenuation caused by objects (such as buildings)

    and therefore require a free "line of sight" between the transmitter and the receiver. Radio link

    systems use frequencies between 2 and 40 GHz, and satellite systems normally use frequencies

    between 2 and 14 GHz. The capacity is in the magnitude of 10-150 Mbit/s.

    Radio link

    In radio link connections, transmission is effected via a chain of radio transmitters and radio receivers.

    The radio link is used for analog as well as for digital transmission.

    Fig. Radio link connection

    At regular intervals, the signal is received and forwarded to the next link station. See Fig. The link

    station may be either active or passive. An active link station amplifies or regenerates the signal. A

    passive link station generally consists of two directly interconnected parabolic antennas without any

    amplifying electronics between them. Each radio link needs two radio channels: one for each direction.

    A few MHz spacing is needed between the transmitter frequency and the receiver frequency. The same

    parabolic antenna and waveguide are used for both directions.

    The distance between the link stations - also called the hop length - is dependent on output power,

    antenna type and climate, as well as on the frequency. The higher is the carrier frequency, the shorter

    is the range. For example, a 2 GHz system has a range of approximately 50 kilometers, and an 18 GHz

    system has a range of 5-10 km.

    http://edunxt.smude.edu.in/FileRepository/Community/921/Slm%20Unit/clip-image01631.jpg
  • 7/30/2019 Format Assignment

    28/35

    Computer Networks - MC0075 Roll No. 521150974

    Microwave transmission

    Microwave transmission refers to the technique of transmitting information over a Microwave link.

    Since microwaves are highly susceptible to attenuation by the atmosphere (especially during wet

    weather), the use of microwave transmission is limited to a few contexts.

    Properties

    It is only suitable over Line of Sight transmission links.

    Provides good bandwidth.

    Affected by rain, vapour, dust, snow, cloud, mist and fog, heavy moisture.

    Not suitable for links where an obstacle is in between the transmitter and receiver

    Uses

    Backbone carriers in cellular networks. Used to link BTS-BSC and BSC-MSC.

    Communication with satellites

    Microwave relay links for telephone service providers.

    Que: 4. Describe the following:

    a. IGP

    b. OSPF

    c. OSPF Message formats

    Ans:

    (a)IGP

    An interior gateway protocol (IGP) is a routing protocol that is used within an autonomous system

    (AS).In contrast an Exterior Gateway Protocol (EGP) is for determining network reach ability between

    autonomous systems and makes use of IGPs to resolve routes within an AS. The interior gateway

    protocols can be divided into two categories: 1) Distance-vector routing protocol and 2) Link-state

    routing protocol.

  • 7/30/2019 Format Assignment

    29/35

    Computer Networks - MC0075 Roll No. 521150974

    Autonomous System like Internet (TCP/IP) terminology for a collection of gateways (routers) that fall

    under one administrative entity and cooperate using a common Interior Gateway Protocol (IGP).

    IGP repository is an advanced digital preservation archive designed for critical, demanding, long-term

    data archiving for a wide range of organization requirements. IGP repository successfully isolates

    content and content management from technology and technology obsolescence enabling the modernenterprise for a data-certain future.

    It is purpose designed for:

    Document management including images, office documents, maps, etc.

    Asset management including images, audio and video

    Records management with statutory compliance requirements

    Archiving cultural artifacts (as digital surrogates) for museums and formal archives

    Maintaining large data sets, including mixed datasets

    The design is a faithful execution of the OAIS Reference Model for digital archives. The benchmark for

    information system archives. IGP repository complies with a number of international standards for

    document and records management . It is designed specifically as a content management foundation

    to empower any organization to institute a best practices business model related to the

    (b) OSPF:

    (Open Shortest Path First) A routing protocol that determines the best path for routing IP traffic over a

    TCP/IP network based on distance between nodes and several quality parameters. OSPF is an interior

    gateway protocol (IGP), which is designed to work within an autonomous system. It is also a link state

    protocol that provides less router to router update traffic than the RIP protocol (distance vector

    protocol) that it was designed to replace. Open Shortest Path First OSPF is widely deployed in IP

    networks to manage intra-domain routing. OSPF is a link-state protocol, in which routers reliably flood

    "Link State Advertisements" LSAs, enabling each to build a consistent, global view of the routingtopology. Reliable performance hinges on routing stability, OSPF Open Shortest Path First is a widely

    used intra-domain routing protocol in IP networks. Internal processing delays in OSPF implementations

    impact the speed at which updates propagate in the network, the load on individual routers, and the

    time needed for both intra-domain and inter-domain routing

  • 7/30/2019 Format Assignment

    30/35

    Computer Networks - MC0075 Roll No. 521150974

    Improving IP control plane routing robustness is critical to the creation of reliable and stable IP services

    Yet very few tools exist for effective IP route monitoring and management. This paper describes the

    architecture, design and deployment of a monitoring system for OSPF, an IP intra-domain routing

    protocol in wide. Many recent router architectures decouple the routing engine from the forwarding

    engine, allowing packet forwarding to continue even when the routing process is not active. This opensup the possibility of using the forwarding capability of a router even when its routing process is brought

    down for software upgrade. Due to the growing commercial importance of the Internet, resilience is

    becoming a key design issue for future IP-based networks. Reconfiguration times on the order of a few

    hundred milliseconds are required in the case of network element failures - far away from the slow

    rerouting of current implementations

    (c) OSPF Message Formats:

    OSPF is an interior gateway protocol (IGP), which is designed to work within an autonomous system. It

    is also a link state protocol that provides less router to router update traffic than the RIP protocol

    (distance vector protocol) that it was designed to replace. Open Shortest Path First OSPF is widely

    deployed in IP networks to manage intra-domain routing. OSPF is a link-state protocol, in which routers

    reliably flood "Link State Advertisements" LSAs, enabling each to build a consistent, global view of the

    routing topology. Reliable performance hinges on routing stability, OSPF Open Shortest Path First is a

    widely used intra-domain routing protocol in IP networks

    OSPF uses five different types of messages to communicate both link-state and general information

    between routers within an autonomous system or area. To help illustrate better how the OSPF

    messages are used, it's worth taking a quick look at the format used for each of these messages.

    OSPF Common Header Format

    Naturally, each type of OSPF message includes a slightly different set of informationotherwise, theywouldn't be different message types! However, they all share a similar message structure, beginning

    with a shared 24-byte header. This common header allows certain standard information to be

    conveyed in a consistent manner, such as the number of the version of OSPF that generated the

    message. It also allows a device receiving an OSPF message to quickly determine which type of

    message it has received, so it knows whether or not it needs to bother examining the rest of the

    message

  • 7/30/2019 Format Assignment

    31/35

    Computer Networks - MC0075 Roll No. 521150974

    Que: 5 Describe the following with respect to Internet Security:

    a. Cryptography

    b. DES Algorithm

    Ans:

    a. Cryptography

    Until modern times cryptography referred almost exclusively to encryption, which is the process of

    converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext). Decryption is

    the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or

    cypher) is a pair of algorithms which create the encryption and the reversing decryption. The detailed

    operation of a cipher is controlled both by the algorithm and in each instance by a key. This is a secret

    parameter (ideally known only to the communicants) for a specific message exchange context. Keys are

    important, as ciphers without variable keys can be trivially broken with only the knowledge of the

    cipher used and are therefore less than useful for most purposes. Historically, ciphers were often used

    directly for encryption or decryption without additional procedures such as authentication or integrity

    checks. In colloquial use, the term "code" is often used to mean any method of encryption or

    concealment of meaning. However, in cryptography, code has a more specific meaning. It means the

    replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a code word (for example,

    apple pie replaces attack at dawn). Codes are no longer used in serious cryptographyexcept

    incidentally for such things as unit designations (e.g., Bronco Flight or Operation Overlord) - since

    properly chosen ciphers are both more practical and more secure than even the best codes and also

    are better adapted to computers.

    The most ancient and basic problem of cryptography is secure communication over an insecure

    channel. Party A wants to send to party B a secret message over a communication line which may be

    tapped by an adversary. In the computer industry, refers to techniques for ensuring that data stored in

    a computer cannot be read or compromised by any individuals without authorization. Most security

    measures involve data encryption and passwords. Data encryption is the translation of data into a form

    that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that

    gives a user access to a particular program or system. Modern cryptography abandons the assumption

    that the Adversary has available infinite computing resources, and assumes instead that the adversary'computation is resource bounded in some reasonable way. In particular, in these notes we will assume

    that the adversary is a probabilistic algorithm who runs in polynomial time. Similarly, the encryption

    and decryption algorithms designed are probabilistic and run in polynomial time. The running time of

    the encryption, decryption, and the adversary algorithms are all measured as a function of a security

    parameter k which is a parameter which is fixed at the time the cryptosystem is setup. Thus, when we

  • 7/30/2019 Format Assignment

    32/35

    Computer Networks - MC0075 Roll No. 521150974

    say that the adversary algorithm runs in polynomial time, we mean time bounded by some polynomial

    function in k.

    Accordingly, in modern cryptography, we speak of the infeasibility of breaking the encryption system

    and computing information about exchanged messages where as historically one spoke of the

    impossibility of breaking the encryption system and finding information about exchanged messages.

    We note that the encryption systems which we will describe and claim secure" with respect to the new

    adversary are not secure" with respect to a computationally unbounded adversary in the way that the

    one-time pad system was secure against an unbounded adversary. But, on the other hand, it is no

    longer necessarily true that the size of the secret key that A and B meet and agree on before remote

    transmission must be as long as the total number of secret bits ever to

    be exchanged securely remotely. In fact, at the time of the initial meeting, A and B do not need to know

    in advance how many secret bits they intend to send in the future. We will show how to construct such

    encryption systems, for which the number of messages to be exchanged securely can be a polynomialin the length of the common secret key. How we construct them brings us to another fundamental

    issue, namely that of cryptographic, or complexity, assumptions.

    (b) Data Encryption Standard (DES):

    The Data Encryption Standard (DES) is the quintessential block cipher. Even though it is now quite old,

    and on the way out, no discussion of block ciphers can really omit mention of this construction. DES is aremarkably well-engineered algorithm which has had a powerful influence on cryptography. It is in very

    widespread use, and probably will be for some years to come. Every time you use an ATM machine,

    you are using DES.

    Brief history

    In 1972 the NBS (National Bureau of Standards, now NIST, the National Institute of Standards and

    Technology) initiated a program for data protection and wanted as part of it an encryption algorithm

    that could be standardized. They put out a request for such an algorithm. In 1974, IBM responded with

    a design based on their \Lucifer" algorithm. This design would eventually evolve into the DES. DES has a

    key-length of k = 56 bits and a block-length of n = 64 bits. It consists of 16 rounds of what is called a

    \Feistel network." We will describe more details shortly. After NBS, several other bodies adopted DES

    as a standard, including ANSI (the American National Standards Institute) and the American Bankers

    Association.

  • 7/30/2019 Format Assignment

    33/35

    Computer Networks - MC0075 Roll No. 521150974

    The standard was to be reviewed every five years to see whether or not it should be re-adopted.

    Although there were claims that it would not be re-certified, the algorithm was re-certified again and

    again. Only recently did the work for finding a replacement begin in earnest, in the form of the AES

    (Advanced Encryption Standard)

    Construction

    The DES algorithm is depicted in Figure 4.1. It takes input a 56-bit key K and a 64 bit plaintext M. The

    key-schedule KeySchedule produces from the 56-bit key K a sequence of 16 subkeys, one for each of

    the rounds 50 Goldwasser and Bellare

    The algorithm as a standard

    Despite the criticisms, DES was approved as a federal standard in November 1976, and published on 15

    January 1977 as FIPS PUB 46, authorized for use on all unclassified data. It was subsequently reaffirmed

    as the standard in 1983, 1988 (revised as FIPS-46-1), 1993 (FIPS-46-2), and again in 1999 (FIPS-46-3),

    the latter prescribing "Triple DES" (see below). On 26 May 2002, DES was finally superseded by the

    Advanced Encryption Standard (AES), following a public competition. On 19 May 2005, FIPS 46-3 was

    officially withdrawn, but NIST has approved Triple DES through the year 2030 for sensitive government

    information.

    The algorithm is also specified in ANSI X3.92, NIST SP 800-67 and ISO/IEC 18033-3 (as a component of

    TDEA).

    Another theoretical attack, linear cryptanalysis, was published in 1994, but it was a brute force attack

    in 1998 that demonstrated that DES could be attacked very practically, and highlighted the need for a

    replacement algorithm. These and other methods of cryptanalysis are discussed in more detail later in

    the article.

    The introduction of DES is considered to have been a catalyst for the academic study of cryptography,

    particularly of methods to crack block ciphers. According to a NIST retrospective about DES, DES is the

    archetypal block cipher an algorithm that takes a fixed-length string of plaintext bits and transforms

    it through a series of complicated operations into another ciphertext bitstring of the same length. In

  • 7/30/2019 Format Assignment

    34/35

    Computer Networks - MC0075 Roll No. 521150974

    the case of DES, the block size is 64 bits. DES also uses a key to customize the transformation, so that

    decryption can supposedly only be performed by those who know the particular key used to encrypt.

    The key ostensibly consists of 64 bits; however, only 56 of these are actually used by the algorithm.

    Eight bits are used solely for checking parity, and are thereafter discarded. Hence the effective key

    length is 56 bits, and it is usually quoted as such. Like other block ciphers, DES by itself is not a securemeans of encryption but must instead be used in a mode of operation. FIPS-81 specifies several modes

    for use with DES. Further comments on the usage of DES are contained in FIPS-74.

    Que: 6. What are Digital Signatures? Discuss their merits and drawbacks.

    Ans:

    Digital signatures

    In cryptography, a digital signature or digital signature scheme is a type ofasymmetric cryptography

    used to simulate the security properties of a signature in digital, rather than written, form. Digital

    signature schemes normally give two algorithms, one for signing which involves the user's secret or

    private key, and one for verifying signatures which involves the user's public key. The output of the

    signature process is called the "digital signature."

    Digital signatures, like written signatures, are used to provide authentication of the associated input,

    usually called a "message." Messages may be anything, from electronic mail to a contract, or even amessage sent in a more complicated cryptographic protocol. Digital signatures are used to create publi

    key infrastructure (PKI) schemes in which a user's public key (whether for public-key encryption, digital

    signatures, or any other purpose) is tied to a user by a digital identity certificate issued by a certificate

    authority. PKI schemes attempt to unbreakably bind user information (name, address, phone number,

    etc.) to a public key, so that public keys can be used as a form ofidentification.

    Digital signatures are often used to implement electronic signatures, a broader term that refers to any

    electronic data that carries the intent of a signature, but not all electronic signatures use digital

    signatures.

    Benefits of digital signatures

    These are common reasons for applying a digital signature to communications:

    Authentication

    http://en.wikipedia.org/wiki/Asymmetric_key_algorithmhttp://en.wikipedia.org/wiki/Signaturehttp://en.wikipedia.org/wiki/Private_keyhttp://en.wikipedia.org/wiki/Public_keyhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Contracthttp://en.wikipedia.org/wiki/Cryptographic_protocolhttp://en.wikipedia.org/wiki/Public_key_infrastructurehttp://en.wikipedia.org/wiki/Public_key_infrastructurehttp://en.wikipedia.org/wiki/Public-key_encryptionhttp://en.wikipedia.org/wiki/Digital_identity_certificatehttp://en.wikipedia.org/wiki/Certificate_authorityhttp://en.wikipedia.org/wiki/Certificate_authorityhttp://en.wikipedia.org/wiki/Identificationhttp://en.wikipedia.org/wiki/Electronic_signaturehttp://en.wikipedia.org/wiki/Electronic_signaturehttp://en.wikipedia.org/wiki/Identificationhttp://en.wikipedia.org/wiki/Certificate_authorityhttp://en.wikipedia.org/wiki/Certificate_authorityhttp://en.wikipedia.org/wiki/Digital_identity_certificatehttp://en.wikipedia.org/wiki/Public-key_encryptionhttp://en.wikipedia.org/wiki/Public_key_infrastructurehttp://en.wikipedia.org/wiki/Public_key_infrastructurehttp://en.wikipedia.org/wiki/Cryptographic_protocolhttp://en.wikipedia.org/wiki/Contracthttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Public_keyhttp://en.wikipedia.org/wiki/Private_keyhttp://en.wikipedia.org/wiki/Signaturehttp://en.wikipedia.org/wiki/Asymmetric_key_algorithm
  • 7/30/2019 Format Assignment

    35/35

    Although messages may often include information about the entity sending a message, that

    information may not be accurate. Digital signatures can be used to authenticate the source of

    messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature

    shows that the message was sent by that user. The importance of high confidence in sender

    authenticity is especially obvious in a financial context. For example, suppose a bank's branch officesends instructions to the central office requesting a change in the balance of an account. If the central

    office is not convinced that such a message is truly sent from an authorized source, acting on such a

    request could be a grave mistake.

    Integrity

    In many scenarios, the sender and receiver of a message may have a need for confidence that the

    message has not been altered during transmission. Although encryption hides the contents of a

    message, it may be possible to change an encrypted message without understanding it. (Some

    encryption algorithms, known as nonmalleable ones, prevent this, but others do not.) However, if amessage is digitally signed, any change in the message will invalidate the signature. Furthermore, there

    is no efficient way to modify a message and its signature to produce a new message with a valid

    signature, because this is still considered to be computationally infeasible by most cryptographic hash

    functions.

    Drawbacks of digital signatures

    Despite their usefulness, digital signatures do not alone solve all the problems we might wish them to.

    Non-repudiation: In a cryptographic context, the word repudiation refers to the act of disclaiming

    responsibility for a message. A message's recipient may insist the sender attach a signature in order to

    make later repudiation more difficult, since the recipient can show the signed message to a third party

    (eg, a court) to reinforce a claim as to its signatories and integrity. However, loss of control over a

    user's private key will mean that all digital signatures using that key, and so ostensibly 'from' that user,

    are suspect. Nonetheless, a user cannot repudiate a signed message without repudiating their

    signature key.

    http://en.wikipedia.org/wiki/Malleability_%28cryptography%29http://en.wikipedia.org/wiki/Cryptographic_hash_functionshttp://en.wikipedia.org/wiki/Cryptographic_hash_functionshttp://en.wikipedia.org/wiki/Cryptographic_hash_functionshttp://en.wikipedia.org/wiki/Cryptographic_hash_functionshttp://en.wikipedia.org/wiki/Malleability_%28cryptography%29