Professional Documents
Culture Documents
UNIT-I
Network edge is nothing but the end systems which are located at
the edge of any network.They can be desktop computers,mobile
computers,PDAS,web TV's,set boxes,digital cameras,home appliances.
6.What are the services provided by the Internet for end system
application?
11.What is TCP?
1.It is not suitable for real time It is suitable for real time
services,
application line telephone and
because of variable an video conferencing.
unpredictable end to
end delay.
packet switching.
(1)Datagram networks
(2)Queuing delay
(3)Transmission delay
(4)Propogation delay.
dnod=dprop+dtrans+dqueue+dprocess.
Traffic intensity=La/R.
The rule is that traffic intensity La/R should not be greater than 1.
When a packet arrives and finds no place in the queue the router
will drop the packet and the packet will be lost.
Dend to end=N(dprop+dtrans+dprocess)
where,
dtrans=L/R.
31.What are the advantages and disadvantages of Layering.
Advantages:
Disadvantages:
(1)Physical layer
(2)Link layer
(3)Network layer
(4)transport layer
(5)APplication layer.
This transport the application layer manages between client and server
sides of application. The two transport layer protocols are TCP and UDP.
Transport layer packets are called segments.
It has a protocol that defines the field in the datagram. The network layer also
contains the routing protocols that determine the route the datagram takes
between source and destination.
36. Link layer – explain.
The link layer moves packet from one node to the next node in the route. At the
next node, the link layer passes the datagram up to the network layer. The
service provided by the link layer depends on the specific link layer protocol that
is employed over the link.
The job of the physical layer is to move the individual bits within the
frames from one node to the next. The protocol in this layer is again link
dependent and further depends on the actual transmission medium of the link.
The process of attaching the layer information along with the message at
each of the layers is called encapsulation.
40. What are the various attacks on network and also list what are the
entrustion detection systems.
To overcome this some intrusion detection systems are 1) firewall and 2) ip trace
back.
Some times a single server is not capable of keeping up with all the
requests from its client . Therefore a cluster of hosts are interconnected (i.e)
Server to create a powerful server . This is called the virtual server.
Text sent between to users does not always pan through an intermediate
server.
But here we first register with the central server and then find who and all
are online.
2)server process.
48.Define a socket.
When a process wants to send a message to another process on another
host, it shows he message out its door. The socket to the interface between
application layer and transport layer within the host.
-mail server—25
2) The syntax of the various message types like fields and how fields are
delineated
4) Rules for determining when and how the process sends messages and
responds to message.
The web’s protocol is the HTTP – Hyper Text Transfer Protocol.This defines
the format and sequence of message that are parsed between browser and web
server (Request and response message)
1) Database
2) Bandwidth
3) timing
Here each TCP connections is closed after the server sends the object.
The connection does not persist for the other object.
With persistent connection, the server leaves the TCP connection after
sending a response.It can be usesd for transmitting large amount of data . They
can further be divided into
Without pipelining the client issues a new request only when the previous
response has been received .
With pipe lining ,the client can make back to back requests for the
reference objects , thus it can make a new request before receiving response.
3) Cookie file kept in the end user system manager by the browser.
A Web cache is called a proxy server. This is a network entity that satisfies
HTTP request on behalf of the server .The Web cache has its own disk storage
and keeps copies of recently requested objects in its storage. The users browser
can be configured so that all of the users HTTP request are first diverted to the
Web cache