Networking (2023)
Networking (2023)
Explanation:
In a ring topology, if one of the stations is unplugged, it will disrupt the entire network. This is because the signal
travels in only one direction and each device or station in the ring topology prepares and retransmits the signal.
So, if a station is unplugged, the signal cannot continue on to the next station as the path is broken, causing the
entire network to fail.
However, in a bus topology, unplugging one of the stations will not disrupt the entire network. This is because
each device on the network connects to a central cable, or bus. If a station is unplugged, it won't affect the
overall communication since other devices can still transmit data along the backbone. Nevertheless, the
unplugged station will not be able to send or receive data.
To send an IP packet from host 1 to host 2, the packet is inserted into a “Multiprotocol router”. After putting
packets on the ethernet, when a multiprotocol router gets the frame, it removes the IP packets. Packets are then
inserted in the payload field of the WAN network and address the latter to the WAN address of the destinations
multiprotocol router.
At receiver’s end, the host again fetch the IP packet and send it to the destination. In this view, WAN can seen as
a big tunnel extending from one multiprotocol router to other.
WAN LAN
LAN Tunnel
IP IP IP
iv. What id Piggybacking?
Answer:
When a data frame arrives, instead of immediately sending a separate control frame, the receiver restrains itself
and waits until the network layer passes it the next packet. The acknowledgement is attached to the outgoing
data frame (using the ack field in the frame header). In effect, the acknowledgement gets a free ride on the next
outgoing data frame. The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is known as “piggybacking”.
Answer:
It is the simplest flow control method. In this, the sender will transmit one frame at a time to the receiver. The
sender will stop and wait for the acknowledgement from the receiver.
This time (i.e. the time joining message transmitting and acknowledgement receiving) is the sender’s waiting
time, and the sender is idle during this time. When the sender gets the acknowledgement (ACK), it will send the
next data packet to the receiver and wait for the disclosure again, and this process will continue as long as the
sender has the data to send.
While sending the data from the sender to the receiver, the data flow needs to be controlled. If the sender is
transmitting the data at a rate higher than the receiver can receive and process it, the data will get lost. The
Flow-control methods will help in ensuring that the
data doesn't get lost. The flow control method will
check that the senders send the data only at a rate
that the receiver can receive and process.
Features
The features of Stop and Wait Protocol are as follows
−
It is used in Connection-oriented communication.
It offers error and flows control.
It can be used in data Link and transport Layers.
Stop and Wait ARQ executes Sliding Window Protocol with Window Size 1.
ii. a) Compare byte stuffing and bit stuffing. Also, “Bit Stuff” the following data frame
00111111100110001111111100. (2+3)
b) How does token bucket traffic sharper work? Explain through a diagram. 5
Answer:
iii. a) Discuss the functions and services of sublayers of ATM adaption layers (AAL). 5
b) What is the important aspect that establishes trust in digital signature?
Answer:
a) Adaptation Layers (AAL)
The use of Asynchronous Transfer Mode (ATM) technology and services creates the need for an adaptation layer
in order to support information transfer protocols, which are not based on ATM. This adaptation layer defines
how to segment and reassemble higher-layer packets into ATM cells, and how to handle various transmission
aspects in the ATM layer. Examples of services that need adaptations are Gigabit Ethernet, IP, Frame
Relay, SONET/SDH, UMTS/Wireless, etc.
b)
Digital signatures rely on asymmetric cryptography, also known as public key cryptography. This cryptography
uses a public/private key pair. The private key is used to create a signature, and the corresponding public key is
used to verify the signature.
Digital signatures are a subset of electronic signature technology (eSignature). They rely on a universally
accepted format known as Public Key Infrastructure (PKI) to ensure enhanced security. The level of trust in digital
signatures is based on the level of assurance or vetting that the process that proved your identity went through.
iv. a) Draw the format of IP Header version 4 and explain the significance of each field. 5
b) Explain the DES algorithm with the help of suitable diagram. 5
Answer:
a)
IP datagram is unit of transfer in an IP network. It carries enough information about the network to get
forwarded to its destination; it consists of a header followed by bytes of data.
The header contains information about the type of IP datagram, how long the datagram should stay on the
network with special flags indicating any special purpose the datagram is supposed to serve etc. The minimum
use of the IP header is 20 bytes consisting of five 32 bit words.
Li−1 Ri−1
Li−1+ f (R i−1 , K i)
32 Bits
(A) (B)
v. a) How information of complete path from 10 source to destination instead of delay (number of hops), helps
in solving count-to-infinity problem of distance vector routing? Explain with example.
b)Find CRC for Data Polynomial x 4 + x 2 + x+ 1 with generator polynomial x 3 +1