Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
4 views

Assignments

java assignments

Uploaded by

sanskaruravane9
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Assignments

java assignments

Uploaded by

sanskaruravane9
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Assignment No 4

Q1. Enlist any two services offered by UDP.


Fast data transfer
Time-sensitive applications
DNS
Network News Protocol (NNP)

Q2 The dump of UDP header in hexadecimal format is as follows :


BC82D00D002B0
obtain the following :
(i) Source port number (ii) Destination port number
(iii) Total length (iv) Packet direction

Q3 Compare TCP with UDD on any four points

Q4 State different applications of UDP.


• Gaming: UDP is ideal for online gaming because it's fast and can handle some data loss without
affecting the perceived quality.
• Voice and video: UDP is often used for voice and video traffic because it's time-sensitive and can
handle some data loss. For example, VoIP (voice over IP) uses UDP because a static phone
conversation is better than a delayed one.
• Domain Name System (DNS): UDP is used for DNS lookups because fast lookups are important
for minimizing website loading latency.
• Network monitoring: UDP is used for network monitoring applications.
• Lossless data transmission: UDP can be used for applications that require lossless data
transmission

Q5 List and explain, services provided by TCP (Transmission Control Protocol).


• Connection-oriented services
TCP establishes a formal connection between two endpoints before transmitting data. It ensures that
data is delivered and that data packets are delivered in the same order they were sent.
• Error detection
TCP ensures that data is delivered reliably and accurately without loss of content or data.
• Full duplex services
TCP provides a full-duplex service to the application layer, meaning data can flow in each direction
independently.
• Remote access
TCP/IP supports remote connections to networks or computers via protocols like SSH and Telnet

Q6 State the use of six flags in TCP header.


• SYN: Used to establish a three-way handshake between two hosts.
• ACK: Used to acknowledge the successful receipt of a packet.
• FIN: Used to indicate that there is no more data from the sender.
• URG: Used to notify the receiver to process urgent packets before processing all other packets.
• PSH: Used to tell the receiver to process packets as they are received instead of buffering them.
• RST: Used to reset a TCP connection abruptly.

Q7 Explain state transition diagram of TCP.


A Transmission Control Protocol (TCP) state transition diagram is a visual representation of the states,
messages, and transitions of TCP. It shows how TCP establishes, maintains, and terminates connections
between endpoints.
Here are some key points about TCP state transition diagrams:
• States
The diagram shows the states that TCP can be in, such as closed, listen, SYN_Recv, and ESTABLISHED.
• Transitions
The diagram shows the transitions between states, and the events that trigger those transitions. For
example, a client program invokes a system call to trigger an active open, which causes the server to
send a SYN message.
• Client and server
The diagram shows the client and server on opposite sides, with the server on the left and the client on
the right.
• Deadlock
TCP is designed to prevent deadlock, which means that neither the client nor the server can be waiting
for the other to send a message.
Q8 List Transport layer protocols. List Transport layer protocols.
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
• Stream Control Transmission Protocol (SCTP)
• Datagram Congestion Control Protocol (DCCP)
• AppleTalk Transaction Protocol (ATP)
• Fibre Channel Protocol (FCP)
• Reliable Data Protocol (RDP)
• Reliable User Data Protocol (RUDP)
Assignment No 5
Q1. Explain URL. Give one example.
URL is an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the
Internet. A URL has two main components: Protocol identifier: For the URL http://example.com ,

Q2 List Application Layer Protocols.


• Hypertext Transfer Protocol (HTTP) ...
• File Transfer Protocol (FTP) ...
• Domain Name System (DNS) ...
• Simple Mail Transfer Protocol (SMTP) ...
• Post Office Protocol (POP) ...
• Telnet. ...
• Trivial File Transfer Protocol (TFTP) ...
• Lightweight Directory Access Protocol (LDAP)

Q3 Explain the working principle of World Wide Web?


The World Wide Web (WWW) is a system that allows users to access and share information on the
internet through hyperlinks. It works by using a client-server model, where a user's device (the client)
requests documents from a server, which then stores and transmits them. The user can then view the
documents on their screen using a web browser.
Here are some key components of how the WWW works:
• Web browsers
These programs allow users to view web pages, which can contain text, images, videos, and more. Web
browsers also provide the interface that allows users to click on hyperlinked resources.
• Hypertext Markup Language (HTML) and Hypertext Transfer Protocol (HTTP)
These technologies are used to create and communicate web pages.
• DNS server
The browser uses this server to find the real address of the server that a website is on.

Q4 Compare FTP and TFTP file transfer protocols.


Q5 Distinguish between SMTP and POP3 protocols.
Q 6 Explain the working of TELNET.
Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative
and text-based communication channel between two machines.
How Telnet works
Telnet is a type of client-server protocol that opens a command line on a remote computer, typically a
server. Users can use this tool to ping a port and find out if it's open.
Telnet works with a virtual terminal connection emulator, which is an abstract instance of a connection
to a computer, and uses standard protocols to act like a physical terminal connected to a machine.
Telnet also sometimes uses FTP to help users send data files.
Users connect remotely to a machine with Telnet. This is sometimes referred to as Telnetting into the
system. Telnet prompts users to enter their usernames and passwords to access the remote computer,
which enables command lines to run as if users are logged in to the computers in person. A user's IP
address matches the computer they're logged in to rather than the one physically used to connect.

Q8 Describe DHCP operations, when DHCP client and server on same network.
Client Request (DHCP Discover):
• The DHCP client, needing an IP address, sends a broadcast message (DHCPDISCOVER) to the
entire network since it doesn't know the DHCP server's address.
• This message includes the client's MAC address so the server can identify it.
Server Response (DHCP Offer):
• The DHCP server receives the broadcast and reserves an available IP address from its pool.
• It then sends a DHCP Offer message to the client, offering the reserved IP along with other
settings like the subnet mask, default gateway, and lease duration.
• This message is typically broadcast back because the client may not have an IP address to
receive unicast messages yet.
Client Confirmation (DHCP Request):
• The client, upon receiving the offer, responds with a DHCP Request message, requesting to
officially use the offered IP address and settings.
Server Acknowledgment (DHCP Acknowledge):
• The server confirms the request with a DHCP Acknowledgment (DHCPACK), completing the
process.
• The client can now use the assigned IP and network settings.
Q9 Describe E-mail security over non-secure channel.
Introduction to Email Security
Email (short for electronic mail) is a digital method by using it we exchange messages between people
over the internet or other computer networks. With the help of this, we can send and receive text-based
messages, often an attachment such as documents, images, or videos, from one person or organization
to another. In this article, we will understand the concept of email security, how we can protect our
email, email security policies, and email security best practices, and one of the features of email is an
email that we can use to protect the email from unauthorized access.
What is Email Security?
Basically, Email security refers to the steps where we protect the email messages and the information
that they contain from unauthorized access, and damage. It involves ensuring the confidentiality,
integrity, and availability of email messages, as well as safeguarding against phishing attacks, spam,
viruses, and another form of malware. It can be achieved through a combination of technical and non-
technical measures.

Q10 Describe SMTP with suitable diagram.


Simple Mail Transfer mechanism (SMTP) is a mechanism for exchanging email messages between
servers. It is an essential component of the email communication process and operates at the
application layer of the TCP/IP protocol stack. SMTP is a protocol for transmitting and receiving email
messages. In this article, we are going to discuss every point about SMTP.
What is Simple Mail Transfer Protocol?
SMTP is an application layer protocol. The client who wants to send the mail opens a TCP connection to
the SMTP server and then sends the mail across the connection. The SMTP server is an always-on
listening mode. As soon as it listens for a TCP connection from any client, the SMTP process initiates a
connection through port 25. After successfully establishing a TCP connection the client process sends
the mail instantly.
Q11 Describe the HTTP Response Message format.

• Status line
The first line of the response, which includes the HTTP version, a status code, and a reason phrase. For
example, "HTTP/1.1 200 OK".
• Headers
A series of key-value pairs that provide additional information about the response, such as the content
type, content length, and caching directives.
• Message body
The actual content of the response, such as HTML, JSON, or an image. If the requested object cannot be
served, an error message will be returned instead.
• CRLF
An additional CRLF after the last HTTP headers

You might also like