0% found this document useful (0 votes)
51 views5 pages

DCN Unit-4 Saq

The UDP checksum is calculated over the IP header fields, UDP header fields, and payload. UDP has less overhead than TCP since it has fewer header bytes and does not confirm packet receipt. Network congestion occurs when network traffic exceeds maximum capacity, causing delays. The TCP header contains flags like SYN, ACK, FIN, and PSH that are used for connection establishment and data transmission. [/SUMMARY]

Uploaded by

sravan kumar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
0% found this document useful (0 votes)
51 views5 pages

DCN Unit-4 Saq

The UDP checksum is calculated over the IP header fields, UDP header fields, and payload. UDP has less overhead than TCP since it has fewer header bytes and does not confirm packet receipt. Network congestion occurs when network traffic exceeds maximum capacity, causing delays. The TCP header contains flags like SYN, ACK, FIN, and PSH that are used for connection establishment and data transmission. [/SUMMARY]

Uploaded by

sravan kumar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 5

UNIT - IV

SHORT ANSWER QUESTIONS

1.What are the fields on which the UDP checksum is calculated? Why?
The UDP checksum is performed over the entire payload, and the other fields in the
header, and some fields from the IP header. A pseudo-header is constructed from the IP
header in order to perform the calculation (which is done over this pseudo-header, the
UDP header and the payload).

2. What are the advantages of using UDP over TCP?


 UDP communication is more reliable.
 UDP communication requires less overhead.
 UDP acknowledges received data.
 UDP reorders segments that are received out of order.
TCP is a more reliable protocol and uses sequence numbers to realign packets
that arrive out of order at the destination. Both UDP and TCP use port numbers
to identify applications. UDP has less overhead than TCP because the UDP
header has fewer bytes and UDP does not confirm the receipt of packets.

3. Define congestion.
Network Congestion occurs when the traffic flowing through a network exceeds its
maximum capacity. In most cases, congestion is a temporary issue with the network
caused due to a sudden upsurge of traffic, however, sometimes, a network is
continually congested, indicating a deeper problem. End-users perceive network
congestion as Network Slowdown or a very large delay in processing requests .

4. List the flag used in TCP header.


 SYN - The synchronisation flag is used as a first step in establishing a three way

handshake between two hosts.


 ACK - The acknowledgment flag is used to acknowledge the successful receipt of a
packet.
 FIN - The finished flag means there is no more data from the sender.
 URG - The urgent flag is used to notify the receiver to process the urgent packets before
processing all other packets.
 PSH - The push flag is somewhat similar to the URG flag and tells the receiver to process
these packets as they are received instead of buffering them.
 RST - The reset flag gets sent from the receiver to the sender when a packet is sent to a
particular host that was not expecting it.

5. What do you mean by QoS?


Refer 3rd unit
6. What is multiplexing, de-multiplexing?
Multiplexing – 
Gathering data from multiple application processes of the sender, enveloping
that data with a header, and sending them as a whole to the intended receiver
is called multiplexing. 
Demultiplexing – 
Delivering received segments at the receiver side to the correct application
layer processes is called demultiplexing. 

7. List the services of end to end services.

8. What is congestion?

9. What are the functions of transport layer?

Specific functions of the transport layer are as follows:

1. Service-point addressing

2. Segmentation and Reassembly

3. Connection Control

It can be either of two types:

i. Connectionless Transport Layer


ii. Connection Oriented Transport Layer

4. Multiplexing and Demultiplexing

5. Flow control

6. Error Control

10. What are the types of QoS tools?

11. List some ways to deal with congestion


3rd unit.

12. List the three types of addresses in TCP/IP.


Addresses present in TCP/IP are:
1) Physical address :- used in Physical layer
2) Logical Address:- used in Network layer
3) Port Address:- used in transport layer.
4) Specific Address:- used in Application layer

13. What is the flow characteristics related to QoS?


The needs of each flow can be characterized by four primary parameters : 
 
 Reliability, Lack of reliability means losing a packet or acknowledgement which
entertains retransmission. 
 
 Delay, Increase in delay means destination will find the packet later than expected,
Importance of delay changes according to the various application. 
 
 Jitter, Variation of the delay is jitter, If the delay is not at a constant rate, it may
result in poor quality. 
 
 Bandwidth, Increase in bandwidth means increase in the amount of data which can
be transferred in given amount of time, Importance of bandwidth also varies
according to various application.

14. What are the techniques to improve QoS?

Techniques to improve QOS

Generally, there are four techniques to improve quality of service −

 Scheduling
 Traffic shaping
 Resource Reservation
 Admission Control

15. Define Socket address.


Socket address is the combination of an IP address and port number.
Telephone connection is the combination of a phone number and particular
extension. Number socket is an internal end point for sending or receiving
data at a single node in computer network.

16. What are the two types of protocols used in Transport layer?
 TCP(Transmission Control Protocol): TCP is a layer 4 protocol which
provides acknowledgement of the received packets and is also reliable as it
resends the lost packets.
 UDP (User Datagram Protocol): UDP is also a layer 4 protocol but unlike
TCP it doesn’t provide acknowledgement of the sent packets. Therefore, it
isn’t reliable and depends on the higher layer protocols for the same. 

17. Define Throughput


Throughput is a measure of how many units of information a system can
process in a given amount of time. It is applied broadly to systems ranging
from various aspects of computer and network systems to organizations.

18. What is the need of port numbers? Port numbers are used as an addressing
mechanism in transport layer.

In computer networking, port numbers are part of the addressing information used to
identify the senders and receivers of messages. They are associated
with TCP/IP network connections and might be described as an add-on to the IP
address. Port numbers allow different applications on the same computer to share
network resources simultaneously. Home network routers and computer software work
with these ports and sometimes support configuring port number settings.

19. What are the types of port numbers used in transport layer? Well-known port
Registered port Dynamic port

The port numbers are divided into three categories:

o Well-known ports: The range of well-known port is 0 to 1023. The well-known ports
are used with those protocols that serve common applications and services such as HTTP
, IMAP, SMTP, etc.
o Registered ports: The range of registered port is 1024 to 49151. The registered ports
are used for the user processes. 
o Dynamic ports: The range of dynamic port is 49152 to 65535. These port numbers are
assigned to the client application dynamically when a client creates a connection.

20. Why TCP services are called Stream delivery services?


TCP allows the sending process to deliver data as a stream of bytes and the
receiving process to deliver data as a stream of bytes. so it is called as
stream of bytes. It is the variation in delay for packets belonging to same
flow .

You might also like