Unit 4 Sanjay Kumar Nayak

Download as pdf or txt
Download as pdf or txt
You are on page 1of 86

Noida Institute of Engineering and

Technology, Greater Noida


Transport Layer

Unit: 4

Computer Networks
ACSE0602 Sanjay Kumar Nayak
CSE
B.Tech 6th sem Department

Sanjay NayakACSE0602 Computer Networks


1
4/30/2024
Curriculum
Content

Sanjay NayakACSE0602 Computer Networks


4/30/2024 2
Syllabus
Content

Sanjay NayakACSE0602 Computer Networks


4/30/2024 3
Course
Content
Objective

The objective of this course is to understand introduction of


computer networks with suitable transmission media and different
networking devices. Network protocols which are essential for the
computer network are need to explain such as data link layer protocols
and routing protocols.
A detail explanation of IP addressing , TCP/IP protocols and
application layer protocols are covered in this course.

Sanjay NayakACSE0602 Computer Networks


4/30/2024 4
Course
Content
Outcome

Sanjay NayakACSE0602 Computer Networks


4/30/2024 5
Content
Course Outcome
Outcomes
Cos
After Completion of the Course Student will be able to
Explain basic concepts, OSI reference model, services and role of each layer of
CO1 OSI model and TCP/IP, networks devices and transmission media, Analog and
digital data transmission.
CO2 Apply channel allocation, framing, error and flow control techniques and describe
the functions of Network Layer i.e. Logical addressing, subnetting & Routing
Mechanism.
CO3 Explain the different Transport Layer function i.e. Port addressing, Connection
Management, Error control and Flow control mechanism.
CO4 Explain the functions offered by session and presentation layer and their
Implementation.
CO5 Explain the different protocols used at application layer i.e. HTTP, SNMP, SMTP,
FTP,TELNET and VPN.

4/30/2024 CN Unit-5 6
PSO’s
Content

Course Outcome
Program Specific
Outcomes CO1 CO2 CO3 CO4 C05

2 2 2 2 2
PSO1

2 2 2 2
PSO2
2

2 2 2 3 2
PSO3

AVERAGE 2 2 2 2.3 2

Sanjay NayakACSE0602 Computer Networks 1


4/30/2024 7
PO’s
Content
1.Engineering knowledge
2. Problem analysis
3. Design/development of solutions
4. Conduct investigations of complex problems
5. Modern tool usage
6. The engineer and society
7. Environment and sustainability
8. Ethics
9. Individual and team work
10. Communication
11. Project management and finance
12. Life-long learning

Sanjay NayakACSE0602 Computer Networks


4/30/2024 8
PSO’s
Content

On successful completion of graduation degree, The computer Science & Engineering


graduates will be able to:

PSO1: identify, analyze real world problems and design their ethical solutions using
artificial intelligence, robotics, virtual/augmented reality, data analytics, block chain
technology, and cloud computing.

PSO2: design and develop the hardware sensor devices and related interfacing software
systems for solving complex engineering problems.

PSO 3: understand inter-disciplinary computing techniques and to apply them in the


design of advanced computing.

PSO 4: conduct investigation of complex problem with the help of technical, managerial,
leadership qualities, and modern engineering tools provided by industry sponsored
laboratories.

Sanjay NayakACSE0602 Computer Networks


4/30/2024 9
Content
CO-PO Mapping

CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
2 2 2 2 2 2 2 2 2 2 2 2
CO1
2 2 2 2 2 2 2 2 2 2 2 2
CO2
2 2 2 3 2 2 2 3 2 2 2 3
CO3
2 2 2 2 2 2 2 2 2 2 2 2
CO4
2 2 2 2 2 2 2 2 2 2 2 2
CO5
2 2 2 2 2 2 2 2 2 2 2 2
Avg.

*3= High *2= Medium *1=Low

4/30/2024 Sanjay NayakACSE0602 Computer Networks 10


PSO’s
Content

Course Outcome
Program Specific
Outcomes CO1 CO2 CO3 CO4 C05

2 2 2 2 2
PSO1

2 2 2 2
PSO2
2

2 2 2 3 2
PSO3

AVERAGE 2 2 2 2.3 2

Sanjay NayakACSE0602 Computer Networks


4/30/2024 11
Program Educational
Content Objectives
PEO 1: To have an excellent scientific and engineering breadth so as to comprehend,
analyze, design and provide sustainable solutions for real-life problems using state-of-the-
art technologies.

PEO 2: To have a successful career in industries, to pursue higher studies or to support


entrepreneurial endeavors and to face the global challenges.

PEO 3:To have an effective communication skills, professional attitude, ethical values and
a desire to learn specific knowledge in emerging trends, technologies for research,
innovation and product development and contribution to society.

PEO 4: To have life-long learning for up-skilling and re-skilling for successful
professional career as engineer, scientist, entrepreneur and bureaucrat for betterment of
society.
Sanjay NayakACSE0602 Computer Networks
4/30/2024 12
Result
Content
Analysis

COMPUTER ORGANIZATION & ARCHITECTURE


(KCS603)
Department wise Result of VI sem. NA

Subject wise result NA

Faculty wise result NA

Sanjay NayakACSE0602 Computer Networks


4/30/2024 13
Prerequisite
Content
and Recap

• Duties of network layer


• Understanding about router and its function
In previous unit
• Logical addressing
• IPv4 and IPv6
• Congestion control
• Routing protocols

Sanjay NayakACSE0602 Computer Networks


4/30/2024 14
Content
Content

Unit 4
• Transport Layer: Process-to-process delivery
• Transport layer protocols (UDP and TCP)
• UDP header format
• TCP header Format
• Port addressing
• Multiplexing, Connection management
• Flow control and retransmission
• Window management
• TCP Congestion control
• Quality of service

Sanjay NayakACSE0602 Computer Networks


4/30/2024 15
OSI model

Sanjay NayakACSE0602
4/30/2024 16
Computer Networks
TCP/ IP model

Sanjay NayakACSE0602
4/30/2024 17
Computer Networks
INTRODUCTION

Objective: Study about basic concept of Transport layer and it functions

• The transport layer is located between the application layer and the
network layer.

• It provides Process-to-process communication between two


application layers, one at the local host and the other at the remote
host.

• Communication is provided using a logical connection.

Sanjay NayakACSE0602
4/30/2024 18
Computer Networks
Logical connection at the transport layer

Sanjay NayakACSE0602
4/30/2024 19
Computer Networks
Network layer versus transport layer

Sanjay NayakACSE0602
4/30/2024 20
Computer Networks
Functions of transport Layer

• Process to process delivery of data


• Port addressing
• Encapsulation and de capsulation
• Multiplexing and de multiplexing
• Connection less and connection oriented services
• Flow control and error control

Sanjay NayakACSE0602
4/30/2024 21
Computer Networks
Port numbers

• 16 bit integer number from 0 to 65535


• Well known port no. are fixed for particular application Provided by
ICANN (Internet Corporation for Assigned Names and Numbers)
• eg. FTP -21, Telnet -23, DNS-53, TFTP-69 server uses the fix port
number for particular application
• Client process knows the well known port no. for corresponding
server process

22

Sanjay NayakACSE0602
4/30/2024
Computer Networks
Registered port numbers

• 1024 to 49151

• Used by vendors for their own server applications

Sanjay NayakACSE0602
4/30/2024 23
Computer Networks
Dynamic port numbers

Ephemeral / Temporary port no.

• 49152 to 65535

• Client process define itself with port no. chosen randomly by transport
layer

Sanjay NayakACSE0602
4/30/2024 24
Computer Networks
Example Port number

Sanjay NayakACSE0602
4/30/2024 25
Computer Networks
IP addresses versus port numbers

Sanjay NayakACSE0602
4/30/2024 26
Computer Networks
Socket address

Sanjay NayakACSE0602
4/30/2024 27
Computer Networks
Socket address

A socket is one endpoint of a two way communication link between two


programs running on the network.

The socket mechanism provides a means of inter-process communication (IPC)


by establishing named contact points between which the communication take
place.

Types of Sockets : There are two types of Sockets: the datagram socket and
the stream socket.

Sanjay NayakACSE0602
4/30/2024 28
Computer Networks
Socket address

1.Datagram Socket : This is a type of network which has connection less point
for sending and receiving packets. It is similar to mailbox. The letters (data)
posted into the box are collected and delivered (transmitted) to a letterbox
(receiving socket).

2.Stream Socket In Computer operating system, a stream socket is type


of interprocess communications socket or network socket which provides a
connection-oriented, sequenced, and unique flow of data without record
boundaries with well defined mechanisms for creating and destroying
connections and for detecting errors. It is similar to phone. A connection is
established between the phones (two ends) and a conversation (transfer of data)
takes place.

Sanjay NayakACSE0602
4/30/2024 29
Computer Networks
Encapsulation and de capsulation

Sanjay NayakACSE0602
4/30/2024 30
Computer Networks
Multiplexing and de multiplexing

Sanjay NayakACSE0602
4/30/2024 31
Computer Networks
TRANSPORT-LAYER PROTOCOLS

Objective: Study about basic concept of Transport layer protocols-UDP & TCP

• Transport-layer protocol are created by combining a set of services


provided by transport –layer

• Transport-layer protocol are

1. TCP –Transmission control protocol


(connection oriented protocol)
2. UDP - User datagram protocol
(connectionless protocol)

Sanjay NayakACSE0602
4/30/2024 32
Computer Networks
UDP -User datagram protocol

• Simple connectionless protocol


• Neither flow nor error control
• Receiver can immediately handle any packet it receives
• Receiver can never be overwhelmed with incoming packets.
• UDP packets, called user data grams, have a fixed-size header
of 8 bytes.

Sanjay NayakACSE0602
4/30/2024 33
Computer Networks
UDP -User datagram protocol

Sanjay NayakACSE0602
4/30/2024 34
Computer Networks
Connectionless service

Sanjay NayakACSE0602
4/30/2024 35
Computer Networks
Question
The following is a dump of a UDP header in hexadecimal format.

a. What is the source port number?


b. What is the destination port number?
c. What is the total length of the user datagram?
d. What is the length of the data?
e. Is the packet directed from a client to a server or vice versa?

Sanjay NayakACSE0602
4/30/2024 36
Computer Networks
Question

Solution
a. The source port number is the first four hexadecimal digits (CB84)16
or 52100.
b. The destination port number is the second four hexadecimal digits
(000D)16 or 13.
c. The third four hexadecimal digits (001C)16 define the length of the
whole UDP packet as 28 bytes.
d. The length of the data is the length of the whole packet
minus the length of the header, or 28 – 8 = 20 bytes.
e. Since the destination port number is 13 (well-known port), the packet
is from the client to the server.

Sanjay NayakACSE0602
4/30/2024 37
Computer Networks
Question

the decimal equivalent of CB84 is


4*1=4
8*16=128
11*16*16=2816
12*16*16*16=49152
4+128+2816+49152=52100

Sanjay NayakACSE0602
4/30/2024 38
Computer Networks
Well known ports

Sanjay NayakACSE0602
4/30/2024 39
Computer Networks
TCP – transmission control protocol
connection oriented protocol

• Provides flow and error control


• receiver can immediately handle any packet it receives
• receiver can never be overwhelmed with incoming packets.
• Three way handshaking : connection establishment , data
transfer , connection termination

Sanjay NayakACSE0602
4/30/2024 40
Computer Networks
Connection-oriented service

Packet 2

Sanjay NayakACSE0602
4/30/2024 41
Computer Networks
Flow control ( Pushing or pulling)

• How much data should be sent by sender to the receiver

• So that Receiver can process it …. How much data should be sent


by sender without getting acknowledgement

Sanjay NayakACSE0602
4/30/2024 42
Computer Networks
Flow control at the transport layer

Sanjay NayakACSE0602
4/30/2024 43
Computer Networks
Flow control methods

• Simple Protocol
• The simple protocol is a connectionless protocol that provides
neither flow nor error control. (unreliable protocol)…fast ….no
acknowledgement

Flow control and error control methods

• Stop-and-Wait ARQ(automatic repeat request)


• Go-Back-N ARQ sliding window Protocol
•Selective-Repeat ARQ sliding window Protocol
• Bidirectional Protocols: Piggybacking

Sanjay NayakACSE0602
4/30/2024 44
Computer Networks
Flow control methods
Objective: Study about basic concept of Flow control and Error control

Sanjay NayakACSE0602
4/30/2024 45
Computer Networks
Stop and Wait

Sanjay NayakACSE0602
4/30/2024 46
Computer Networks
Flow control :Sliding Window protocol

Window size : n Window size – 7


Frame no. from: 0 to n Frame no. from 0 to 7

7 frames can be transmitted without getting acknowledgement


Sanjay NayakACSE0602
4/30/2024 47
Computer Networks
Sender Sliding Window

Window size : n Window size : 7


Frame no. from: 0 to n Frame no. from 0 to 7

Sanjay NayakACSE0602
4/30/2024 48
Computer Networks
Receiver Sliding Window

Sanjay NayakACSE0602
4/30/2024 49
Computer Networks
Sliding Window Example

Sanjay NayakACSE0602
4/30/2024 50
Computer Networks
Sender

Sanjay NayakACSE0602
4/30/2024 51
Computer Networks
Receiver

Sanjay NayakACSE0602
4/30/2024 52
Computer Networks
Stop and Wait Protocol

Sanjay NayakACSE0602
4/30/2024 53
Computer Networks
Go-Back-N ARQ sliding window Protocol
Lost Frame

Sanjay NayakACSE0602
4/30/2024 54
Computer Networks
Go-Back-N ARQ sliding window Protocol
Lost ACK

Sanjay NayakACSE0602
4/30/2024 55
Computer Networks
Selective Reject

Go-Back-N ARQ sliding window Protocol

Sanjay NayakACSE0602
4/30/2024 56
Computer Networks
TCP segment format

Sanjay NayakACSE0602
4/30/2024 57
Computer Networks
Control field

• URG bit is used to treat certain data on an urgent basis.


• ACK bit indicates whether acknowledgement number field is
valid or not.
• PSH bit is used to push the entire buffer immediately to the
receiving application.
• RST bit is used to reset the TCP connection.
• SYN bit is used to synchronize the sequence numbers.
•4/30/2024
FIN bit is used to terminate
Sanjaythe TCP connection.
NayakACSE0602
Computer Networks
58
Transport Layer Protocol :SCTP

Stream Control Transmission Protocol (SCTP) is a new reliable, message-


oriented transport-layer protocol.

SCTP is a message-oriented, reliable protocol that combines the best features


of UDP and TCP.

Sanjay NayakACSE0602
4/30/2024 1
Computer Networks
Content
Comparison

• UDP: Message-oriented, Unreliable


• TCP: Byte-oriented, Reliable
• SCTP
– Message-oriented, Reliable
– Other innovative features
• Association, Data transfer/Delivery
• Fragmentation, Error/Congestion Control

Sanjay NayakACSE0602
4/30/2024 60
Computer Networks
Services offered by SCTP
• Process-to-Process Communication
• Multiple Streams
• Multi homing
• Full-Duplex Communication
• Connection-Oriented Service
• Reliable Service

Sanjay NayakACSE0602
4/30/2024 61
Computer Networks
Multiple-stream concept

If one of the streams is blocked,


the other streams can still deliver
their data.

Sanjay NayakACSE0602
4/30/2024 62
Computer Networks
Multi homing concept
At present, SCTP does not allow load sharing between different
path. Currently, it is only for fault-tolerance.

SCTP association allows multiple IP addresses for each end.

Sanjay NayakACSE0602
4/30/2024 63
Computer Networks
Topics Discussed in the Section

• Transmission Sequence Number (TSN)


• Stream Identifier (SI)
• Stream Sequence Number (SSN)
• Packets
• Acknowledgment Number
• Flow Control
• Error Control
• Congestion Control

Sanjay NayakACSE0602
4/30/2024 64
Computer Networks
Comparison between a TCP segment and
an SCTP packet

In SCTP, a data chunk is numbered using a TSN.


To distinguish between different streams, SCTP uses an SI.
To distinguish between different data chunks belonging to the same stream,
SCTP uses SSNs.
✓Transmission Sequence Number (TSN)
✓ Stream Identifier (SI)
✓ Stream Sequence Number (SSN) Sanjay NayakACSE0602
4/30/2024 65
Computer Networks
SCTP vs. TCP Content
• Control information
– TCP: part of the header -- SCTP: several types of control chunks
• Data
– TCP: one entity in a TCP segment --SCTP: several data chunks in a packet
• Option
– TCP: part of the header --SCTP: handled by defining new chunk types

Sanjay NayakACSE0602
4/30/2024 66
Computer Networks
SCTP vs. TCP (2) Content
• Mandatory part of the header
– TCP: 20 bytes, SCTP: 12 bytes
– Reason: TSN in data chunk’s header, Ack. # and window size are part
of control chunk, No need for header length field (∵no option), No
need for an urgent pointer
• Checksum
– TCP: 16 bits, SCTP: 32 bit

Sanjay NayakACSE0602
4/30/2024 67
Computer Networks
SCTP vs. TCP (3) Content
• Association identifier
– TCP: none, SCTP: verification tag, Multihoming in SCTP
• Sequence number
– TCP: one # in the header, SCTP: TSN, SI and SSN define each data
chunk
– TCP:SYN and FIN need to consume one seq. #,Control chunks never
use a TSN, SI, or SSN number

Sanjay NayakACSE0602
4/30/2024 68
Computer Networks
SCTP and TCP header comparison

In SCTP, control information and data information are carried in


separate chunks.

Sanjay NayakACSE0602
4/30/2024 69
Computer Networks
ERROR CONTROL

SCTP, like TCP, is a reliable transport-layer protocol. It uses a SACK


chunk to report the state of the receiver buffer to the sender. Each
implementation uses a different set of entities and timers for the receiver
and sender sites.

Sanjay NayakACSE0602
4/30/2024 70
Computer Networks
Faculty Video Links, Youtube & NPTEL
Content
Video Links and Online Courses Details
• Self Made Video Link:

• https://a.impartus.com/ilc/#/video/id/1829352
https://a.impartus.com/ilc/#/video/id/1838377
https://a.impartus.com/ilc/#/video/id/1847574
https://a.impartus.com/ilc/#/video/id/1850888
https://a.impartus.com/ilc/#/video/id/1862865
• https://a.impartus.com/ilc/#/video/id/1881999
https://a.impartus.com/ilc/#/video/id/1889154
• Youtube/other Video Links
• https://www.youtube.com/watch?v=kAty4mKczEg
• https://www.youtube.com/watch?v=trHox1bN5es

4/30/2024 Sanjay NayakACSE0602 Computer Networks 71


Daily
Content
Quiz

1. Transport layer receives data in the form of __________


a) Packets b) Bits c) Frame d) TPDU or Segment
2. ARQ stands for __________
a) Automatic Repeat Request b) Automatic Request Repeat
c) Application Repeat Request d) Application Request Repeat
3. Socket address found in which layer of OSI model
a) Physical b) Data Link c) Network d) Transport
4. Data Translation and Encryption is main duty of which layer
a) Data link b) Network c) Presentation d) Application
5. RPC protocol and dialogue controller in which layer of OSI model
a) Network b) Transport c) Session d) Presentation

4/30/2024 Sanjay NayakACSE0602 Computer Networks 72


Daily
Content
Quiz

6. TCP and UDP protocol work on which layer of OSI model


a) Transport b) Network c) Application d) Data link
7. RSA algorithm is example of
a) Asymmetric Encryption b) Symmetric Encryption
c) Both A & B d) None
8. Physical address found in which layer of OSI model
a) Physical b) Data Link c) Network d) Transport
9. Error control and Flow control is main duty of which layer
a) Data link b) Network c) Presentation d) Application
10. Which protocol is example of Reliability and Connection oriented
a) TCP b) UDP c) Both d) None

4/30/2024 Sanjay NayakACSE0602 Computer Networks 73


Content
Weekly Assignment

1. List the steps in connection establishment in TCP. (CO5)


2. How asymmetric key is useful? (CO5)
3. What do you mean by confidentiality and integrity? (CO5)
4. What is DoS attack? (CO5)
5. How confidentiality can be achieved? Name the methods. (CO5)

4/30/2024 Sanjay NayakACSE0602 Computer Networks 74


Content
MCQ s
1. An endpoint of an inter-process communication flow across a
computer network is called:
A. socket
B. pipe
C. port
D. none of the mentioned

2. A(n)_______is keyless transposition cipher with N inputs and M


outputs that uses a table to define the relationship between input
stream and the output stream
A. S-box
B. P-box
C. T-box
D. none
4/30/2024 Sanjay NayakACSE0602 Computer Networks 75
Content
MCQ s
3. UDP uses _______to handle incoming user datagram that go to
different processes on the same hosts
A. flow control
B. multiplexing
C. demultiplexing
D. None

4. UDP packets have fixed size header of …………bytes


A. 6
B. 8
C. 40
D. none of the above

Sanjay NayakACSE0602
4/30/2024 76
Computer Networks
Content
MCQ s

Multiple Choice Questions (Transport Layer)

1. Which of the following is false with respect to UDP?


a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead
Answer: a
Explanation: UDP is an unreliable, connectionless transport layer protocol that provides
message-based data transmission. TCP is an example of connection-oriented protocols.
2. 2. Return value of the UDP port “Chargen” is _______
a) String of characters
b) String of integers
c) Array of characters with integers
d) Array of zero’s and one’s
Answer: a
Explanation: Using Chargen with UDP on port 19, the server sends a UDP datagram
containing a random number of characters every time it receives a datagram from the
connecting host. The number of characters is between 0 and 512.

Sanjay NayakACSE0602
4/30/2024 77
Computer Networks
Content
MCQ s

3. Beyond IP, UDP provides additional services such as _______


a) Routing and switching
b) Sending and receiving of packets
c) Multiplexing and demultiplexing
d) Demultiplexing and error checking
Answer: d
Explanation: De-multiplexing is the delivering of received segments to the correct
application layer processes at the recipients end using UDP. Error checking is done
through checksum in UDP.
4. 4. What is the main advantage of UDP?
a) More overload
b) Reliable
c) Low overhead
d) Fast
Answer: c
Explanation: As UDP does not provide assurance of delivery of packet, reliability
and other services, the overhead taken to provide these services is reduced in
UDP’s operation. Thus, UDP provides low overhead, and higher speed.

Sanjay NayakACSE0602
4/30/2024 78
Computer Networks
Content
MCQ s

5. Port number used by Network Time Protocol (NTP) with UDP is ________
a) 161
b) 123
c) 162
d) 124
Answer: b
Explanation: The Network Time Protocol is a clock synchronization network
protocol implemented by using UDP port number 123 to send and receive time
stamps.
6. What is the header size of a UDP packet?
a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes
Answer: a
Explanation: The fixed size of the UDP packet header is 8 bytes. It contains four
two-byte fields: Source port address, Destination port address, Length of packet,
and checksum.

Sanjay NayakACSE0602
4/30/2024 79
Computer Networks
Content
MCQ s

7. The port number is “ephemeral port number”, if the source host is _______
a) NTP
b) Echo
c) Server
d) Client
Answer: d
Explanation: Port numbers from 1025 to 5000 are used as ephemeral port numbers in
Windows Operating System. Ephemeral port numbers are short-lived port numbers which
can be used for clients in a UDP system where there are temporary clients all the time.
8. “Total length” field in UDP packet header is the length of _________
a) Only UDP header
b) Only data
c) Only checksum
d) UDP header plus data
Answer: d
Explanation: Total length is the 16 bit field which contains the length of UDP header and the
data. The maximum value of the Total length field and the maximum size of a UDP
datagram is 65,535 bytes (8 byte header + 65,527 bytes of data).

Sanjay NayakACSE0602
4/30/2024 80
Computer Networks
Content
MCQ s

9. Which is the correct expression for the length of UDP datagram?


a) UDP length = IP length – IP header’s length
b) UDP length = UDP length – UDP header’s length
c) UDP length = IP length + IP header’s length
d) UDP length = UDP length + UDP header’s length
Answer: a
Explanation: A user datagram is encapsulated in an IP datagram. There is a field in the IP
header that defines the total length of the IP packet. There is another field in the IP header
that defines the length of the header. So if we subtract the length of the IP header that is
encapsulated in the IP packet, we get the length of UDP datagram.
10. The ______ field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port
Answer: b
Explanation: Checksum field is used to detect errors over the entire user datagram. Though it
is not as efficient as CRC which is used in TCP, it gets the job done for the UDP datagram as
UDP doesn’t have to ensure the delivery of the packet.

Sanjay NayakACSE0602
4/30/2024 81
Computer Networks
ContentPapers
Old Question

• https://firstranker.com/fr.php/frdA290120A17171122/download-
aktu-b-tech-6th-sem-2018-2019-KCS603-computer-network-
question-paper
• ACSE0602 CN.docx (sharepoint.com)

4/30/2024 Sanjay NayakACSE0602 Computer Networks 82


Expected Questions
Content
for University Exam

1. List all the methods of flow control on transport layer


2. Name the parameters of TCP header.
3. How piggybacking is useful?
4. Callie wants to send the message M = 13 to Alice. Using Alice’s
public and private keys, calculate the ciphertext C, and the value for
R when Alice recovers the message. Use RSA method.
5. How SCTP is different from TCP and UDP?
6. In Stop and wait protocol every 4th packet is lost and we need to
send total 10 packets so how many transmissions it took to send all
the packets?

4/30/2024 Sanjay NayakACSE0602 Computer Networks 83


Summary
Content

In this unit we have studied functions of transport layer and port


addressing.
TCP/UDP protocols in detail and SCTP protocol for transport Layer.
We have also covered network security issues and encryption
decryption methods

4/30/2024 Sanjay NayakACSE0602 Computer Networks 84


Recap
Content
of Unit

• Transport Layer: Process-to-process delivery


• Transport layer protocols (UDP and TCP)
• UDP header format
• TCP header Format
• Port addressing
• Multiplexing, Connection management
• Flow control and retransmission
• Window management
• TCP Congestion control
• Quality of service

Sanjay NayakACSE0602 Computer Networks


4/30/2024 85
References
Content

Books:
1. Forouzen, "Data Communication and Networking",TMH

2. A.S. Tanenbaum, Computer Networks, Pearson Education

3. W. Stallings, Data and Computer Communication, MacmillanPress

Thank You

4/30/2024 Sanjay NayakACSE0602 Computer Networks 86

You might also like