Professional Documents
Culture Documents
Paper Code:
Paper Title:
MCA-106
Computer Networks & Internet Concept
Section-A
/ Collision Detection, a
set
of
rules
determining
how network devices respond when two devices attempt to use a data channel simultaneously (called a
collision). Standard Ethernet networks use CSMA/CD to physically monitor the traffic on the line at
participating stations. If no transmission is taking place at the time, the particular station can
transmit. If two stations attempt to transmit simultaneously, this causes a collision, which is detected
by all participating stations. After a random time interval, the stations that collided attempt to transmit
again. If another collision occurs, the time intervals from which the random waiting time is selected
are increased step by step. This is known as exponential back off.
CSMA/CD is a type of contention protocol. Networks using the CSMA/CD procedure are simple to
implement but do not have deterministic transmission characteristics. The CSMA/CD method is
internationally standardized in IEEE 802.3 and ISO 8802.3.
UDP-
IP network is implemented in Internet networks, local area networks (LAN) and enterprise networks.
An IP network requires that all hosts or network nodes be configured with the TCP/IP suite.
The Internet is the largest and best known IP network.
Each host is assigned a unique logical IP address, which distinguishes it from other nodes and helps
initiate data communication with other hosts. IP network communication occurs when a host sends a
data packet to another host by addressing its IP address. Similarly, the recipient identifies the sender
by its IP address.
Moreover, an IP network requires that all connected devices - such as servers, switches, routers and
other devices - be configured with the TCP/IP suite and have a valid IP address to perform any
network communication.
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for
relayingdatagrams across network boundaries. Its routing function enables internetworking, and
essentially establishes theInternet.
IP has the task of delivering packets from the source host to the destination host solely based on
the IP addresses in the packet headers. For this purpose, IP defines packet structures
that encapsulate the data to be delivered. It also defines addressing methods that are used to label
the datagram with source and destination information.
Historically, IP was the connectionless datagram service in the original Transmission Control
Program introduced by Vint Cerf and Bob Kahn in 1974; the other being the connectionoriented Transmission Control Protocol (TCP). The Internet protocol suite is therefore often referred
to as TCP/IP.
maintain internal information about the state of connections passing through them, the
contents of some of the data streams, and so on. One thing that's an important distinction
about many network layer firewalls is that they route traffic directly though them, so to use
one you either need to have a validly assigned IP address block or to use a ``private
internet'' address block [3]. Network layer firewalls tend to be very fast and tend to be very
transparent to users.
Example Network layer firewall: In figure 2, a network layer firewall called a ``screened
subnet firewall'' is represented. In a screened subnet firewall, access to and from a whole
network is controlled by means of a router operating at a network layer. It is similar to a
screened host, except that it is, effectively, a network of screened hosts.
firewall toolkit, are not particularly transparent to end users and may require some training.
Modern application layer firewalls are often fully transparent. Application layer firewalls tend
to provide more detailed audit reports and tend to enforce more conservative security
models than network layer firewalls.
Section-B
Q.1. Explain the media access control.
In the seven-layer OSI model of computer networking, media access
control (MAC) data communication protocol is a sub layer of the data link layer (layer
2). The MAC sub layer provides addressing and channel access control mechanisms
that make it possible for several terminals or network nodes to communicate within
a multiple access network that incorporates a shared medium, e.g. an Ethernet network.
The hardware that implements the MAC is referred to as a media access controller.
The MAC sub layer acts as an interface between the logical link control (LLC) sub layer
and the network's physical layer. The MAC layer emulates a full-duplex logical
communication channel in a multi-point network. This channel may provide
unicast, multicast or broadcast communication service.
The Media Access Control Layer is one of two sublayers that make up the Data Link
Layer of the OSI model. The MAC layer is responsible for moving data packets to and
from one Network Interface Card (NIC) to another across a shared channel.
In the case of Ethernet, according to 802.3-2002 section 4.1.4, the functions required of
a MAC are:[2]
hort for Simple Mail TransferProtocol, a protocol for sending e-mail messages
betweenservers. Most e-mail systems that send mail over the Internet use SMTP to send messages
from one server to another; the messages can then be retrieved with an e-mail client using
eitherPOP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a
mail server. This is why you need to specify both the POP or IMAP server and the SMTP server
when you configure your e-mail application. Simple Mail Transfer Protocol (SMTP) is an Internet
standard for electronic mail (e-mail) transmission. First defined by RFC 821 in 1982, it was last
updated in 2008 with the Extended SMTP additions by RFC 5321 - which is the protocol in
widespread use today.
SMTP by default uses TCP port 25. The protocol for mail submission is the same, but uses port 587.
SMTP connections secured by SSL, known as SMTPS, default to port 465 (nonstandard, but
sometimes used for legacy reasons).
Although electronic mail servers and other mail transfer agents use SMTP to send and receive mail
messages, user-level client mail applications typically use SMTP only for sending messages to a
mail
server
for relaying.
For
receiving
messages,
client
applications
usually
use
proprietary
systems
(such
as Microsoft
Notes/Domino)
and webmail systems (such asHotmail, Gmail and Yahoo! Mail) use their own non-standard
protocols to access mail box accounts on their own mail servers, all use SMTP when sending or
receiving email from outside their own systems.
(B) FTP The File Transfer Protocol (FTP) is a standard network protocol used to
transfer computer files from one host to another host over a TCP-based network, such
as the Internet.
FTP is built on a client-server architecture and uses separate control and data
connections between the client and the server. [1] FTP users may authenticate
themselves using a clear-text sign-in protocol, normally in the form of a username and
password, but can connect anonymously if the server is configured to allow it. For
secure transmission that protects the username and password, and encrypts the
content, FTP is often secured with SSL/TLS (FTPS). SSH File Transfer Protocol(SFTP)
is sometimes also used instead, but is technologically different.
The first FTP client applications were command-line applications developed
before operating systems had graphical user interfaces, and are still shipped with most
Windows, Unix, and Linux operating systems.[2][3] Many FTP clients and automation
utilities have since been developed for desktops, servers, mobile devices, and
hardware, and FTP has been incorporated into productivity applications, such as Web
page editors.
(C) DHCP
(D) URL
specifies the location of the resource on a computer network and a mechanism for
retrieving it. A URL is a specific type of uniform resource identifier (URI).[1] although
many people use the two terms interchangeably.[2] A URL implies the means to access
an indicated resource, which is not true of every URI. [2][3] URLs occur most commonly to
reference web pages (http), but are also used for file transfer (ftp), email (mailto),