Bulla__ACN
Bulla__ACN
Bulla__ACN
4 MARKS EACH
Ans –
3. exp the operations performed on POP3
Ans –
POP3 –
• It executes the download and deletes operations for messages.
• Post Office Protocol, version 3 (POP3) is simple but limited in functionality.
• The client POP3 software is installed on the recipient computer; the server POP3
software is installed on the mail server.
• Mail access starts with the client when the user needs to download its e-mail from
the mailbox on the mail server.
• The client opens a connection to the server on TCP port 110.
1. Version: This 4 bits field defines the version number of IP. The value is 6 for IPV6.
2. Priority: This 4 bits priority field defines the priority of packet with respect to traffic
congestion.
3. Flow Label: It is 24 bits field that is designed to provide special handling for a particular
flow of data.
4. Payload Length: The 16 bits payload length field defines the length of the IP datagram
excluding the base header.
5. Next Header: It is an 8 bits field defining the header that follows the base header in
datagram.
6. Hop Limit: This 8 bits field serves the same purpose as the TTL field in IPV4.
7. Source Address: The source address field is a 128 bits internet address that identifies the
original.
8. Destination Address: It is 128 bits internet address that usually identifies the final
destination of datagram.
9. Payload: Is combination of zero or more extension headers(options) which is followed by
data from other protocols such as UDP, TCP etc
EXTENSION HEADERS
• The length of the base header is fixed at 40 bytes.
• Types of extension headers are:
1. Hop by Hop option
2. Source routing
3. Fragmentation
4. Authentication
5. Encrypted security payload
6. Destination option
1.Hop by Hop options is used when the source needs to pass information to all the routers
visited by the datagram.
2. Source routing extension header combines the concept of strict source route & the loose
source route options of IPV4.
3. Fragmentation is the same as that in IPV4. in IPV6 only the original source can be
fragment.
4. Authentication header has a dual purposes: it validates the message sender & ensure the
integrity of data.
5. Encrypted security Payload is an extension that provides confidentiality & guards.
6. Destination option is used when the service needs to pass information to destination only,
intermediate routers are not permitted access to this information.
6. Explain the TCP connection establishment using a three way handshake mechanism.
Ans –
Connection Establishment
TCP uses a Three way handshaking mechanism to establish a
connection between client and server machines.
The three steps in three way handshaking mechanism are as follows.
SYN:
The client sends the first segment, a SYN segment, in which only the
SYN flag is set. This segment is for synchronization of sequence
num
bers.
SYN + ACK
The server sends the second segment, a SYN +ACK segment, with 2
flag bits set.
ACK
The client sends the third segment. This is just an ACK segment. It
guarantees the completion of three way handshaking.
6 MARKS EACH