Bulla__ACN

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

ACN - 22520

4 MARKS EACH

1. Distinguish between FTP & TFTP protocols.


Ans –

2. Compare TCP and UDP

Ans –
3. exp the operations performed on POP3
Ans –
POP3 –
• It executes the download and deletes operations for messages.
• Post Office Protocol, version 3 (POP3) is simple but limited in functionality.
• The client POP3 software is installed on the recipient computer; the server POP3
software is installed on the mail server.
• Mail access starts with the client when the user needs to download its e-mail from
the mailbox on the mail server.
• The client opens a connection to the server on TCP port 110.

4. Explain the working of TELNET.


Ans –
TELNET: TELNET is an abbreviation for TErminaLNETwork. It is
the standard TCP/IP protocol for virtual terminal service.
TELNET Working:
TELNET is a client-server application that allows a user to log on
to a remote machine, giving the user access to the remote system.
The user sends the keystrokes to the terminal driver, where the
local operating system accepts the characters but does not
interpret them.
A terminal driver correctly interprets the keystrokes on the local
terminal or terminal emulator.
The characters are sent to the TELNET client, which transforms
the characters to a universal character set called network virtual
terminal (NVT) characters and delivers them to the local TCP/IP
protocol stack.
The commands or text, in NVT form, travel through the Internet
and arrive at the TCP/IP stack at the remote machine.
Here the characters are delivered to the operating system and
passed to the TELNET server, which changes the characters to the
corresponding characters understandable by the remote computer.
However, the characters cannot be passed directly to the operating
system because the remote operating system is not designed to
receive characters from a TELNET server: It is designed to
receive characters from a terminal driver.
A piece of software called a pseu do terminal driver is added
which pretends that the characters are coming from a terminal.
The operating system then passes the characters to the appropriate
application program.
5. Draw and explain IPv6 protocol format
Ans –

1. Version: This 4 bits field defines the version number of IP. The value is 6 for IPV6.
2. Priority: This 4 bits priority field defines the priority of packet with respect to traffic
congestion.
3. Flow Label: It is 24 bits field that is designed to provide special handling for a particular
flow of data.
4. Payload Length: The 16 bits payload length field defines the length of the IP datagram
excluding the base header.
5. Next Header: It is an 8 bits field defining the header that follows the base header in
datagram.
6. Hop Limit: This 8 bits field serves the same purpose as the TTL field in IPV4.
7. Source Address: The source address field is a 128 bits internet address that identifies the
original.
8. Destination Address: It is 128 bits internet address that usually identifies the final
destination of datagram.
9. Payload: Is combination of zero or more extension headers(options) which is followed by
data from other protocols such as UDP, TCP etc

EXTENSION HEADERS
• The length of the base header is fixed at 40 bytes.
• Types of extension headers are:
1. Hop by Hop option
2. Source routing
3. Fragmentation
4. Authentication
5. Encrypted security payload
6. Destination option

1.Hop by Hop options is used when the source needs to pass information to all the routers
visited by the datagram.
2. Source routing extension header combines the concept of strict source route & the loose
source route options of IPV4.
3. Fragmentation is the same as that in IPV4. in IPV6 only the original source can be
fragment.
4. Authentication header has a dual purposes: it validates the message sender & ensure the
integrity of data.
5. Encrypted security Payload is an extension that provides confidentiality & guards.
6. Destination option is used when the service needs to pass information to destination only,
intermediate routers are not permitted access to this information.

6. Explain the TCP connection establishment using a three way handshake mechanism.
Ans –
Connection Establishment
TCP uses a Three way handshaking mechanism to establish a
connection between client and server machines.
The three steps in three way handshaking mechanism are as follows.
SYN:
The client sends the first segment, a SYN segment, in which only the
SYN flag is set. This segment is for synchronization of sequence
num
bers.
SYN + ACK
The server sends the second segment, a SYN +ACK segment, with 2
flag bits set.
ACK
The client sends the third segment. This is just an ACK segment. It
guarantees the completion of three way handshaking.
6 MARKS EACH

➢ Differentiate between distance vector routing and link state routing.


Ans –

You might also like