Вы находитесь на странице: 1из 8

WINTER 2013 ASSIGNMENT MC0087-INTERNETWORKING WITH TCP/IP

1. Discuss the functions of transport layer and Network Interface Layer. Ans. Transport Layer

The transport layer is the third layer of the TCP/IP protocol stack. As the name suggests, the transport layer is responsible for the transport of the data. The transmission and reception of data is handled by the transport layer. This layer is also functions for detecting the errors in the transmitted data. Basically, the transport layer communicates data between the applications running on the computers. The applications and the operating system used are different on different computers. To identify the applications along with the operating systems, the transport layer uses a numbering system. These numbers assigned are associated with the application used and are called port numbers. The transport layer uses two protocols which are TCP !Transmission Control Protocol" This a connection#oriented protocol. $%P !$ser &atagorda Protocol" This is a connection less protocol.
Network Interface Layer

The network interface is between the host computer and the network. It refers to the physical network and all related physical components which are responsible for the transmission of data. This layer uses protocol to send packets of information o'er the network. This protocol is not the same e'erywhere and 'aries from network to network. The functionalities of this layer can be seen by the internet user because they are carried out by the operating system and the hardware dri'ers !network dri'ers" allow the connection with the computer network. The main functions of network interface layer are routing and synchroni(ing data o'er the network, checking the data format, con'erting signals !analog to digital", error detection in the transmitted data.

2. Brief the following a. ISDN . !.2" Ans. a. ISDN# Integrated )er'ices for %igital *etwork !I)%*" is a set of communication

standards for simultaneous digital transmission of 'oice, 'ideo, data, and other network ser'ices o'er the traditional circuits of the public switched telephone network. It was first defined in +,-- in the CCITT red book..+/ Prior to I)%*, the telephone system was 'iewed as a way to transport 'oice, with some special ser'ices a'ailable for data. The key feature of I)%* is that it integrates speech and data on the same lines, adding features that were not a'ailable in the classic telephone system. There are se'eral kinds of access interfaces to I)%* defined as Basic 0ate Interface !B0I", Primary 0ate Interface !P0I", *arrowband I)%* !*#I)%*", and Broadband I)%* !B#I)%*". I)%* is a circuit#switched telephone network system, which also pro'ides access to packet switched networks, designed to allow digital transmission of 'oice and data o'er ordinary telephone copper wires, resulting in potentially better 'oice 1uality than an analog phone can pro'ide. It offers circuit#switched connections !for either 'oice or data", and packet#switched connections !for data", in increments of 23 kilobit/s. A ma4or market application for I)%* in some countries is Internet access, where I)%* typically pro'ides a ma5imum of +6- bit/s in both upstream and downstream directions. Channel bonding can achie'e a greater data rate7 typically the I)%* B#channels of three or four B0 Is !si5 to eight 23 bit/s channels" are bonded.

b. !.2"# It can be carried o'er the B or % channels of a B0I line, and o'er the B

channels of a P0I line. 8.69 o'er the % channel is used at many point#of#sale !credit card" terminals because it eliminates the modem setup, and because it connects to the central system o'er a B channel, thereby eliminating the need for modems and making much better use of the central system:s telephone lines. 8.69 was also part of an I)%* protocol called ;Always <n/%ynamic I)%*;, or A</%I. This allowed a user to ha'e a constant culti#link PPP connection to the internet o'er 8.69 on the % channel, and brought up one or two B channels as needed.

$. %hat is congestion& 'ention few algorith(s to o)erco(e congestion. Ans: TCP is the popular transport protocol for best#effort traffic in Internet. =owe'er,

TCP is not well#suited for many applications such as streaming multimedia, because TCP congestion control algorithms introduce large 'ariations in the congestion window si(e !and corresponding large 'ariations in the sending rate". )uch 'ariability in the sending rate is not acceptable to many multimedia applications. =ence, many multimedia applications are built o'er $%P and use no congestion control at all. The absence of congestion control in applications built o'er $%P may lead to congestion collapse on the Internet. In addition, the $%P flows may star'e any competing TCP flows. To o'ercome these ad'erse effects, congestion control needs to be incorporated into all applications using the Internet, whether at the transport layer or pro'ided by the application itself. >urthermore, the congestion control algorithms must be TCP# friendly, i.e. the TCP#friendly flows should not gain more throughput than competing TCP flows in the long run. Thus, in recent years, many researchers ha'e focused on de'eloping ?TCP#friendly@ transport protocols which are suitable for many applications that currently use $%P. In this direction, IAT> is currently working on de'eloping a new protocol called, %ata gram Congestion Control Protocol !%CCP",that pro'ides an unreliable &atagorda ser'ice with congestion control. %CCP is designed to use any suitable TCP# friendly congestion control algorithm. Bith a multitude of TCP#friendly congestion control algorithms a'ailable, some important 1uestions that need to be answered are Bhat are the strengths and weakness of the 'arious TCP#friendly algorithmsC Is there a single algorithm which is uniformly superior o'er other algorithmsC. The first step in answering these 1uestions is to study the short#term and long#term beha'ior of these algorithms. Although the goal of all TCP#friendly algorithms is to emulate the beha'ior of TCP in the long term, these algorithms may ha'e an ad'erse impact in the short#term on competing TCP flows. )ince TCP#friendly algorithms are designed for smoother sending rates than TCP, these algorithms may react slowly to new connections that share a common bottleneck link. )uch a slower response may ha'e a deleterious effect on TCP flows. >or e5ample, a TCP connection suffering losses in its slow start phase may enter the congestion a'oidance phase with a small window, and conse1uently obtain lesser throughput than other competing flows. =ence, it is clear that a detailed study is re1uired on the short#term !transient"beha'ior of TCP friendly flows in addition to their long#term beha'ior. In this paper, we study the transient beha'ior of three TCP#friendly congestion control algorithms general AI&% congestion control, T>0C and binomial congestion control algorithm. Prior work has studied the transient beha'ior of these algorithms when 0A% 1ueues are used at the bottleneck link. =owe'er, as drop tail Dueues are still widely used in practice, in this paper we study the transient beha'ior of these algorithms with drop tail 1ueues.

Past work has also identified certain unfairness of AI&% and binomial congestion algorithmically to TCP with drop tail 1ueues, but has not identified the reasons for this unfairness. In this paper, we analy(e the reasons for this unfairness, and 'alidate the analysis by simulations.The rest of the paper is organi(ed as follows. In )ection II, we briefly o'er'iew the 'arious TCP#friendly congestion algorithms proposed in literature. In )ection III, we define interbeha'iors studied in this paper, and analy(e the e5pected transient beha'ior of the 'arious TCP#friendly congestion control algorithms. )ection IE analy(es in detail the reasons for unfairness of AI&% and binomial congestion control algorithms with drop tail 1ueues.
*ew algorith(s to o)erco(e congestion A. Transient behaviors evaluated in the paper B. Equation-Based Congestion Control Algorithm C. General AIMD-Based Congestion Control Algorithms D. Binomial Congestion Control Algorithm +. Differentiate between permanent and transient host Groups.

Ans. IP multicampus is defined as the transmission of an IP &atagorda to a ;host group;,a set of (ero or more hosts identified by a single IP destination address. %iastaltic &atagorda is deli'ered to all members of its destination host group Bitherbee same ;best#efforts; reliability as regular Tunica IP data grams, i.e. the &atagorda is not guaranteed to arri'e at all members of the destination group or in the same order relati'e to other data grams. The membership of a host group is dynamic7 that is, hosts may 4oin and lea'e groups at any time. There is no restriction on the location or number of dismember a host group, but membership in a group may be restricted to only those hosts possessing a pri'ate access key. A host may be a member of more than one groundman a time. A host need not be a member of a group to send data grams to it.A host group may be permanent or transient. A permanent group has a well#known, administrati'ely assigned IP address. It is the address, not the memberless the group, that is permanent7 at any time a permanent group may ha'e any number of members, e'en (ero. A transient group, on the other hand, is assigned an address dynamically when the group is created, at the re1uest of a host. A transient group ceases to e5ist, and its address becomes eligible for reassignment,when its membership drops to (ero. The creation of transient groups and the maintenance of group biotransformation is the responsibility of ;multicarbon agents;, entities that reside in internet gateways or other special#purpose hosts. There is at least one multidenticulate directly attached to e'ery IP network or subnetwork that supports Casting. A host re1uests the creation of new groups, and 4oins or in'estigating groups, by e5changing messages with a neighboring agent.multicarbon agents are also responsible for Internet deli'ery of multicarbon Pentagrams. Bhen sending a multicarbon IP &atagorda, a host transmits it to a cabinetwork multicarbon address which identifies all neighboring members of

destination host group. If the group has members on other networks, a multidenticulate becomes an additional recipient of the local multicarbon and relays thermogram to agents on each of those other networks, 'ia the internet gateway system. >inally, the agents on the other networks each transmit the &atagorda as <cala multicarbon to their own neighboring members of the destination group.Fe'el 6 full support for IP multicampus, allows a host to create, 4oin and lea'e host groups, as well as send IP data grams to host groups. It re1uires implementation of the Internet Group &anagement Protocol !IG&P" and e5tension of the IP and cabinetwork ser'ice interfaces within the host. All of the following sections of &ethodism are applicable to le'el 6 implementations.0>C ,--, page +H Bithin the IP module, the membership management operations are supported )otheby Internet Group &anagement Protocol !IG&P", specified in Appendi5 I. As well Ashaway messages corresponding to each of the operations specified abo'e, )igmoidal specifies a ;deadman timer; procedure whereby hosts periodically confirm memberships with the multicarbon agents. The IP module must maintain a data structure listing the IP addresses of all host groups to which the host currently belongs, along with each group:s bibliopolical, access key, and timer 'ariables. This data structure is used by the &ulticausal transmission ser'ice to know which outgoing data grams to loop back,and by the reception ser'ice to know which incoming data grams to accept. Purpose of IG&P and the management interface operations is to maintain this data structure. The Internet Group &anagement Protocol !IG&P" is used between IP hosts and their immediate neighbor multicarbon agents to support the creation of transgressions, the addition and deletion of members of a group, and the confirmational of group membership. IG&P is an asymmetric protocol and infraspecific here from the point of 'iew of a host, rather than a multicarbon agent. 5. %hat is do(ain na(e resolution& Discuss the do(ain na(e resolution process Ans. Bhen using the Internet most people connect to web sites, ftp ser'ers or other Internet ser'ers by connecting to a domain name, as in BBB.bleeping computer.com. Internet applications, though, do not communicate 'ia domain names, but rather using IP addresses, such as +,6.+2-.+.+. Therefore when you type a domain name in your program that you wish to connect to, your application must first con'ert it to an IP address that it will use to connect to. The way these host names are resol'ed to their mapped IP address is called %omain *ame 0esolution. <n almost all operating systems whether they be Apple, Finu5, $ni5, Giftware, or Bindows the ma4ority of resolutions from domain names to IP addresses are done through a procedure called %*).

Do(ain Na(e ,esolutions As discussed abo'e, %omain *ame 0esolution is the task of con'erting domain names to their corresponding IP address. This is all done behind the scenes and is rarely noticed by the user. Bhen you enter a domain name in an application that uses the Internet, the application will issue a command to ha'e the operating system con'ert the domain name into its IP address, and then connect to that IP address to perform whate'er operation it is trying to do. The way the operating system resol'es the domain name is based upon its configuration. >or almost all operating systems the default order for %omain *ame resolution is as follows -osts *ile # There is a file called the =<)T) file that you can use to con'ert domain names to IP addresses. Antries in the =<)T) file o'erride any mappings that would be resol'ed 'ia a %*) ser'er. Do(ain Na(e Syste( # This is the system used on the Internet for con'erting domain names to their corresponding IP addresses. Iour operating system will connect to the %*) ser'er configured on your computer and ha'e that ser'er return to you the IP address for the domain name you 1ueried it with.

Bo inets # This only applies to Bindows machines and will only be used to map names to IP addresses if all pre'ious methods failed. This method will attempt to map the Bobbinets name you are trying to connect to with an IP address. It is possible though to change the order that your operating system uses when doing %omain *ame 0esolution. Be will discuss these methods for the Bindows and $ni5/Finu5 operating systems below. Do(ain Na(e ,esolution on %indows Bindows by default uses the abo'e order for %omain *ame 0esolution. This can be changed though by changing certain registry keys. There registry keys are 0egistry Jey %escription Priority Bhich corresponds to using the %omain *ame )ystem Focal Priority This refers to the local name of the computer =osts Priority This is the =<)T) file Interiority This is using Bobbinets name mapping Iou assign to these keys a priority based upon 'alues ranging between #K6L2- and

K6L2L. The lower the number you assign to the entry, the higher the priority for that particular resolution pro'ider. >or e5ample, e5amine the priorities assigned to the 'alues below Priority M KH Focal Priority M 6HH =osts Priority M L9 Interiority M +HH Bhat this will do is change the %omain *ame 0esolution order to the following se1uence %omain *ame )ystem =osts file Bobbinets &appings The Focal Computer *ame

As you can see I ha'e changed the default order of how Bindows will do domain name resolution and the 'alue that had the lowest number had the highest priority when doing domain name resolution. The location for the abo'e registry sub key:s can be found under these registry keys
Bindows ,9/,-/&A Bindows *T, 6HHH, 8P
=JAINF<CAFN&AC=I*AO)ystemOCreateChildControlsO)er'icesO&)TCPOPreser'ice

=JAINF<CAFN&AC=I*AO)I)TA&OCreateChildControlsO)er'icesOCPIOPreser'ice

Do(ain Na(e ,esolution on Linu. and /ni. $ni5 and Finu5 ha'e a similar default %omain *ame 0esolution order as Bindows. The operating system will first check its /etc/hosts file and if it does not find an entry for the 1ueried domain, it will then 1uery its configured %*) ser'ers. The order in which ser'er resol'es domain names can be changed by editing the /etc/host.conf file. This file determines the order that the operating system uses to resol'e domain names. The line that we are concerned with is the one that looks like order hosts, bind This tells the operating system to first check the hosts file, and if that fails, to use %*), otherwise known as bind which is the name of the software used to make %*) re1uests.

Iou can change the order the operating system uses, by changing the order line. >or e5ample if we wanted to make it so it 1ueried %*) first and the hosts file second we would change the line to read order bind, hosts. Currently the 'alid 'alues you can place after order is hosts, bind, or nis. *I) stands for the *etwork Information )er'ice. 6. Differentiate etween Si(ple 'ail Transfer 0rotocol and 0ost 1ffice 0rotocol. Ans. )&TP !)imple &ail Transfer Protocol" and P<P !Post <ffice Protocol" are both standards used for emailing. )imply put, )&TP is used when recei'ing and sending emails !like your 'ery own mailman which picks up and deli'ers your mail to different locations", while P<P is the protocol used for the storing of emails !like your 'ery own Post <ffice Bo5 for mail storage". )&TP is the protocol in general use at the moment. )&TP has always been 'ery reliable. )ince its in'ention in the eighties, all emails are usually deli'ered to the recei'er without encountering problems. This is why )&TP has become the standard for the transfer of the bulk of emails on the Internet. It is mainly used for outgoing email transport and makes use of the 0apport 69. )&TP is used by &TA or the &ail Transfer Agent. *owadays, )&TP is more widely used for sending emails than recei'ing them because P<P is used for accessing mail bo5 accounts on an email ser'er !like Internet &essage Access Protocol and Fotus *otes". 0ecei'ing emails is dependent on the mail/client applications. $ser#le'el client mail applications use )&TP for sending out emails to a mail ser'er where it is then relayed. )till, )&TP was not safe from technicalities such as different issues for a lot of present users. <ne of the problems is the una'ailability of a 'erification ser'ice for the sender of the mail. This was not a big problem during its in'ention because the Internet was used by 'ery few people, usually only those hailing from the academy. Today, though, spam mail is a worldwide phenomenon. *ot only that, transfer of different computer 'iruses is also 1uite large. Increasing the security for the )&TP has been made although it is still not 'ery effecti'e. Another issue is that )&TP is also dependent on the network/I)P settings. Also, if the message is not deli'ered, it is bounced back to the sender. )&TP also 'erifies proper configuration before sending a message. It 'erifies proper configuration and grants permission to a computer attempting to send a message. &essages stored under P<P are stored on the ser'er and are then mo'ed to the computerPs hard dri'e. This is why ha'ing a backup is e5tremely important so all retrie'ed messages are safe. Bhen an email client is configured with both )&TP and P<P, a mailbo5 is now a'ailable for sending and recei'ing e#mails with 4ust one central location. This mailbo5 is also protected by a password.

Вам также может понравиться