0% found this document useful (0 votes)
36 views5 pages

Distance Vector Routing and TELNET Explained

Acnsolved question 2 summer 2023 Advance computer network

Uploaded by

papratiksha377
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views5 pages

Distance Vector Routing and TELNET Explained

Acnsolved question 2 summer 2023 Advance computer network

Uploaded by

papratiksha377
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

22520

CO/CM/IF/CW
Advanced Computer network
Summer 2023 Paper
Question 3

3. Attempt any THREE of the following: (12M)


(a) Explain distance vector routing with suitable example.
=> Distance Vector Routing (DVR) is a dynamic routing protocol where each router
maintains a table containing the shortest estimated distances to all other routers in
the network. This table is called a distance vector. Routers periodically share their
distance vectors with their neighbours, allowing them to update their own tables and
determine the best path to reach any destination.
How it Works
1. Distance Vector Creation: Each router calculates the distance (cost) to reach
every other router in the network. This distance is usually based on the number
of hops, but it can also consider other factors like bandwidth or delay.
2. Sharing Distance Vectors: Routers periodically share their distance vectors
with their directly connected neighbours.
3. Route Calculation: Upon receiving a distance vector from a neighbour, a
router calculates the shortest path to each destination by adding the cost to
reach the neighbour to the distance provided by the neighbour.
4. Route Update: If the newly calculated distance to a destination is shorter than
the previously known distance, the router updates its routing table
accordingly.
Example
Consider a simple network with three routers: A, B, and C. A
• Link costs:
o A to B: 2
B
o B to C: 3
o A to C: 7 C

Initial state:
• Each router knows only the direct link costs to its neighbours.
Iteration 1:
• Router A shares its distance vector with B and C:
o A to B: 2
o A to C: 7
• Router B shares its distance vector with A and C:
o B to A: 2
o B to C: 3
• Router C shares its distance vector with A and B:
o C to A: 7 A
o C to B: 3
Iteration 2:
B
• Router A receives distance vectors from B and C:
o A to B: 2 C

o A to C: 7
o A to C via B: 2 + 3 = 5 (shorter than direct link)
• Router A updates its routing table:
o A to B: 2
o A to C: 5 (via B)
Similar calculations are performed by routers B and C.
(b) Describe the working of TELNET.
=> TELNET is an abbreviation for TErminaLNETwork. It is the standard TCP/IP
protocol for virtual terminal service.
TELNET Working:
• TELNET is a client-server application that allows a user to log on to a remote
machine, giving the user access to the remote system.
• The user sends the keystrokes to the terminal driver, where the local operating
system accepts the characters but does not interpret them.
• A terminal driver correctly interprets the keystrokes on the local terminal or
terminal emulator.
• The characters are sent to the TELNET client, which transforms the characters to
a universal character set called network virtual terminal (NVT) characters and
delivers them to the local TCP/IP protocol stack.
• The commands or text, in NVT form, travel through the Internet and arrive at the
TCP/IP stack at the remote machine.
• Here the characters are delivered to the operating system and passed to the
TELNET server, which changes the characters to the corresponding characters
understandable by the remote computer.
• However, the characters cannot be passed directly to the operating system because
the remote operating system is not designed to receive characters from a TELNET
server: It is designed to receive characters from a terminal driver.
• A piece of software called a pseudo terminal driver is added which pretends that
the characters are coming from a terminal.
• The operating system then passes the characters to the appropriate application
program.
(c) List UDP services and UDP applications (any 4 each).
=> UDP Services and Applications
UDP (User Datagram Protocol) is a connectionless protocol used for fast and
efficient data transmission. While it doesn't guarantee delivery or order of packets,
it's ideal for applications that prioritize speed and can tolerate some packet loss.
UDP Services
• Port Number Assignment: UDP assigns unique port numbers to applications
to differentiate between different data streams.
• Checksum Calculation: UDP includes a checksum to verify data integrity
upon arrival.
• Encapsulation: UDP encapsulates data into datagrams and adds a header
containing source and destination port numbers, length, and checksum.
• Domain Name System (DNS): While DNS can use both UDP and TCP, UDP
is often preferred for quick query-response interactions.

UDP Applications
UDP is widely used in various applications due to its speed and efficiency. Here are
some common examples:
Real-Time Applications
• Voice over IP (VoIP): Applications like Skype, WhatsApp, and Zoom use UDP
for real-time voice communication.
• Video Conferencing: Platforms like Google Meet, Zoom, and Skype utilize
UDP for transmitting video and audio data.
• Online Gaming: UDP is essential for online games to ensure low latency and
minimal delays.
Other Applications
• Network Time Protocol (NTP): Synchronizes clocks across different
computer systems.
• Dynamic Host Configuration Protocol (DHCP): Assigns IP addresses to
devices on a network.
• Simple Network Management Protocol (SNMP): Manages network devices.
• Routing Information Protocol (RIP): Used for routing updates in networks.
• Trivial File Transfer Protocol (TFTP): Transfers small files efficiently.
• Real-time Streaming Protocols (RTSP): Controls multimedia sessions.

(d) Find out the error, if any in the following IPv4 addresses:
a. [Link]
b. [Link].20
c. [Link]
d. 11100101.23.14.67
=> IPv4 Address Structure
An IPv4 address consists of four octets (groups of eight bits), separated by dots. Each
octet can have a value from 0 to 255.
Error Analysis
• a. [Link]: This address is valid. All octets are within the range of 0-
255.
• b. [Link].20: This address is invalid. It contains five octets instead of four.
• c. [Link]: This address is invalid. The third octet, 301, is greater than
255.
• d. 11100101.23.14.67: This address is invalid. It contains a binary number in
the first octet, while IPv4 addresses use decimal notation.

Summary of Errors
• b: Too many octets.
• c: Octet value out of range.
• d: Incorrect format (binary instead of decimal).
Therefore, only a. [Link] is a valid IPv4 address.

*****All The Best Students*****


Keep Learning…… Happy Learning……..

Common questions

Powered by AI

The Network Virtual Terminal (NVT) in TELNET acts as an abstraction layer between the user terminal and the remote system, ensuring compatibility and standardization. When a user inputs data, it is transformed by the TELNET client into a universal character set, referred to as NVT characters, which is then sent over the Internet to the destination. At the remote site, these characters are interpreted by the TELNET server and passed to a pseudo terminal driver, which simulates inputs from a physical terminal, thus integrating with the remote system's applications seamlessly .

In a network where router C is connected to routers A and B, with link costs B-C of 3, and A-C of 7, C begins by recognizing direct paths only. As it receives distance vectors from A and B, C computes potential new paths. If B reports a direct path to A at cost 2, C calculates its route to A as B's cost (2) plus its own cost to B (3), totaling 5, which is cheaper than its direct path of 7. Thus, C updates its table to route to A through B. Similarly, when router C updates involve other destinations, it applies this calculation model iteratively, optimizing routes based on received vectors .

UDP is preferred over TCP in real-time applications primarily due to its low latency and minimal delay characteristics, which are critical for time-sensitive communications. Unlike TCP, UDP is connectionless and does not require the overhead of establishing, maintaining, or terminating connections, resulting in faster data transmission. Furthermore, UDP's tolerance for packet loss—allowing some data to be missing or out of order without significant impact—makes it suitable for applications where speed is prioritized over accuracy. Examples include Voice over IP (VoIP) applications like Skype, where real-time voice delivery is crucial, and online gaming, which demands quick response times .

The checksum in UDP datagrams is critical in maintaining data integrity during transmission, despite UDP's inherent unreliability as a connectionless protocol. It provides a mechanism for the receiving device to verify that the data has been delivered without being corrupted. If the calculated checksum does not match upon receipt, it indicates errors have occurred, prompting the receiving client to potentially discard the corrupted packet. This integrity check, while basic, is integral to ensuring a minimal level of trust in the data received at the application level, albeit without guarantees of delivery or sequence like TCP .

UDP handles error-checking and data integrity through its checksum feature, which is included in the UDP header. Although UDP is connectionless and does not provide in-built data recovery or retransmission mechanisms typical of connection-oriented protocols like TCP, the checksum allows the receiving system to verify that the data has not been corrupted during transmission. This method ensures a basic level of data integrity without the overhead of connection management .

Port numbers in UDP services serve as endpoints for data communication, allowing the protocol to distinguish between different data streams intended for various applications or services on a single device. Each application using UDP is assigned a unique port number—through which it sends and receives data—ensuring data is routed correctly to its intended destination program amidst potentially numerous concurrent communications. This system facilitates the management and organization of network traffic despite the absence of connection-oriented features in UDP .

Distance Vector Routing (DVR) maintains routing tables by having each router in the network calculate the shortest path to every other router, using a measure like hop count. Each router shares its current distance table, known as a distance vector, with its direct neighbours periodically. When a router receives a distance vector from a neighbour, it recalculates its own routing table to potentially find shorter paths. For instance, in a network of routers A, B, and C, with direct link costs A-B of 2, B-C of 3, and A-C of 7, initially, each router only knows the direct link costs to its neighbours. Router A, upon receiving distance vectors from B and C, would compute A-C via B as 2 + 3 = 5, which is shorter than its own direct link cost of 7. Thus, A updates its table to route data to C through B instead. This process continues iteratively across all routers in the network, ensuring all have updated, optimal paths .

The pseudo terminal driver is crucial in TELNET as it simulates a physical terminal to allow the remote operating system to accept characters as if they were directly typed into a terminal. Since remote operating systems are typically not designed to interact directly with TELNET servers but expect input from terminal devices, the pseudo driver bridges this gap by making the characters from the TELNET session appear as regular terminal input to the OS. This facilitates seamless integration with the remote system's applications .

The IPv4 address '222.34.7.8.20' is invalid because it contains five octets instead of the standard four octets format required for IPv4 addresses. Each IPv4 address must consist of four decimal numbers representing four 8-bit segments (octets), meaning that having five segments is a format error .

The IPv4 address '75.45.301.14' is invalid. The third octet, 301, exceeds the permissible range of 0 to 255 for any octet within an IPv4 address. Therefore, the error lies in the third octet having an out-of-range value, rendering the address incorrect .

You might also like