Host To Host Communication in Networking
Host To Host Communication in Networking
Advanced TCP/IP
1. What is host? What is host to host communication in networking with example?
Ans:
A host (also known as "network host") is a computer or other device that communicates with
other hosts on a network. Hosts on a network include clients and servers -- that send or receive
data, services or applications.
Hosts typically do not include intermediary network devices like switches and routers, which are
instead often categorized as nodes. A node is also a broader term that includes anything
connected to a network, while a host requires an IP address. In other words, all hosts are
nodes, but network nodes are not hosts unless they require an IP address to function.
On a TCP/IP network, each host has a host number that, together with a network identity, forms
its own unique IP address. In the Open Systems Interconnection (OSI) model, protocols in the
transport layer, also known as Layer 4, are responsible for communication between hosts.
Hosts use various protocols to communicate, including transmission control protocol (TCP) and
User Datagram Protocol (UDP).
TCP is one of the basic standards that define the rules of the internet and is included within the
standards defined by the Internet Engineering Task Force (IETF). It is one of the most
commonly used protocols within digital network communications and ensures end-to-end data
delivery.
TCP organizes data so that it can be transmitted between a server and a client. It guarantees
the integrity of the data being communicated over a network. Before it transmits data, TCP
establishes a connection between a source and its destination, which it ensures remains live
until communication begins. It then breaks large amounts of data into smaller packets, while
ensuring data integrity is in place throughout the process.
As a result, high-level protocols that need to transmit data all use TCP Protocol. Examples
include peer-to-peer sharing methods like File Transfer Protocol (FTP), Secure Shell (SSH), and
Telnet. It is also used to send and receive email through Internet Message Access Protocol
(IMAP), Post Office Protocol (POP), and Simple Mail Transfer Protocol (SMTP), and for web
access through the Hypertext Transfer Protocol (HTTP).
3. Explain Sliding Window Protocol with examples.
Ans:
The sliding window is a technique for sending multiple frames at a time. It controls the data
packets between the two devices where reliable and gradual delivery of data frames is needed.
It is also used in TCP (Transmission Control Protocol).
In this technique, each frame has sent from the sequence number. The sequence numbers are
used to find the missing data in the receiver end. The purpose of the sliding window technique is
to avoid duplicate data, so it uses the sequence number.
Go-Back-N ARQ
Selective Repeat ARQ
Go-Back-N ARQ
Go-Back-N ARQ protocol is also known as Go-Back-N Automatic Repeat Request. It is a data
link layer protocol that uses a sliding window method. In this, if any frame is corrupted or lost, all
subsequent frames have to be sent again.
The size of the sender window is N in this protocol. For example, Go-Back-8, the size of the
sender window, will be 8. The receiver window size is always 1.
If the receiver receives a corrupted frame, it cancels it. The receiver does not accept a corrupted
frame. When the timer expires, the sender sends the correct frame again.
Selective Repeat ARQ is also known as the Selective Repeat Automatic Repeat Request. It is a
data link layer protocol that uses a sliding window method. The Go-back-N ARQ protocol works
well if it has fewer errors. But if there is a lot of error in the frame, lots of bandwidth loss in
sending the frames again. So, we use the Selective Repeat ARQ protocol. In this protocol, the
size of the sender window is always equal to the size of the receiver window. The size of the
sliding window is always greater than 1.
If the receiver receives a corrupt frame, it does not directly discard it. It sends a negative
acknowledgment to the sender. The sender sends that frame again as soon as on the receiving
negative acknowledgment. There is no waiting for any time-out to send that frame.
Dynamic NAT is a many-to-one mapping of a private IP address or subnets inside the SD-WAN
network to a public IP address or subnet outside the SD-WAN network. The traffic from different
zones and subnets over trusted (inside) IP addresses in the LAN segment is sent over a single
public (outside) IP address.
Port Restricted: Port Restricted NAT uses the same outside port for all translations related to an
Inside IP Address and Port pair. This mode is typically used to allow Internet P2P applications.
Symmetric: Symmetric NAT uses the same outside port for all translations related to an Inside
IP Address, Inside Port, Outside IP Address, and Outside Port tuple. This mode is typically used
to enhance security or expand the maximum number of NAT sessions.