Npm UNIT 1 Notes Final

Embed Size (px)

Citation preview

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

Mailam Engineering CollegeMailam 604 304(Approved by AICTE, New Delhi, Affiliated to Anna University, Chennai & Accredited by National Board of Accreditation (NBA), New Delhi)

DEPARTMENT OF INFORMATION TECHNOLOGYIII YEAR / VI SEM IT 2351 NETWORK PROGRAMMING AND MANAGEMENT UNIT I ELEMENTARY TCP SOCKET SYLLABUS: Introduction to Socket Programming Overview of TCP/IP Protocols Introduction to Sockets Socket address Structures Byte ordering functions address conversion functions Elementary TCP Sockets socket, connect, bind, listen, accept, read, write, close functions Iterative Server Concurrent Server. PART - A1. Group the OSI layers by function. The seven layers of the OSI model belonging to three subgroups. Physical, data link and network layers are the network support layers; they deal with the physical aspects of moving data from one device to another. Session, presentation and application layers are the user support layers; they allow interoperability among unrelated software systems. The transport layer ensures end-to-end reliable data transmission. 2. The transport layer creates a communication between the source and destination. What are the three events involved in a connection? Creating a connection involves three steps: connection establishment, data transfer and connection release. 3. Define flow control. Flow control refers to a set of procedures used to restrict the amount of data. The sender can send before waiting for acknowledgment. 4. Mention the categories of flow control. There are 2 methods have been developed to control flow of data across communication links. Stop and wait- send one from at a time. Sliding window- send several frames at a time.

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 1

5. What is the function of stop and wait flow control? In this method, the sender sends one frame and waits for an acknowledgement before sending. 6. Mention the advantage and disadvantage of stop and wait flow control. Advantage: simplicity Disadvantage: inefficiency. 7. What is piggy backing? Piggybacking means combining data to send and acknowledgement of the frame received in one single frame. Piggy backing can save bandwidth because the overhead from a data frame and an ACK frame can be combined into just one frame 8. What are the network support layers and the user support layers? Network support layers: The network support layers are Physical layer, Data link layer and Network layer. These deals with electrical specifications, physical connection, transport timing and reliability. User support layers: The user support layers are: Session layer, Presentation layer, Application layer. These allow interoperability among unrelated software system. 9. What are the responsibilities of network layer? The network layer is responsible for the source-to-destination delivery of packet across multiple network links. The specific responsibilities of network layer include the following: Logical addressing. Routing.

10.What are data grams? In datagram approach, each packet is treated independently from all others. Even when one packet represents just a place of a multi-packet transmission, the network treats it although it existed alone. this technology are referred to as datagram. 11.Define IP address. IP address is the 32-bit number for representing a host or system in the network. One portion of the IP address indicates a networking and the other represents the host in a network. 12.What is function of transport layer? The protocol in the transport layer takes care in the delivery of data from one application program on one device to an application program Packets in

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT on another device. They act as a link between the upper layer and the services provided by the lower layer. 13.What are the duties of the transport layer? The services provided by the transport layer End-to- end delivery Addressing Reliable delivery Flow control Multiplexing

UNIT-1 protocols

14.What is the difference between network layer delivery and the transport layer delivery? Network layer delivery The network layer is responsible for the source-todestination delivery of packet Transport layer delivery The transport layer is responsible for source-to-destination delivery of the entire message.

across multiple network links. 15.What are the four aspects related to the reliable delivery of data? The four aspects are, o o o o Error control Sequence control Loss control Duplication control

16.What is meant by segment? At the sending and receiving end of the transmission, TCP divides long transmissions into smaller data units and packages each into a frame called a segment. 17.What is meant by segmentation? When the size of the data unit received from the upper layer is too long for the network layer datagram or data link layer frame to handle, the transport protocol divides it into smaller usable blocks. The dividing process is called segmentation. 18.What is meant by Concatenation? The size of the data unit belonging to single sessions are so small that several can fit together into a single datagram or frame, the transport protocol combines them into a single data unit. The combining process is called concatenation. 19.What are the types of multiplexing? The types of multiplexing are, Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 3

Upward multiplexing Downward multiplexing

20.What are the two possible transport services? Two basic types of transport services are, o o Connection service Connectionless services

21.The transport layer creates the connection between source and destination. What are the three events involved in the the two end ports. A connection is a single logical path between the source and destination that is associated with all packets in a message. Creating a connection involves three steps: Connection establishment Data transfer & Connection release. connection? For security, the transport layer may create a connection between

22. What is meant by congestion? Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. 23. What is the purpose of Domain Name System? Domain Name System can map a host name to an IP address and conversely an IP address to host name. 24. Discuss the three main division of the domain name space. Domain name space is divided into three different sections: generic domains, country domains & inverse domain. Generic domain: Define registered hosts according to their generic behavior, uses generic suffixes. Country domain: Uses two characters to identify a country as the last suffix. Inverse domain: Finds the domain name given the IP address. 25. What is the principle difference between connectionless communication and connection oriented communication? Network is a connection oriented. Here user uses the connection and then release the connection. Typically one side makes a proposal other side can accept it. Eg:-Telephone systems. In connectionless each message carries the full destination address and each one is routed through the system independent of all others. The first one send will be the first one to arrive. Eg:-Postal system. 26. State few advantages of IPv6 over IPv4.

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT Larger address space Better header format New options. Allowance for extension. Support for resource allocation. Support for more security. Four actions are needed to close the connections in both directions:

UNIT-1

27. Explain about Connection Termination. Host A sends a segment announcing its wish for connection establishment. Host B sends a segment acknowledging the request of A. After this the connection is closed in one direction but not in the other direction. When Host B has finished sending its own data, it sends a segment to indicate that it wants to close the connection. Host A acknowledges the request of B. Encapsulation and De-capsulation Buffering Multiplexing and De-multiplexing Pushing Data Urgent Data 28 . What are the TCP operations?

29. What is ephemeral port number? A client program running on the local computer defines itself with a port number, chosen randomly by the TCP software running on the local host. This is called Ephemeral port number. 30.What is Socket address? The combination of an IP address and a port number is called Socket Address. 31. What are elements needed for communications? Local host Local client program Remote host Remote server program. Socket interface is a set of declarations, definitions and procedures for writing client server programs. 33.Give some common APIs that supports to write client-server Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

32.What is Socket Interface?

Page 5

programs? Some common APIs that supports t o write client-server programs are Socket interface Transport Layer Interface Stream Interface Thread Interface Remote Procedure call 34.Specify the Internet Address structure? An IPV4 address is defined as a structure called in_addr, which structure contains only one field called s_addr if type in_addr_t. The holds an IP address as a 32-bit binary number. struct in_addr { in_addr_t }; 35.What are the three socket types defined by socket interface? The socket interface defines three types of sockets, They are stream socket, the datagram socket and the raw socket. Stream socket allows processes to communicate using TCP/IP.TCP uses a pair of sockets to connect one application program to another across the Internet. Datagram socket allows processes to communicate using UDP.UDP uses a pair of datagram sockets to send a message from application program to another across the Internet. Raw sockets provide access to ICMP or OSPF that directly use services of IP. 36. What is little-endian byte order? A computer system that uses little-endian system stores the least significant byte of data in the starting address of the data unit. 00001010 00010111 00001110 00000110 the s_addr;

00001010 00010111 00001110 00000110

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

37. What is Big-Endian byte order? A computer system that uses big-endian system stores the most significant byte of data in the starting address of the data unit. 00001010 00010111 00001110 00000110

00001010 00010111 00001110 00000110

38. What are the Byte Manipulation functions? How they are declared? The most common byte manipulation functions are memset, memcpy, memcmp. Declaration for byte manipulation functions: void *memset (void *dest, int chr, size_t len); void *memcpy (void *dest, const void *src, size_t len); int memcmp (const void *first, const void *second, size_t len); 39. Explain the socket function? The socket function is used by a process to create a socket. It takes three integer arguments and return an integer result. int socket(int family, int type, int protocol); Family Type Protocol -defines the protocol group -defines the type of socket -set to zero for TCP and UDP.

This function returns a socket descriptor, which uniquely defines the created socket if the creation is successful. It returns -1 if there is an error. The socket descriptor is used by other functions to refer to the socket. 40. Explain the bind function? The bind function binds a socket to a local socket address by the local socket address to an already created socket. int bind(int sockfd, const sockaddress *localaddr, socklen_t localaddrlen); sockfd is the socket descriptor. localaddr is the pointer to the Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC adding

Page 7

socket address of the local machine and localaddrlen is the length of the local socket address. To use this function, the client first needs to call the socket function in order to use the returned value as the socket descriptor. This function sets values for the local socket address. This function returns an integer, 0 for success and -1 if any error. 41. How an active connection to a remote process is established? The connect function is used by a process (usually a client) to establish an active connection to a remote process (normally a server) int connect(int sockfd, const struct sockaddress *serveraddr, socklen_t serveraddrlen); sockfd is the socket descriptor .serveraddr is the pointer to the remote socket address ;and serveraddrlen is the length of the local socket address. To use this function, the client first needs to call the socket function in order to use the returned value as the socket descriptor. This function sets values for the remote socket address. This function returns an integer, 0 for success and -1 if any error. 42. Explain the listen function? Only the TCP server calls the listen function. It creates a passive socket from an unconnected socket. Before calling the listen function, the socket must already be created and the local address fields set. This function informs the operating system that the server is ready to accept connection through this socket. int listen(int sockfd, int backlog); sockfd is the socket descriptor .backlog is the number of requests that can be queued for this connection. This function returns an integer, 0 for success and -1 if any error. 43. Explain the accept function? The accept function is called by a TCP server to remove the first Connection request from the corresponding queue. If there are no requests the accept function is put to sleep. int accept(int sockfd, struct sockaddress *clientaddr, socklen_t clientaddrlen); This function creates a new socket (child socket)that can be used by a child server to connect to the client. All the information needed for a new socket is provided by the operating system. The return value is the new socket descriptor. 44. Explain sendto system call?

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

A connectionless process (process using UDP) issues the sendto system call to send data to a process. ssize_t sendto(int sockfd, const void *buf, size_t buflen, int flags, const struct sockaddress *toaddr, socklen_t toaddrlen); sockfd is the socket descriptor, buf is the pointer to the buffer holding the message to be sent, buflen defines the length of the buffer, and the flags fields specifies out-of-band data or look ahead messages. Normally it is set to zero. Toaddr is the pointer to the socket address of the receiver, and toaddrlen is the length of the socket address. The function returns the number of characters sends if there is no error and 0 otherwise. 45. Explain recvfrom system call? A connectionless process (process using UDP) issues the recvfrom system call to receive from incoming queue, the datagrams send by a remote process. ssize_t recvfrom(int sockfd, const void *buf, size_t buflen, int flags, struct sockaddress *fromaddr, socklen_t *fromaddrlen); sockfd is the socket descriptor, buf is the pointer to the buffer where the message will be stored, buflen defines the length of the buffer, and the flags fields specifies out-of-band data or lookahead messages. Normally it is set to zero. Fromaddr is the pointer to the socket address of the sender, and fromaddrlen is the length of the socket address. This function returns the number of characters send if there is no error and 0 otherwise. 46. Explain read system call? A connection-oriented process (process using TCP) issues the read system call to receive datagrams from a remote process. ssize_t read(int sockfd, const void *buf, size_t buflen); sockfd is the socket descriptor, buf is the pointer to the buffer where the data will be stored and buflen defines the length of the buffer. This function returns the number of bytes received if successful,0 if endof-file condition is detected, and -1 if there is an error. 47. Explain write system call? A connection oriented process (process using TCP) issues the write system call to send datagrams to a remote process. ssize_t write(int sockfd, const void *buf, size_t buflen); sockfd is the socket descriptor, buf is the pointer to the buffer where the data to be sent is stored, buflen defines the length of the buffer. This function returns the number of bytes sent(written) if successful ,and Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 9

-1 if there is an error. 48. How a TCP connection is terminated? The close function is used by a process to close a socket and terminate a TCP connection. int close(int sockfd) The socket descriptor is not valid after this call. This function returns an integer, 0 for success and -1 if any error. 49. What is a parent server? A server running infinitely and accepting connections from clients is called a parent server. 50. What is iterative server? If a client request to a server for a resource, which in turns gives the resource form other server called iterative server. 51. what is concurrent server? If many client access a server called concurrent server. 52. What is a Socket? (DEC 2011 / 2012) The communication structure used for socket programming is called socket. It is an end point of communication to which a name can be bound. Two processes need a socket at each end to communicate each other. The socket values are IP address and Port number. 53.Specify the Socket Address structure? (MAY 2010) The application program that use the TCP/IP protocol suite need a structure called a socket address, which mainly holds an IP address. The structure has five fields. struct sockaddress { uint8_t sin_len; sa_family_t sin_family; in_port_t sin_port; struct in_addr char }; Family Type Protocol Local socket address Remote socket address - defines the protocol group - defines the type of socket - set to zero for TCP and UDP. - defines the local socket address, a structure of type sockaddress. - defines the remote socket address, a sin_zero[8]; sin_addr; with

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT structure of type 54. What do you mean by socket abstraction? sockaddress.

UNIT-1

(DEC 2007)

The socket is the basic abstraction for network communication in the socket API Defines an endpoint of communication for a process Operating system maintains information about the socket and its connection Application references the socket for sends, receives, etc.

55. How shall local and remote socket addresses be obtained. (DEC 2007) REMOTE AND LOCAL ADDRESS Getsockname: Return the local protocol address associated with a socket. int getsockname(int sockfd, struct sockaddr * localaddr, socklen_t *addrlen); Getpeername: Return the remote address associated with a socket. int getpeername(int sockfd, struct sockaddr *peeraddr, socklen_t *addrlen); Both the functions returns 0 if ok else -1 on error. 56.What is the use of bind () system Call? (MAY 2007) adding

The bind function binds a socket to a local socket address by the local socket address to an already created socket. int bind(int sockfd, const sockaddress *localaddr, socklen_t

localaddrlen); sockfd is the socket descriptor. localaddr is the pointer to the socket address of the local machine and localaddrlen is the length of the function in order to use the returned value as the socket descriptor. This Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC local socket address. To use this function, the client first needs to call the socket

Page 11

function sets values for the local socket address. This function returns an integer, 0 for success and -1 if any error. 57. Explain the socket structure in brief. (MAY 2009)

Socket Programming to hold information about the address and port and other information. Most socket functions require a pointer to a socket address structure as an argument. 58. Distinguish between an iterative server and concurrent server. (MAY 2009 / 2012)

Concurrent server 1. Many request are processed at a same time 2. It is called when the time taken to completed the request is infinite or long. 3. The request can be of any complexity and duration. 4. Server software must be programmed explicitly to handle requests concurrently.

Iterative server 1. One request is processed at a time 2. When the time taken to complete the process is less this server is used.

3. Easy to implementation

4. Server is locked while dealing with a request.

59. Distinguish between an TCP sockets and UDP sockets TCP SOCKET Reliable, Connection Oriented Protocol Provides packets Can transmit large amount of data Sequencing of packet is guaranteed in TCP. Means the packets that are sent guaranteed delivery of UDP SOCKET

(MAY 2011)

Unreliable, Connection Less Protocol Does not provide guaranteed delivery of packets Can transmit only limited amount of data In UDP it is not guaranteed that the packets will reach in time to the

struct sockaddr IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT uint8_t sa_len; /* length of the structure */ sa_family_t sa_family; /* address family : AF_ XXX value */ is delivered in time destination. char sa_data[14]; /* protocol specific address */ ; 60. Give the structure of struct sockaddr. Name Header Structure : : : sockaddr UNIT-1

(MAY 2011)

61. Define well-known port.

(DEC 2011/2012)

The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). Port numbers 0 to 1024 are reserved for privileged services and designated as well-known ports. This list of well-known port numbers specifies the port used by the server process as its contact port. 62. Define socket and list out its types. Socket: The communication structure used for socket programming is called socket. It is an end point of communication to which a name can be bound. Two processes need a socket at each end to communicate each other. The socket values are IP address and Port number. Types of Socket: The socket interface defines three types of sockets, They are Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC with (MAY 2007)

Page 13

stream socket, the datagram socket and the raw socket. Stream socket allows processes to communicate using TCP/IP. TCP uses a pair of sockets to connect one application program to another across the Internet. Datagram socket allows processes to communicate using UDP. UDP uses a pair of datagram sockets to send a message from the application program to another across the Internet. Raw sockets provide access to ICMP or OSPF that directly use services of IP. 63. Distinguish between TCP Sockets and UDP Sockets. (MAY 2011)

TCP Socket reliable delivery in-order guaranteed connectionoriented bidirectional Structure is SOCK_STREAM

UDP Socket unreliable delivery no order guarantees no notion of connection app indicates dest. for each packet can send or receive Structure is SOCK_DGRAM

64. What is meant by host byte ordering? HOST BYTE ORDER

(MAY 2011)

It is the byte ordering used by a given system. It can be big endian or little endian.

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 15

PART B1. Explain the TCP layering in details with neat sketch. Web Clients OVERVIEW OF TCP / IP PROTOCOLS and Servers communicate using the TCP protocol. TCP (MAY 2007)

communicates with the data link layer using IP protocol. The actual flow of information between the client and server goes down the protocol stack on one side across the network and up the protocol stack on other side. CLIENT APPLICATION PROTOCOL TCP PROTOCOL SERVER APPLICATION LAYER TRANSPORT LAYER

IP PROTOCOL ETHERNET PROTOCOL Actual flow between client and server ETHERNET

NETWORK LAYER DATA LAYER

Figure : Client and Server communication on the same Ethernet using TCP TCP : TRANSMISSION CONTROL PROTOCOL TCP provides connection between clients and server. A TCP client establishes a connection with the server, exchange data with the server and then terminate the connection. TCP provides flow control, reliability, full duplex and also sequences the data by associating a sequence number with every byte that it sends. TCP contains algorithms to estimate the round trip time (RTT) between a client and server dynamically, so that it knows how long to wait for an acknowledgement. TCP always specifies the no. of bytes to be sent by the peer. This is called advertised window.

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT APPLICATION LAYER

UNIT-1

Application protocols are defined at the top layer, which implement specific user applications and other high-level functions. Since they are at the top of the stack, application protocols are the only ones that do not provide services to a higher layer; they make use of services provided by the layers below. 1. FTP-FILE TRANSFER PROTOCOL: the TCP\IP standard protocols for a transferring file s from one machine to another machine.ftp differ from the other applications because is use to connections to transfer a file: control connection data connection. 2. SMTP-SIMPLE MAIL TRANSFER PROTOCOL: THE TCP\IP Standard protocol for transferring electronic message from one machine to another machine. it specify how to mail systems interact and the form of control messages they exchange to transfer mail. 3. SNMP: SIMPLE NETWORK MANAGEMENT PROTOCOL: a protocol use to manage the devices such as hosts, router and printers. 4. TELNET-REMOTE LOGIN: the TCP\IP standard protocol for remote terminal service .TELNET allows an interactive users and the client system to start a login session on a remote system. Once a login system is established, the client process passes the users keystrokes to the server process. 5. TFTP-TRIVIAL FILE TRANSFER PROTOCOL: it is a simple file transfer protocol it is not complex as FTP. It does not have much code consumes less memory, it can be used small machine .there is no security provisions. TFTP is UDP not TCP. 6. DNS DOMAIN NAME SERVICE: the online distributed database system used to map host names into IP address. TRANSPORT LAYER The Transport layer (also known as the Host-to-Host Transport layer) is responsible for providing the Application layer with session and datagram communication services. The core protocols of the Transport layer are Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). Either of these two protocols are used by the application layer process, the choice depends on the application's transmission reliability requirements. The mechanisms used by the Transport layer to determine whether data has been Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 17

correctly delivered are: Acknowledgement responses Sequencing Flow control

The Transport layer facilitates two types of communication: Connection-oriented (TCP) A connection must be established at the Transport layer of both systems before the application can transmit any data. Connectionless (UDP) All systems do not need to establish a connection with the recipient prior to data exchange. TCP is a more reliable form of data exchange than UDP. NETWORK LAYER The Network Interface layer (also called the Network Access layer) is responsible for placing TCP/IP packets on the network medium and receiving TCP/IP packets off the network medium. TCP/IP was designed to be independent of the network access method, frame format, and medium. In this way, TCP/IP can be used to connect differing network types. This layer include LAN technologies such as Ethernet and Token Ring and WAN technologies such as X.25 and Frame Relay. Independence from any specific network technology gives TCP/IP the ability to be adapted to new technologies such as Asynchronous Transfer Mode (ATM). DATALINK LAYER It consists of combination of datalink and physical layers that deals with pure hardware (wires, satellite links, network interface cards, etc.) and access methods such as CSMA/CD (carrier sensed multiple access with collision detection). 2. Explain the following system calls in details CONNECT() BIND() LISTEN() ACCEPT() server. THE CONNECT CALL: #include addrlen); (MAY 2007/2009)

The connect function is used by a TCP client to establish a connection with a TCP int connect(int sockfd,const struct sochaddr *servaddr, socklen_t

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT Return 0 if OK Else -1 on error o o Sockfd-> socket descriptor value.

UNIT-1

Servaddr- pointer to socket address structure . the socket address structure must contain the IP address and port number of the server.

o

Addrlen-> Length o fhte server address.

ERROR CODE: Value in errno EBADF ENOTSOCK EISCONN ETIMEDOUT ECONNREFUSED ENETUNREACH OR EHOSTUNREACH Cause of the error Not a valid socket descriptor If the first argument is not specified. If the socket is already connected. If the connection is not established If the port number specified is not waiting on the server for connection When the destination is unreachable from some intermediate router. BIND FUNCTION:

The bind function assigns a local protocol address to a socket . internet protocol address is a combination of either 32 bit IPV4 address or 128 bits IPv6 address along with a 16 bits TCP or UDP port number int bind(int sockfd, const struct sockaddr *myaddr, socklen_t addrlen); It returns 0 if OK & -1 on error Sockfd- socket description My addr the address of a structure that specifies an ip address and port number. Addrlen- The size of the address structure in bytes. Return 0 if successful & -1 on error. ERROR CODE Value in errno EBADF ENOTSOCK EADDRINUSE EFAULT Cause of the error Not a valid socket descriptor If the first argument is not specified. If the address is already bound to it. If the local address argument pointer is invalid.

Return code:

PROCESS SPECIFIES IP ADDRESS PORT

RESULT

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 19

Wild card Wild card Local IP address Local IP address

0 Non zero 0 Non Zero

Kernel chooses IP address and port Kernel chooses IP address and process specifies port Process specifies IP address, kernel chooses port Process specifies the IP address & port

THE LISTEN CALL: It is called only by a TCP server and it performs two functions.

1. The listen function converts an unconnected socket into a passive socket indicating that the kernel should accept the incoming connection request directed to this socket. 2. It specifies the maximum number of connection the kernel should queue for this socket. #include int listen (int sockfd, int backlog); It return 0 if OK, -1 on error. The kernel maintains two queues: 1. Incomplete connection queue: It contains an entry for each SYN that arrived from a client for which the server is awaiting completion of the three way handshake. 2. Completed connection queue: It contains an entry for each client with the TCP three way handshake has completed . Sockfd- socket descriptor Backlog- size of incoming connection request. ERROR CODE: Value in errno EBADF ENOTSOCK Cause of the error Not a valid socket descriptor If the first argument is not specified.

THE ACCEPT FUNCTION: The accept is called by the TCP server to return the next completed connection

from the front of the completed connection queue. Accept creates a new socket and return the descriptor of the new socket to the caller. The server can transfer data on the new socket after finishing the server closes it. #include int accept (int sockfd, struct sockaddr *cliaddr, socklen_t addrlen);

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT Non negative descriptor if OK Else -1 on error Sockfd-> socket descriptor Cliaddr-> client IP address Addrlen-> length of the second argument.

UNIT-1

The connected socket is closed each time while the listening socket remains open for the life of the server. This is supported only in stream. ERROR CODE Value in errno EBADF ENOTSOCK EOPNOTSUPP Cause of the error Not a valid socket descriptor If the first argument is not specified. socket is not a SOCKET_STREAM.

3. Differentiate between the iterative server and concurrent server? (MAY 2007 / 2008) ITERATIVE SERVER: Server: A server is a process which offers services. A server waits for reads and processes a clients request for a server. Types of server: Server can be classified based on following 1. Their communication method (connection less or connection-oriented). 2. The information they maintain(state less or state full); 3. Based on their service(iterative or concurrent). Connection oriented servers: Uses TCP for connection oriented communication Provides reliable transport Servers are simpler Uses a separate socket for each connection.

Connection less servers: Uses UDP for connectionless communication Does not guarantee reliable transport The server and client are complicative.

State less server: Does not maintain any information about the outgoing interaction with each client . Requires long messages. All information about the request must be placed in all messages.

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 21

They are less efficient. They are more reliable. Example: HTTP.

Stateful server: Maintains information about the status of the ongoing information with the client. Maintains few information between request. Requires smaller messages. Is unreliable of a connection terminates abnormally. Example: FTP. An iterative server serves single client at a time. Handles one request at a time. Client waits for all previous requests to be processed. It is easier to design and implement. It is suitable when the service time for each request is small. It is suitable for simple services such as TIME service. It is not suitable when the service time.

Iterative or sequential server:

Example:

The first client request to get a file of size 200 Mbytes. The second client requests to get a file of 20 bytes between the 2nd client has to wait until the processing of client ends.

CONCURRENT SERVER

A server can handle multiple clients at the same time in parallel, and this type of a server is called a concurrent server.

Concurrent Vs Iterative server

# include in_addr_t inet_addr(const char *strptr); int /inet_aton(const char* strptr, AND MANAGEMENT struct IT 2351 32 bit binary network byte orderedin_addr *addrptr); Returns NETWORK PROGRAMMING IPv4 Address, Returns 1, if string was valid, INADDR_NONE if an error. 0, if an error. Concurrent server Iterative server Many request are processed at a same time It is called when the time taken to completed the request is infinite or long. The request can be of any complexity and duration. Server software must be programmed explicitly to handle requests concurrently.

UNIT-1

One request is processed at a time When the time taken to complete the process is less this server is used.

Easy to implementation Server is locked while dealing with a request.

4. Discuss the syntactical issues of various address conversion functions. (MAY 2008) ADDRESS CONVERSION FUNCTIONS: There are two groups of address conversion functions: 1. inet_aton, inet_addr & inet_ntoa : Converts between ASCII string and network byte ordered binary values. Applicable only for IPv4 Address 2. inet_pton & inet_ntop : Converts presentation to numeric & numeric to presentation. Applicable for both IPV4 & IPV6 address. Conversion between ASCII strings & network byte order: i. inet_aton

o

The function inet_aton converts the character string (dotted decimal string ) pointed by strptr into the 32 bit binary network bytes ordered value which is stored through pointer addrptr. If the addrptr is a null pointer the function performs the conversion but does not store any result.

o

ii. inet_addr: It returns the 32-bit binary network byte order value & INADDR_NONE if error.

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 23

#include ude int const void *addrptr, char char *strptr, void *addrptr); char *inet_ntop(int family,inet_pton(int family, const *strptr, - returns 1 If ok , size_t len); if not a error. urn pointer to result if OK &0NULL on valid presentation format , 1 for error. iii. inet_ntoa: It converts 32 bits binary network byte ordered IPV4 address into its corresponding dotted decimal string & return pointer to dotted decimal string Conversion between presentation and numeric : These are used for both IPV4 & IPV6 address. P-> Presentation ASCII string n-> numeric binary value i. inet_pton

Family AF_INET

[IPV4]

AF_INET6 [IPV6] If the family is not supported it return the error -1 set to EAFNOSUPPORT. The dotted decimal string stored in strptr is converted and stored through

the pointer addrptr. ii. inet_ntop: It converts from numeric (addrptr) to presentation (strptr).

len -> size of the destination to prevent the function from overflowing the callers buffer. IPV4 - 16 bit - INET_ADDRSTRPTR IPV6 46 bit - INET6_ADDRSTRPTR The problem with inet_ntop is it requires the caller to pass a pointer to a binary address. The addr is normally containedin a socket addr structure requiring the caller to know the formet of the structure and address family. To solve this we use sock_ntop function. General Representation Dotted decimal IPV4 address inet_pton(AF_INET) inet_aton, inet_addr 32-bit binary IPv4 address

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT inet_pton(AF_INET6) Hexadecimal strings inet_ntop(AF_INET6) 5. Write notes on byte ordering functions. BYTE ORDERING FUNCTIONS The bytes can be stored in memory in two ways 1. Little Endian Byte Ordering 2. Big Endian Byte Ordering LITTLE ENDIAN BYTE ORDERING: LSB or Low order bytes as the starting address. Increasing Memory Address Address A + 1 Address A 128 bit binary IPv4

UNIT-1

mapped or IPv4 compatible IPv6 Address or IPv6 Address (MAY 2008 / DEC 2012)

HIGH ORDER BYTE

LOW ORDER BYTE

MSB

16-BIT VALUE

LSB

Example : 10.23.14.6 can be represented in 32 bit as MSB 00001010 Byte Order: 00001010 A+3 Application: DEC VAX Computers Intel Microprocessors 00010111 A+2 00001110 A+1 00000110 Address A 00010111 00001110 00000110 LSB

BIG ENDIAN BYTE ORDERING: High order bytes or MSB as the starting address. Increasing Memory Address Address A Address A + 1 Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 25

MSB

16-BIT VALUE

LSB

HIGH ORDER BYTE

LOW ORDER BYTE

Example : 10.23.14.6 can be represented in 32 bit as MSB 00001010 Byte Order: 00001010 Address A Application: PROGRAM: /* program to find host byte order */ int main (int argc, char **argv) { union { short s; char c[sizeof(short)]; } un; un.s=0*0102; printf (%s, CPU_VENDOR_OS); If (sizeof(short)==2) { If (un.c[0]==1 && un.c[1]==2) printf(big endian); elseif (un.c[0]==2 && un.c[1]==1) printf(Little endian); } } IBM Mainframe Computers Motorola Microprocessors 00010111 A+1 00001110 A+2 A+3 00000110 00010111 00001110 00000110 LSB

uint16_t ntohs(uint16_t host16bit value); 32 bit 0000004d5347726170682e43686172742e3800f439b271000000000000000000000000000000000 uint16_t htons(uint16_t host16bit value); 16 bit 32 bit uint32_t ntohl(uint32_t host32bit value); 0000000000000000000000000000000000000000000000000000000000000000000000000000000 uint32_t htonl(uint32_t host32bit value); returns value AND MANAGEMENT IT 2351 / NETWORK PROGRAMMING in host byte order - returns value in network byte order TYPES OF BYTE FUNCTIONS NETWORK BYTE ORDER Networking protocols can choose their own byte order HOST BYTE ORDER It is the byte ordering used by a given system. It can be big endian or little endian. TCP/IP has the big endian system. UNIT-1

ORDER BASED ON BYTE ORDERING

BYTE CONVERSION FUNCTIONS: htons htonl From host to network byte order host to network short[16 bit int] host to network long [32 bit int]

ntohs ntohl -

From network to host byte order network to host short [16 bit int] network to host long [32 bit int]

Host byte order htons ntohs htonl ntohl Network byte order

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 27

6. Explain the Types of Services? Connection Oriented services Connectionless services Connection Oriented and Connectionless services

o In connection oriented method session is created before transmittingdata. It provides a reliable data stream as it ensures the sequential transmission of data. In connection oriented method the process starts from the sender computer by sending a request to start the transfer that is to be acknowledged by the destination device before data can be sent and hence a virtual link is established between sender and receiver. This process is called handshaking.

o After

that

data

is

transferred

sequentially

by

processing

acknowledgements. Sliding window and Stop and wait are used to provide flow control and Cyclic Redundancy Checks are used to provide error detection. These methods can either be implemented in the data link layer or in the transport layer. TCP provides a connection-oriented service.

o In connectionless transmission there is no need to establishconnection. The sender just starts transmitting data that's why it cannot provide the same reliability as offered by connection-oriented method. These techniques are used in the broadcast networks. In these networks there is need of maintaining the state information for the sender and receiver devices that's why it can only offer a small number of services. However the speed of connectionless networks is better than those of connection-oriented ones because they do not provide flow control and error detection. UDP provides connectionless services. o In connection oriented communication one use guided medium. But in

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

connectionless communication there's no need of a cable. It also named as wireless communication.

0100090000037c83080000009de3040000001610000026060f0022205 74d4643010000000000010089e8000000003a000000002000005c1507 005c350700010000006c0000000000000000000000e00200000202000 00000000000000000f6590000dd3e000020454d46000001005c350700 0c0000000100000000000000000000000000000000040000000300004 0010000f000000000000000000000000000000000e2040080a9030046 0000002c00000020000000454d462b014001001c00000010000000021 0c0db01000000600000006000000046000000d8ac0000ccac0000454d 462b224004000c000000000000001e4009000c0000000000000024400 1000c000000000000003040020010000000040000000000803f214007 000c000000000000000840000524ac000018ac00000210c0db0100000 00000000000000000000000000000000001000000ffd8ffe000104a46 494600010101006000600000ffe110bb45786966000049492a0008000 00003001a01050001000000320000001b010500010000003a00000028 010300010000000200000042000000480000000100000048000000010 0000006000301030001000000060000001a0105000100000090000000 1b0105000100000098000000280103000100000002000000010204000 1000000a0000000020204000100000013100000000000004800000001 0000004800000001000000ffd8ffe000104a464946000101010060006 00000ffdb00430006040506050406060506070706080a100a0a09090a 140e0f0c1017141818171416161a1d251f1a1b231c1616202c2023262 7292a29191f2d302d283025282928ffdb0043010707070a080a130a0a 13281a161a28282828282828282828282828282828282828282828282 82828282828282828282828282828282828282828282828282828ffc0 0011080059008003012200021101031101ffc4001f000001050101010 1010100000000000000000102030405060708090a0bffc400b5100002 010303020403050504040000017d01020300041105122131410613516 107227114328191a1082342b1c11552d1f02433627282090a16171819 1a25262728292a3435363738393a434445464748494a5354555657585 95a636465666768696a737475767778797a838485868788898a929394Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 29

95969798999aa2a3a4a5a6a7a8a9aab2b3b4b5b6b7b8b9bac2c3c4c5c 6c7c8c9cad2d3d4d5d6d7d8d9dae1e2e3e4e5e6e7e8e9eaf1f2f3f4f5 f6f7f8f9faffc4001f010003010101010101010101000000000000010 2030405060708090a0bffc400b5110002010204040304070504040001 0277000102031104052131061241510761711322328108144291a1b1c 109233352f0156272d10a162434e125f11718191a262728292a353637 38393a434445464748494a535455565758595a636465666768696a737 475767778797a82838485868788898a92939495969798999aa2a3a4a5 a6a7a8a9aab2b3b4b5b6b7b8b9bac2c3c4c5c6c7c8c9cad2d3d4d5d6d 7d8d9dae2e3e4e5e6e7e8e9eaf2f3f4f5f6f7f8f9faffda000c030100 02110311003f00fa4750d6f4c11dc5baeb961697415e305a68c989fa6 4a93d41ec6a92eb36425d3d8f8ab4d2902b0b95df17fa492b8073bbe4 c1e78eb57f52d36f6ee6f321d4bec8caac88d15ba96507dd89efb4f4c 1283208c834342f0ccda469f65689aa4d7296712c1019432ed8d44602 908caa7fd52f2413cb0e8c41562949a563a0b4b982f2d61b9b49a39ed a64592296270c9221190ca4704107208ac4d4b5dd36e2d992cbc49a6d a4c48c4be6c52630c09e09c72011f8e7b56878734a8b41f0f697a45b3 c9241a7dac5691bc98dccb1a0504e38ce0557d634abcd4ed0dbb6a46d 958105ada328c41041e771ec4fd339182010c49db5248b5fd1a490247 ac69eeeec02a8b942493c607349625a2d7f50b65924680410dc05772f b5dde60d827240f917e51c0c700555d3bc3d259ea9a9df1bd134ba8ec 13ef8790abbb6aa907800390339e83df32dc19ad758d4aed63f90da5b 22b30f949124d91f8061f98a892d63fd7465c3e197a7ea8daa2b908fc 631ba9c496dbc2ee283e662319e0027777fbb9e411505e78eecacec8d e4f75682d87fcb450ce3ef6dc704f39c8c7fb2de871baa551bb28b39f dac3f991db515c6ea5e36b6d32d5ee2fa7b686156d858ab1c90402001 c9c13838e8739e957bc39e254d6e484dbb42f1baee3b7a8e0fbe3a823 d3208ec693a7351e769dbb8d548b7ca9ea696872b5d457175296f31ae 26831b8ed0b1cce8b85ce01c0e48ebf80c4369a3ecba9ee9b52beb859 cc8c88d70db103e301429030074efc939e987785ffe41b37fd7ede7fe 94c9599addad9d8788bc3925bd8db89af6e9ac249002a56116b3c9b40 040c1312020820855c8caa95e7a5ad38b7d8e8a8dc67248ded2acdac2 c23b66b99ee8c79fdecec59db273c9efd6add456f0f93e6ed7765772e

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

15b184cf5038ce3393ce7a9ed8025ad56866db6eecc89348170cb27db ef3cb3379f88ee1d4302a06dc86fbbc0381dfa7048ad2b5816dadd618 cc8cab9c1924691bae7966249fc4d733ab697a7d8df6936d0d9a795aa 5fbc7741a47fdeafd9ee24c37cdf3ae46dd8d950b80000ab8eac00338 1d793ef492486e526acd98f75e2082def52dfec5aaca0b32bcb158cac 91e3d4ede41ec5777e5593a3f896f64d67578b51d36eedf4a89e35d3d 934e9cbc8bb7e72d807f8ba0da303d6bac91d6342ef90a392719acdd1 b5ab4d4e6b8b582495aeed153ed0af6b2c182c0e301c0eb827009c0c7 a8cb246783df5293c25a23ebc186b0d63035e865553e798d7ccc85e07 cd9e071e95af543c3daac1aee81a6eaf68b225b5fdb457712ca007549 10300c0123383ce09abf4005616a28d7bab5ddb18d2436f6f04d0640c a33bcaac413eaa807e7ea6b76b2adbfe46ad47febcadbff439ea27ba5 e6690da4fcbf54667f655e7fcf1ff00c797fc6aa4be1ebb92e04bb255 3bb2c05cb004631c00c00e71d8feb9aeceaaea1610df7d9bcf7b95fb3 ccb3a79173243965e81b630debcf28d953dc1ad136b6327152dce76df 44bab785628e290aaf4324dbdbf166249fc4d5ed32c2e60be8e4963da 8b9c9dc0f63ef5bd4526efab1a56d118de1d8c4ba4ce8c58037b77f75 8a9ff8f993b8e6b0750d36ea1d634afed1bbb79c4d7d30b2123ce2485 fc8b82bb181c6ef2f2096c0dbb87271bba1f0bffc8366ff00afdbcffd 2992a878b3fe43de0cff00b0b49ffa43775950fe1c7d11a56fe24bd59 aba2dbcd1da4725df9ab70c0e55e62e42e7e50dc95dd8c676f19ce38a b17f691df5a3dbced3ac6f8c9827785c60e787421874ec7dba558a2b5 333cd1bc1ad6de29b16d5b53bbbad3e7b9905924baa5ef9d0cbe5ccc3 cb2af853e56e5258f201c119c1eb3c2ba2369b0f9f752deb5db7989b6 6d46e2e1447bc94cac8eca24d813715e376ec1c1a3c4bff0021af09ff 00d84dff00f48ee6b7e800a6e15f6b119c7232391c7e9d6b2752d2af2 f2fed6e23d525b65824121862521260338571bb91ce78c67033903150 41a1df45a64367fdb373218e48e4370e18cae56412619b77dd6c6d200 0369c71401b5696d059dac36d690c705b428b1c51448152340301540e 000060015cb5c7c4bf035bdbcb349e30f0f948d4bb08f5089d88033c2 ab124fb0049ed5abe0bd097c31e12d23438ee24b91a7dac76fe748589 90aae0b61998a827385c90a30070055e4b0862d40ddc39899c379a918 0ab33b041bdc63e670b1aa83d8647a600316d7c7de0fbbba86dad7c57Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 31

e1f9ee26711c7147a942ceec4e02a80d9249e0015a16dff2356a3ff5e 56dff00a1cf4d5d136eacf7ff00da3a8b96b67b6fb3bcd983e6937efd 98fbe3ee83d978a75b7fc8d5a8ff00d795b7fe873d44b78fafe8cd21f 0cbd3f546934d1aac8cd22058fef92c004e33cfa71cd297512042ca1d 8160b9e4818c9c7e23f3158d7da55ec9aa59de41784ac374267b67242 30d9246769e4a90b206c72acd18c042ccd59ba6685aad969fae412496 f7126ab34b7459e77fdc349191e50ca9dcaa55006f972a4fca3680c9c e57b58e88e1e94a3cded174fcf5fbb7f3d8eb68ae626d1f556d52d6e9 2e2dc1b482e218e407634e5e481d4c8a13033e5b87dbd78236eec2eee 990496d6ee92ecdc669a41b4e461a4661d8738233efebd69c64dbb346 5528c61152534eff00f07fe07de53f0bff00c8366ffafdbcff00d2992 a878b3fe43de0cffb0b49ff00a437757fc2ff00f20d9bfebf6f3ff4a6 4aa1e2cff90f7833fec2d27fe90ddd4d0fe1c7d1115bf892f5674b451 456a66607897fe435e13ffb09bffe91dcd6fd607897fe435e13ff00b0 9bff00e91dcd6fd00145727ac78ef45d3352fb2b5f69d3048a733edd4 20478a58caed88a3b8f99b2e3a8c15e78390eb1f1ef86e66647d634db 7454055e6d46dceff998638909ce155b9ece3b860003aaa2b9af04ebd a8eb7e0fd1753d4b48b9b6bdbbb48a69a21e5aa866504951e61214f50 09dc0119c1c8a65d78f7c33031dbade9732889e42d1dfc07918c260b8 3b9b271c63e539238c807515956dff2356a3ff5e56dff00a1cf546dfc 6be1dbb6f2ed35bd2e49dc948a317911691b385014364e4f418c9fcaa f5b7fc8d5a8ff00d795b7fe873d44b78fafe8cd21f0cbd3f546ad1455 5bf4bd7fb3ff0067dc5b41b66569fcf81a5df17f12ae1d76b1e30c770 1fdd356665aa28a280327c2ff00f20d9bfebf6f3ff4a64aa1e2cff90f 7833fec2d27fe90ddd5af0faceda637d9e48d31a85d17df197dcbf699 320608c1f7e71e86a96b71dc5f5fe872b4496975637fe7c115c5c2aa5 db186e2268d59773642334a3e5e405e8776cca87f0e3e88d2b7f125ea cea28ac16d435a49f5349f4d823486dda5b3786579c5c30270adf2aec 6185caf3bb7fcadf2b56c2492fd8d64960227f2f73428c1be6c72a09c 03cf1938fc2b53331bc4bff0021af09ff00d84dff00f48ee6b7eb9dd4 7ed533dacf7b690a5dd9dc4b369d04776a0ddca2195021dca36ee5666 0013803248c115afa5cb7935987d4ada3b5b92cc1a18e4f3157070087 c0dc0e370e01c1008041a00b74566df6a1716930536a8ca559f7877da

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

a8b8c966d9b54f20e3393ce338359fa6789edf54489f4e6b5b8592736 c1a3924204823326d63e5fcbf20cf38ec3a902803a2a2b8df0f78ff4f d57c37a6eab2d86b30b5dda4574d145a55dce10ba062aaeb161c0ce03 0e0f51d6b4756d7e4b0b936b32d9413340d2a4925ce464745d980ee4e 18e147f09e41c6403a1acab6ff91ab51ffaf2b6ff00d0e7accf0bf8b6 3f12d9ddde6950c32d9db4f25bb4eb70195d91994ecc039180ac0f42a ebce72069db7fc8d5a8ff00d795b7fe873d44b78fafe8cd21f0cbd3f5 43fc4f23c3e1bd5a585da3912d266475382a421c107b1ae661bbd505c 38966cc1ced6f3d8bf5ee30074fe5d4d765796d15e59cf6d70bba19a3 68dc038ca9183fa1aa4744b52305a523ea3fc2a96926ec4bb38a5fd74 387ff008483514b38bcfbcb68eea7c080b49284932323a8c8f71cf61c 1618b535feaf1e9772f7738491612d98257383b39c77fbdd3daba8ff0 084734ffdd7eeff00d50db1f0bf20c63038e38e2a49342b4911924f35 9186194b6323d2b4ab3528b505632a50946579b17c348c9a592eacbe6 5cdc4ca1860ed799d9723a83861c1e47438359de2cff90f7833fec2d2 7fe90ddd5ef0c9c6993939e2f6f3a0cffcbcc94dd5ed1750bfd1ae55a 65fecdbc7ba2a2027cc1e4cd011938c7fadddc6490bc020e6b9e8ff00 0e3e88deb7f125eacd9a2abd8dd7dae0693c89e0db2c916d9936b1d8e c9b80feeb6ddca7ba907bd526d65135bbdb07865c5b416d37991a3485 8cd248806d504e0796096e98249c0526b5332af897fe435e13ff00b09 bff00e91dcd6fd64ea769f6ebed2e60664934e9fed86311e7ccdd0cd1 6cdc4edc8f3093827ee8fef0356edef7cebfbab6fb35cc7e42a1f3a44 c4726eddc21cf240009f4dc3be4000cfb8f08f86ee6e259ee7c3fa3cd 3cac5e4924b28d99d89c92495c924f7a863f06785de3566f0be8c8480 4ab584395f638047e55d0d140115adbc1676b0db5a431c16d0a2c7145 128548d40c05503800018005605df843c3305acd2c5e13d22e648d19d 618ac600f21032157700b93d06481ea45749450061c1e10f0d5bcd1cd 0787b478a68d83a3a5944acac0e41042f04559b18a76d6afef2585a18 9a28add03b292fb1a425c6d27e53e60c6707839038ce9d152e3769f62 94ac9aee14514551214514500666870cd689756d342ea16e259965cae c90492bc981839e370072073d3239aade21b1b9bbd5fc3135bc45e2b3 d45e79db701e5a1b4b88c1e4f3f3488303279cf4048dca2a611e48a8a e854a5ccf9985145154498daeda5c5cea9e1d96de232476b7ef2cec18Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 33

0f2d0dace81b93cfcce838c9f9bd0123668a2803ffd9ffdb004300050 3040404030504040405050506070c08070707070f0b0b090c110f1212 110f111113161c1713141a1511111821181a1d1d1f1f1f13172224221 e241c1e1f1effdb0043010505050706070e08080e1e1411141e1e1e1e 1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1 e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1effc0001108018202290301 2100021101031101ffc4001f000001050101010101010000000000000 0000102030405060708090a0bffc400b5100002010303020403050504 040000017d01020300041105122131410613516107227114328191a10 82342b1c11552d1f02433627282090a161718191a25262728292a3435 363738393a434445464748494a535455565758595a636465666768696 a737475767778797a838485868788898a92939495969798999aa2a3a4 a5a6a7a8a9aab2b3b4b5b6b7b8b9bac2c3c4c5c6c7c8c9cad2d3d4d5d 6d7d8d9dae1e2e3e4e5e6e7e8e9eaf1f2f3f4f5f6f7f8f9faffc4001f 0100030101010101010101010000000000000102030405060708090a0 bffc400b5110002010204040304070504040001027700010203110405 2131061241510761711322328108144291a1b1c109233352f0156272d 10a162434e125f11718191a262728292a35363738393a434445464748 494a535455565758595a636465666768696a737475767778797a82838 485868788898a92939495969798999aa2a3a4a5a6a7a8a9aab2b3b4b5 b6b7b8b9bac2c3c4c5c6c7c8c9cad2d3d4d5d6d7d8d9dae2e3e4e5e6e 7e8e9eaf2f3f4f5f6f7f8f9faffda000c03010002110311003f00fb2e 8a00c29fc5da0c30c9349757023480dc6f167310d1020191484f9d791 cae46083d0e6897c59a2c4ae656bf8d91e2428fa6dc07cc85963f94c7 9218ab00718c8c75c567ed6275fd4ab765f7aff327ff00848f47ff004 7c5d39f3ee4da2810484acc3f81fe5f91bd9b14cbef136916778d693b def9cb30876c7613c80c853785055082768278ed4dce28ce386a8ddad f8a5faff4b5d86378b34559638775f99a40e5625d36e19c6dc6eca84c 8c6e5eb8e181e8456bda5c41776b15d5acc93412a078e443956523208 34e334f626a509d349cbf34ff00225a2a8c828a0028a00a77fa9da594 82298cef26cdfb20b792660bea4229233ce33d7071d2abe8de20d2b58 9cc3a7cd34ac208ee32d6d222f96e3287732807383c673c1f4353ceaf 6355466e0e7d3d515ae7c5ba25bdc4b6f2c97c248ae45ab85d3ae1879

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

a46e08084c1241046339041ee2a5b2f1368b77a947a6c7732c77926fd 90cf6d2c2cc502b30c3a8e42bab63ae083d39a5ed237b16f0b57979ac bef5f95ee4171e30d060791249af73149e53edd3ae182b6fd80642639 6f947a9c81d2b5b4cbeb7d46d16ead5a4319665fde44d1b06562ac0ab 00c0820f514e3352d89a9879d38f34bf34ff2659a2a8c4f3cd7bc61e3 2f0f6a17573aa784167d0a29582dcda4c19c460f0e464e38f50bf5aec fc3bad69de20d261d534b9c4d6f2f438c1523aa91d88af27078fab3af 2c36221cb25aaecd5cf4f1582a71a31af425cd1d9f74cd0a2bd63cc0a 2800a2800a2800a2800a2800a2800a2800a2800a280387f16fc404d37 5d1e1dd0b4a9f5bd67f8e18ced48b8cfccd8eb839f41dcd6ef836ebc4 779a63cbe26d2edb4ebbf34848a1943829818270480739ef5e4e1f30a b89c5ca9d387eee374e5e7d91e9d7c0d3c3e1a33a92f7e566a3e5dd9b 7457ac798723278c2e5bc3f26bb67a4477163f626bc8a4fb5e32aa46e 8df08764801fbbc8c8233c1c4da8f8875ab1923866d174f69a5ba86d9 3cbd4d8a6e903753e56e046d048dbd18609e4563ed1f44772c2d35a4a 6d3bb5b76b5faa251e269196d5974f015b523a75e1698816f267008c2 9deac7007dde59738e70cbcf116ab1de8b7b7d22ce549351363048f7e ca1c888c85b888e00daca47386047bd3751db62638685fde969af4edf 3eda88de20d686a11588d12c5e4782e2625753ca9f25d15829f2fd645 1f36dc10e0e3009ddd22fa1d5349b3d4add5d61bb81278c38c305750c 338ef83551937ba32ab4e115784afeaadfab2d5156601450014500457 b7305959cf7975208a0823696573d1554649fc00ac1d635dd674fb74b 9ff00847d2485d247c9bb20c4163671e60087692148e370dd819e454c a4d6c8da8d28cdfbcec3b51f105e59f8362f107f6740f23471c8d6ff0 06a202ab918c3ece4fcc3f8477fc63b7d775a92f2ee16d1f4e58ecef6 3b495bfb4cee25d63705418803f2cabc12092081db32e52ec6b1a14ac dca4f77d3d3cfcc82cbc60f79a5cf343a746b7d6ba84763736b25ce02 992511ac8ac14ee424823e51d18704629fa7788b5db8d405adc787608 4aa5b49385be67922599980f97ca192bb4ee19c0f5353ed1e96469f54 a6a32729b56db4df6f3d374753456c7005140052364292a3271c0f5a0 0f31bcb7b887c33a95969b63abbe9f36912f916d7161219ec6572b882 33b72c872723e60be58e70455ed6249e7d3dede0b9f13de336a36537d a67d2dd5e10255cec5f28021446589d98048ce4b62b975e973d6b2ba7Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 35

78e8f5d5796daf5dfcbcb52ed8e937973e16d4b4b99671ae4573f686b b9632a97172855e2995b1b769d9182abf7402bdb261d6a3b8fecfd0ef 248753b4babad4cdf5d35a59b4f2db83048a03008e32a0c71f2bce2ad c5d8ca1523cd6bf7ddd959ad16ff7fe650ba4d5eeaff4f8749bdd6d2e a18afc457f79a6ba891a4789d564dd1e114e197202e360230300f69e1 1687fe11bb18edec6eac1218522fb35c230788a803692c32d8fef743d 69d34f99dc9c538ba714924fad9f9bb757b6bf81ab456c70051400514 01cc2492691e30d56eaf2def65b6bf8606b7960b692709e5ab068c845 25793b86783b8e39e2aa5b6a90e9be25d5ae5b48d5d216b1b548a3874 c99c33219895528a573f3af7c73d7838c5bb35a753b943da5da6b54ba ae96beefcbfc8cad785d4b757bb6d757809f11db5c79b05849232c6b6 b1233ae63656019187420e3e952ad82eb3a9d8d94926b72bdbc57ad06 a777a7c913c7334b0cb1b825140da03281f28210ae307065abbb1bd39 72414b4d2fd55f6b5ad7bea4f709a8a782243a869b32dfbeae8f2c56b 0492e42de072ca141629b433024743ea6bba4dbb41518079e98ebed57 04efaff005b9c75dc6deebd2eff004168ad4e6060181560083c106bcc 3e1d451e87f163c55e19b23b2c0c71de450ff0c64842428e807ef31f4 03d2bccc746d5e8545ba95be4d3bfe48f4704dba35e9f4e5bfcd35fe6 cf4fa2bd33ce0a2800a2800a2800a2800a2800a2800a2800a2800aaba c5d1b1d22f2f55771b7b77940f5daa4ff004a8a92e4839762a094a493 387f80da6c11782d75c6cc9a86ab2c92dcccdcb36d91940cfe04fd49a f42ae1ca697b3c1525e49fcdeaff33b7339b9e2ea7936be4b45f9050d 9da70707b1af44e0385d4fc35ac5dd96a4f15ad95a5cea3a6c905e411 5cb7913dcb95025c6de30a1b9c65b7007a668d47c2f7377045676fe1d d22c2c7edf0dccf0c170409400cae70100071b718ebcf231ce0e0efb1 dd0c4c636d5e8fefed7d7a1a5a6f87aea3f08dc786ae8c2b1c194b0b9 89b0db436e89d800312290a4e32095cf722a3d63c3d753e93a2d99b2b 1d44db5d9babd49ced8e6764937900ab759242d8c714dc1d84b156937 aad5bfbd7e9ea65dcf83ef351b8b6b4b8d2b4dd3f4c860bc484417064 36ef2c9148ac10a0561ba36caf0b870b8201cf6da57db3fb3a01a8430 4372140912062d1823fba48071edda9c22d3bd89c456552295dbd6faf 9efd4b5456a72051400514014b5fd3a3d5f43bed2a490c69776ef0170 325772919c7b67359b7d1f88af744b9b29acf4f8e692de489996e1996

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

462a5463e51b46482739c0e307a8995fa1ac25156e6e8ccad4b4cf135 e7845342161a747b2d638b79bb63b9d1a3c1fb9c0c2bfaf3b7de95b41 bd6d7351d49f41d265b8b9bd8e7b6bb966fdec0122890744c9c18cb6d 0c01ce3b9359da4f7474aaf4e3f0c9adfa77b79f90ade15bbb8b5d3ee 5bc8b3d46daf9649b636f59adfed427319381d3008e38208e8c6b6ec2 cef23f166a7a84b1c42d6e2dade289849962633213918e3fd671c9e94 d41ab32275e328b8fafe6bfc8d7a2b539028a0028a0028a0028a0028a 0028a0028a0028a0028a0028a0028a0028a002bcc7c3bff2713e24ff0 0b0647ffa0dbd7063be3a3fe3fd247a380f86b7f81fe713d3a8aef3ce 0a2800a2800a2800a2800a2800a2800a2800a2800accf16ffc8a9abff d78cdff00a2cd6388fe0cfd1fe45d2f8d7a9cf7c0ff00f925da3fd26f fd1d257695965ffeeb4bfc2bf23a330ff7babfe27f9b0a2bace40a280 0a2800a2800a2800a2800a2800a2800a2800a2800a2800a280397d7fc 6d65a4f8864d063d1f5cd52f62b48aee65d3ecccab1472bca91963918 24c3271fecd54ff0084fbfea4af19ff00e0afff00b2a003fe13effa92 bc67ff0082bffeca8ff84fbfea4af19ffe0aff00fb2a003fe13eff00a 92bc67ff82bff00eca8ff0084fbfea4af19ff00e0afff00b2a003fe13 effa92bc67ff0082bffeca8ff84fbfea4af19ffe0aff00fb2a00934ff 1f595c6b7a6e9375a0f88b4c9b5299e0b592fac0c71bc8b149315dd93 83b2290ffc06bafa0028a00caf166bd65e1ad11f56bf8ee6585668205 8ede2324924934a90c6aabdc979147e3583ff0009f7fd495e33ff00c1 5fff00654007fc27dff52578cfff00057ffd951ff09f7fd495e33ffc1 5ff00f654007fc27dff0052578cff00f057ff00d951ff0009f7fd495e 33ff00c15fff00654007fc27dff52578cfff00057ffd951ff09f7fd49 5e33ffc15ff00f654007fc27dff0052578cff00f057ff00d95747e1ad 62cbc41e1ed3f5dd359dacf50b68ee602ebb5b63a86191d8e0d006857 98f877fe4e27c49ff0060c8ff00f41b7ae0c77c747fc7fa48f4701f0d 6ff03fce27a7515de79c1450014500145001450014500145001450014 5001599e2dff915357ffaf19bff00459ac71610000026060f00222057 4d464301000000000001000000000000003a000000002000005cf5060 05c35070011fc19fa3fc8ba5f1af539ef81ff00f24bb47fa4dffa3a4a ed2b2cbffdd697f857e474661fef757fc4ff0036713ab6b9e2ebaf1ce a1e1df0ddbe86b169f616b752cba834a59da779d40509d00f23bff7aaPrepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 37

b6a5aafc41d34c6b7f7de04b632ee282592e14b05c6e3f419193d0679 aeb3909ac6efe24df59c5796373e06bab69903c5342f70e9229e85587 047b8a9bfe2e9ffd499ff93340156c752f8877d3ddc1657de04b996ce 5f26e52292e18c32601d8d8e8d820e0f3c8ab5ff174ff00ea4cff00c9 9a008ee67f8996d034f71378261897ef3bb5c803f134b04df136e2332 412f826540cc84a35c901949561f50410476208a008bfb73c6fa4f89b c3b61e20b7f0ecb67ad5fc963bac5a61244cb6971701be7e08ff00472 b8ff6b3dabbba0028a002b88d435cf18df78d356d0fc396fa0a5be990 db3c925fb4a5e469439e0270000b4015b53d5be20697b3fb42fbc096b bd5997cd7b85f9571b9bd946465ba0c8c9e6ac59dcfc4bbcb386f2ce7 f045c5b4f1ac90cb135c32488c32aca47041041068025ff8ba7ff5267 fe4cd55d3b52f885a935d2e9f7de04bb36939b7b8f264b87f2a50aac5 1b1d1806538f714016bfe2e9ff00d499ff009334cb89be26dbc4659e5 f04c518206e76b90324e00fa9240fa9a006dadc7c4cbb804f6d378266 889203a35c91907047d41041f422920d73c69a6f8b342d2fc456fe1f9 2d7579a6815ec1a61246c903ca09dfc107cb23f1a00ee68a00e3748ff 0092dbe27ffb16f46ffd29d4ea9fc4bbbb8d2b5ed3357d53489f56f0a 476f2c77c2dd0c8f6129642b74d10e5d02ab02ca0b479c80416c005ed 0b537b6d2ec347f0cc89e24f2ec56ed6eee6f8aab5b3b30809976b991 d82900e39d8cc48240296be359f56d14ea5e1dd0a6d43c9b5371736f2 cc21951c33ab5ba8c30698344ea54955cedf9b07340195e19d626b7f8 87e33d26cd1af6f64d52de416d35d3016f09b2b72ce4e1b6aee24051d 4938e871b3ff00099349adc3656da5b4f6d2de49626547732472a6f05 9d3cbc08b7c6577ee27953b71920031749f12eb5af4be11d2b56b6b6b 27d660babfbafb1dcbbab43008879609552bb9e74cf5caa1049dc71bb a36aa6d7e21eabe127769221610eab6bb892635924963923c9fe10d18 65f4f30a8c2aa8a00aff0010bfe46df873ff006324dffa69d42bb2a00 28a00e37e317fc8a563ff00632685ff00a76b4ad9f1bdbeb375e10d56 dfc3d2a45ab496aeb68cf21405f1c0de394cf4dc395ce7b500721e10d 7fc3aa352d6ad6db51d16f2c2d121d53c37326d92094b6622b1e7665c 9651227cb2657e6f96b72e3c5d71a6ea8749d6b485b7be96dd6e2c96d 6e0cd1dce668e129bd9136b2c93420e4631203938600039ef1e6bb796 9aa7862e75eb57d1a3b3f11ac6f2c576d25bdcc6d6370df2f0a5c8601

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

7694cee036e735d2df789ef6ce0b38ee34b820d42f124962826ba708b 1a1404bbac4c55bf78bf2853d4f3c1a00c83e3cd4956e75593454b7d2 2d7c3dfdaf3c7712bc7771b0f34b46536107063033bb9c93cf02abeaf aa5d787fe185878e6e2e659af204b7bfd40798de5cc9318c4e814e70a aac4a01d0a2f3cb6403d1eb8cf817ff002467c1bff604b4ff00d14b40 1d9d798f877fe4e27c49ff0060c8ff00f41b7ae0c77c747fc7fa48f47 01f0d6ff03fce27a7515de79c14500145001450014500145001450014 500145001599e2dff915357ffaf19bff00459ac711fc19fa3fc8ba5f1 af539ef81ff00f24bb47fa4dffa3a4aed2b2cbffdd697f857e474661f ef757fc4ff0036719a17fc966f167fd81349ff00d1b7f49e37b1f1143 e22b3f12f84ded6fefac6d5e0bbd1ee65d82eade470c0c6fd22977467 0586d6e41c6011d67214fc27e20b3f130874cf09dd4da35a47a78be2a f6e3ce8e49279a330947caa08e48655751df685200e59e18f117893c5 fa35cfd86e2cf4bd56c6d995c795ba196f1659a2f981cb0b72d0e7030 e437de18e4029786f57993e2ef8b3c3f1cc96b7375a84172d33a65644 8ec6d03c71e7abfcc0fb2f3835af63ad78935ad420bcd2adee134c3a8 5cd95c1736e2358637962f36324993cd12229dacbb7195c67e62018be 17bcd42e2efe1969fa96a573a8a5ee893eab33dc6cdcf3c715aaa676a 8c81f6891b9c9ddb4e720637f4cbd9ad7e33eb3a1c4bfe8575a2daea6 c3fbb71e6cb0b37fc091231ff6cfdcd003be217fc8dbf0e7fec649bff 4d3a85765400514005719e16ff92abe34ff00ae1a77fe812d0047e36b 3f1269fe228fc59e1358355b986cd6db50d1679761b883cc2eaf0bf44 941f300dc36b838254a8350f8575c83c4d04361e10bd7d234eb6d1ada f2dc1b70cea6579e3489d1feeac66dd8150413d03285e4022f0af88fc 47e34f0dc97da5dc59e95a8dadb46a60923f32192ef6ee60e796f209c 01b76bf539e3155bc31ac487e2af8c7c376f37d92693588ef5a591322 78974db1568e2cf05812a5bfba19783bb800d1d2359f12ebd77677da6 c73c5a45d4f710cf2b88156284798b1cb164b3f9dbd5015752bf33703 0338fe09babdbcd4fe1e69fa95edcea08de179b56696e0ae5ee00b48d 49daa01dab3cbd727e7c9e403401d1685712dafc56f11e8b1e7ec72e9 b65aa05c711cf23dc43263d985bc671ea18f5269be37ff91fbc03ff00 612bbffd219e803b2a2803cea5f10e81a0fc6df10ff6e6b9a6697e7f8 6f48f27ed97690f99b6e752ddb77119c64671d322a4bdf1af87d3c432Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 39

ea5a7fc47f0835a4966907d8ae3538b68955dcf9a183fcbc3e08c1dd8 5e5719201cff8624f05f85a4b1b8d17e267848ce9692dadeacf79108a 7df3bceac8ab2feec2492cbb572c36bedcf00d2585e787742bf497c31 f167c1d6b05c4023d423bb9a198bcbe6c9234f16d99423b34cf90432f dde38390064d75e148fc5faaf8a34ff897e0db5d52eafa2b8b673a844 40b710c50cb04a3cc1bd5c44adc636b853cede757c3daff0087747bc9 ed62f8a9e113a23dfcd7b1c02e601711f9b234ad0f99e6ed29e633107 603b4ededba8032ad755f0b68eba06a27e20785753bad024b88634835 086269ac660032106520c8a5227cf00f96471bb237f49f14f811bc65a 9f8a6efc63e188a69ada2d3ad90ead6e596089e472e70e402ef2138ec aa99c31650011f89fc53e19d73c71f0f2d345f11e8fa9dc27882691a2 b4bd8e67541a55f82c42927192067dc57a550014500711f1b6e2ded3c 0f6f77773c56f6f0f8834392596570a91a2eab684b313c0000249349e 27f1a784b50d1a4b5d2be2478634ebdf362922b83a942ea85245720a8 71b948520ae4641232339a00e67c4171e05f12ea5a86a1ac7c45f0adb 4d3e92fa5dbfd8b53877441a4593ce6667f9983a2155c617e6196dc4d 4bafea3e13f10411dd6a3f143c256dac5adaac5657569770f970ca278 273218da5258192da1f9377dd0464e72002bf88b51f0d7896c74987c4 ff00123c057c969a81babb863b98e282487c8961312a99988244cc4b1 63d000075a7c1abe956f3e957f1fc5cf074ba8e98b7168b35d5cc528b ab39590aacb89558caa6243e6038386cafcdc005cbad5fc1d79a9992f f00e25784af6caf34b7d3b54865bc8434e1998e50acbf20fde38c10dc 639279acd9bc41e15d4bc0963e05d4fc5de1b782368ad2f6f5b57b6d9 35ac0c84301bf3ba550148c0da4c87276aef00efbfe1617807fe878f0 cffe0d60ff00e2aa97c0a20fc17f0610410744b4c11ff5c96803b3af3 1f0effc9c4f893fec191ffe836f5c18ef8e8ff8ff00491e8e03e1adfe 07f9c4f41d5356d374b119d42f22b6f333b379c6ec75c7e63f3aa3ff0 0096786ff00e8316bff007d56b571b4294b9672d7e673d3c256a91e68 c740ff0084b3c37ff418b5ff00bea8ff0084b3c37ff418b5ff00beab3 fed1c37f37e0ffc8bfa8623f97f141ff096786ffe8316bff7d51ff096 786ffe8316bff7d51fda386fe6fc1ff907d4311fcbf8a0ff0084b3c37 ff418b5ff00bea8ff0084b3c37ff418b5ff00bea8fed1c37f37e0ff00 c83ea188fe5fc507fc259e1bff00a0c5affdf547fc259e1bff00a0c5a

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

ffdf547f68e1bf9bf07fe41f50c47f2fe283fe12cf0dffd062d7fefaa 3fe12cf0dffd062d7fefaa3fb470dfcdf83ff20fa8623f97f141ff000 96786ff00e8316bff007d51ff00096786ff00e8316bff007d51fda386 fe6fc1ff00907d4311fcbf8a0ff84b3c37ff00418b5ffbea8ff84b3c3 7ff00418b5ffbea8fed1c37f37e0ffc83ea188fe5fc507fc259e1bffa 0c5aff00df547fc259e1bffa0c5aff00df547f68e1bf9bf07fe41f50c 47f2fe28d0d2f52b0d52079b4fba8ae6347f2d9a33901b00e0fbe083f 8d57f16ffc8a9abffd78cdff00a2cd6b5671a98794a3b34cc54254eaa 8c96b739ef81fff0024bb47fa4dff00a3a4aed2a72fff0075a5fe15f9 1ae61fef757fc4ff003679e5fea17be1df8a9ae6a5278735dd46cf50d 274f8a19b4fb5f3977c525d9756e460812a7e755f50d7e2b9d5e4d5ed fc37f10ac2fa4b64b5692db4e5c18d5d9802afb949cb1e482464e3193 9eb390a705d68d66ba79d2bc17e3dd327b08a4862b8b7b0cc8f1c8dbe 4590bb309373fce59816dd920824e61bcff847e6bfb7bcb7f05fc43d3 da2b5167225941242b730062ca92ed7f9f059ceefbdf3b73c9a00a7a8 6a7e1e9fc4573692787be2145aa6a53a6b1188f4f45785ad847109223 d540568e33d72ac41cee39d5d32fb4ad3b55b8beb6f07fc4111dc5cb5 e4966d66c6dbed0c72d288f760316cb63eeee3bb1bb9a00aff006db7b 1d334b8747f0978e56e7469bcdd39eeb4f32044d8633013bb223319db ed856e4a8ad4d23c50d6dab6a1ac5df83fc6135f5eec8f72e93858a08 cb79712fcd9382eec49eacedd060000351d5af7c4fe32f050b5f0b788 aca1d37589af2ea7beb3f2a348ff00b3ef211cee3925e68c63debd228 00a2800af3b9752bdf0dfc4af11de4de1ad7b50b5d46decbecf3d85a0 99098d640c09dc3041238a00ada8eb915d6b33eaf6fe1ef88ba7de4f6 b15a48f6da7aed31a3bb81b5f72e73237cd8dc074239cd686ef46b336 0da4f82fc79a5c9656bf63492d74ff0099e0ce7639666dff00365b71f 9812c4302cd900867ff008479f5282f6dfc11f102c365ac767341676d 2430dd431e7cb49515f0fb773007ae188248e2aa5eeaba14de229addb 42f88916ad797835c8cc7a7a2c91bc491db97438e1767971b29c861c1 cee6c8069e937da5699a9cb796be10f884227b992ec5935a31b68e790 92f22a6ee0962cd8fba198b000f350595e59e95a76890691e12f1d89b 43cad93dcd8193309508d031dd9d8502818e8c88c4310430069e8be28 fb1dfdfeab73e0df18cba86a0c9e6bae95f2c71a0223897e6ced5dcc7Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 41

27ab3b9c282143ae354bdf1378efc2525bf863c4163069d77733dccf7 d66218d55ad658c73b8e4967518a00f46a28020b9b2b3b970f73696f3 30180648c3103f1a8bfb274bff00a06d97fdf85ff0a003fb274bff00a 06d97fdf85ff0a3fb274bff00a06d97fdf85ff0a00e3b56d334d1f1ab c3318d3ed021f0e6b04af92b8245ce9983d3dcfe75d8ff0064e97ff40 db2ff00bf0bfe14007f64e97ff40db2ff00bf0bfe147f64e97ff40db2 ff00bf0bfe1400f834fb0b7944b058db4520e8c912a91f881566800a2 80193451cd13453469246dd55d4107f0355bfb274bffa06d97fdf85ff 000a003fb274bffa06d97fdf85ff000a3fb274bffa06d97fdf85ff000 a00e3be38699a6c7f057c73247a7da23af873502acb0a8208b69391c5 763fd93a5ffd036cbfefc2ff0085001fd93a5ffd036cbfefc2ff00851 fd93a5ffd036cbfefc2ff0085001fd93a5ffd036cbfefc2ff00855b8d 163458e355445002aa8c000761400b5e63e1dff9389f127fd8323ffd0 6deb831df1d1ff1fe923d1c07c35bfc0ff389b5f10bfe460f0ffd2e7f f414aa75d70f8a5ebfa238ea7c30f4fd5992fe24d190c5baed824d288 6294c2fe5c8e4e0057dbb5b278e0d6b57555c3d4a4939adff0043928e 229d6bf23bd828ac4d828240c73d7a50057b2bdb6bd131b693ccf2666 864f948daebd473562aa51707cac984d4e2a51d828a928af7b7b6d666 017326cf3e65862f949dce7381c74e86ac5538b4937d49534db4ba050 082010720f4352515754d42cf4cb43777d308610caa58a93cb1c01c7b 9ab554e125152e8ff4ff0087254e2e4e2b746a7c37ff0057aeff00d85 3ff006de0ad9f16ff00c8a9abff00d78cdffa2cd71cff00813ffb7bf5 3ae5fc58ff00dbbf9239ef81ff00f24bb47fa4dffa3a4aed2965ff00e eb4bfc2bf22b30ff7babfe27f9b0a2bace40a28038cd47fe4b7e85ff6 2dea5ffa53635d9d00145001450014500145001450015c6de7fc96ed2 ffec5bbcffd29b5a00eca8a0028a0028a0028a0028a00e3757ff92dbe 18ff00b16f59ff00d29d32bb2a0028a0028a0028a0028a0028a00e37e 3a7fc912f1dff00d8b7a87fe93495d9500145001450015e67a12f95fb 446be5c81e76948c9ef8100fe86bcfc7bb4a8ff8d7e4cf4701f0d6ff0 003fcd1b1f10bfe460f0ffd2e7ff414ae53e224b243e0ad5248d9d310 fef197a88cb00fff008eeeaf4f0293c4a4ff00997e87979837f5576df 95fea6bcf6b6b3d92dbb220b71b5942f017690548c7a103f2ae5e2d5b 549f48d375e8af084bbbc4825b42886354925f28153b776e5c83cb60f

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

3c7415db848c6a2fde2babdbef4f5f5d11c588938d45ecddb4bfc935a 7a7bccade1fd4b5eb893456bad5ccaba88ba89945b2284f2f76d71c64 b71f4c76cf260b7f106b967a658ead757f1ddadde8935d981adc2a24a 9e56d395f9b07ccf9bb704f1dbd0583c3cea38285afa6ef4f8ff00f91 382189c4aa7cee77b6bb2d748bfd5ec694979e20d36e56defeee264be 92282d999d1a589cb61d8008808c118c8386c6720e29355b5d4d75dd1 e09b5db8756d464f28c6910754fb24870ff0026d27707c71d0faf2318 ac3464e5085d34dadfa2f5daf7ebd8de4b1134a33a96b35daef5f4dfe 5dc6e9dacea53dca697737b8b89f54b9b75b88e2552b1c4bbb0a0e464 f1d73c67db0d9350d74eb50e931ea6abb3537b49263029692336be7a9 e980cbd32060f048ed4e386a1cd2e68e89396efa5d5bf52556c44e2a5 19db551d9793bfe9dbe66d784eeef27f0e89afe7fb4dc452dc44f2ec0 9e679733a0381c0c851d2b26db52d5e4d3b41d563d404abab32ac9079 0ac90f991b3a94c61be4200392723278ac3d852552a5e3a26d2d76dff cba9d33ad53d9c3deb3b27d35d97ddaf42b586a3e20fecbf0eea93eae 92a6a72db24d07d950050cac5b6b75e78ce73d38c74ab3a45ef88b51b 7b6d585c5bdbd9ddc321285d5bca254f97b57603b81c06058e79f615d 13a1868f33e5b5aebabd75b7a6de9b9c91ad8abc63cf7eade8b4d3fcf efb19a9a86bd3e8d1c977ac337dbfc392dee228113ca91447ca9c13c8 939cf7e4638c58b29bc413d947a668f79892d74db7904b29452cf2062 030f2c8280201f2e0fdee49e9b4a8e1637bc6d14efd5f5b77fe9f9094 f13cc9735e4d792eeff4b7fc123f11dedd6afe16d4ef05df9715bdd45 079110568df0d1966dd8dc7963820818038eb5ded7998b84614e304b6 6fe7a44ecc1ca53a92949dee97cb59686a7c37ff0057aeff00d853ff0 06de0ad9f16ff00c8a9abff00d78cdffa2cd78d3fe04ffedefd4f6a5f c58ffdbbf9239ef81fff0024bb47fa4dff00a3a4aed2965ffeeb4bfc2 bf22b30ff007babfe27f9b0a2bace40a28038cd47fe4b7e85ff0062de a5ff00a53635d9d00145001450014500145001450015c6de7fc96ed2f f00ec5bbcff00d29b5a00eca8a0028a0028a0028a0028a00f36f10789 bc3f6dfb42f85f47b8d62ca2d44e81a9c22d9a50242f2cfa7b46b8eb9 658a523d4237a1af49a0028a0028a0028a0028a0028a00e37e3a7fc91 2f1dff00d8b7a87fe93495d9500145001450015e7df14f41d423bdb4f 1b787e6820d534b522613c81239a0192412481dcf523209e720570667Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 43

4a5530edc778da4bd56bff0000efcb6ac69e2129abc65a3f9e87356de 3eb3f1a6b7a3471d8cf69776d1ced3ab10c9f32a8f95ba9e9dc0ae925 8e396278a545923752acac32181ea08ee296578d8e328fb786977f8a4 8799e0de16a2a32d74fc1b6655978774eb4091c46e9ade320c76d25cb bc4983918527181c601e060600a7ae83a6adc99d63957f7a6658c4cde 5a48472ea99da1b92738ea49ebcd7b8f1b55b6f4d7cbf1f5f33c3581a 4975fbff000f4f22bc5e15d2625b6588de20b5777836ddc80a17fbd83 9e87278e94b6fe16d1e15b68c473c915adbbdac51c970ee8227c6e420 9c30381d73d07a56af33ad67a2fbbd7fcdfde671cb6947abfbdf97f92 1abe12d0ffb3e5b192de79e291163ccd73248c8aa72a118b65002011b 71c81560f87f4d36d04056e0f93319d643732194b952a4b3eedc72a48 e4f4c0ec2a5e655df6defb2ed6fbbc8d16028ae9f89147e18d2120961 f2ee5c49702eb735d485926fefab672a7939c633d2a66d074e696d66d b7024b595a647170f96723696639f98ed24739e38e949e6155bbd97dc baab7f5e7a87d469596fa79bef7febcb42c68fa6dae956ad6b67e7796 d23ca4492b487731cb72c49e49271ea4d416fa169b6ec4c11cb18f9cc 68b33ec88b677145ce10f27a631938c66b378ba9cd2969ef6fa7f5e7f 7b2bea94f962b5f776d5ff5d17dc880f8634bfecfb1b01f6c1058b87b 65177202840c0e73938ed9e99a7c1e1cd26dde468229a30e5caa2dc48 1232ff78a2e7084e4f200ea71d4d6af32adaedadfa2eaeffe7f26c859 7d2d37fbdf4febf0190f86349885baaa5c94b7b46b38d1aea42be4b0c 14209e7a0ebfdd1e94d7f09e8cc20ca5d06861f203addcaacf1673b1d 836597d8e453fed3af7be9f72f3ff3fc17617f67d1b75fbdf97f97e2c 2f7c27a15dbce65b59152731b4b0c7712471332602928ac17202a8ce3 a01e95b5146b14491a676a28519249c0f73c9ac2b62aa56846137a2ff 86fd0da8e16951939416ffd7c8d6f86ff00eaf5dffb0a7fedbc15b3e2 dff915357ffaf19bff00459af327fc09ff00dbdfa9e8cbf8b1ff00b77 f2473df03ff00e49768ff0049bff47495da52cbff00dd697f857e4566 1fef757fc4ff0036145759c81450078f7893c711d8fed53e19f093687 a8cb3dce83771c7709b3ca2b2c91485c9ce40516b203c672571d6bd86 800a2800a2800a2800a2800a2800af18d53c55e218ff006bad23c2c9e 1f89ec1fc3b3b8bef38e440ce8cce5718c896111e33fc60fb5007b3d1 4005140051401c8ebbe2cd5adfc5b71e1cd0fc2f26b13dad85bdf5cc8

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

6f63b74459e49d1146ee49cdbc99f4e3d6a2ff848bc77ff0044ebff00 2b50ff0085001ff09178effe89d7fe56a1ff000a3fe122f1dffd13aff cad43fe1401c46b3e1bf12ea7f18f42f89337c3b1f6ed274e9ecd13fb 620f98b91b1f38fe1579c7fc0c7a576fff0009178eff00e89d7fe56a1 ff0a003fe122f1dff00d13aff00cad43fe147fc245e3bff00a275ff00 95a87fc28012dfc61af41e21d174bd7bc1d269716af74f696f70ba8c5 385956de69f0cab8201481f9f5c5769400514005140051401c6fc74ff 009225e3bffb16f50ffd2692bb2a0028a0028a002bcc3c6d0bf8cbe26 5a78326999349b0b717d7a8870d2b740b9ff812f4fef1ef8c7959bc5d 4a31a3fcf249fa6eff00047a3963e4aaeaff00226fe7b2fc59a5e2fb0 b2d3353f0e59e9f6b15b5bc6b721638d7007ca9fe734caeea14e34d38 45592ff2473579ca7cb293bb6bf561456e7385140057371cfa86bd717 0f61a83d85bd9dfb5ab04552d22a7fac3f303c96f940ec013ce401d58 6518dea4d5d2e9ea736239e56841dae66595ceac965aaea92eb775245 a4ea3379913a47892de31964e1339c6707d40ad1934bd6351f0e9b9fe d8bcb5d5a780c8be53ec8a2665e23d847dd19c64fcddf23b77d5a9469 c94fd9add2b74b6efaee70508d6ab0b73bd9bf9edf719faa6a3711ea3 e2057f10cb626cd6392d22262e498f715c3292c09e38e79fa56b687a9 dff00f695bd8ea89b25bdb15bc8d3183138da258be80b2904f3f311d8 54d6a10952d23676baf3f7536ff3fbc285792aafdfbabd9aedef34bfa f23a0a2bc83d80a2800a280353e1bff00abd77fec29ff00b6f056cf8b 7fe454d5ff00ebc66ffd166b967fc09ffdbdfa9d32fe2c7feddfc91cf 7c0ff00f925da3fd26ffd1d257694b2ff00f75a5fe15f915987fbdd5f f13fcd9c26a779e2fd53e226aba0e87ae69ba4d9e9da6d95c933e986e 5e579e4b953cf9a8000205e307a9ab3fd8bf11bfe87bd1bff0009d3ff 00c935d6721cf5deb7e22b4b8bf82ebe2569301d38817af2784e758ed b2320c8e66da8a473b89031ce715acb6de3a6d423b15f881a334f2c06 e102f869cab46080486fb46deac38ce79a00a973e03f185c78b2cbc51 378c3446d56cad26b3826ff008474e5639591987fc7cfac6307b65bd4 d5a8a1f1c49accfa3a7c42d18df41025c4911f0d3822372caad9fb460 82518707b1a004b08fc6b7f22a59fc46d0a62f1f9a9b7c3ad8913715d ca7ed186191d464723d466eff62fc46ffa1ef46ffc274fff0024d0052 9eebc6da0f8afc2b6baaf88b4ad56c758d4a5b19a28b4836ee80595cdPrepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 45

c0757f39bf8add4631d18d77f40051400579ecf69abf88be23f886c07 8b75cd26cf4db7b3f220d3cc0aa4c8b233336f89c93c0efda80343fe1 07d47fe8a378cbfefeda7ff23d7357474db59b538e6f89df1017fb2a4 f2efdfec2a63b73b03e59c59ed0bb1836ece30739a00db8bc2d752de8 b58fe22f8e1c9816759545b98590920624fb36c278cedce7041c6291b e1b336af1eaede3cf169bf8eddad92e37da6f11332b3267ecfd094538 f6a00861d07cdd66ff00485f899e355bbd3e086e2e439b64558e53204 60c6d82b03e549d09c6d39c53ac3c3cd7d2a456ff00133c69be4805c4 6aed6c8648f38deb9b61919c671d37293c32e402ff00fc20fa8ffd146 f197fdfdb4ffe47acd9ac758f0d78e7c2902f8c35ed56d753bab8b7b9 b7bf3032155b5964523644a410c8bdfd6803d128a00e3748ff0092dbe 27ffb16f46ffd29d4ebb2a00f1af11c7a75af8a3c7c64f0bea5a9622b 578e5d3a31e6db3b4272e8cac248ce70c4c633c13c9ebd1681ae79771 a1473436dadeacde106bd1ac4371b62bc28600eaa31c2bbbab06c71e9 400ba0fc4a92ea1b4b9d5f413a7dbea1a1c5ac58793762e249558c6ad 132ed50afbe6882fcc4307c92b82060f8bfc47ab786fc57e2dd5a6b5b 5b6bc4f0ee9c96e2198cf18965bbb885246ca2670ccb918e42819f400 eabc5332783eefc317766d2b4375a9c3a4dd89652cd324fbc2392725a 412953b8f6693d463b6a00e37e217fc8dbf0e7fec649bff4d3a857654 00514005140051401c6fc74ff009225e3bffb16f50ffd2692bb2a0028 a0028a002bcc7c3bff002713e24ffb06471610000026060f002220574 d464301000000000001000000000000003a000000002000005cd50600 5c350700ff00a0dbd7063be3a3fe3fd247a380f86b7f81fe7136be217 fc8c1e1ff00a5cffe82954ebae1f14bd7f4471d4f861e9fab0a2b4320 a2800ac1f0e5ac9a5ea3ab58c88ec9717525f40e10ed65931b949e818 3e78cf420fae3a2949724e0fadbf07fe5730ab75384bfad4aba069379 369dafe9fab59b5ac5a95ccf22959558f9728c638e8c3f2f7ab1a3ff0 0c24167a745a54d6304b3408228ef848042ea0615d933bc363aa818cf f100723aead4a1539a2e5a5d34ede566bd7b7438e953af4a31e58ddea ad7db5ba7e9dfa868b6b7d1f89b57bbbbd3f64172d11865de8df71369 c807232791d6a58edcdef8b86a8b91058dac96a87181248eea5fea17c b519f524763899d68a93945dd72dbf0b3fd5951a52e55192b372bfe3c dff00dba2bce3d10a2800a280353e1bffabd77fec29ffb6f056cf8b7f

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

e454d5ffebc66ff00d166b967fc09ff00dbdfa9d32fe2c7feddfc91cf 7c0fff00925da3fd26ff00d1d257694b2fff0075a5fe15f915987fbdd 5ff0013fcd9c6685ff259bc59ff00604d27ff0046dfd7675d6721e5f7 b6fe27b9f1978f21f0d49a579d243668d1df46f87cc0470ca70bc67aa b0ce3af4a87c19af492d978674ff0f5ddcdae853f8225b8b48a78d1e7 86484dbc71bb39043305720ff09233834014b44f19f89b4ed3f47d435 4d65352fed8f0a43a995b8823861b5b8f32da32c3600c50fda4330663 f73e52a0e053f8a12ea5a26ade32922d4aeef2493c37a5c2d34aa8af1 c52df5c4729063550004663bb191c9cf03001dc7c50966d325f07dee9 d1949a3f10dada62351cc13068a443c7dcdadbb1d328a7f84576f401c 6fc42ff0091b7e1cffd8c937fe9a750aeca800a2800ae33c2dff2557c 69ff005c34effd025a00ecebc9ef34ff00106a5acfc4db5d1b55d3ac6 296ea14985cdb92ce0e9f6d90b2eedb165723718df19ce0e31400cd2f c437b3e98926897d79a76953f80e3d4ac2d19226366fb7e4218a65885 c03b8b038c8151c1e24d6b44b88a6bcd7ae6ee3d4b44d36e657ba5429 6724b731c0f24615400a165dc436465013dc900aff0010e1934bd63c6 11c377772c12e9be1c8e6f3e43215b79352ba8e752c7e628633213b89 c066e42800763f1326bab5d77c0b73601bcf7f10adb49b47de81ed6e3 cc53fecfcaadf5453da803b6ae37c6fff0023f7807fec2577ff00a433 d0076545007011eada5697f1b7c47fda7a9d958f9be1bd1fcbfb44eb1 efc5cea79c6e2338c8fceba6ff84b3c2bff00432e8dff0081d17ff154 01c6c732db7887c43abd87c4bf094275768bcb592d95cdb2c685179fb 480e70739200cf6c7155b4cd2bc2fa3dc692ba3f8eb4186cb4bf0fcda 34314f224b23990c6de7338954139894950a3396e46460028ffc23fe1 d92c347d3e7f893a1aae9de1b3a2a3c0d1c72970d0b2dca93310a55a0 8ced218673cf3813ea3a4e8fae4fab4de23f88de1bbb7d4b468b4d616 b1c702c72452bcb15c2e6773b95dc9db9c642f4c7201b17fac68be229 f415d6758d0ad63d32e5350b9c6a303a4d7118758d63c312103625dcd b4e0463192e13aaff0084b3c2bff432e8dff81d17ff0015401cb78c35 cd1752f1a7c3b834ed5f4fbd957c453394b7b949182ff656a03385278 c91f9d7a150014500145001450071bf1d3fe48978effec5bd43ff0049 a4aeca800a2800a2800af31f0eff00c9c4f893fec191ff00e836f5c18 ef8e8ff008ff491e8e03e1adfe07f9c4e83c7b677d3ea7a3dd5a58cf7Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 47

496fe7f98220091b8281d48f43595b354ffa00ea7ff7c27ff15552c43 a5392e493f45e48c951556117ce959757e6c366a9ff00401d4ffef84f fe2a8d9aa7fd00753ffbe13ff8aa5f5dff00a772fb83ea7ff4f23f786 cd53fe803a9ff00df09ff00c551b354ff00a00ea7ff007c27ff001547 d77fe9dcbee0fa9ffd3c8fde1b354ffa00ea7ff7c27ff1546cd53fe80 3a9ff00df09ff00c551f5dffa772fb83ea7ff004f23f786cd53fe803a 9ffdf09ffc551b354ffa00ea7ff7c27ff1547d77fe9dcbee0fa9ff00d 3c8fde1b354ff00a00ea7ff007c27ff001546cd53fe803a9ffdf09ffc 551f5dff00a772fb83ea7ff4f23f786cd53fe803a9ff00df09ff00c55 1b354ff00a00ea7ff007c27ff001547d77fe9dcbee0fa9ffd3c8fde1b 354ffa00ea7ff7c27ff1546cd53fe803a9ff00df09ff00c551f5dffa7 72fb83ea7ff004f23f786cd53fe803a9ffdf09ffc551b354ffa00ea7f f7c27ff1547d77fe9dcbee0fa9ff00d3c8fde6efc3eb5bcb6b6d564bc b39ad4dc5f99634971b8af9312e7827ba9fcab4fc5bff0022a6afff00 5e337fe8b35726de1a4ed6ba7fa913b7b6493bdadf9239ef81ff00f24 bb47fa4dffa3a4aed28cbff00dd697f857e45661fef757fc4ff003679 e5f6a17be1df8a9ae6a5278735dd46ceff0049d3e2866d3ed3ce5df14 9765d4f23040953f3ad0ff84fbfea4af19ffe0aff00fb2aeb390e6679 3c3b35f6a97ade07f88cb3eaac1af4c6f76825c0da06d59c0000e3000 18e315664d43c3ed7b6f78bf0fbc6f0496da73e9902c1692c51c56cd8 cc6a892051f757040c8dab823028032ffb4bc1116a161a149f0ffc68f 347a1cd616d6935b4d229d3c346b2215694861968864827eef3c0ab76 6de17b66ba71f0f7c7970f77a71d32e1eee2b8b8692d4927ca264998e 3e66f719383cd005ab6f1048d73a64baa7867c69a80d2816b4dda3ed6 3290e9e748dbcee7f29b6f01465a46c72a1373fe13effa92bc67ff008 2bffeca8032b52d5ef3c4de33f052daf85bc4765169daccd79753ded9 7951471ff675e4439dc792f320c7bd7a45001450015e752ea57be1bf8 95e24bc9bc35afdfdaea16f65f679ec2d3ce426359030272304122803 4bfe13effa92bc67ff0082bffecab9b9e4f0b5c4d7f2dc7c37f1acdfd a32092f924b495a3ba60368f310cbb5c6d006181180074a00b779aae8 5797b2de4ff0f3c666696c8d8395b1741f673d630a24002fb01545bc4 1e0f5d5a3d265f87be2c96ea4d21ed45b4da7348af62acaac8559c829 9751c83d6802c5b5d785ade3ba48fe17f8a7377646c2e246d28b492db

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

9ddfba672e58afcc78cfa7a0c4d61e21315e59dddff0086bc75a8cb63 13456a65d280db9c832361be694a614b7a6ec05dcd900d9ff84fbfea4 af19ffe0aff00fb2accb8d56f7c4be3cf08c96fe18f10d8c1a75ddccf 733df59f931aab5a4b18e771c92cea31ef401e8d450050d4b45d1b539 966d4b49b0bd91576abdc5b248c075c02c0f1cd55ff00844fc2bff42d 68dff80317ff00134007fc227e15ff00a16b46ff00c018bff89a3fe11 3f0affd0b5a37fe00c5ff00c4d00721ab7867c36bf19bc3502f87b491 13f877577641671ed665b8d34024639203363ea7d6baff00f844fc2bf f0042d68dff0080317ff134007fc227e15ffa16b46ffc018bff0089a3 fe113f0aff00d0b5a37fe00c5ffc4d004f63e1fd06c2e56eac744d36d 675ced961b54471918382067a56950014500145001450071bf1d3fe48 978eff00ec5bd43ff49a4aeca800a2800a2800af31f0effc9c4f893fe c191ffe836f5c18ef8e8ff8ff00491e8e03e1adfe07f9c4f4ea2bbcf3 828a0028a0028a0029370dc572320648ef8a005a2800a2800a2800a28 00accf16ffc8a9abffd78cdff00a2cd6388fe0cfd1fe45d2f8d7a9cf7 c0ff00f925da3fd26ffd1d257695965ffeeb4bfc2bf23a330ff7babfe 27f9b0a2bace40a28038cd47fe4b7e85ff62dea5ffa53635d9d001450 01450014500145001450015c6de7fc96ed2ffec5bbcffd29b5a00eca8 a0028a0028a0028a0028a00e3757ff92dbe18ff00b16f59ff00d29d32 bb2a0028a0028a0028a0028a0028a00e37e3a7fc912f1dff00d8b7a87 fe93495d9500145001450015e63e1dff9389f127fd8323ffd06deb831 df1d1ff1fe923d1c07c35bfc0ff389e9d45779e70514005140051400d 92448a3692475444059998e0003a926be2bf09fc7ad4ee3f6b8bcd62e 96f23f096a11a696a8f1b0586d037ee2e8823e50646dc58f004aded40 1f6b5140051400514005140056678b7fe454d5ffebc66ff00d166b1c4 7f067e8ff22e97c6bd4e7be07ffc92ed1fe937fe8e92bb4acb2fff007 5a5fe15f91d1987fbdd5ff13fcd8515d672051401c66a3ff25bf42ffb 16f52ffd29b1aece800a2800a2800a2800a2800a2800ae36f3fe4b769 7ff0062dde7fe94dad00765450014500145001450014500794789fc71 e1fb1fda63c29e17b89ae46a92685a842912db3b0669e6b378c860318 db6b3927a0d9cf6af57a0028a0028a0028a0028a0028a00e37e3a7fc9 12f1dffd8b7a87fe93495d9500145001450015e63e1dff009389f127f d8323ff00d06deb831df1d1ff001fe923d1c07c35bfc0ff00389e9d45Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 49

779e70514005140051400300ca558020f041ef5e65a478fd750fda3b5 df86e740b78c586831deb6a47fd64d978ff0076463ee7efb8e7aab7ad 007a6d140051400514005140056678b7fe454d5ffebc66ff00d166b1c 47f067e8ff22e97c6bd4e7be07ffc92ed1fe937fe8e92bb4acb2fff00 75a5fe15f91d1987fbdd5ff13fcd8515d672051401c66a3ff25bf42ff b16f52ffd29b1aece800a2800a2800a2800a2800a2800ae36f3fe4b76 97ff0062dde7fe94dad0076545001450014500719ad7883c55278e2f3 c37e1ad2b459c58e9b6b7d3cfa85ecb0e7ed12dca2aaaa44fd3ecc492 48fbc2ab6a1acfc43d3a349350b4f01d9a3b6d569f5a9e30c7d013072 68024bad53e245ada35e5d69fe0682d917734d26b370a8a3d4b1b7c01 537da7e297fd01bc1bff00835b9ffe47a00e6352f0978eaffe24691e3 c9f43f071d534bb0b8b284ff6adc60aca54ee3fe8f9ca81201ff5d1ab a7fb4fc52ffa037837ff0006b73ffc8f40115cea1f12eda232dc69be0 886319cb49ac5c281819ea6dfd01a97ed3f14bfe80de0dffc1adcff00 f23d00403c45e35d37c4be1ed3fc45a3f87d2d359be92c565b0d42692 489d6d67b80c55e1504116e57aff10aee6800a2800a2800a28038df8e 9ff244bc77ff0062dea1ff00a4d2576540051400514005798f877fe4e 27c49ff0060c8ff00f41b7ae0c77c747fc7fa48f4701f0d6ff03fce27 a7515de79c14500145001450015e65a2f8fadef7f691d77e1e0f0edbc 33d86851de9d5723cd986f8ff007478ced1e70c73d55bd6803d368a00 28a0028a0028a002b33c5bff0022a6afff005e337fe8b358e23f833f4 7f9174be35ea73df03ffe49768ff49bff0047495da56597ff00bad2ff 000afc8e8cc3fdeeaff89fe6c28aeb39028a00e3351ff92dfa17fd8b7 a97fe94d8d7674005140051400514005140051400571b79ff0025bb4b ff00b16ef3ff004a6d6803b2a2800a2800a28038dd23fe4b6f89ff00e c5bd1bff4a753a93e2ca23f862c4ba2b15f1068c5723383fda76c38fc 091f8d005af8a1aacfa1fc3dd7358b6b5b4bb92cecde6f22e94b45205 192180ebc66a19fc49749e363e1e99ad34f67756b3fb544d8bf8bcacb 98640c14c8ae7063c121577746054030f41f12f899f43d0ac43c3a9eb 1a8594b7cf325b20d91a346bf346d3c7925a5eaac00c6368c8355f53f 1678fa30d6bf61d134bd420f0e36ab7315cc6f70127472ad1831ca014 6c707395cf3bba50068f83b5cff00849fe22ea924b06c874dd234f96c d1b04c6d74b2bc8df52ab1afd14e3ef1abdf0caee661e23d19c830689

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

ad4963687b884c30ce89f44f3f60ff65168019f10bfe46df873ff0063 24dffa69d42bb2a0028a0028a0028a00e37e3a7fc912f1dffd8b7a87f e93495d9500145001450015e63e1dff009389f127fd8323ff00d06deb 831df1d1ff001fe923d1c07c35bfc0ff00389e9d45779e70514005140 0514005798e8be3ad3af7f692d77c031f866da1bfb1d0a3bc93591b7c d9977c7fb93f2e768f3811f375078a00f4ea2800a2800a2800a2800ac cf16ffc8a9abffd78cdff00a2cd6388fe0cfd1fe45d2f8d7a9cf7c0ff 00f925da3fd26ffd1d257695965ffeeb4bfc2bf23a330ff7babfe27f9 b0a2bace40a28038cd47fe4b7e85ff62dea5ffa53635d9d0014500145 0014500145001450015c6de7fc96ed2ffec5bbcffd29b5a00eca8a002 8a0028a00f36d43c4da07863e346bb3788756b5d323bbf0ee94b6ef72 fb04a52e751de149ea46f4cfa6e1eb4cf17f8d3e1b78934f82c65f88d 6b6090ddc1761ad2e21dccf0ca92c79f311c603a29e00ce31d280323c 43ac7c37d7ed6fed755f8bb34f05e58c965e58b9b45585242a5d902c2 3e72100cb6ec02718c9ad29fc5bf0c6eaebcebef8896b791fdb20bd58 26b984a24d0aa8565c2065e515c8520139eccc0806643ad7c2db64d36 2b5f8acd6d79a7b5c1b1b94bdb732c56f295f32df0d11478b2b19f9d5 98155f9b8a9ae75af85735ddc5cffc2ca48dae348934a702f216f91d8 b34b968c9321624e492bcfdda007d8f8bbe1fe877f677da2f8e744b97 8f4c8f4db95bcbc5437290863039744c065667070b822463fc201d3f0 bf8f3e1be8f653893c6fa24d797b7325e5eccb3802499fae012485550 a8a3248545193d68020d6fc61e17f1378e7c0167e1fd72cb539e0d7a6 9e68eda4de638c6977cbbce3a0dcea33eac077af4fa0028a0028a0028 a00e37e3a7fc912f1dff00d8b7a87fe93495d9500145001450015e63e 1dff9389f127fd8323ffd06deb831df1d1ff1fe923d1c07c35bfc0ff3 89e9d45779e705140051400514005798e89e38d1ef7f691d7bc071785 eda1d56c7428aee5d686cf3668f747fb93f2eeda3ce523e6c641e3a50 07a75140051400514005140056678b7fe454d5ff00ebc66ffd166b1c4 7f067e8ff0022e97c6bd4e7be07ff00c92ed1fe937fe8e92bb4acb2ff 00f75a5fe15f91d1987fbdd5ff0013fcd8515d672051401c66a3ff002 5bf42ff00b16f52ff00d29b1aece800a2800a2800a2800a2800a2800a e36f3fe4b7697ff62dde7fe94dad00765450014500145001450014500 71babff00c96df0c7fd8b7acffe94e995d95001450014500145001450Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 51

01450071bf1d3fe48978effec5bd43ff0049a4aeca800a2800a2800af 31f0eff00c9c4f893fec191ff00e836f5c18ef8e8ff008ff491e8e03e 1adfe07f9c4f4ea2bbcf3828a0028a0028a002bccb45f1a787eeff006 90d77c0f0785e0875cb2d0a3ba9f5b013cc9e2df1e213f2eeda3cd523 2d8c83c700d007a6d140051400514005140056678b7fe454d5ff00ebc 66ffd166b1c47f067e8ff0022e97c6bd4e7be07ff00c92ed1fe937fe8 e92bb4acb2ff00f75a5fe15f91d1987fbdd5ff0013fcd8515d6720514 01c66a3ff0025bf42ff00b16f52ff00d29b1aece800a2800a2800a280 0a2800a2800ae36f3fe4b7697ff62dde7fe94dad00765450014500145 00145001450071babff00c96df0c7fd8b7acffe94e995d95001450014 50014500145001450071bf1d3fe48978effec5bd43ff0049a4aeca800 a2800a2800af31f0eff00c9c4f893fec191ff00e836f5c18ef8e8ff00 8ff491e8e03e1adfe07f9c4f4ea2bbcf3828a0028a0028a002bccb46f 177866ebf691d73c1b6de198a2f10d9e831dcdceb5b503cd16f8ff704 e376079b19ce7b118e06403d368a0028a0028a0028a002b33c5bff002 2a6afff005e337fe8b358e23f833f47f9174be35ea73df03ffe49768f f49bff0047495da56597ff00bad2ff000afc8e8cc3fdeeaff89fe6c28 aeb39028a00e3351ff92dfa17fd8b7a97fe94d8d76740051400514005 14005140051400571b79ff0025bb4bff00b16ef3ff004a6d6803b2a28 00a2800a2800a2800a2803c8bc55e3ab1b0fda8fc23e139349d5e4bc9 f41bf8a39a38a330b09e5b6903ee2e0ed5165306e32095c039e3d7680 0a2800a2800a2800a2800a2803cdbf69fd5af347f807e31bab3d33fb4 0cba64b692a09bcb31c732989a51f29ddb03ee2bc6429e4575de01d6a f3c49e0ad1fc417fa5ff655c6a5671dd359f9fe69843ae