Anda di halaman 1dari 85

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

Mailam Engineering College


Mailam 604 304
(Approved by AICTE, New Delhi, Affiliated to Anna University, Chennai
& Accredited by National Board of Accreditation (NBA), New Delhi)

DEPARTMENT OF INFORMATION TECHNOLOGY


III YEAR / VI SEM
IT 2351 NETWORK PROGRAMMING AND MANAGEMENT
UNIT I
ELEMENTARY TCP SOCKET
SYLLABUS:
Introduction to Socket Programming Overview of TCP/IP Protocols
Introduction to Sockets Socket address Structures Byte ordering
functions address conversion functions Elementary TCP Sockets
socket, connect, bind, listen, accept, read, write, close functions Iterative
Server Concurrent Server.
PART - A
1. Group the OSI layers by function.
The seven layers of the OSI model belonging to three subgroups. Physical,
data link and network layers are the network support layers; they deal with the
physical aspects of moving data from one device to another. Session,
presentation and application layers are the user support layers; they allow
interoperability among unrelated software systems. The transport layer ensures
end-to-end reliable data transmission.
2. The transport layer creates a communication between the source and
destination. What are the three events involved in a connection?
Creating a connection involves three steps: connection establishment, data
transfer and connection release.
3. Define flow control.
Flow control refers to a set of procedures used to restrict the amount of
data. The sender can send before waiting for acknowledgment.
4. Mention the categories of flow control.
There are 2 methods have been developed to control flow of data
across communication links.

Stop and wait- send one from at a time.

Sliding window- send several frames at a time.

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 1

5. What is the function of stop and wait flow control?


In

this

method,

the

sender

sends

one

frame

and

waits

for

an

acknowledgement before sending.


6. Mention the advantage and disadvantage of stop and wait flow control.
Advantage: simplicity
Disadvantage: inefficiency.
7. What is piggy backing?
Piggybacking means combining data to send and acknowledgement
of the frame

received in one single frame. Piggy backing can save

bandwidth because the overhead from a data frame and an ACK frame can
be combined into just one frame
8. What are the network support layers and the user support layers?
Network support layers:
The network support layers are Physical layer, Data link layer and
Network

layer.

These

deals

with

electrical

specifications,

physical

connection, transport timing and reliability.


User support layers:
The user support layers are: Session layer, Presentation layer,
Application layer. These allow interoperability among unrelated software
system.
9. What are the responsibilities of network layer?
The network layer is responsible for the source-to-destination
delivery

of

packet

across

multiple

network

links.

The

specific

responsibilities of network layer include the following:

Logical addressing.

Routing.

10.What are data grams?


In datagram approach, each packet is treated independently from
all others. Even when one packet represents just a place of a multi-packet
transmission, the network treats it although it existed alone.

Packets in

this technology are referred to as datagram.


11.Define IP address.
IP address is the 32-bit number for representing a host or system
in the network. One portion of the IP address indicates a networking and
the other represents the host in a network.
12.What is function of transport layer?
The protocol in the transport layer takes care in the delivery of data
from one application program on one device to an application

program

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

on another device. They act as a link between the upper layer

protocols

and the services provided by the lower layer.


13.What are the duties of the transport layer?
The services provided by the transport layer

End-to- end delivery

Addressing

Reliable delivery

Flow control

Multiplexing

14.What is the difference between network layer delivery and the


transport layer delivery?
Network layer delivery
The

network

layer

Transport layer delivery


is

The transport layer is responsible

responsible for the source-to-

for source-to-destination delivery

destination delivery of packet

of the entire message.

across multiple network links.


15.What are the four aspects related to the reliable delivery of data?

The four aspects are,


o

Error control

Sequence control

Loss control

Duplication control

16.What is meant by segment?


At the sending and receiving end of the transmission, TCP divides
long transmissions into smaller data units and packages each into a frame
called a segment.
17.What is meant by segmentation?
When the size of the data unit received from the upper layer is too
long for the network layer datagram or data link layer frame to handle,
the transport protocol divides it into smaller usable blocks. The dividing
process is called segmentation.
18.What is meant by Concatenation?
The size of the data unit belonging to single sessions are so small
that several can fit together into a single datagram or frame, the transport
protocol combines them into a single data unit. The combining process is
called concatenation.
19.What are the types of multiplexing?
The types of multiplexing are,
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 3

Upward multiplexing

Downward multiplexing

20.What are the two possible transport services?


Two basic types of transport services are,
o

Connection service

Connectionless services

21.The transport layer creates the connection between source and


destination. What are the three events involved in the

connection?

For security, the transport layer may create a connection between


the two end ports.
A connection is a single logical path between the source and
destination that is associated with all packets in a message. Creating a
connection involves three steps:

Connection establishment

Data transfer & Connection release.

22. What is meant by congestion?


Congestion in a network occurs if user sends data into the
network at a rate greater than that allowed by network resources.
23. What is the purpose of Domain Name System?
Domain Name System can map a host name to an IP address and
conversely an IP address to host name.
24. Discuss the three main division of the domain name space.
Domain name space is divided into three different sections:
generic domains, country domains & inverse domain.

Generic domain:

Define registered hosts according to their generic


behavior, uses generic suffixes.

Country domain: Uses two characters to identify a country as the last


suffix.

Inverse domain: Finds the domain name given the IP address.

25. What is the principle difference between connectionless


communication and connection oriented communication?
Network is a connection oriented. Here user uses the connection
and then release the connection. Typically one side makes a proposal
other side can accept it. Eg:-Telephone systems.
In connectionless each message carries the full destination address
and each one is routed through the system independent of all others. The
first one send will be the first one to arrive. Eg:-Postal system.
26. State few advantages of IPv6 over IPv4.

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

Larger address space

Better header format

New options.

Allowance for extension.

Support for resource allocation.

Support for more security.

UNIT-1

27. Explain about Connection Termination.


Four actions are needed to close the connections in both directions:

Host A sends a segment announcing its wish for connection


establishment.

Host B sends a segment acknowledging the request of A. After this


the connection is closed in one direction but not in the other
direction.

When Host B has finished sending its own data, it sends a segment
to indicate that it wants to close the connection.

Host A acknowledges the request of B.

28 . What are the TCP operations?

Encapsulation and De-capsulation

Buffering

Multiplexing and De-multiplexing

Pushing Data

Urgent Data

29. What is ephemeral port number?


A client program running on the local computer defines itself with a port
number, chosen randomly by the TCP software running on the local host. This
is called Ephemeral port number.
30.What is Socket address?
The combination of an IP address and a port number is called
Socket Address.
31. What are elements needed for communications?

Local host

Local client program

Remote host

Remote server program.

32.What is Socket Interface?


Socket interface is a set of declarations, definitions and
procedures for writing client server programs.
33.Give some common APIs that supports to write client-server
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 5

programs?
Some common APIs that supports t o write client-server programs are
Socket interface
Transport Layer Interface
Stream Interface
Thread Interface
Remote Procedure call
34.Specify the Internet Address structure?
An IPV4 address is defined as a structure called in_addr,
which

contains only one field called s_addr if type in_addr_t. The

structure

holds an IP address as a 32-bit binary number.


struct in_addr
{
in_addr_t

s_addr;

};
35.What are the three socket types defined by socket interface?
The socket interface defines three types of sockets, They are
stream socket, the datagram socket and the raw socket.

Stream socket allows processes to communicate using


TCP/IP.TCP uses a pair of sockets to connect one application
program to another across the Internet.

Datagram socket allows processes to communicate using UDP.UDP


uses a pair of datagram sockets to send a message from
application program to another across the Internet.

Raw sockets provide access to ICMP or OSPF that directly use

the

services of IP.
36. What is little-endian byte order?
A computer system that uses little-endian system stores the least
significant byte of data in the starting address of the data unit.
00001010

00001010
00010111
00001110
00000110

00010111

00001110

00000110

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

37. What is Big-Endian byte order?


A computer system that uses big-endian system stores the most
significant byte of data in the starting address of the data unit.
00001010

00010111

00001110

00000110

00001010
00010111
00001110
00000110

38. What are the Byte Manipulation functions? How they are
declared?
The most common byte manipulation functions are memset,
memcpy, memcmp.
Declaration for byte manipulation functions:
void *memset (void *dest, int chr, size_t len);
void *memcpy (void *dest, const void *src, size_t len);
int memcmp (const void *first, const void *second, size_t len);
39. Explain the socket function?
The socket function is used by a process to create a socket. It
takes three integer arguments and return an integer result.
int socket(int family, int type, int protocol);
Family

-defines the protocol group

Type

-defines the type of socket

Protocol

-set to zero for TCP and UDP.

This function returns a socket descriptor, which uniquely defines


the created socket if the creation is successful. It returns -1 if there is an
error. The socket descriptor is used by other functions to refer to the
socket.
40. Explain the bind function?
The bind function binds a socket to a local socket address by

adding

the local socket address to an already created socket.


int bind(int sockfd, const sockaddress *localaddr, socklen_t
localaddrlen);
sockfd is the socket descriptor. localaddr is the pointer to the
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 7

socket address of the local machine and localaddrlen is the length of the
local socket address. To use this function, the client first needs to call the
socket function in order to use the returned value as the socket descriptor.
This function sets values for the local socket address. This function returns
an integer, 0 for success and -1 if any error.
41. How an active connection to a remote process is established?
The connect function is used by a process (usually a client) to
establish an active connection to a remote process (normally a server)
int connect(int sockfd, const struct sockaddress *serveraddr,
socklen_t serveraddrlen);
sockfd is the socket descriptor .serveraddr is the pointer to the
remote socket address ;and serveraddrlen is the length of the local socket
address. To use this function, the client first needs to call the socket function
in order to use the returned value as the socket descriptor. This function sets
values for the remote socket address. This function returns an integer, 0 for
success and -1 if any error.
42. Explain the listen function?
Only the TCP server calls the listen function. It creates a passive socket
from an unconnected socket. Before calling the listen function, the socket
must already be created and the local address fields set. This function informs
the operating system that the server is ready to accept connection through
this socket.
int listen(int sockfd, int backlog);
sockfd is the socket descriptor .backlog is the number of requests
that can be queued for this connection. This function returns an integer, 0 for
success and -1 if any error.
43. Explain the accept function?
The accept function is called by a TCP server to remove the first
Connection request from the corresponding queue. If there are no requests
the accept function is put to sleep.
int accept(int sockfd, struct sockaddress *clientaddr, socklen_t
clientaddrlen);
This function creates a new socket (child socket)that can be used by a child
server to connect to the client. All the information needed for a new socket is
provided by the operating system. The return value is the new socket
descriptor.
44. Explain sendto system call?

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

A connectionless process (process using UDP) issues the sendto system


call to send data to a process.
ssize_t sendto(int sockfd, const void *buf, size_t buflen, int flags,
const struct sockaddress *toaddr, socklen_t toaddrlen);
sockfd is the socket descriptor, buf is the pointer to the buffer holding the
message to be sent, buflen defines the length of the buffer, and the flags fields
specifies out-of-band data or look ahead messages. Normally it is set to zero.
Toaddr is the pointer to the socket address of the receiver, and toaddrlen is the
length of the socket address. The function returns the number of characters
sends if there is no error and 0 otherwise.
45. Explain recvfrom system call?
A connectionless process (process using UDP) issues the recvfrom system
call to receive from incoming queue, the datagrams send by a remote process.
ssize_t recvfrom(int sockfd, const void *buf, size_t buflen, int flags,
struct sockaddress *fromaddr, socklen_t *fromaddrlen);
sockfd is the socket descriptor, buf is the pointer to the
buffer where the message will be stored, buflen defines the length of the
buffer, and the flags fields specifies out-of-band data or lookahead
messages. Normally it is set to zero. Fromaddr is the pointer to the socket
address of the sender, and fromaddrlen is the length of the socket
address. This function returns the number of characters send if there is no
error and 0 otherwise.
46. Explain read system call?
A connection-oriented process (process using TCP) issues the read
system call to receive datagrams from a remote process.
ssize_t read(int sockfd, const void *buf, size_t buflen);
sockfd is the socket descriptor, buf is the pointer to the buffer
where the data will be stored and buflen defines the length of the buffer.
This function returns the number of bytes received if successful,0 if endof-file condition is detected, and -1 if there is an error.
47. Explain write system call?
A connection oriented process (process using TCP) issues the write
system call to send datagrams to a remote process.
ssize_t write(int sockfd, const void *buf, size_t buflen);
sockfd is the socket descriptor, buf is the pointer to the buffer
where the data to be sent is stored, buflen defines the length of the buffer.
This function returns the number of bytes sent(written) if successful ,and
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 9

-1 if there is an error.
48. How a TCP connection is terminated?
The close function is used by a process to close a socket and terminate a
TCP connection.
int close(int sockfd)
The socket descriptor is not valid after this call. This function returns an
integer, 0 for success and -1 if any error.
49. What is a parent server?
A server running infinitely and accepting connections from clients is
called a parent server.
50. What is iterative server?
If a client request to a server for a resource, which in turns gives the
resource form other server called iterative server.
51. what is concurrent server?
If many client access a server called concurrent server.
52.

What is a Socket?

(DEC 2011 / 2012)

The communication structure used for socket programming is called


socket. It is an end point of communication to which a name can be
bound. Two processes need a socket at each end to communicate

with

each other. The socket values are IP address and Port number.
53.Specify the Socket Address structure?

(MAY 2010)

The application program that use the TCP/IP protocol suite need a
structure called a socket address, which mainly holds an IP address. The
structure has five fields.
struct sockaddress
{
uint8_t

sin_len;

sa_family_t sin_family;
in_port_t sin_port;
struct in_addr
char

sin_addr;

sin_zero[8];

};
Family

- defines the protocol group

Type

- defines the type of socket

Protocol
Local socket address

- set to zero for TCP and UDP.


- defines the local socket address, a structure
of type sockaddress.

Remote socket address

- defines the remote socket address, a

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT


structure of type

UNIT-1
sockaddress.

54. What do you mean by socket abstraction?

(DEC 2007)

The socket is the basic abstraction for network communication in the


socket API

Defines an endpoint of communication for a process

Operating system maintains information about the socket and its


connection

Application references the socket for sends, receives, etc.

55. How shall local and remote socket addresses be obtained. (DEC 2007)
REMOTE AND LOCAL ADDRESS

Getsockname:
Return the local protocol address associated with a socket.
int getsockname(int sockfd, struct sockaddr * localaddr, socklen_t
*addrlen);

Getpeername:
Return the remote address associated with a socket.
int getpeername(int sockfd, struct sockaddr *peeraddr, socklen_t
*addrlen);
Both the functions returns 0 if ok else -1 on error.

56.What is the use of bind () system Call?

(MAY 2007)

The bind function binds a socket to a local socket address by

adding

the
local socket address to an already created socket.
int bind(int sockfd, const sockaddress *localaddr, socklen_t
localaddrlen);
sockfd is the socket descriptor. localaddr is the pointer to the
socket address of the local machine and localaddrlen is the length of the

local

socket address. To use this function, the client first needs to call the socket
function in order to use the returned value as the socket descriptor. This
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 11

function sets values for the local socket address. This function returns an
integer, 0 for success and -1 if any error.
57. Explain the socket structure in brief.

(MAY 2009)

Socket Programming to hold information about the address and port and
other information. Most socket functions require a pointer to a socket address
structure as an argument.
58. Distinguish between an iterative server and concurrent server.
(MAY 2009 / 2012)

Concurrent server

Iterative server

1. Many request are processed


at a same time

1. One request is processed at a


time
2. When the time taken to complete
the process is less this server is
used.

2. It is called when the time


taken to completed the
request is infinite or long.
3. The request can be of any
complexity and duration.

3. Easy to implementation

4. Server software must be


programmed explicitly to
handle requests
concurrently.

4. Server is locked while dealing with


a request.

59. Distinguish between an TCP sockets and UDP sockets


TCP SOCKET

UDP SOCKET

Reliable, Connection Oriented Protocol


Provides

guaranteed

delivery

(MAY 2011)

of

packets
Can transmit large amount of data

Unreliable, Connection Less


Protocol
Does not provide guaranteed delivery
of packets
Can transmit only limited amount of
data

Sequencing of packet is guaranteed in

In UDP it is not guaranteed that the

TCP. Means the packets that are sent

packets will reach in time to the

struct sockaddr
IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT
uint8_t sa_len;
/* length of the structure */
sa_family_t sa_family;
/* address family : AF_ XXX value */
is delivered
in time
destination.
char sa_data[14];
/* protocol specific address */
;
60. Give the structure of struct sockaddr.
Name

Header

Structure

UNIT-1

(MAY 2011)

sockaddr
<sys / socket.h>

61. Define well-known port.

(DEC 2011/2012)

The well-known port numbers are the port numbers that are
reserved for assignment by the Internet Corporation for Assigned Names
and Numbers (ICANN) for use by the application end points that
communicate using the Internet's Transmission Control Protocol (TCP) or
the User Datagram Protocol (UDP). Port numbers 0 to 1024 are reserved
for privileged services and designated as well-known ports. This list of
well-known port numbers specifies the port used by the server process as
its contact port.
62. Define socket and list out its types.

(MAY 2007)

Socket:
The communication structure used for socket programming is called
socket. It is an end point of communication to which a name can be
bound. Two processes need a socket at each end to communicate

with

each other. The socket values are IP address and Port number.
Types of Socket:
The socket interface defines three types of sockets, They are
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 13

stream socket, the datagram socket and the raw socket.

Stream socket allows processes to communicate using TCP/IP. TCP


uses a pair of sockets to connect one application program to another
across the Internet.

Datagram socket allows processes to communicate using UDP. UDP


uses

a pair of datagram

sockets

to send a message

from

application program to another across the Internet.

Raw sockets provide access to ICMP or OSPF that directly use

the

services of IP.
63. Distinguish between TCP Sockets and UDP Sockets.

TCP Socket

(MAY 2011)

UDP Socket

reliable delivery

unreliable delivery

in-order

no order guarantees

guaranteed

no notion of connection app

connection-

indicates dest. for each packet

oriented

can send or receive

bidirectional

Structure is SOCK_DGRAM

Structure is
SOCK_STREAM

64. What is meant by host byte ordering?

(MAY 2011)

HOST BYTE ORDER

It is the byte ordering used by a given system.

It can be big endian or little endian.

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 15

PART B
1. Explain the TCP layering in details with neat sketch.

Web

Clients

(MAY 2007)

OVERVIEW OF TCP / IP PROTOCOLS


and

Servers

communicate

using

the

TCP

protocol.

TCP

communicates with the data link layer using IP protocol. The actual flow of
information between the client and server goes down the protocol stack on
one side across the network and up the protocol stack on other side.
CLIENT

SERVER
APPLICATION

APPLICATION

PROTOCOL
TCP

LAYER
TRANSPORT

PROTOCOL

LAYER

IP

NETWORK

PROTOCOL

LAYER

ETHERNET
PROTOCOL

DATA
LAYER

Actual flow between client and server


ETHERNET
Figure : Client and Server communication on the same Ethernet using TCP

TCP : TRANSMISSION CONTROL PROTOCOL


TCP provides connection between clients and server. A TCP client

establishes a connection with the server, exchange data with the server
and then terminate the connection. TCP provides flow control, reliability,
full duplex and also sequences the data by associating a sequence number
with every byte that it sends. TCP contains algorithms to estimate the
round trip time (RTT) between a client and server dynamically, so that it
knows how long to wait for an acknowledgement. TCP always specifies the
no. of bytes to be sent by the peer. This is called advertised window.

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

APPLICATION LAYER
Application protocols are defined at the top layer, which implement specific
user applications and other high-level functions. Since they are at the top of the
stack, application protocols are the only ones that do not provide services to a
higher layer; they make use of services provided by the layers below.
1. FTP-FILE

TRANSFER

PROTOCOL:

the

TCP\IP

standard protocols for a transferring file s from one


machine to another machine.ftp differ from the other
applications because is use to connections to transfer
a file: control connection data connection.
2. SMTP-SIMPLE MAIL TRANSFER PROTOCOL: THE
TCP\IP Standard protocol for transferring electronic
message from one machine to another machine. it
specify how to mail systems interact and the form of
control messages they exchange to transfer mail.
3. SNMP:

SIMPLE

NETWORK

MANAGEMENT

PROTOCOL: a protocol use to manage the devices


such as hosts, router and printers.
4. TELNET-REMOTE

LOGIN:

the

TCP\IP

standard

protocol for remote terminal service .TELNET allows


an interactive users and the client system to start a
login session on a remote system. Once a login
system is established, the client process passes the
users keystrokes to the server process.
5. TFTP-TRIVIAL FILE TRANSFER PROTOCOL: it is a simple file transfer
protocol it is not complex as FTP. It does not have much code consumes less
memory, it can be used small machine .there is no security provisions. TFTP
is UDP not TCP.
6. DNS DOMAIN NAME SERVICE: the online distributed database system
used to map host names into IP address.
TRANSPORT LAYER
The Transport layer (also known as the Host-to-Host Transport layer) is
responsible for providing the Application layer with session and datagram
communication

services.

The

core

protocols

of

the

Transport

layer

are

Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).
Either of these two protocols are used by the application layer process, the choice
depends on the application's transmission reliability requirements.
The mechanisms used by the Transport layer to determine whether data has been
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 17

correctly delivered are:

Acknowledgement responses

Sequencing

Flow control

The Transport layer facilitates two types of communication:

Connection-oriented (TCP) A connection must be established at the


Transport layer of both systems before the application can transmit any data.

Connectionless (UDP) All systems do not need to establish a connection


with the recipient prior to data exchange. TCP is a more reliable form of data
exchange than UDP.

NETWORK LAYER
The Network Interface layer (also called the Network Access layer) is
responsible for placing TCP/IP packets on the network medium and receiving
TCP/IP packets off the network medium. TCP/IP was designed to be independent
of the network access method, frame format, and medium. In this way, TCP/IP
can be used to connect differing network types. This layer include LAN
technologies such as Ethernet and Token Ring and WAN technologies such as
X.25 and Frame Relay. Independence from any specific network technology gives
TCP/IP the ability to be adapted to new technologies such as Asynchronous
Transfer Mode (ATM).
DATALINK LAYER
It consists of combination of datalink and physical layers that deals with pure
hardware (wires, satellite links, network interface cards, etc.) and access
methods such as CSMA/CD (carrier sensed multiple access with collision
detection).
2. Explain the following system calls in details

CONNECT()

BIND()

LISTEN()

ACCEPT()

(MAY 2007/2009)

THE CONNECT CALL:

The connect function is used by a TCP client to establish a connection with a TCP
server.

#include<sys/socket.h>

int connect(int sockfd,const struct sochaddr *servaddr, socklen_t


addrlen);

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

Return 0 if OK

Else -1 on error

UNIT-1

Sockfd-> socket descriptor value.

Servaddr- pointer to socket address structure . the socket address


structure must contain the IP address and port number of the server.

Addrlen-> Length o fhte server address.

ERROR CODE:
Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EISCONN

If the socket is already connected.

ETIMEDOUT

If the connection is not established

ECONNREFUSED

If the port number specified is not waiting on the server for

ENETUNREACH OR

connection

EHOSTUNREACH

When the destination is unreachable from some intermediate


router.

BIND FUNCTION:

The bind function assigns a local protocol address to a socket . internet protocol
address is a combination of either 32 bit IPV4 address or 128 bits IPv6 address along
with a 16 bits TCP or UDP port number
int bind(int sockfd, const struct sockaddr *myaddr, socklen_t addrlen);

It returns 0 if OK & -1 on error

Sockfd- socket description

My addr the address of a structure that specifies an ip address and port number.

Addrlen- The size of the address structure in bytes.

Return code:
Return 0 if successful & -1 on error.
ERROR CODE
Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EADDRINUSE

If the address is already bound to it.

EFAULT

If the local address argument pointer is invalid.

PROCESS SPECIFIES
IP ADDRESS

RESULT

PORT

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 19

Wild card

Wild card

Non zero

Local IP

address
Local IP

Kernel chooses IP address and process specifies port


Process specifies IP address, kernel chooses port

Non Zero

address

Kernel chooses IP address and port

Process specifies the IP address & port

THE LISTEN CALL:


It is called only by a TCP server and it performs two functions.

1. The listen function converts an unconnected socket into a passive socket


indicating that the kernel should accept the incoming connection request directed
to this socket.
2. It specifies the maximum number of connection the kernel should queue for this
socket.
#include <sys/socket.h>
int listen (int sockfd, int backlog);
It return 0 if OK, -1 on error.
The kernel maintains two queues:
1. Incomplete connection queue:
It contains an entry for each SYN that arrived from a client for which the server
is awaiting completion of the three way handshake.
2. Completed connection queue:
It contains an entry for each client with the TCP three way handshake has
completed .
Sockfd- socket descriptor
Backlog- size of incoming connection request.
ERROR CODE:

Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

THE ACCEPT FUNCTION:


The accept is called by the TCP server to return the next completed connection

from the front of the completed connection queue. Accept creates a new socket and
return the descriptor of the new socket to the caller. The server can transfer data on
the new socket after finishing the server closes it.
#include <sys/socket.h>
int accept (int sockfd, struct sockaddr *cliaddr, socklen_t addrlen);

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

Non negative descriptor if OK


Else -1 on error
Sockfd-> socket descriptor
Cliaddr-> client IP address
Addrlen-> length of the second argument.
The connected socket is closed each time while the listening socket
remains open for the life of the server. This is supported only in stream.
ERROR CODE
Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EOPNOTSUPP

socket is not a SOCKET_STREAM.

3. Differentiate between the iterative server and concurrent server?


(MAY 2007 / 2008)

ITERATIVE SERVER:
Server:
A server is a process which offers services. A server waits for reads and
processes a clients request for a server.
Types of server:
Server can be classified based on following
1. Their communication method (connection less or connection-oriented).
2. The information they maintain(state less or state full);
3. Based on their service(iterative or concurrent).

Connection oriented servers:

Uses TCP for connection oriented communication

Provides reliable transport

Servers are simpler

Uses a separate socket for each connection.

Connection less servers:

Uses UDP for connectionless communication

Does not guarantee reliable transport

The server and client are complicative.

State less server:

Does not maintain any information about the outgoing interaction with
each client .

Requires long messages.

All information about the request must be placed in all messages.

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 21

They are less efficient.

They are more reliable.

Example: HTTP.

Stateful server:

Maintains information about the status of the ongoing information with the
client.

Maintains few information between request.

Requires smaller messages.

Is unreliable of a connection terminates abnormally.

Example: FTP.

Iterative or sequential server:


An iterative server serves single client at a time.

Handles one request at a time.

Client waits for all previous requests to be processed.

It is easier to design and implement.

It is suitable when the service time for each request is small.

It is suitable for simple services such as TIME service.

It is not suitable when the service time.

Example:

The first client request to get a file of size 200 Mbytes.

The second client requests to get a file of 20 bytes between the 2nd client
has to wait until the processing of client ends.

CONCURRENT SERVER

A server can handle multiple clients at the same time in parallel, and this type of
a server is called a concurrent server.

Concurrent Vs Iterative server

# include <arpa/inet.h>
in_addr_t inet_addr(const char *strptr);
int
inet_aton(const
char* strptr, AND
struct
in_addr *addrptr);
IT
2351 /32
NETWORK
PROGRAMMING
MANAGEMENT
Returns
bit binary
network byte ordered
IPv4 Address,
Returns 1, if string was valid,

UNIT-1

INADDR_NONE if an error.
0, if an error.
Concurrent server
Iterative server
Many request are processed at a
same time
It is called when the time taken to
completed the request is infinite or
long.

One request is processed at a time


When the time taken to complete the
process is less this server is used.

The request can be of any


complexity and duration.

Easy to implementation

Server software must be


programmed explicitly to handle
requests concurrently.

Server is locked while dealing with a


request.

4. Discuss the syntactical issues of various address conversion


functions.
(MAY 2008)
ADDRESS CONVERSION FUNCTIONS:
There are two groups of address conversion functions:
1. inet_aton, inet_addr & inet_ntoa : Converts between ASCII string and
network byte ordered binary values. Applicable only for IPv4 Address
2. inet_pton & inet_ntop : Converts presentation to numeric & numeric to
presentation. Applicable for both IPV4 & IPV6 address.
Conversion between ASCII strings & network byte order:
i. inet_aton

The function inet_aton converts the character string (dotted decimal


string ) pointed by strptr into the 32 bit binary network bytes ordered
value which is stored through pointer addrptr.

If the addrptr is a null pointer the function performs the conversion but
does not store any result.

ii. inet_addr:
It returns the 32-bit binary network byte order value & INADDR_NONE if
error.

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 23

#include <arpa/inet.h>
ude <arpa/inet.h>
int inet_pton(int
family, const
char *strptr, void *addrptr);
char *inet_ntop(int family,
const void *addrptr,
char *strptr,
- returns 1 If ok ,
size_t len);
if noton
a valid
urn pointer to result if OK &0NULL
error.presentation format ,
1 for error.
iii. inet_ntoa:
It converts 32 bits binary network byte ordered IPV4 address into its
corresponding dotted decimal string & return pointer to dotted decimal
string
Conversion between presentation and numeric :
These are used for both IPV4 & IPV6 address.
P-> Presentation ASCII string
n-> numeric binary value
i. inet_pton

Family AF_INET

[IPV4]

AF_INET6 [IPV6]

If the family is not supported it return the error -1 set to EAFNOSUPPORT.

The dotted decimal string stored in strptr is converted and stored through

the pointer addrptr.


ii. inet_ntop:
It converts from numeric (addrptr) to presentation (strptr).

len -> size of the destination to prevent the function from


overflowing the callers buffer.
IPV4 - 16 bit - INET_ADDRSTRPTR
IPV6 -

46 bit - INET6_ADDRSTRPTR

The problem with inet_ntop is it requires the caller to pass a pointer to a


binary address. The addr is normally containedin a socket addr structure requiring
the caller to know the formet of the structure and address family. To solve this we
use sock_ntop function.
General Representation
Dotted decimal
IPV4 address

inet_pton(AF_INET)
inet_aton, inet_addr

32-bit binary IPv4 address

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

inet_pton(AF_INET6)
Hexadecimal

128 bit binary IPv4

strings

mapped or IPv4 compatible


inet_ntop(AF_INET6)

IPv6 Address or IPv6 Address

5. Write notes on byte ordering functions.

(MAY 2008 / DEC 2012)

BYTE ORDERING FUNCTIONS


The bytes can be stored in memory in two ways
1. Little Endian Byte Ordering
2. Big Endian Byte Ordering
LITTLE ENDIAN BYTE ORDERING:
LSB or Low order bytes as the starting address.
Increasing Memory Address
Address A + 1

HIGH ORDER BYTE

MSB

Address A

LOW ORDER BYTE

16-BIT VALUE

LSB

Example :
10.23.14.6 can be represented in 32 bit as
MSB

LSB
00001010

00010111

00001110

00000110

00001010

00010111

00001110

00000110

A+3

A+2

A+1

Byte Order:
Address A

Application:

DEC VAX Computers Intel Microprocessors

BIG ENDIAN BYTE ORDERING:


High order bytes or MSB as the starting address.
Increasing Memory Address
Address A
Address A + 1
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 25

MSB

16-BIT VALUE

HIGH ORDER BYTE

LOW ORDER BYTE

LSB

Example :
10.23.14.6 can be represented in 32 bit as
MSB

LSB
00001010

00010111

00001110

00000110

00001010

00010111

00001110

00000110

Address A

A+1

Byte Order:
A+2

A+3

Application:

IBM Mainframe Computers

Motorola Microprocessors

PROGRAM:
/* program to find host byte order */
int main (int argc, char **argv)
{
union
{
short s;
char c[sizeof(short)];
} un;
un.s=0*0102;
printf (%s, CPU_VENDOR_OS);
If (sizeof(short)==2)
{
If (un.c[0]==1 && un.c[1]==2)
printf(big endian);
elseif (un.c[0]==2 && un.c[1]==1)
printf(Little endian);
}
}

uint16_t
ntohs(uint16_t host16bit
32 bit value);
0000004d5347726170682e43686172742e3800f439b271000000000000000000000000000000000
uint16_t
htons(uint16_t
host16bit value);
16
bit
32 bit
uint32_t
ntohl(uint32_t host32bit
value);
0000000000000000000000000000000000000000000000000000000000000000000000000000000
uint32_t
htonl(uint32_t host32bit value);
returns value in
host
byte order
IT 2351 / NETWORK PROGRAMMING
AND
MANAGEMENT
- returns value in network byte order

TYPES OF BYTE

UNIT-1

ORDER BASED ON BYTE ORDERING

FUNCTIONS
NETWORK BYTE ORDER

Networking protocols can choose their own


byte order

TCP/IP has the big endian system.

HOST BYTE ORDER

It is the byte ordering used by a given system.

It can be big endian or little endian.

BYTE CONVERSION FUNCTIONS:

From host to network byte order

htons

host to network short[16 bit int]

htonl

host to network long [32 bit int]

From network to host byte order

ntohs -

network to host short [16 bit int]

ntohl

network to host long [32 bit int]

Host byte order


htons

ntohs

htonl

ntohl
Network byte order

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 27

6. Explain the Types of Services?

Connection Oriented services

Connectionless services

Connection Oriented and Connectionless services

o In connection oriented method session is created before transmitting


data. It provides a reliable data stream as it ensures the sequential
transmission of data. In connection oriented method the process starts
from the sender computer by sending a request to start the transfer
that is to be acknowledged by the destination device before data can
be sent and hence a virtual link is established between sender and
receiver. This process is called handshaking.

o After

that

data

is

transferred

sequentially

by

processing

acknowledgements. Sliding window and Stop and wait are used to


provide flow control and Cyclic Redundancy Checks are used to provide
error detection. These methods can either be implemented in the data
link layer or in the transport layer. TCP provides a connection-oriented
service.

o In connectionless transmission there is no need to establish


connection. The sender just starts transmitting data that's why it
cannot provide the same reliability as offered by connection-oriented
method. These techniques are used in the broadcast networks. In
these networks there is need of maintaining the state information for
the sender and receiver devices that's why it can only offer a small
number of services. However the speed of connectionless networks is
better than those of connection-oriented ones because they do not
provide flow control and error detection. UDP provides connectionless
services.
o

In connection oriented communication one use guided medium. But in

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

connectionless communication there's no need of a cable. It also


named as wireless communication.

0100090000037c83080000009de3040000001610000026060f0022205
74d4643010000000000010089e8000000003a000000002000005c1507
005c350700010000006c0000000000000000000000e00200000202000
00000000000000000f6590000dd3e000020454d46000001005c350700
0c0000000100000000000000000000000000000000040000000300004
0010000f000000000000000000000000000000000e2040080a9030046
0000002c00000020000000454d462b014001001c00000010000000021
0c0db01000000600000006000000046000000d8ac0000ccac0000454d
462b224004000c000000000000001e4009000c0000000000000024400
1000c000000000000003040020010000000040000000000803f214007
000c000000000000000840000524ac000018ac00000210c0db0100000
00000000000000000000000000000000001000000ffd8ffe000104a46
494600010101006000600000ffe110bb45786966000049492a0008000
00003001a01050001000000320000001b010500010000003a00000028
010300010000000200000042000000480000000100000048000000010
0000006000301030001000000060000001a0105000100000090000000
1b0105000100000098000000280103000100000002000000010204000
1000000a0000000020204000100000013100000000000004800000001
0000004800000001000000ffd8ffe000104a464946000101010060006
00000ffdb00430006040506050406060506070706080a100a0a09090a
140e0f0c1017141818171416161a1d251f1a1b231c1616202c2023262
7292a29191f2d302d283025282928ffdb0043010707070a080a130a0a
13281a161a28282828282828282828282828282828282828282828282
82828282828282828282828282828282828282828282828282828ffc0
0011080059008003012200021101031101ffc4001f000001050101010
1010100000000000000000102030405060708090a0bffc400b5100002
010303020403050504040000017d01020300041105122131410613516
107227114328191a1082342b1c11552d1f02433627282090a16171819
1a25262728292a3435363738393a434445464748494a5354555657585
95a636465666768696a737475767778797a838485868788898a929394
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 29

95969798999aa2a3a4a5a6a7a8a9aab2b3b4b5b6b7b8b9bac2c3c4c5c
6c7c8c9cad2d3d4d5d6d7d8d9dae1e2e3e4e5e6e7e8e9eaf1f2f3f4f5
f6f7f8f9faffc4001f010003010101010101010101000000000000010
2030405060708090a0bffc400b5110002010204040304070504040001
0277000102031104052131061241510761711322328108144291a1b1c
109233352f0156272d10a162434e125f11718191a262728292a353637
38393a434445464748494a535455565758595a636465666768696a737
475767778797a82838485868788898a92939495969798999aa2a3a4a5
a6a7a8a9aab2b3b4b5b6b7b8b9bac2c3c4c5c6c7c8c9cad2d3d4d5d6d
7d8d9dae2e3e4e5e6e7e8e9eaf2f3f4f5f6f7f8f9faffda000c030100
02110311003f00fa4750d6f4c11dc5baeb961697415e305a68c989fa6
4a93d41ec6a92eb36425d3d8f8ab4d2902b0b95df17fa492b8073bbe4
c1e78eb57f52d36f6ee6f321d4bec8caac88d15ba96507dd89efb4f4c
1283208c834342f0ccda469f65689aa4d7296712c1019432ed8d44602
908caa7fd52f2413cb0e8c41562949a563a0b4b982f2d61b9b49a39ed
a64592296270c9221190ca4704107208ac4d4b5dd36e2d992cbc49a6d
a4c48c4be6c52630c09e09c72011f8e7b56878734a8b41f0f697a45b3
c9241a7dac5691bc98dccb1a0504e38ce0557d634abcd4ed0dbb6a46d
958105ada328c41041e771ec4fd339182010c49db5248b5fd1a490247
ac69eeeec02a8b942493c607349625a2d7f50b65924680410dc05772f
b5dde60d827240f917e51c0c700555d3bc3d259ea9a9df1bd134ba8ec
13ef8790abbb6aa907800390339e83df32dc19ad758d4aed63f90da5b
22b30f949124d91f8061f98a892d63fd7465c3e197a7ea8daa2b908fc
631ba9c496dbc2ee283e662319e0027777fbb9e411505e78eecacec8d
e4f75682d87fcb450ce3ef6dc704f39c8c7fb2de871baa551bb28b39f
dac3f991db515c6ea5e36b6d32d5ee2fa7b686156d858ab1c90402001
c9c13838e8739e957bc39e254d6e484dbb42f1baee3b7a8e0fbe3a823
d3208ec693a7351e769dbb8d548b7ca9ea696872b5d457175296f31ae
26831b8ed0b1cce8b85ce01c0e48ebf80c4369a3ecba9ee9b52beb859
cc8c88d70db103e301429030074efc939e987785ffe41b37fd7ede7fe
94c9599addad9d8788bc3925bd8db89af6e9ac249002a56116b3c9b40
040c1312020820855c8caa95e7a5ad38b7d8e8a8dc67248ded2acdac2
c23b66b99ee8c79fdecec59db273c9efd6add456f0f93e6ed7765772e

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

15b184cf5038ce3393ce7a9ed8025ad56866db6eecc89348170cb27db
ef3cb3379f88ee1d4302a06dc86fbbc0381dfa7048ad2b5816dadd618
cc8cab9c1924691bae7966249fc4d733ab697a7d8df6936d0d9a795aa
5fbc7741a47fdeafd9ee24c37cdf3ae46dd8d950b80000ab8eac00338
1d793ef492486e526acd98f75e2082def52dfec5aaca0b32bcb158cac
91e3d4ede41ec5777e5593a3f896f64d67578b51d36eedf4a89e35d3d
934e9cbc8bb7e72d807f8ba0da303d6bac91d6342ef90a392719acdd1
b5ab4d4e6b8b582495aeed153ed0af6b2c182c0e301c0eb827009c0c7
a8cb246783df5293c25a23ebc186b0d63035e865553e798d7ccc85e07
cd9e071e95af543c3daac1aee81a6eaf68b225b5fdb457712ca007549
10300c0123383ce09abf4005616a28d7bab5ddb18d2436f6f04d0640c
a33bcaac413eaa807e7ea6b76b2adbfe46ad47febcadbff439ea27ba5
e6690da4fcbf54667f655e7fcf1ff00c797fc6aa4be1ebb92e04bb255
3bb2c05cb004631c00c00e71d8feb9aeceaaea1610df7d9bcf7b95fb3
ccb3a79173243965e81b630debcf28d953dc1ad136b6327152dce76df
44bab785628e290aaf4324dbdbf166249fc4d5ed32c2e60be8e4963da
8b9c9dc0f63ef5bd4526efab1a56d118de1d8c4ba4ce8c58037b77f75
8a9ff8f993b8e6b0750d36ea1d634afed1bbb79c4d7d30b2123ce2485
fc8b82bb181c6ef2f2096c0dbb87271bba1f0bffc8366ff00afdbcffd
2992a878b3fe43de0cff00b0b49ffa43775950fe1c7d11a56fe24bd59
aba2dbcd1da4725df9ab70c0e55e62e42e7e50dc95dd8c676f19ce38a
b17f691df5a3dbced3ac6f8c9827785c60e787421874ec7dba558a2b5
333cd1bc1ad6de29b16d5b53bbbad3e7b9905924baa5ef9d0cbe5ccc3
cb2af853e56e5258f201c119c1eb3c2ba2369b0f9f752deb5db7989b6
6d46e2e1447bc94cac8eca24d813715e376ec1c1a3c4bff0021af09ff
00d84dff00f48ee6b7e800a6e15f6b119c7232391c7e9d6b2752d2af2
f2fed6e23d525b65824121862521260338571bb91ce78c67033903150
41a1df45a64367fdb373218e48e4370e18cae56412619b77dd6c6d200
0369c71401b5696d059dac36d690c705b428b1c51448152340301540e
000060015cb5c7c4bf035bdbcb349e30f0f948d4bb08f5089d88033c2
ab124fb0049ed5abe0bd097c31e12d23438ee24b91a7dac76fe748589
90aae0b61998a827385c90a30070055e4b0862d40ddc39899c379a918
0ab33b041bdc63e670b1aa83d8647a600316d7c7de0fbbba86dad7c57
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 31

e1f9ee26711c7147a942ceec4e02a80d9249e0015a16dff2356a3ff5e
56dff00a1cf4d5d136eacf7ff00da3a8b96b67b6fb3bcd983e6937efd
98fbe3ee83d978a75b7fc8d5a8ff00d795b7fe873d44b78fafe8cd21f
0cbd3f546934d1aac8cd22058fef92c004e33cfa71cd297512042ca1d
8160b9e4818c9c7e23f3158d7da55ec9aa59de41784ac374267b67242
30d9246769e4a90b206c72acd18c042ccd59ba6685aad969fae412496
f7126ab34b7459e77fdc349191e50ca9dcaa55006f972a4fca3680c9c
e57b58e88e1e94a3cded174fcf5fbb7f3d8eb68ae626d1f556d52d6e9
2e2dc1b482e218e407634e5e481d4c8a13033e5b87dbd78236eec2eee
990496d6ee92ecdc669a41b4e461a4661d8738233efebd69c64dbb346
5528c61152534eff00f07fe07de53f0bff00c8366ffafdbcff00d2992
a878b3fe43de0cffb0b49ff00a437757fc2ff00f20d9bfebf6f3ff4a6
4aa1e2cff90f7833fec2d27fe90ddd4d0fe1c7d1115bf892f5674b451
456a66607897fe435e13ffb09bffe91dcd6fd607897fe435e13ff00b0
9bff00e91dcd6fd00145727ac78ef45d3352fb2b5f69d3048a733edd4
20478a58caed88a3b8f99b2e3a8c15e78390eb1f1ef86e66647d634db
7454055e6d46dceff998638909ce155b9ece3b860003aaa2b9af04ebd
a8eb7e0fd1753d4b48b9b6bdbbb48a69a21e5aa866504951e61214f50
09dc0119c1c8a65d78f7c33031dbade9732889e42d1dfc07918c260b8
3b9b271c63e539238c807515956dff2356a3ff5e56dff00a1cf546dfc
6be1dbb6f2ed35bd2e49dc948a317911691b385014364e4f418c9fcaa
f5b7fc8d5a8ff00d795b7fe873d44b78fafe8cd21f0cbd3f546ad1455
5bf4bd7fb3ff0067dc5b41b66569fcf81a5df17f12ae1d76b1e30c770
1fdd356665aa28a280327c2ff00f20d9bfebf6f3ff4a64aa1e2cff90f
7833fec2d27fe90ddd5af0faceda637d9e48d31a85d17df197dcbf699
320608c1f7e71e86a96b71dc5f5fe872b4496975637fe7c115c5c2aa5
db186e2268d59773642334a3e5e405e8776cca87f0e3e88d2b7f125ea
cea28ac16d435a49f5349f4d823486dda5b3786579c5c30270adf2aec
6185caf3bb7fcadf2b56c2492fd8d64960227f2f73428c1be6c72a09c
03cf1938fc2b53331bc4bff0021af09ff00d84dff00f48ee6b7eb9dd4
7ed533dacf7b690a5dd9dc4b369d04776a0ddca2195021dca36ee5666
0013803248c115afa5cb7935987d4ada3b5b92cc1a18e4f3157070087
c0dc0e370e01c1008041a00b74566df6a1716930536a8ca559f7877da

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

a8b8c966d9b54f20e3393ce338359fa6789edf54489f4e6b5b8592736
c1a3924204823326d63e5fcbf20cf38ec3a902803a2a2b8df0f78ff4f
d57c37a6eab2d86b30b5dda4574d145a55dce10ba062aaeb161c0ce03
0e0f51d6b4756d7e4b0b936b32d9413340d2a4925ce464745d980ee4e
18e147f09e41c6403a1acab6ff91ab51ffaf2b6ff00d0e7accf0bf8b6
3f12d9ddde6950c32d9db4f25bb4eb70195d91994ecc039180ac0f42a
ebce72069db7fc8d5a8ff00d795b7fe873d44b78fafe8cd21f0cbd3f5
43fc4f23c3e1bd5a585da3912d266475382a421c107b1ae661bbd505c
38966cc1ced6f3d8bf5ee30074fe5d4d765796d15e59cf6d70bba19a3
68dc038ca9183fa1aa4744b52305a523ea3fc2a96926ec4bb38a5fd74
387ff008483514b38bcfbcb68eea7c080b49284932323a8c8f71cf61c
1618b535feaf1e9772f7738491612d98257383b39c77fbdd3daba8ff0
084734ffdd7eeff00d50db1f0bf20c63038e38e2a49342b4911924f35
9186194b6323d2b4ab3528b505632a50946579b17c348c9a592eacbe6
5cdc4ca1860ed799d9723a83861c1e47438359de2cff90f7833fec2d2
7fe90ddd5ef0c9c6993939e2f6f3a0cffcbcc94dd5ed1750bfd1ae55a
65fecdbc7ba2a2027cc1e4cd011938c7fadddc6490bc020e6b9e8ff00
0e3e88deb7f125eacd9a2abd8dd7dae0693c89e0db2c916d9936b1d8e
c9b80feeb6ddca7ba907bd526d65135bbdb07865c5b416d37991a3485
8cd248806d504e0796096e98249c0526b5332af897fe435e13ff00b09
bff00e91dcd6fd64ea769f6ebed2e60664934e9fed86311e7ccdd0cd1
6cdc4edc8f3093827ee8fef0356edef7cebfbab6fb35cc7e42a1f3a44
c4726eddc21cf240009f4dc3be4000cfb8f08f86ee6e259ee7c3fa3cd
3cac5e4924b28d99d89c92495c924f7a863f06785de3566f0be8c8480
4ab584395f638047e55d0d140115adbc1676b0db5a431c16d0a2c7145
128548d40c05503800018005605df843c3305acd2c5e13d22e648d19d
618ac600f21032157700b93d06481ea45749450061c1e10f0d5bcd1cd
0787b478a68d83a3a5944acac0e41042f04559b18a76d6afef2585a18
9a28add03b292fb1a425c6d27e53e60c6707839038ce9d152e3769f62
94ac9aee14514551214514500666870cd689756d342ea16e259965cae
c90492bc981839e370072073d3239aade21b1b9bbd5fc3135bc45e2b3
d45e79db701e5a1b4b88c1e4f3f3488303279cf4048dca2a611e48a8a
e854a5ccf9985145154498daeda5c5cea9e1d96de232476b7ef2cec18
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 33

0f2d0dace81b93cfcce838c9f9bd0123668a2803ffd9ffdb004300050
3040404030504040405050506070c08070707070f0b0b090c110f1212
110f111113161c1713141a1511111821181a1d1d1f1f1f13172224221
e241c1e1f1effdb0043010505050706070e08080e1e1411141e1e1e1e
1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1
e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1e1effc0001108018202290301
2100021101031101ffc4001f000001050101010101010000000000000
0000102030405060708090a0bffc400b5100002010303020403050504
040000017d01020300041105122131410613516107227114328191a10
82342b1c11552d1f02433627282090a161718191a25262728292a3435
363738393a434445464748494a535455565758595a636465666768696
a737475767778797a838485868788898a92939495969798999aa2a3a4
a5a6a7a8a9aab2b3b4b5b6b7b8b9bac2c3c4c5c6c7c8c9cad2d3d4d5d
6d7d8d9dae1e2e3e4e5e6e7e8e9eaf1f2f3f4f5f6f7f8f9faffc4001f
0100030101010101010101010000000000000102030405060708090a0
bffc400b5110002010204040304070504040001027700010203110405
2131061241510761711322328108144291a1b1c109233352f0156272d
10a162434e125f11718191a262728292a35363738393a434445464748
494a535455565758595a636465666768696a737475767778797a82838
485868788898a92939495969798999aa2a3a4a5a6a7a8a9aab2b3b4b5
b6b7b8b9bac2c3c4c5c6c7c8c9cad2d3d4d5d6d7d8d9dae2e3e4e5e6e
7e8e9eaf2f3f4f5f6f7f8f9faffda000c03010002110311003f00fb2e
8a00c29fc5da0c30c9349757023480dc6f167310d1020191484f9d791
cae46083d0e6897c59a2c4ae656bf8d91e2428fa6dc07cc85963f94c7
9218ab00718c8c75c567ed6275fd4ab765f7aff327ff00848f47ff004
7c5d39f3ee4da2810484acc3f81fe5f91bd9b14cbef136916778d693b
def9cb30876c7613c80c853785055082768278ed4dce28ce386a8ddad
f8a5faff4b5d86378b34559638775f99a40e5625d36e19c6dc6eca84c
8c6e5eb8e181e8456bda5c41776b15d5acc93412a078e443956523208
34e334f626a509d349cbf34ff00225a2a8c828a0028a00a77fa9da594
82298cef26cdfb20b792660bea4229233ce33d7071d2abe8de20d2b58
9cc3a7cd34ac208ee32d6d222f96e3287732807383c673c1f4353ceaf
6355466e0e7d3d515ae7c5ba25bdc4b6f2c97c248ae45ab85d3ae1879

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

a46e08084c1241046339041ee2a5b2f1368b77a947a6c7732c77926fd
90cf6d2c2cc502b30c3a8e42bab63ae083d39a5ed237b16f0b57979ac
bef5f95ee4171e30d060791249af73149e53edd3ae182b6fd80642639
6f947a9c81d2b5b4cbeb7d46d16ead5a4319665fde44d1b06562ac0ab
00c0820f514e3352d89a9879d38f34bf34ff2659a2a8c4f3cd7bc61e3
2f0f6a17573aa784167d0a29582dcda4c19c460f0e464e38f50bf5aec
fc3bad69de20d261d534b9c4d6f2f438c1523aa91d88af27078fab3af
2c36221cb25aaecd5cf4f1582a71a31af425cd1d9f74cd0a2bd63cc0a
2800a2800a2800a2800a2800a2800a2800a2800a280387f16fc404d37
5d1e1dd0b4a9f5bd67f8e18ced48b8cfccd8eb839f41dcd6ef836ebc4
779a63cbe26d2edb4ebbf34848a1943829818270480739ef5e4e1f30a
b89c5ca9d387eee374e5e7d91e9d7c0d3c3e1a33a92f7e566a3e5dd9b
7457ac798723278c2e5bc3f26bb67a4477163f626bc8a4fb5e32aa46e
8df08764801fbbc8c8233c1c4da8f8875ab1923866d174f69a5ba86d9
3cbd4d8a6e903753e56e046d048dbd18609e4563ed1f44772c2d35a4a
6d3bb5b76b5faa251e269196d5974f015b523a75e1698816f267008c2
9deac7007dde59738e70cbcf116ab1de8b7b7d22ce549351363048f7e
ca1c888c85b888e00daca47386047bd3751db62638685fde969af4edf
3eda88de20d686a11588d12c5e4782e2625753ca9f25d15829f2fd645
1f36dc10e0e3009ddd22fa1d5349b3d4add5d61bb81278c38c305750c
338ef83551937ba32ab4e115784afeaadfab2d5156601450014500457
b7305959cf7975208a0823696573d1554649fc00ac1d635dd674fb74b
9ff00847d2485d247c9bb20c4163671e60087692148e370dd819e454c
a4d6c8da8d28cdfbcec3b51f105e59f8362f107f6740f23471c8d6ff0
06a202ab918c3ece4fcc3f8477fc63b7d775a92f2ee16d1f4e58ecef6
3b495bfb4cee25d63705418803f2cabc12092081db32e52ec6b1a14ac
dca4f77d3d3cfcc82cbc60f79a5cf343a746b7d6ba84763736b25ce02
992511ac8ac14ee424823e51d18704629fa7788b5db8d405adc787608
4aa5b49385be67922599980f97ca192bb4ee19c0f5353ed1e96469f54
a6a32729b56db4df6f3d374753456c7005140052364292a3271c0f5a0
0f31bcb7b887c33a95969b63abbe9f36912f916d7161219ec6572b882
33b72c872723e60be58e70455ed6249e7d3dede0b9f13de336a36537d
a67d2dd5e10255cec5f28021446589d98048ce4b62b975e973d6b2ba7
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 35

78e8f5d5796daf5dfcbcb52ed8e937973e16d4b4b99671ae4573f686b
b9632a97172855e2995b1b769d9182abf7402bdb261d6a3b8fecfd0ef
248753b4babad4cdf5d35a59b4f2db83048a03008e32a0c71f2bce2ad
c5d8ca1523cd6bf7ddd959ad16ff7fe650ba4d5eeaff4f8749bdd6d2e
a18afc457f79a6ba891a4789d564dd1e114e197202e360230300f69e1
1687fe11bb18edec6eac1218522fb35c230788a803692c32d8fef743d
69d34f99dc9c538ba714924fad9f9bb757b6bf81ab456c70051400514
01cc2492691e30d56eaf2def65b6bf8606b7960b692709e5ab068c845
25793b86783b8e39e2aa5b6a90e9be25d5ae5b48d5d216b1b548a3874
c99c33219895528a573f3af7c73d7838c5bb35a753b943da5da6b54ba
ae96beefcbfc8cad785d4b757bb6d757809f11db5c79b05849232c6b6
b1233ae63656019187420e3e952ad82eb3a9d8d94926b72bdbc57ad06
a777a7c913c7334b0cb1b825140da03281f28210ae307065abbb1bd39
72414b4d2fd55f6b5ad7bea4f709a8a782243a869b32dfbeae8f2c56b
0492e42de072ca141629b433024743ea6bba4dbb41518079e98ebed57
04efaff005b9c75dc6deebd2eff004168ad4e6060181560083c106bcc
3e1d451e87f163c55e19b23b2c0c71de450ff0c64842428e807ef31f4
03d2bccc746d5e8545ba95be4d3bfe48f4704dba35e9f4e5bfcd35fe6
cf4fa2bd33ce0a2800a2800a2800a2800a2800a2800a2800a2800aaba
c5d1b1d22f2f55771b7b77940f5daa4ff004a8a92e4839762a094a493
387f80da6c11782d75c6cc9a86ab2c92dcccdcb36d91940cfe04fd49a
f42ae1ca697b3c1525e49fcdeaff33b7339b9e2ea7936be4b45f9050d
9da70707b1af44e0385d4fc35ac5dd96a4f15ad95a5cea3a6c905e411
5cb7913dcb95025c6de30a1b9c65b7007a668d47c2f7377045676fe1d
d22c2c7edf0dccf0c170409400cae70100071b718ebcf231ce0e0efb1
dd0c4c636d5e8fefed7d7a1a5a6f87aea3f08dc786ae8c2b1c194b0b9
89b0db436e89d800312290a4e32095cf722a3d63c3d753e93a2d99b2b
1d44db5d9babd49ced8e6764937900ab759242d8c714dc1d84b156937
aad5bfbd7e9ea65dcf83ef351b8b6b4b8d2b4dd3f4c860bc484417064
36ef2c9148ac10a0561ba36caf0b870b8201cf6da57db3fb3a01a8430
4372140912062d1823fba48071edda9c22d3bd89c456552295dbd6faf
9efd4b5456a72051400514014b5fd3a3d5f43bed2a490c69776ef0170
325772919c7b67359b7d1f88af744b9b29acf4f8e692de489996e1996

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

462a5463e51b46482739c0e307a8995fa1ac25156e6e8ccad4b4cf135
e7845342161a747b2d638b79bb63b9d1a3c1fb9c0c2bfaf3b7de95b41
bd6d7351d49f41d265b8b9bd8e7b6bb966fdec0122890744c9c18cb6d
0c01ce3b9359da4f7474aaf4e3f0c9adfa77b79f90ade15bbb8b5d3ee
5bc8b3d46daf9649b636f59adfed427319381d3008e38208e8c6b6ec2
cef23f166a7a84b1c42d6e2dade289849962633213918e3fd671c9e94
d41ab32275e328b8fafe6bfc8d7a2b539028a0028a0028a0028a0028a
0028a0028a0028a0028a0028a0028a0028a002bcc7c3bff2713e24ff0
0b0647ffa0dbd7063be3a3fe3fd247a380f86b7f81fe713d3a8aef3ce
0a2800a2800a2800a2800a2800a2800a2800a2800accf16ffc8a9abff
d78cdff00a2cd6388fe0cfd1fe45d2f8d7a9cf7c0ff00f925da3fd26f
fd1d257695965ffeeb4bfc2bf23a330ff7babfe27f9b0a2bace40a280
0a2800a2800a2800a2800a2800a2800a2800a2800a2800a280397d7fc
6d65a4f8864d063d1f5cd52f62b48aee65d3ecccab1472bca91963918
24c3271fecd54ff0084fbfea4af19ff00e0afff00b2a003fe13effa92
bc67ff0082bffeca8ff84fbfea4af19ffe0aff00fb2a003fe13eff00a
92bc67ff82bff00eca8ff0084fbfea4af19ff00e0afff00b2a003fe13
effa92bc67ff0082bffeca8ff84fbfea4af19ffe0aff00fb2a00934ff
1f595c6b7a6e9375a0f88b4c9b5299e0b592fac0c71bc8b149315dd93
83b2290ffc06bafa0028a00caf166bd65e1ad11f56bf8ee6585668205
8ede2324924934a90c6aabdc979147e3583ff0009f7fd495e33ff00c1
5fff00654007fc27dff52578cfff00057ffd951ff09f7fd495e33ffc1
5ff00f654007fc27dff0052578cff00f057ff00d951ff0009f7fd495e
33ff00c15fff00654007fc27dff52578cfff00057ffd951ff09f7fd49
5e33ffc15ff00f654007fc27dff0052578cff00f057ff00d95747e1ad
62cbc41e1ed3f5dd359dacf50b68ee602ebb5b63a86191d8e0d006857
98f877fe4e27c49ff0060c8ff00f41b7ae0c77c747fc7fa48f4701f0d
6ff03fce27a7515de79c1450014500145001450014500145001450014
5001599e2dff915357ffaf19bff00459ac71610000026060f00222057
4d464301000000000001000000000000003a000000002000005cf5060
05c35070011fc19fa3fc8ba5f1af539ef81ff00f24bb47fa4dffa3a4a
ed2b2cbffdd697f857e474661fef757fc4ff0036713ab6b9e2ebaf1ce
a1e1df0ddbe86b169f616b752cba834a59da779d40509d00f23bff7aa
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 37

b6a5aafc41d34c6b7f7de04b632ee282592e14b05c6e3f419193d0679
aeb3909ac6efe24df59c5796373e06bab69903c5342f70e9229e85587
047b8a9bfe2e9ffd499ff93340156c752f8877d3ddc1657de04b996ce
5f26e52292e18c32601d8d8e8d820e0f3c8ab5ff174ff00ea4cff00c9
9a008ee67f8996d034f71378261897ef3bb5c803f134b04df136e2332
412f826540cc84a35c901949561f50410476208a008bfb73c6fa4f89b
c3b61e20b7f0ecb67ad5fc963bac5a61244cb6971701be7e08ff00472
b8ff6b3dabbba0028a002b88d435cf18df78d356d0fc396fa0a5be990
db3c925fb4a5e469439e0270000b4015b53d5be20697b3fb42fbc096b
bd5997cd7b85f9571b9bd946465ba0c8c9e6ac59dcfc4bbcb386f2ce7
f045c5b4f1ac90cb135c32488c32aca47041041068025ff8ba7ff5267
fe4cd55d3b52f885a935d2e9f7de04bb36939b7b8f264b87f2a50aac5
1b1d1806538f714016bfe2e9ff00d499ff009334cb89be26dbc4659e5
f04c518206e76b90324e00fa9240fa9a006dadc7c4cbb804f6d378266
889203a35c91907047d41041f422920d73c69a6f8b342d2fc456fe1f9
2d7579a6815ec1a61246c903ca09dfc107cb23f1a00ee68a00e3748ff
0092dbe27ffb16f46ffd29d4ea9fc4bbbb8d2b5ed3357d53489f56f0a
476f2c77c2dd0c8f6129642b74d10e5d02ab02ca0b479c80416c005ed
0b537b6d2ec347f0cc89e24f2ec56ed6eee6f8aab5b3b30809976b991
d82900e39d8cc48240296be359f56d14ea5e1dd0a6d43c9b5371736f2
cc21951c33ab5ba8c30698344ea54955cedf9b07340195e19d626b7f8
87e33d26cd1af6f64d52de416d35d3016f09b2b72ce4e1b6aee24051d
4938e871b3ff00099349adc3656da5b4f6d2de49626547732472a6f05
9d3cbc08b7c6577ee27953b71920031749f12eb5af4be11d2b56b6b6b
27d660babfbafb1dcbbab43008879609552bb9e74cf5caa1049dc71bb
a36aa6d7e21eabe127769221610eab6bb892635924963923c9fe10d18
65f4f30a8c2aa8a00aff0010bfe46df873ff006324dffa69d42bb2a00
28a00e37e317fc8a563ff00632685ff00a76b4ad9f1bdbeb375e10d56
dfc3d2a45ab496aeb68cf21405f1c0de394cf4dc395ce7b500721e10d
7fc3aa352d6ad6db51d16f2c2d121d53c37326d92094b6622b1e7665c
9651227cb2657e6f96b72e3c5d71a6ea8749d6b485b7be96dd6e2c96d
6e0cd1dce668e129bd9136b2c93420e4631203938600039ef1e6bb796
9aa7862e75eb57d1a3b3f11ac6f2c576d25bdcc6d6370df2f0a5c8601

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

7694cee036e735d2df789ef6ce0b38ee34b820d42f124962826ba708b
1a1404bbac4c55bf78bf2853d4f3c1a00c83e3cd4956e75593454b7d2
2d7c3dfdaf3c7712bc7771b0f34b46536107063033bb9c93cf02abeaf
aa5d787fe185878e6e2e659af204b7bfd40798de5cc9318c4e814e70a
aac4a01d0a2f3cb6403d1eb8cf817ff002467c1bff604b4ff00d14b40
1d9d798f877fe4e27c49ff0060c8ff00f41b7ae0c77c747fc7fa48f47
01f0d6ff03fce27a7515de79c14500145001450014500145001450014
500145001599e2dff915357ffaf19bff00459ac711fc19fa3fc8ba5f1
af539ef81ff00f24bb47fa4dffa3a4aed2b2cbffdd697f857e474661f
ef757fc4ff0036719a17fc966f167fd81349ff00d1b7f49e37b1f1143
e22b3f12f84ded6fefac6d5e0bbd1ee65d82eade470c0c6fd22977467
0586d6e41c6011d67214fc27e20b3f130874cf09dd4da35a47a78be2a
f6e3ce8e49279a330947caa08e48655751df685200e59e18f117893c5
fa35cfd86e2cf4bd56c6d995c795ba196f1659a2f981cb0b72d0e7030
e437de18e4029786f57993e2ef8b3c3f1cc96b7375a84172d33a65644
8ec6d03c71e7abfcc0fb2f3835af63ad78935ad420bcd2adee134c3a8
5cd95c1736e2358637962f36324993cd12229dacbb7195c67e62018be
17bcd42e2efe1969fa96a573a8a5ee893eab33dc6cdcf3c715aaa676a
8c81f6891b9c9ddb4e720637f4cbd9ad7e33eb3a1c4bfe8575a2daea6
c3fbb71e6cb0b37fc091231ff6cfdcd003be217fc8dbf0e7fec649bff
4d3a85765400514005719e16ff92abe34ff00ae1a77fe812d0047e36b
3f1269fe228fc59e1358355b986cd6db50d1679761b883cc2eaf0bf44
941f300dc36b838254a8350f8575c83c4d04361e10bd7d234eb6d1ada
f2dc1b70cea6579e3489d1feeac66dd8150413d03285e4022f0af88fc
47e34f0dc97da5dc59e95a8dadb46a60923f32192ef6ee60e796f209c
01b76bf539e3155bc31ac487e2af8c7c376f37d92693588ef5a591322
78974db1568e2cf05812a5bfba19783bb800d1d2359f12ebd77677da6
c73c5a45d4f710cf2b88156284798b1cb164b3f9dbd5015752bf33703
0338fe09babdbcd4fe1e69fa95edcea08de179b56696e0ae5ee00b48d
49daa01dab3cbd727e7c9e403401d1685712dafc56f11e8b1e7ec72e9
b65aa05c711cf23dc43263d985bc671ea18f5269be37ff91fbc03ff00
612bbffd219e803b2a2803cea5f10e81a0fc6df10ff6e6b9a6697e7f8
6f48f27ed97690f99b6e752ddb77119c64671d322a4bdf1af87d3c432
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 39

ea5a7fc47f0835a4966907d8ae3538b68955dcf9a183fcbc3e08c1dd8
5e5719201cff8624f05f85a4b1b8d17e267848ce9692dadeacf79108a
7df3bceac8ab2feec2492cbb572c36bedcf00d2585e787742bf497c31
f167c1d6b05c4023d423bb9a198bcbe6c9234f16d99423b34cf90432f
dde38390064d75e148fc5faaf8a34ff897e0db5d52eafa2b8b673a844
40b710c50cb04a3cc1bd5c44adc636b853cede757c3daff0087747bc9
ed62f8a9e113a23dfcd7b1c02e601711f9b234ad0f99e6ed29e633107
603b4ededba8032ad755f0b68eba06a27e20785753bad024b88634835
086269ac660032106520c8a5227cf00f96471bb237f49f14f811bc65a
9f8a6efc63e188a69ada2d3ad90ead6e596089e472e70e402ef2138ec
aa99c31650011f89fc53e19d73c71f0f2d345f11e8fa9dc27882691a2
b4bd8e67541a55f82c42927192067dc57a550014500711f1b6e2ded3c
0f6f77773c56f6f0f8834392596570a91a2eab684b313c0000249349e
27f1a784b50d1a4b5d2be2478634ebdf362922b83a942ea85245720a8
71b948520ae4641232339a00e67c4171e05f12ea5a86a1ac7c45f0adb
4d3e92fa5dbfd8b53877441a4593ce6667f9983a2155c617e6196dc4d
4bafea3e13f10411dd6a3f143c256dac5adaac5657569770f970ca278
273218da5258192da1f9377dd0464e72002bf88b51f0d7896c74987c4
ff00123c057c969a81babb863b98e282487c8961312a99988244cc4b1
63d000075a7c1abe956f3e957f1fc5cf074ba8e98b7168b35d5cc528b
ab39590aacb89558caa6243e6038386cafcdc005cbad5fc1d79a9992f
f00e25784af6caf34b7d3b54865bc8434e1998e50acbf20fde38c10dc
639279acd9bc41e15d4bc0963e05d4fc5de1b782368ad2f6f5b57b6d9
35ac0c84301bf3ba550148c0da4c87276aef00efbfe1617807fe878f0
cffe0d60ff00e2aa97c0a20fc17f0610410744b4c11ff5c96803b3af3
1f0effc9c4f893fec191ffe836f5c18ef8e8ff8ff00491e8e03e1adfe
07f9c4f41d5356d374b119d42f22b6f333b379c6ec75c7e63f3aa3ff0
0096786ff00e8316bff007d56b571b4294b9672d7e673d3c256a91e68
c740ff0084b3c37ff418b5ff00bea8ff0084b3c37ff418b5ff00beab3
fed1c37f37e0ffc8bfa8623f97f141ff096786ffe8316bff7d51ff096
786ffe8316bff7d51fda386fe6fc1ff907d4311fcbf8a0ff0084b3c37
ff418b5ff00bea8ff0084b3c37ff418b5ff00bea8fed1c37f37e0ff00
c83ea188fe5fc507fc259e1bff00a0c5affdf547fc259e1bff00a0c5a

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

ffdf547f68e1bf9bf07fe41f50c47f2fe283fe12cf0dffd062d7fefaa
3fe12cf0dffd062d7fefaa3fb470dfcdf83ff20fa8623f97f141ff000
96786ff00e8316bff007d51ff00096786ff00e8316bff007d51fda386
fe6fc1ff00907d4311fcbf8a0ff84b3c37ff00418b5ffbea8ff84b3c3
7ff00418b5ffbea8fed1c37f37e0ffc83ea188fe5fc507fc259e1bffa
0c5aff00df547fc259e1bffa0c5aff00df547f68e1bf9bf07fe41f50c
47f2fe28d0d2f52b0d52079b4fba8ae6347f2d9a33901b00e0fbe083f
8d57f16ffc8a9abffd78cdff00a2cd6b5671a98794a3b34cc54254eaa
8c96b739ef81fff0024bb47fa4dff00a3a4aed2a72fff0075a5fe15f9
1ae61fef757fc4ff003679e5fea17be1df8a9ae6a5278735dd46cf50d
274f8a19b4fb5f3977c525d9756e460812a7e755f50d7e2b9d5e4d5ed
fc37f10ac2fa4b64b5692db4e5c18d5d9802afb949cb1e482464e3193
9eb390a705d68d66ba79d2bc17e3dd327b08a4862b8b7b0cc8f1c8dbe
4590bb309373fce59816dd920824e61bcff847e6bfb7bcb7f05fc43d3
da2b5167225941242b730062ca92ed7f9f059ceefbdf3b73c9a00a7a8
6a7e1e9fc4573692787be2145aa6a53a6b1188f4f45785ad847109223
d540568e33d72ac41cee39d5d32fb4ad3b55b8beb6f07fc4111dc5cb5
e4966d66c6dbed0c72d288f760316cb63eeee3bb1bb9a00aff006db7b
1d334b8747f0978e56e7469bcdd39eeb4f32044d8633013bb223319db
ed856e4a8ad4d23c50d6dab6a1ac5df83fc6135f5eec8f72e93858a08
cb79712fcd9382eec49eacedd060000351d5af7c4fe32f050b5f0b788
aca1d37589af2ea7beb3f2a348ff00b3ef211cee3925e68c63debd228
00a2800af3b9752bdf0dfc4af11de4de1ad7b50b5d46decbecf3d85a0
99098d640c09dc3041238a00ada8eb915d6b33eaf6fe1ef88ba7de4f6
b15a48f6da7aed31a3bb81b5f72e73237cd8dc074239cd686ef46b336
0da4f82fc79a5c9656bf63492d74ff0099e0ce7639666dff00365b71f
9812c4302cd900867ff008479f5282f6dfc11f102c365ac767341676d
2430dd431e7cb49515f0fb773007ae188248e2aa5eeaba14de229addb
42f88916ad797835c8cc7a7a2c91bc491db97438e1767971b29c861c1
cee6c8069e937da5699a9cb796be10f884227b992ec5935a31b68e790
92f22a6ee0962cd8fba198b000f350595e59e95a76890691e12f1d89b
43cad93dcd8193309508d031dd9d8502818e8c88c4310430069e8be28
fb1dfdfeab73e0df18cba86a0c9e6bae95f2c71a0223897e6ced5dcc7
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 41

27ab3b9c282143ae354bdf1378efc2525bf863c4163069d77733dccf7
d66218d55ad658c73b8e4967518a00f46a28020b9b2b3b970f73696f3
30180648c3103f1a8bfb274bff00a06d97fdf85ff0a003fb274bff00a
06d97fdf85ff0a3fb274bff00a06d97fdf85ff0a00e3b56d334d1f1ab
c3318d3ed021f0e6b04af92b8245ce9983d3dcfe75d8ff0064e97ff40
db2ff00bf0bfe14007f64e97ff40db2ff00bf0bfe147f64e97ff40db2
ff00bf0bfe1400f834fb0b7944b058db4520e8c912a91f881566800a2
80193451cd13453469246dd55d4107f0355bfb274bffa06d97fdf85ff
000a003fb274bffa06d97fdf85ff000a3fb274bffa06d97fdf85ff000
a00e3be38699a6c7f057c73247a7da23af873502acb0a8208b69391c5
763fd93a5ffd036cbfefc2ff0085001fd93a5ffd036cbfefc2ff00851
fd93a5ffd036cbfefc2ff0085001fd93a5ffd036cbfefc2ff00855b8d
163458e355445002aa8c000761400b5e63e1dff9389f127fd8323ffd0
6deb831df1d1ff1fe923d1c07c35bfc0ff389b5f10bfe460f0ffd2e7f
f414aa75d70f8a5ebfa238ea7c30f4fd5992fe24d190c5baed824d288
6294c2fe5c8e4e0057dbb5b278e0d6b57555c3d4a4939adff0043928e
229d6bf23bd828ac4d828240c73d7a50057b2bdb6bd131b693ccf2666
864f948daebd473562aa51707cac984d4e2a51d828a928af7b7b6d666
017326cf3e65862f949dce7381c74e86ac5538b4937d49534db4ba050
082010720f4352515754d42cf4cb43777d308610caa58a93cb1c01c7b
9ab554e125152e8ff4ff0087254e2e4e2b746a7c37ff0057aeff00d85
3ff006de0ad9f16ff00c8a9abff00d78cdffa2cd71cff00813ffb7bf5
3ae5fc58ff00dbbf9239ef81ff00f24bb47fa4dffa3a4aed2965ff00e
eb4bfc2bf22b30ff7babfe27f9b0a2bace40a28038cd47fe4b7e85ff6
2dea5ffa53635d9d00145001450014500145001450015c6de7fc96ed2
ffec5bbcffd29b5a00eca8a0028a0028a0028a0028a00e3757ff92dbe
18ff00b16f59ff00d29d32bb2a0028a0028a0028a0028a0028a00e37e
3a7fc912f1dff00d8b7a87fe93495d9500145001450015e67a12f95fb
446be5c81e76948c9ef8100fe86bcfc7bb4a8ff8d7e4cf4701f0d6ff0
003fcd1b1f10bfe460f0ffd2e7ff414ae53e224b243e0ad5248d9d310
fef197a88cb00fff008eeeaf4f0293c4a4ff00997e87979837f5576df
95fea6bcf6b6b3d92dbb220b71b5942f017690548c7a103f2ae5e2d5b
549f48d375e8af084bbbc4825b42886354925f28153b776e5c83cb60f

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

3c7415db848c6a2fde2babdbef4f5f5d11c588938d45ecddb4bfc935a
7a7bccade1fd4b5eb893456bad5ccaba88ba89945b2284f2f76d71c64
b71f4c76cf260b7f106b967a658ead757f1ddadde8935d981adc2a24a
9e56d395f9b07ccf9bb704f1dbd0583c3cea38285afa6ef4f8ff00f91
382189c4aa7cee77b6bb2d748bfd5ec694979e20d36e56defeee264be
92282d999d1a589cb61d8008808c118c8386c6720e29355b5d4d75dd1
e09b5db8756d464f28c6910754fb24870ff0026d27707c71d0faf2318
ac3464e5085d34dadfa2f5daf7ebd8de4b1134a33a96b35daef5f4dfe
5dc6e9dacea53dca697737b8b89f54b9b75b88e2552b1c4bbb0a0e464
f1d73c67db0d9350d74eb50e931ea6abb3537b49263029692336be7a9
e980cbd32060f048ed4e386a1cd2e68e89396efa5d5bf52556c44e2a5
19db551d9793bfe9dbe66d784eeef27f0e89afe7fb4dc452dc44f2ec0
9e679733a0381c0c851d2b26db52d5e4d3b41d563d404abab32ac9079
0ac90f991b3a94c61be4200392723278ac3d852552a5e3a26d2d76dff
cba9d33ad53d9c3deb3b27d35d97ddaf42b586a3e20fecbf0eea93eae
92a6a72db24d07d950050cac5b6b75e78ce73d38c74ab3a45ef88b51b
7b6d585c5bdbd9ddc321285d5bca254f97b57603b81c06058e79f615d
13a1868f33e5b5aebabd75b7a6de9b9c91ad8abc63cf7eade8b4d3fcf
efb19a9a86bd3e8d1c977ac337dbfc392dee228113ca91447ca9c13c8
939cf7e4638c58b29bc413d947a668f79892d74db7904b29452cf2062
030f2c8280201f2e0fdee49e9b4a8e1637bc6d14efd5f5b77fe9f9094
f13cc9735e4d792eeff4b7fc123f11dedd6afe16d4ef05df9715bdd45
079110568df0d1966dd8dc7963820818038eb5ded7998b84614e304b6
6fe7a44ecc1ca53a92949dee97cb59686a7c37ff0057aeff00d853ff0
06de0ad9f16ff00c8a9abff00d78cdffa2cd78d3fe04ffedefd4f6a5f
c58ffdbbf9239ef81fff0024bb47fa4dff00a3a4aed2965ffeeb4bfc2
bf22b30ff007babfe27f9b0a2bace40a28038cd47fe4b7e85ff0062de
a5ff00a53635d9d00145001450014500145001450015c6de7fc96ed2f
f00ec5bbcff00d29b5a00eca8a0028a0028a0028a0028a00f36f10789
bc3f6dfb42f85f47b8d62ca2d44e81a9c22d9a50242f2cfa7b46b8eb9
658a523d4237a1af49a0028a0028a0028a0028a0028a00e37e3a7fc91
2f1dff00d8b7a87fe93495d9500145001450015e7df14f41d423bdb4f
1b787e6820d534b522613c81239a0192412481dcf523209e720570667
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 43

4a5530edc778da4bd56bff0000efcb6ac69e2129abc65a3f9e87356de
3eb3f1a6b7a3471d8cf69776d1ced3ab10c9f32a8f95ba9e9dc0ae925
8e396278a545923752acac32181ea08ee296578d8e328fb786977f8a4
8799e0de16a2a32d74fc1b6655978774eb4091c46e9ade320c76d25cb
bc4983918527181c601e060600a7ae83a6adc99d63957f7a6658c4cde
5a48472ea99da1b92738ea49ebcd7b8f1b55b6f4d7cbf1f5f33c3581a
4975fbff000f4f22bc5e15d2625b6588de20b5777836ddc80a17fbd83
9e87278e94b6fe16d1e15b68c473c915adbbdac51c970ee8227c6e420
9c30381d73d07a56af33ad67a2fbbd7fcdfde671cb6947abfbdf97f92
1abe12d0ffb3e5b192de79e291163ccd73248c8aa72a118b65002011b
71c81560f87f4d36d04056e0f93319d643732194b952a4b3eedc72a48
e4f4c0ec2a5e655df6defb2ed6fbbc8d16028ae9f89147e18d2120961
f2ee5c49702eb735d485926fefab672a7939c633d2a66d074e696d66d
b7024b595a647170f96723696639f98ed24739e38e949e6155bbd97dc
baab7f5e7a87d469596fa79bef7febcb42c68fa6dae956ad6b67e7796
d23ca4492b487731cb72c49e49271ea4d416fa169b6ec4c11cb18f9cc
68b33ec88b677145ce10f27a631938c66b378ba9cd2969ef6fa7f5e7f
7b2bea94f962b5f776d5ff5d17dc880f8634bfecfb1b01f6c1058b87b
65177202840c0e73938ed9e99a7c1e1cd26dde468229a30e5caa2dc48
1232ff78a2e7084e4f200ea71d4d6af32adaedadfa2eaeffe7f26c859
7d2d37fbdf4febf0190f86349885baaa5c94b7b46b38d1aea42be4b0c
14209e7a0ebfdd1e94d7f09e8cc20ca5d06861f203addcaacf1673b1d
836597d8e453fed3af7be9f72f3ff3fc17617f67d1b75fbdf97f97e2c
2f7c27a15dbce65b59152731b4b0c7712471332602928ac17202a8ce3
a01e95b5146b14491a676a28519249c0f73c9ac2b62aa56846137a2ff
86fd0da8e16951939416ffd7c8d6f86ff00eaf5dffb0a7fedbc15b3e2
dff915357ffaf19bff00459af327fc09ff00dbdfa9e8cbf8b1ff00b77
f2473df03ff00e49768ff0049bff47495da52cbff00dd697f857e4566
1fef757fc4ff0036145759c81450078f7893c711d8fed53e19f093687
a8cb3dce83771c7709b3ca2b2c91485c9ce40516b203c672571d6bd86
800a2800a2800a2800a2800a2800af18d53c55e218ff006bad23c2c9e
1f89ec1fc3b3b8bef38e440ce8cce5718c896111e33fc60fb5007b3d1
4005140051401c8ebbe2cd5adfc5b71e1cd0fc2f26b13dad85bdf5cc8

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

6f63b74459e49d1146ee49cdbc99f4e3d6a2ff848bc77ff0044ebff00
2b50ff0085001ff09178effe89d7fe56a1ff000a3fe122f1dffd13aff
cad43fe1401c46b3e1bf12ea7f18f42f89337c3b1f6ed274e9ecd13fb
620f98b91b1f38fe1579c7fc0c7a576fff0009178eff00e89d7fe56a1
ff0a003fe122f1dff00d13aff00cad43fe147fc245e3bff00a275ff00
95a87fc28012dfc61af41e21d174bd7bc1d269716af74f696f70ba8c5
385956de69f0cab8201481f9f5c5769400514005140051401c6fc74ff
009225e3bffb16f50ffd2692bb2a0028a0028a002bcc3c6d0bf8cbe26
5a78326999349b0b717d7a8870d2b740b9ff812f4fef1ef8c7959bc5d
4a31a3fcf249fa6eff00047a3963e4aaeaff00226fe7b2fc59a5e2fb0
b2d3353f0e59e9f6b15b5bc6b721638d7007ca9fe734caeea14e34d38
45592ff2473579ca7cb293bb6bf561456e7385140057371cfa86bd717
0f61a83d85bd9dfb5ab04552d22a7fac3f303c96f940ec013ce401d58
6518dea4d5d2e9ea736239e56841dae66595ceac965aaea92eb775245
a4ea3379913a47892de31964e1339c6707d40ad1934bd6351f0e9b9fe
d8bcb5d5a780c8be53ec8a2665e23d847dd19c64fcddf23b77d5a9469
c94fd9add2b74b6efaee70508d6ab0b73bd9bf9edf719faa6a3711ea3
e2057f10cb626cd6392d22262e498f715c3292c09e38e79fa56b687a9
dff00f695bd8ea89b25bdb15bc8d3183138da258be80b2904f3f311d8
54d6a10952d23676baf3f7536ff3fbc285792aafdfbabd9aedef34bfa
f23a0a2bc83d80a2800a280353e1bff00abd77fec29ff00b6f056cf8b
7fe454d5ff00ebc66ffd166b967fc09ffdbdfa9d32fe2c7feddfc91cf
7c0ff00f925da3fd26ffd1d257694b2ff00f75a5fe15f915987fbdd5f
f13fcd9c26a779e2fd53e226aba0e87ae69ba4d9e9da6d95c933e986e
5e579e4b953cf9a8000205e307a9ab3fd8bf11bfe87bd1bff0009d3ff
00c935d6721cf5deb7e22b4b8bf82ebe2569301d38817af2784e758ed
b2320c8e66da8a473b89031ce715acb6de3a6d423b15f881a334f2c06
e102f869cab46080486fb46deac38ce79a00a973e03f185c78b2cbc51
378c3446d56cad26b3826ff008474e5639591987fc7cfac6307b65bd4
d5a8a1f1c49accfa3a7c42d18df41025c4911f0d3822372caad9fb460
82518707b1a004b08fc6b7f22a59fc46d0a62f1f9a9b7c3ad8913715d
ca7ed186191d464723d466eff62fc46ffa1ef46ffc274fff0024d0052
9eebc6da0f8afc2b6baaf88b4ad56c758d4a5b19a28b4836ee80595cd
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 45

c0757f39bf8add4631d18d77f40051400579ecf69abf88be23f886c07
8b75cd26cf4db7b3f220d3cc0aa4c8b233336f89c93c0efda80343fe1
07d47fe8a378cbfefeda7ff23d7357474db59b538e6f89df1017fb2a4
f2efdfec2a63b73b03e59c59ed0bb1836ece30739a00db8bc2d752de8
b58fe22f8e1c9816759545b98590920624fb36c278cedce7041c6291b
e1b336af1eaede3cf169bf8eddad92e37da6f11332b3267ecfd094538
f6a00861d07cdd66ff00485f899e355bbd3e086e2e439b64558e53204
60c6d82b03e549d09c6d39c53ac3c3cd7d2a456ff00133c69be4805c4
6aed6c8648f38deb9b61919c671d37293c32e402ff00fc20fa8ffd146
f197fdfdb4ffe47acd9ac758f0d78e7c2902f8c35ed56d753bab8b7b9
b7bf3032155b5964523644a410c8bdfd6803d128a00e3748ff0092dbe
27ffb16f46ffd29d4ebb2a00f1af11c7a75af8a3c7c64f0bea5a9622b
578e5d3a31e6db3b4272e8cac248ce70c4c633c13c9ebd1681ae79771
a1473436dadeacde106bd1ac4371b62bc28600eaa31c2bbbab06c71e9
400ba0fc4a92ea1b4b9d5f413a7dbea1a1c5ac58793762e249558c6ad
132ed50afbe6882fcc4307c92b82060f8bfc47ab786fc57e2dd5a6b5b
5b6bc4f0ee9c96e2198cf18965bbb885246ca2670ccb918e42819f400
eabc5332783eefc317766d2b4375a9c3a4dd89652cd324fbc2392725a
412953b8f6693d463b6a00e37e217fc8dbf0e7fec649bff4d3a857654
00514005140051401c6fc74ff009225e3bffb16f50ffd2692bb2a0028
a0028a002bcc7c3bff002713e24ffb06471610000026060f002220574
d464301000000000001000000000000003a000000002000005cd50600
5c350700ff00a0dbd7063be3a3fe3fd247a380f86b7f81fe7136be217
fc8c1e1ff00a5cffe82954ebae1f14bd7f4471d4f861e9fab0a2b4320
a2800ac1f0e5ac9a5ea3ab58c88ec9717525f40e10ed65931b949e818
3e78cf420fae3a2949724e0fadbf07fe5730ab75384bfad4aba069379
369dafe9fab59b5ac5a95ccf22959558f9728c638e8c3f2f7ab1a3ff0
0c24167a745a54d6304b3408228ef848042ea0615d933bc363aa818cf
f100723aead4a1539a2e5a5d34ede566bd7b7438e953af4a31e58ddea
ad7db5ba7e9dfa868b6b7d1f89b57bbbbd3f64172d11865de8df71369
c807232791d6a58edcdef8b86a8b91058dac96a87181248eea5fea17c
b519f524763899d68a93945dd72dbf0b3fd5951a52e55192b372bfe3c
dff00dba2bce3d10a2800a280353e1bffabd77fec29ffb6f056cf8b7f

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

e454d5ffebc66ff00d166b967fc09ff00dbdfa9d32fe2c7feddfc91cf
7c0fff00925da3fd26ff00d1d257694b2fff0075a5fe15f915987fbdd
5ff0013fcd9c6685ff259bc59ff00604d27ff0046dfd7675d6721e5f7
b6fe27b9f1978f21f0d49a579d243668d1df46f87cc0470ca70bc67aa
b0ce3af4a87c19af492d978674ff0f5ddcdae853f8225b8b48a78d1e7
86484dbc71bb39043305720ff09233834014b44f19f89b4ed3f47d435
4d65352fed8f0a43a995b8823861b5b8f32da32c3600c50fda4330663
f73e52a0e053f8a12ea5a26ade32922d4aeef2493c37a5c2d34aa8af1
c52df5c4729063550004663bb191c9cf03001dc7c50966d325f07dee9
d1949a3f10dada62351cc13068a443c7dcdadbb1d328a7f84576f401c
6fc42ff0091b7e1cffd8c937fe9a750aeca800a2800ae33c2dff2557c
69ff005c34effd025a00ecebc9ef34ff00106a5acfc4db5d1b55d3ac6
296ea14985cdb92ce0e9f6d90b2eedb165723718df19ce0e31400cd2f
c437b3e98926897d79a76953f80e3d4ac2d19226366fb7e4218a65885
c03b8b038c8151c1e24d6b44b88a6bcd7ae6ee3d4b44d36e657ba5429
6724b731c0f24615400a165dc436465013dc900aff0010e1934bd63c6
11c377772c12e9be1c8e6f3e43215b79352ba8e752c7e628633213b89
c066e42800763f1326bab5d77c0b73601bcf7f10adb49b47de81ed6e3
cc53fecfcaadf5453da803b6ae37c6fff0023f7807fec2577ff00a433
d0076545007011eada5697f1b7c47fda7a9d958f9be1bd1fcbfb44eb1
efc5cea79c6e2338c8fceba6ff84b3c2bff00432e8dff0081d17ff154
01c6c732db7887c43abd87c4bf094275768bcb592d95cdb2c685179fb
480e70739200cf6c7155b4cd2bc2fa3dc692ba3f8eb4186cb4bf0fcda
34314f224b23990c6de7338954139894950a3396e46460028ffc23fe1
d92c347d3e7f893a1aae9de1b3a2a3c0d1c72970d0b2dca93310a55a0
8ced218673cf3813ea3a4e8fae4fab4de23f88de1bbb7d4b468b4d616
b1c702c72452bcb15c2e6773b95dc9db9c642f4c7201b17fac68be229
f415d6758d0ad63d32e5350b9c6a303a4d7118758d63c312103625dcd
b4e0463192e13aaff0084b3c2bff432e8dff81d17ff0015401cb78c35
cd1752f1a7c3b834ed5f4fbd957c453394b7b949182ff656a03385278
c91f9d7a150014500145001450071bf1d3fe48978effec5bd43ff0049
a4aeca800a2800a2800af31f0eff00c9c4f893fec191ff00e836f5c18
ef8e8ff008ff491e8e03e1adfe07f9c4e83c7b677d3ea7a3dd5a58cf7
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 47

496fe7f98220091b8281d48f43595b354ffa00ea7ff7c27ff15552c43
a5392e493f45e48c951556117ce959757e6c366a9ff00401d4ffef84f
fe2a8d9aa7fd00753ffbe13ff8aa5f5dff00a772fb83ea7ff4f23f786
cd53fe803a9ff00df09ff00c551b354ff00a00ea7ff007c27ff001547
d77fe9dcbee0fa9ffd3c8fde1b354ffa00ea7ff7c27ff1546cd53fe80
3a9ff00df09ff00c551f5dffa772fb83ea7ff004f23f786cd53fe803a
9ffdf09ffc551b354ffa00ea7ff7c27ff1547d77fe9dcbee0fa9ff00d
3c8fde1b354ff00a00ea7ff007c27ff001546cd53fe803a9ffdf09ffc
551f5dff00a772fb83ea7ff4f23f786cd53fe803a9ff00df09ff00c55
1b354ff00a00ea7ff007c27ff001547d77fe9dcbee0fa9ffd3c8fde1b
354ffa00ea7ff7c27ff1546cd53fe803a9ff00df09ff00c551f5dffa7
72fb83ea7ff004f23f786cd53fe803a9ffdf09ffc551b354ffa00ea7f
f7c27ff1547d77fe9dcbee0fa9ff00d3c8fde6efc3eb5bcb6b6d564bc
b39ad4dc5f99634971b8af9312e7827ba9fcab4fc5bff0022a6afff00
5e337fe8b35726de1a4ed6ba7fa913b7b6493bdadf9239ef81ff00f24
bb47fa4dffa3a4aed28cbff00dd697f857e45661fef757fc4ff003679
e5f6a17be1df8a9ae6a5278735dd46ceff0049d3e2866d3ed3ce5df14
9765d4f23040953f3ad0ff84fbfea4af19ffe0aff00fb2aeb390e6679
3c3b35f6a97ade07f88cb3eaac1af4c6f76825c0da06d59c0000e3000
18e315664d43c3ed7b6f78bf0fbc6f0496da73e9902c1692c51c56cd8
cc6a892051f757040c8dab823028032ffb4bc1116a161a149f0ffc68f
347a1cd616d6935b4d229d3c346b2215694861968864827eef3c0ab76
6de17b66ba71f0f7c7970f77a71d32e1eee2b8b8692d4927ca264998e
3e66f719383cd005ab6f1048d73a64baa7867c69a80d2816b4dda3ed6
3290e9e748dbcee7f29b6f01465a46c72a1373fe13effa92bc67ff008
2bffeca8032b52d5ef3c4de33f052daf85bc4765169daccd79753ded9
7951471ff675e4439dc792f320c7bd7a45001450015e752ea57be1bf8
95e24bc9bc35afdfdaea16f65f679ec2d3ce426359030272304122803
4bfe13effa92bc67ff0082bffecab9b9e4f0b5c4d7f2dc7c37f1acdfd
a32092f924b495a3ba60368f310cbb5c6d006181180074a00b779aae8
5797b2de4ff0f3c666696c8d8395b1741f673d630a24002fb01545bc4
1e0f5d5a3d265f87be2c96ea4d21ed45b4da7348af62acaac8559c829
9751c83d6802c5b5d785ade3ba48fe17f8a7377646c2e246d28b492db

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

9ddfba672e58afcc78cfa7a0c4d61e21315e59dddff0086bc75a8cb63
13456a65d280db9c832361be694a614b7a6ec05dcd900d9ff84fbfea4
af19ffe0aff00fb2accb8d56f7c4be3cf08c96fe18f10d8c1a75ddccf
733df59f931aab5a4b18e771c92cea31ef401e8d450050d4b45d1b539
966d4b49b0bd91576abdc5b248c075c02c0f1cd55ff00844fc2bff42d
68dff80317ff00134007fc227e15ff00a16b46ff00c018bff89a3fe11
3f0affd0b5a37fe00c5ff00c4d00721ab7867c36bf19bc3502f87b491
13f877577641671ed665b8d34024639203363ea7d6baff00f844fc2bf
f0042d68dff0080317ff134007fc227e15ffa16b46ffc018bff0089a3
fe113f0aff00d0b5a37fe00c5ffc4d004f63e1fd06c2e56eac744d36d
675ced961b54471918382067a56950014500145001450071bf1d3fe48
978eff00ec5bd43ff49a4aeca800a2800a2800af31f0effc9c4f893fe
c191ffe836f5c18ef8e8ff8ff00491e8e03e1adfe07f9c4f4ea2bbcf3
828a0028a0028a0029370dc572320648ef8a005a2800a2800a2800a28
00accf16ffc8a9abffd78cdff00a2cd6388fe0cfd1fe45d2f8d7a9cf7
c0ff00f925da3fd26ffd1d257695965ffeeb4bfc2bf23a330ff7babfe
27f9b0a2bace40a28038cd47fe4b7e85ff62dea5ffa53635d9d001450
01450014500145001450015c6de7fc96ed2ffec5bbcffd29b5a00eca8
a0028a0028a0028a0028a00e3757ff92dbe18ff00b16f59ff00d29d32
bb2a0028a0028a0028a0028a0028a00e37e3a7fc912f1dff00d8b7a87
fe93495d9500145001450015e63e1dff9389f127fd8323ffd06deb831
df1d1ff1fe923d1c07c35bfc0ff389e9d45779e70514005140051400d
92448a3692475444059998e0003a926be2bf09fc7ad4ee3f6b8bcd62e
96f23f096a11a696a8f1b0586d037ee2e8823e50646dc58f004aded40
1f6b5140051400514005140056678b7fe454d5ffebc66ff00d166b1c4
7f067e8ff22e97c6bd4e7be07ffc92ed1fe937fe8e92bb4acb2fff007
5a5fe15f91d1987fbdd5ff13fcd8515d672051401c66a3ff25bf42ffb
16f52ffd29b1aece800a2800a2800a2800a2800a2800ae36f3fe4b769
7ff0062dde7fe94dad00765450014500145001450014500794789fc71
e1fb1fda63c29e17b89ae46a92685a842912db3b0669e6b378c860318
db6b3927a0d9cf6af57a0028a0028a0028a0028a0028a00e37e3a7fc9
12f1dffd8b7a87fe93495d9500145001450015e63e1dff009389f127f
d8323ff00d06deb831df1d1ff001fe923d1c07c35bfc0ff00389e9d45
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 49

779e70514005140051400300ca558020f041ef5e65a478fd750fda3b5
df86e740b78c586831deb6a47fd64d978ff0076463ee7efb8e7aab7ad
007a6d140051400514005140056678b7fe454d5ffebc66ff00d166b1c
47f067e8ff22e97c6bd4e7be07ffc92ed1fe937fe8e92bb4acb2fff00
75a5fe15f91d1987fbdd5ff13fcd8515d672051401c66a3ff25bf42ff
b16f52ffd29b1aece800a2800a2800a2800a2800a2800ae36f3fe4b76
97ff0062dde7fe94dad0076545001450014500719ad7883c55278e2f3
c37e1ad2b459c58e9b6b7d3cfa85ecb0e7ed12dca2aaaa44fd3ecc492
48fbc2ab6a1acfc43d3a349350b4f01d9a3b6d569f5a9e30c7d013072
68024bad53e245ada35e5d69fe0682d917734d26b370a8a3d4b1b7c01
537da7e297fd01bc1bff00835b9ffe47a00e6352f0978eaffe24691e3
c9f43f071d534bb0b8b284ff6adc60aca54ee3fe8f9ca81201ff5d1ab
a7fb4fc52ffa037837ff0006b73ffc8f40115cea1f12eda232dc69be0
886319cb49ac5c281819ea6dfd01a97ed3f14bfe80de0dffc1adcff00
f23d00403c45e35d37c4be1ed3fc45a3f87d2d359be92c565b0d42692
489d6d67b80c55e1504116e57aff10aee6800a2800a2800a28038df8e
9ff244bc77ff0062dea1ff00a4d2576540051400514005798f877fe4e
27c49ff0060c8ff00f41b7ae0c77c747fc7fa48f4701f0d6ff03fce27
a7515de79c14500145001450015e65a2f8fadef7f691d77e1e0f0edbc
33d86851de9d5723cd986f8ff007478ced1e70c73d55bd6803d368a00
28a0028a0028a002b33c5bff0022a6afff005e337fe8b358e23f833f4
7f9174be35ea73df03ffe49768ff49bff0047495da56597ff00bad2ff
000afc8e8cc3fdeeaff89fe6c28aeb39028a00e3351ff92dfa17fd8b7
a97fe94d8d7674005140051400514005140051400571b79ff0025bb4b
ff00b16ef3ff004a6d6803b2a2800a2800a28038dd23fe4b6f89ff00e
c5bd1bff4a753a93e2ca23f862c4ba2b15f1068c5723383fda76c38fc
091f8d005af8a1aacfa1fc3dd7358b6b5b4bb92cecde6f22e94b45205
192180ebc66a19fc49749e363e1e99ad34f67756b3fb544d8bf8bcacb
98640c14c8ae7063c121577746054030f41f12f899f43d0ac43c3a9eb
1a8594b7cf325b20d91a346bf346d3c7925a5eaac00c6368c8355f53f
1678fa30d6bf61d134bd420f0e36ab7315cc6f70127472ad1831ca014
6c707395cf3bba50068f83b5cff00849fe22ea924b06c874dd234f96c
d1b04c6d74b2bc8df52ab1afd14e3ef1abdf0caee661e23d19c830689

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

ad4963687b884c30ce89f44f3f60ff65168019f10bfe46df873ff0063
24dffa69d42bb2a0028a0028a0028a00e37e3a7fc912f1dffd8b7a87f
e93495d9500145001450015e63e1dff009389f127fd8323ff00d06deb
831df1d1ff001fe923d1c07c35bfc0ff00389e9d45779e70514005140
0514005798e8be3ad3af7f692d77c031f866da1bfb1d0a3bc93591b7c
d9977c7fb93f2e768f3811f375078a00f4ea2800a2800a2800a2800ac
cf16ffc8a9abffd78cdff00a2cd6388fe0cfd1fe45d2f8d7a9cf7c0ff
00f925da3fd26ffd1d257695965ffeeb4bfc2bf23a330ff7babfe27f9
b0a2bace40a28038cd47fe4b7e85ff62dea5ffa53635d9d0014500145
0014500145001450015c6de7fc96ed2ffec5bbcffd29b5a00eca8a002
8a0028a00f36d43c4da07863e346bb3788756b5d323bbf0ee94b6ef72
fb04a52e751de149ea46f4cfa6e1eb4cf17f8d3e1b78934f82c65f88d
6b6090ddc1761ad2e21dccf0ca92c79f311c603a29e00ce31d280323c
43ac7c37d7ed6fed755f8bb34f05e58c965e58b9b45585242a5d902c2
3e72100cb6ec02718c9ad29fc5bf0c6eaebcebef8896b791fdb20bd58
26b984a24d0aa8565c2065e515c8520139eccc0806643ad7c2db64d36
2b5f8acd6d79a7b5c1b1b94bdb732c56f295f32df0d11478b2b19f9d5
98155f9b8a9ae75af85735ddc5cffc2ca48dae348934a702f216f91d8
b34b968c9321624e492bcfdda007d8f8bbe1fe877f677da2f8e744b97
8f4c8f4db95bcbc5437290863039744c065667070b822463fc201d3f0
bf8f3e1be8f653893c6fa24d797b7325e5eccb3802499fae012485550
a8a3248545193d68020d6fc61e17f1378e7c0167e1fd72cb539e0d7a6
9e68eda4de638c6977cbbce3a0dcea33eac077af4fa0028a0028a0028
a00e37e3a7fc912f1dff00d8b7a87fe93495d9500145001450015e63e
1dff9389f127fd8323ffd06deb831df1d1ff1fe923d1c07c35bfc0ff3
89e9d45779e705140051400514005798e89e38d1ef7f691d7bc071785
eda1d56c7428aee5d686cf3668f747fb93f2eeda3ce523e6c641e3a50
07a75140051400514005140056678b7fe454d5ff00ebc66ffd166b1c4
7f067e8ff0022e97c6bd4e7be07ff00c92ed1fe937fe8e92bb4acb2ff
00f75a5fe15f91d1987fbdd5ff0013fcd8515d672051401c66a3ff002
5bf42ff00b16f52ff00d29b1aece800a2800a2800a2800a2800a2800a
e36f3fe4b7697ff62dde7fe94dad00765450014500145001450014500
71babff00c96df0c7fd8b7acffe94e995d95001450014500145001450
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 51

01450071bf1d3fe48978effec5bd43ff0049a4aeca800a2800a2800af
31f0eff00c9c4f893fec191ff00e836f5c18ef8e8ff008ff491e8e03e
1adfe07f9c4f4ea2bbcf3828a0028a0028a002bccb45f1a787eeff006
90d77c0f0785e0875cb2d0a3ba9f5b013cc9e2df1e213f2eeda3cd523
2d8c83c700d007a6d140051400514005140056678b7fe454d5ff00ebc
66ffd166b1c47f067e8ff0022e97c6bd4e7be07ff00c92ed1fe937fe8
e92bb4acb2ff00f75a5fe15f91d1987fbdd5ff0013fcd8515d6720514
01c66a3ff0025bf42ff00b16f52ff00d29b1aece800a2800a2800a280
0a2800a2800ae36f3fe4b7697ff62dde7fe94dad00765450014500145
00145001450071babff00c96df0c7fd8b7acffe94e995d95001450014
50014500145001450071bf1d3fe48978effec5bd43ff0049a4aeca800
a2800a2800af31f0eff00c9c4f893fec191ff00e836f5c18ef8e8ff00
8ff491e8e03e1adfe07f9c4f4ea2bbcf3828a0028a0028a002bccb46f
177866ebf691d73c1b6de198a2f10d9e831dcdceb5b503cd16f8ff704
e376079b19ce7b118e06403d368a0028a0028a0028a002b33c5bff002
2a6afff005e337fe8b358e23f833f47f9174be35ea73df03ffe49768f
f49bff0047495da56597ff00bad2ff000afc8e8cc3fdeeaff89fe6c28
aeb39028a00e3351ff92dfa17fd8b7a97fe94d8d76740051400514005
14005140051400571b79ff0025bb4bff00b16ef3ff004a6d6803b2a28
00a2800a2800a2800a2803c8bc55e3ab1b0fda8fc23e139349d5e4bc9
f41bf8a39a38a330b09e5b6903ee2e0ed5165306e32095c039e3d7680
0a2800a2800a2800a2800a2803cdbf69fd5af347f807e31bab3d33fb4
0cba64b692a09bcb31c732989a51f29ddb03ee2bc6429e4575de01d6a
f3c49e0ad1fc417fa5ff655c6a5671dd359f9fe69843aee552db57270
4678183c5006dd1400514005798f877fe4e27c49ff0060c8ff00f41b7
ae0c77c747fc7fa48f4701f0d6ff03fce27a7515de79c145001450014
50015990f87f4487c4b3f8962d2ad1359b8b75b69af44604af129c842
dd71903f21e828034e8a0028a0028a0028a002b33c5bff22a6aff00f5
e337fe8b358e23f833f47f9174be35ea73df03ff00e49768ff0049bff
47495da56597ffbad2ff0afc8e8cc3fdeeaff0089fe6c28aeb39028a0
0e3351ff0092dfa17fd8b7a97fe94d8d7674005140051400514005140
051400571b79ff25bb4bffb16ef3ff4a6d6803b2a2800a2800a280387
d6352f195ffc43d43c3be1dd5340d32d74fd26caf5deff00499af1e57

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

b89aed08052e620a145b0ec492c7918a66a8bf1174bb096ff0051f1d7
822d6d6100c92c9e16b90aa338e4ff00687a9140167fb3be297fd0e3e
0dffc256e7ff96147f677c52ffa1c7c1bff0084adcfff002c28031eef
c11e3bbaf1869fe2c9bc51e0c6d56c2d27b3b797fe115b9e2395919bf
e5ffafeef00f60cdeb5b1fd9df14bfe871f06ff00e12b73ff00cb0a00
8aeedbe25da5acb7575e37f04c3044a5e491fc2d7215547524ff00685
4562bf122f1e58edfc6be0ff321dbe646fe11bb475dc3232ad7e0f23f
911d41a006cba878f743f15785ecf5bd6bc35a9d86b3a949632a59e89
3da4b1edb3b9b80e1daee51d6dc020af463c8c577d40051401ca7c57b
fd4b4ff0823e93a84da6dd5ceada6588ba8638de4892e2fede090a891
59376c91b1b9480707158ba8e97a858de7d8e5f8b5e3a96e42091a2b5
d2f4eb874539c1611d8315070719c6769c6706801fa068fa86bd606fb
4bf8bde349a059a4858b586991b2c91b15752af600821810411d45687
fc21de22ff00a2afe32ffc05d27ff90a802a6b3f0f354d6748bcd2753
f89de2fbab1bd81edee617b5d2b6c91ba956538b2ee09ab31f82f5f8d
1638fe2af8c511400aab69a48000ec3fd0a801dff087788bfe8abf8cb
ff01749ff00e42aaf7be1bd62ce159ae7e2ef8c515dd513fd174a25d9
8e02a8163924fa0a0034ff000deb17f6e67b4f8b9e329103b46dfe89a
502aca70ca41b1c8208e86b53e146a97fae7c32f0ceb1aa4ff68bebdd
2ede7b89762aef91a3059b0a001924f0001401d35798f877fe4e27c49
ff60c8fff0041b7ae0c77c747fc7fa48f4701f0d6ff0003fce27a7515
de79c735f133c596fe0bf09cfaccb1acd2ef586da16620493370a091d
07527d81ae7f5db8f8a3a0f876e35efb4e87ac4d146d2cfa625ab43e5
a8e4f952ef3b8a8ecc39c71cf078ab55abccd52b7baafebe5f81f4d96
60301ec29d4c7297ef66e29a6bdd4ad795acefac92b69a27d6c6ef85f
c536f3fc31d3bc5dac5c450c6da6a5d5dc808da0ec05f18ef9cf1ebc5
62f87756f1c78d6c86b5a6cd61e1ad167cb58f9d6a6e6ea74c8c48c37
2aa29e481c9e9f523ad39f2c21bb576fb21432dc2e15d7c462a2dd384
dc2314ece52d777676492bbeb7690eb7f17eb3e1bf1358787bc731d91
8b523e5e9fab5a02914b2f1fba9118928c7b1048e40f7ae83c6fe29b5
f0cda5b030bde6a37d30b7d3ec636c3dcca7b0f451904b7402aa38871
84b9fe28fe3dbef22be4d0ab89a2b0adfb3acae9bde295f9ef6df96cd
beeaccc48acbe2bdc04bd9b5cf0cd8c9b73fd9e96124b1838e8652e1b
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 53

3ea40c0f43df23e1e78c7c6daff897c51e1ed66c74bd2754d2a080411
6c79226762f993ef066461b3183c64563ed31509c54ed697e1a7e27a0
b0991e2b0b5ea61d4d4a928bb36bdf5ce9396deebb3db55af9117827c
65e3ef1078ef5df0ccd1f86ad93449156e6e12099fcc0c4e36a990738
07af4f7ad1f1978a3c676de3fb4f0c78560d0f507b88c4d32cf14a0d8
c5c0df2babe304e700004f4c1eb531c4e21d2e6d2f7b2dfbdbbfcfd0d
6b64d9453cc3d83753d9aa7cf2778dd5e2a4becf9f2f9c9af9cbf11b5
cf1df853c193788203e1dbd365107bb88db4c9bb2f8ca1f30f0011d7d
09f6a8f44bff008b3aae8d63aa429e0848af2de3b8457fb56e50ea180
38efcd5caa62bdafb38f2ed7ea61470790fd4562eb7b5579b8d9383d9
277d52e8fefb99da8f8e3c71a3e8be2f6d574ed11f53d10591b45b659
4c5389df073b9b3ec3a73eb557c7de32f8a3e0bf088f116ad63e1168f
7468d043f6867567ec4ee038e7906b19e2b1318b9597baaef7eed69f7
1e8e1721c8eb57a749cea7ef66a30b72ece14e57969de76d0b1e31f14
7c56f0cf87575eb9d3fc2577661e3130b733ef8d1c801886619e481c6
7ad7ac57661ea5672946aa5a5b6f3bff91f3b9be132ea742957c04a6d
49c9353b5d38f2ed6efcc1599e2dff00915357ff00af19bff459ad311
fc19fa3fc8f0e97c6bd4e7be07ffc92ed1fe937fe8e92bb4acb2fff00
75a5fe15f91d1987fbdd5ff13fcd8515d672051401c66a3ff25bf42ff
b16f52ffd29b1aece800a2800a2800a2800a2800a2800ae36f3fe4b76
97ff0062dde7fe94dad007654500145001450071ba47fc96df13ff00d
8b7a37fe94ea75378f646bd9edb41fec3bed6ad654925bf82d5e11fbb
da5115fcd7400333161839cc278ea400647857c49a85e7853c35a7ea5
712d8eaf36a2fa36a4646433acd04333b1182c9ba410ab705be593839
c1ad587edebaf45e1abaf12cb31315cde078e348e7318923091138208
8c4a32d80cd98f3fc5b80307edde35bd5d534fd3b5cd324bcd01edade
6bf9e616e93b08229a49648444e363f98ca70e00da76ed209a87589fc
5b6f16b3ae5af8aefa43a4eb890c3a71b6b710dcc0cd0e617223de588
9195595863e5e09c92015889edac3c316ef7b773db5e78eef23b913cc
5c6d8e7be9225c9e804b14240f5551ed5d36bf71756bf18fc2b1da29f
2aff004cd463bdc0e1922681a22dfeeb3b01e9e6b7ad0056f8b926a71
6b1e029346b5b4bad417c4337d9e1bab8686276fec9d438675472a3e8
a7fad733e01d77f684b9f106bf1f8a7c13e148ada2f23fb3d4eb0f6d1

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

153e66e28e90ced21e133bbcbc7181f31c00765fda5f14bfe84ef06ff
00e15573ff00cafa3fb4be297fd09de0dffc2aae7ff95f401ccfc48bd
f1f4da2e991eb5e1af0cd9581f12689e6cf69e209ee655ff89a5ae36c
6d67186c9c039718049e7183d2fc369376b7e358ee09fed05d798cc1f
1bbca36f0f90463f83cbc63dc377cd0058bc984de375f0e5adec9a6c6
6c64d42416aaa1e790c8a84e4838db9048ee645278e0f136dab78c35a
d4edf4b93c5179a632e95abacd25adac1ba59acafd6dd271be36da5d7
2ccbf779f942f5a00a9a878a3c59a9787b51d56dfc4975a7793e04b3f
10c715bdbdb9c5d32cecc32f1b7eedbca5dca79f42bc83d34fab78b35
ebcd4e4d12eb4ed3d348bdb78ddae2eca26cf2609e51246616c864958
060e303691b4824806ce942fb5eb783568fc4735bc2f7b750cf6f1aae
c6894cb08854e03248ae158be49dc8c3ee9c0e5fc0525c7f6afc37b2b
9b89a7b6ff84427bc4699cb16b9ff00421610000026060f002220574d
464301000000000001000000000000003a000000002000005cb506005
c3507005dd9eec124900f676a00e974692687e2ff00892c63ddf639b4
8d3af9d7f845c34975116fab470440ff00d7314cf817ff002467c1bff
604b4ff00d14b401d9d798f877fe4e27c49ff0060c8ff00f41b7ae0c7
7c747fc7fa48f4701f0d6ff03fce27a7515de79c717f1a3c1f378dfc0
971a45a4c21be8e45b9b4666dabe6a67009ec08247b6735c97c3cf8b4
f1ea1ff0877c48b53a26bd0e2313ce36c3759e01cf4527d7ee9ea08e9
5e6d6a8f0f895525f0cb47e4d6c7da65b838e73934f0b4bf8f41b9c57
f34256524bcd357fc3a94ff691861f0dfc27d27c37a50962b0b8d4a2b
775f349263f9dca927923701dfb57b45a5bc369690dadb4623821458e
341d1540c01f90ad2824b1134ba28afcce4cd6a4a79461aa49eb52756
4fd6f0479dfed2d671dcfc22d4ee999965b0961ba818767120507f263
5cc781afeebc53f1eed2fb5171bb4bf0b5bcd0aa8e0bcf1c6cedff009
1587e02b9f11a62947bf2fe1cc7b393252c86a567bc1564bfede5493f
cd9ee15991e87611f89e6f11468cb7d35a2da484602b22b1604f19272
719cf4af525052b5fa1f0947113a2a4a3f6959fa68ff43c06dfc6f6fe
06f891f14350681ee2ee5b8812de311b3229f9f32498e88b919ee7200
e4d7b7fc3fd274ed3f445beb3be1aa4faa6dbbbad48905af1d9461fd9
40c0551c2818eb927ccc0ce339b8ff002b7f8b7f97ea7dc71561aae1b
0f0ae9695a34d5fb285383b7fdbcddffedd465fc76ff9243e25ff00af
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 55

23fcc572fe0ff8aba7d8783b47b597c23e3390db69f046d247a4168db
6c6a0b2b6ee578c83e95a57c42a188bb8b7a7457eace5caf279e69932
842ac216aafe3972dfdd8eddcea3e166b07c75e034d6358b58e517579
395865897e448ee18c4a46392bb57af719ae6ff006b1ff92433ff00d7
ec1fccd15a5cf829547bb8fe84e5943eabc4f4b0b17eec2b597ca56fd
11e982ced6ff438ecefade2b9b79605592291432b0c0ea0d5eaef8a5b
9f2352727ee5f44dbb7aeff92fb82b33c5bff22a6aff00f5e337fe8b3
59e23f833f47f9134be35ea73df03ff00e49768ff0049bff47495da56
597ffbad2ff0afc8e8cc3fdeeaff0089fe6c28aeb39028a00e3351ff0
092dfa17fd8b7a97fe94d8d7674005140051400514005140051400571
b79ff25bb4bffb16ef3ff4a6d6803b2a2800a2800a280382d58789346
f89daa6bba77856ef5bb1d4346b0b457b6bbb788c724135e3b0612ba9
e45c2608cf7a8adf52f105bebb77adc7f0bfc41f6ebb86386666d6ed5
90a264a0086e362e0b31e00e58fa9a00c6b8d21ae61d4e1b9f83fafce
9a9dd25e5d79bafc0c4ce980b2a137398dc055019369c281d00ab17f6
7717da7e9f6371f07f5a31e9cecf69226b56a93465bef9f356e039dd9
f9b2c77756cd0054bfbe8cf8cf4fb59be10eaf16ad369f23c31c3a9da
4714b6d6cf12ed9152711b8469e3daae0e371dbd0d27872dfc6163ade
adaaeabf0ff53bf92f6ffed91470dedb411c4422aaef8cddb248c3629
0e5410471d170017a687526b3d46da1f853af5b0bfba17b2347ac5993
1dc87122cd1869caa30701f8182dc907273674fd4bc631eaf26b17ff0
00eb57bbbe300b78d92fac638e18f82ca8a6e091b980624924e147f08
a0096ee4f15788fc5de1196e7c177da3d9e93aacb7d7371737d6b20da
6c6ea00a163919892f3a76c6335e8740051401c7fc6086ea5f0646f69
65757af6dace9378f0db446594c50ea36d2c855179621118e073c5636
abe20f0b6a5a826a371e15f1cc57aa82337369a36a16d2ba03908cf10
52ea0e485624024f1c9a002f35ff000add456692784bc6c8d665dade5
8744bf8a642ff007ff788a1ceeead93f31c139201a8ae359f08cd7f15
f1f0978e239e2b17d3e330e8da844a903e0b2055014648539c672a39e
050064dedff00c37d2342d425bdf0b78e2d74c4d1bfb3ef1e5d3f5311
a584418ec24fdd5552fcf5c16e704d692ea5e0b5d521d4d7c1be35175
1c51445ff00b1750c4cb17fabf3571898af5569031079068025b0d63c
1d61afdcebb67e0bf18437d72e64919740bed9e611869047b762b91c1

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

70031c9c93935043ab7866c74dd36cf46f0cf8d2c0e95279960e7c3d7
b3792369431fcea498ca12bb720018db82aa40068689e2ed334f92f2e
a5d07c65737d7b2896e67ff008466ed7760055551b0ed455000193dc9
24b12767e0f58de69bf0a3c29a7ea16d2dadddbe916d1cd0cabb5e371
1a82a47620f6a00eaebcc7c3bff002713e24ffb0647ff00a0dbd7063b
e3a3fe3fd247a380f86b7f81fe713d3a8aef3ce397f1b78ad7c31abf8
763bb11269faa5eb59cd33f0627284c67390002c083907f0aa1f1a3c2
3a278abc0fa87f6ac28b3595b49716d7438785954b75fee9c608e98f7
c1ae4adcb5a35294ba7f91f4397bad9657c1e3a83d64ff15269af471b
5fd4f2dbad335ef177ecada5de4b19bad474b93ed706e1bde5862775f
ae7613d3aed1dcd7b8f82fc4163e29f0c58eb9a7cd1c915cc419829cf
96f8f990fa10722b9f04da9ae6de518bfbb7fcd1ec7135384f0d3547e
1a35eac7d14ace3ff00a4c97c8e0ff68dd424bcf0e59f8134bc4dacf8
8aea3863846095855833c87d14151cf1dcf63581ae470fc2df8cba36b
d72d22787753d322d267b965cac3246aaa9b8e78e23427db775c56589
7fbe75ba41c7f5bfe67764b0ff0084ea797fdbc446b35eb68a87dee9b
47b8c6e9246b246cae8c032b29c820f420d528b59d366d766d0e1ba59
6fe0844f3c4809f2949c2ee238527b0272402718af59cd2b5fa9f9f53
c3d4a9cdcabe1577e4b6fcda5eaec792fc31b1b3d4be307c54b2beb78
ee2dee1e18658dc64323070cbf4350785f52baf83fe375f05eb972efe
11d4dda4d1efa76ff008f66279899ba63919e806437735e3c3f7518d7
ed2927e8e4ff00267e8f885f5fad5f2b7ab952a5387f8e14a2ecbfc51
ba3b9f8f2ca9f07fc4a59828fb1e324e392c001f9d6dfc3dff9107c3b
ff0060bb6ffd14b5e82ff797fe15f9b3e426bfe10e1ff5f65ffa444a7
a15ce89a27888782f49426668ae3549d7cccf90249b3cff00bcce703b
015c6fed63ff0024867ffafd83f99acb12e3f55a918ec935f81e86491
adfdbd84ab5be2a928cbef97eab5f99ea5a632b69b6aca41530a10474
2302ac5774763e52a7c6c2b33c5bff0022a6afff005e337fe8b359623
f833f47f9052f8d7a9cf7c0ff00f925da3fd26ffd1d257695965ffeeb
4bfc2bf23a330ff7babfe27f9b0a2bace40a28038cd47fe4b7e85ff62
dea5ffa53635d9d00145001450014500145001450015c6de7fc96ed2f
fec5bbcffd29b5a00eca8a0028a0028a0028a0028a00e3757ff92dbe1
8ff00b16f59ff00d29d32bb2a0028a0028a0028a0028a0028a00e37e3
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 57

a7fc912f1dff00d8b7a87fe93495d9500145001450015e63e1dff9389
f127fd8323ffd06deb831df1d1ff1fe923d1c07c35bfc0ff389e9d457
79e7183e37f0968fe32d36db4dd723965b482e92e8c48fb448ca18056
3d76fcc738c1f7ac1bcf85fa4df5a269d7daff89aeb4a565ff897cda8
9684a820843c6e2a303ab7e35c957070a92726dabef67baec7d060388
f1382a30a318424a0db8f346ee327f693efb7968b43b7b4b782ced62b
5b585218214091c6830aaa060003d2b917f871a2c3a9dc5fe87a86afe
1e6ba3bae22d2ee4450caff00df285594373d4015a55a11a89746b668
e3c066d5b0729e8a719fc5192ba7add37b6a9ea9dcbbe16f03e87a06a
53ead18babfd5e71b64d46fe6335c15c7dd0c7851ec00cf7ad7f1068d
a5ebfa54ba5eb3630ded9cc3e78a55c8f623b823b11c8a70c3c234dd3
b5d3dfcefdc588cdf155f171c5df9651b72db45151d9457448e374df8
53a6e976c2cf4cf1578c2cac949296b0eaa444a3d00dbc0fc6ba4b0f0
ae95a6f8727d0f47fb4e9914ea77dc5b4a7ed058f57f31b24bffb4726
b2a583852d9b7d15dede87763f893118d6b9e9c23aa94b9636e76bf9f
bf5d34dfd0e5743f841a2e8baf4bae69fe22f14c57f3befb897edea4c
e776e224f93e604f5cd5cf881f0bb44f1c5e8b8d7354d70c4a418eda2
ba5586320632aa54e09efeb597f6753f64e9733b3d773b5f1962febd0
c72a34d548ae55eebf2b75dd2565e4da2a5dfc22d26ef405d06e7c51e
2d974d550bf666d44142a36e148d98c0da302a4d3be14d969d611d858
78c7c696d6b12ed8e18f5401147a01b3a51fd9d152e65395f6dfa14f8
cabca93a32c35171bf35b934e67d77dcd0f017c39d0fc1baadfea9a7d
dea9797b7e8ab3cd7d70257201cf5c03cf7ce7a0a8bc7ff0d349f1b4e
5b5ad675e16d9565b382ec2dbab28c060854f3c9e7deade061ec7d8dd
dbd753923c538a599ff697b3839d924b97dd56492b2be8d25dfb9b7e0
df0dc5e17d34e9f6fab6ada84036f97f6fb8129894280154e06170071
5b95d54e1ece2a37bdbb9e263714f175e55dc545cb5b45597c9056678
b7fe454d5ff00ebc66ffd166a311fc19fa3fc8c297c6bd4e7be07ff00
c92ed1fe937fe8e92bb4acb2ff00f75a5fe15f91d1987fbdd5ff0013f
cd8515d672051401c66a3ff0025bf42ff00b16f52ff00d29b1aece800
a2800a2800a2800a2800a2800ae36f3fe4b7697ff62dde7fe94dad007
6545001450014500145001450071babff00c96df0c7fd8b7acffe94e9
95d9500145001450014500145001450071bf1d3fe48978effec5bd43f

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

f0049a4aeca800a2800a2800af31f0eff00c9c4f893fec191ff00e836
f5c18ef8e8ff008ff491e8e03e1adfe07f9c4f4ea2bbcf3828a0028a0
028a002b0edbc5de1cb9f1b5df82e0d56293c416968b79716415b7242
c400c4e36f565e339f9871c8a00dca2800a2800a2800a2800accf16ff
c8a9abffd78cdff00a2cd6388fe0cfd1fe45d2f8d7a9cf7c0ff00f925
da3fd26ffd1d257695965ffeeb4bfc2bf23a330ff7babfe27f9b0a2ba
ce40a28038cd47fe4b7e85ff62dea5ffa53635d9d0014500145001450
0145001450015c6de7fc96ed2ffec5bbcffd29b5a00eca8a0028a0028
a0028a0028a00e3757ff92dbe18ff00b16f59ff00d29d32bb2a0028a0
028a0028a0028a0028a00e37e3a7fc912f1dff00d8b7a87fe93495d95
00145001450015e63e1dff9389f127fd8323ffd06deb831df1d1ff1fe
923d1c07c35bfc0ff389e9d45779e70514005140051400579968da1f8
0e0fda475cd76cf5c964f1adc6831c779a66fca476dbe3025036f5252
218ddc641c7cc2803d368a0028a0028a0028a002b33c5bff0022a6aff
f005e337fe8b358e23f833f47f9174be35ea73df03ffe49768ff49bff
0047495da56597ff00bad2ff000afc8e8cc3fdeeaff89fe6c28aeb390
28a00e3351ff92dfa17fd8b7a97fe94d8d76740051400514005140051
40051400571b79ff0025bb4bff00b16ef3ff004a6d6803b2a2800a280
0a2800a2800a28038dd5ffe4b6f863fec5bd67ff4a74caeca800a2800
a2800a2800a2800a28038df8e9ff00244bc77ff62dea1ffa4d2576540
051400514005798f877fe4e27c49ff60c8fff0041b7ae0c77c747fc7f
a48f4701f0d6ff0003fce27a7515de79c14500145001450015e67a2f8
77c136ffb486bbe24b3f1034be2fb8d0a282ef4ade088adf7c789718c
e4f9718ebc6738f985007a65140051400514005140056678b7fe454d5
ffebc66ff00d166b1c47f067e8ff22e97c6bd4e7be07ffc92ed1fe937
fe8e92bb4acb2fff0075a5fe15f91d1987fbdd5ff13fcd8515d672051
401c66a3ff25bf42ffb16f52ffd29b1aece800a2800a2800a2800a280
0a2800ae36f3fe4b7697ff0062dde7fe94dad00765450014500145001
45001450071babffc96df0c7fd8b7acff00e94e995d95001450014500
14500145001450071bf1d3fe48978eff00ec5bd43ff49a4aeca800a28
00a2800af31f0effc9c4f893fec191ffe836f5c18ef8e8ff8ff00491e
8e03e1adfe07f9c4f4ea2bbcf3828a0028a0028a002bccb45f0c7842d
bf692d77c536be2312f8a6eb428e0b9d2372e62837c7fbec75e7cb8c7
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 59

b67fda1401e9b45001450014500145001599e2dff915357ffaf19bff0
0459ac711fc19fa3fc8ba5f1af539ef81ff00f24bb47fa4dffa3a4aed
2b2cbffdd697f857e474661fef757fc4ff0036145759c814500719a8f
f00c96fd0bfec5bd4bff4a6c6bb3a0028a0028a0028a0028a0028a002
b8dbcff92dda5ffd8b779ffa536b401d9514005140051400514005140
1c6eaff00f25b7c31ff0062deb3ff00a53a6576540051400514005140
05140051401c6fc74ff9225e3bff00b16f50ff00d2692bb2a0028a002
8a002bcc7c3bff2713e24ff00b0647ffa0dbd7063be3a3fe3fd247a38
0f86b7f81fe713d3a8aef3ce0a2800a2800a2800af32d17c2be14b6fd
a475df16daf89525f135d68515bdd68fb977430ef8f1363ef60f9518f
6ce7f885007a6d140051400514005140056678b7fe454d5ffebc66ff0
0d166b1c47f067e8ff22e97c6bd4e7be07ffc92ed1fe937fe8e92bb4a
cb2fff0075a5fe15f91d1987fbdd5ff13fcd8515d672051401c66a3ff
25bf42ffb16f52ffd29b1aece800a2800a2800a2800a2800a2800ae36
f3fe4b7697ff0062dde7fe94dad007654500145001450014500145007
1babffc96df0c7fd8b7acff00e94e995d950014500145001450014500
1450071bf1d3fe48978eff00ec5bd43ff49a4aeca800a2800a2800af3
1f0effc9c4f893fec191ffe836f5c18ef8e8ff8ff00491e8e03e1adfe
07f9c4f4ea2bbcf3828a0028a0028a002bccb45f07f86ed3f691d77c6
96fe28866f105e6851db5c68a1937c116f8ff007c403bb07ca41c8ee7
9e46003d368a0028a0028a0028a002b33c5bff0022a6afff005e337fe
8b358e23f833f47f9174be35ea73df03ffe49768ff49bff0047495da5
6597ff00bad2ff000afc8e8cc3fdeeaff89fe6c28aeb39028a00e3351
ff92dfa17fd8b7a97fe94d8d767400514005140051400514005140057
1b79ff0025bb4bff00b16ef3ff004a6d6803b2a2800a2800a28020b9b
cb3b560b737504248c812481491f8d45fdada5ffd04acbfeffaff008d
001fdada5ffd04acbfeffaff008d1fdada5ffd04acbfeffaff008d007
8cf8b53c4937ed57e11d46c3c50b1f85d744bb3731ab445130f1f9916
e232048e2d0f5cfc8d8ef5ecdfdada5ffd04acbfeffaff008d001fdad
a5ffd04acbfeffaff008d1fdada5ffd04acbfeffaff008d003edefec6
e24f2edef6da57c676a4aac7f206acd00145003659238636925916345
196663803f1aabfdada5ffd04acbfeffaff008d001fdada5ffd04acbf
effaff008d1fdada5ffd04acbfeffaff008d0071df1c353d364f82be3

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

98e3d42d1ddbc39a80555994924db49c0e6bb1fed6d2ffe82565ff7fd
7fc6800fed6d2ffe82565ff7fd7fc68fed6d2ffe82565ff7fd7fc6800
fed6d2ffe82565ff7fd7fc6adab2b286560ca4641078228016bcc7c3b
ff002713e24ffb0647ff00a0dbd7063be3a3fe3fd247a380f86b7f81f
e713d3a8aef3ce0a2800a2800a2801b3491c30bcd34891c68a59ddce1
540e4924f415e57a4f867c27a7fed01ae7c4a5f1b69ef7b7da0436f2e
98658c7930978c0b8ddbb3b1bc950380339e4e40001ead45001450014
500145001599e2dff915357ffaf19bff00459ac711fc19fa3fc8ba5f1
af539ef81ff00f24bb47fa4dffa3a4ab9aafc46f87ba4ea3369daa78f
3c2d617b036c9adee7578239636f46567041fad6597ffbad2ff0afc8e
8cc3fdeeaff0089fe6cabff000b5fe16ffd14af06ff00e0f2dbff008b
a3fe16bfc2dffa295e0dff00c1e5b7ff00175d67207fc2d7f85bff004
52bc1bff83cb6ff00e2e8ff0085aff0b7fe8a57837ff0796dff00c5d0
0791f893c41e11bcfda7fc35e2fb6f8c1a245e1eb7d16e16ee08fc4f1
080ccaca046544b801f7c6e5718636f939c57ae7fc2d7f85bff00452b
c1bff83cb6ff00e2e800ff0085aff0b7fe8a57837ff0796dff00c5d1f
f000b5fe16ffd14af06ff00e0f2dbff008ba003fe16bfc2dffa295e0d
ff00c1e5b7ff0017525afc50f869757315adafc43f08cf3cce238a28f
5ab7677627015407c924f000a00eba8a002b98d73c79e1ed1f5a9b47b
85d6ee6f608d249a3d3f42bdbe11abe76ee68227552769e09cf1d2802
a7fc2caf0effd03bc65ff00846eadff00c8d47fc2caf0effd03bc65ff
00846eadff00c8d4007fc2caf0effd03bc65ff00846eadff00c8d5ccd
cf8db4b7f8a561ad2e8fe323611689736af2ffc221aa712bcf032ae3e
cf9e4231ce31c7d2803a6ff8595e1dff00a0778cbff08dd5bff91a8ff
8595e1dff00a0778cbff08dd5bff91a800ff8595e1dff00a0778cbff0
8dd5bff91aace91e3ff0eea7acdae910a6bb6b79765c5baea1a05f592
4a554bb0579e14524282719ce01a00ea68a00f3b9bc3fa0ebdf1b3c42
35cd134dd5041e1bd23c9fb65aa4de5eeb9d4b76ddc0e33b5738eb81e
95bdff0af7c03ff00423f867ff05507ff0013401e79e5785ed7c2fa87
89750f867e0c361a6eab3d8dd47058c665d915c980ca83caf98e46ed9
c7a673d7ba97c1bf0ca1be8ec65f0af8423bb90031c0da7db891c73c8
5db93f74fe47d2801abe10f85edaa1d2d7c2fe0e3a82a7986d4585b79
a138f9b66dce391ce3b8ac2b9d33e1bc3e368b451e11f043d88d2ef6f
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 61

2eee16cadcbdb496d25bab2380b851b67c9c9cfcbd05004b0685e0516
5a5ea97bf0f7c316da6ea932450b9d2e1df09948107980a71bc90b8ea
ace8bce491d1ff00c2bdf00ffd08fe19ff00c1541ffc4d00739e27f0b
f86743f1bfc3cbad17c3ba469970fe209a3796ceca385d90e957e4a92
a0123201c7a815e90197794dc37000919e403d3f91fca80168a00e27e
364105d7822ded6ea18e7b79bc41a2472c522864911b55b50cac0f041
04820f506b43fe15ef807fe847f0cffe0aa0ff00e2680388d574bf0d5
8c7e3656f869e0c6b9f0f5aaded9c46c621f6cb7689dd59898c04cb47
2c7dc66326b6ad7c33e05bd9f41fecff0005783ee6df52b57bc794697
10fdc85421d06de726441827a367b628026b8f0a7c39b9961834cf0b7
80ae4f9b10ba8e4b3b7c88640db4a8543966c7ca0e0300dcf149a7e8b
f07f5082fe7b4d07c15245a7ccd0ddbfd86d8085d58a90c76fcbf3061
93d4834005c7877e1ab4fa65ae9be0ef095ecda9ef7b668f4e81a3f29
31e64bb954e557728e3ab3a0c804b09745f09fc3fbdbcd434e9bc0be1
78afb4f9552641a5c186461ba3957e5ced619fa32bae4edc900d3ff85
7be01ff00a11fc33ff82a83ff0089aa5f02ff00e48c7837fec0969ffa
296803b3af31f0effc9c4f893fec191ffe836f5c18ef8e8ff8ff00491
e8e03e1adfe07f9c4f4ea2bbcf3828a0028a0028a00180652ac010782
0f7af8f7c13fb397f66fed6b79712d8ffc51fa5edd6acb2bfbb66763e
541e9f248ae71fdd8c67ef5007d8545001450014500145001599e2dff
00915357ff00af19bff459ac711fc19fa3fc8ba5f1af539ef81fff002
4bb47fa4dff00a3a4a5f859ff003357fd8c979ffb256597ff00bad2ff
000afc8e8cc3fdeeaff89fe6cc4d635ad46d35ff001925df8ea4d2a0d
356092c12686d4c6acf116d8418c3c837003018310700e706baab2f14
083c29a7ea9af595cd95f49a6c77b7f670c0f2bda65019032a82df29d
c3a64ed380706bace42c5ef8b342b5856e5eeda4b53e4eeb986269214
f34a88f73a82067729f60c18e14834f83c4ba6cdf68082e77dbea234d
78cc0c1fce214f03baed60dbba6df9b38e6803022f135bdb4b3ebfad6
b17f656116ab2696b6c2d0b4059a458a22c4465d72c3ef160a0c9827e
e81a87c6da1ad94978eba9470c10f9f75e669d3a35ac792374aa54327
dd2704676fcd8c7340116a9f103c2fa6dddc5b5cdddd136cf0adc491d
8cef142b28ca48f22a1558c8fe3276f5e7838aba87c42d23ec374ba73
4e3518efad74e4b7beb39adcf9d7320489cac8aacd1f25b23a846c734

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

01a12eab71a3f8a749d1b50b97bb8b578e48ede664552971126f643b4
0043a0771e8636e4860173fe35ff00c937d43febbda7fe9545401a03c
75e0c6f120f0da78a3489357d8ced689748d2205ebb803f2f5ef8ad7f
ed6d2ffe82565ff7fd7fc680296a7e2cf0b697e5ff0069789746b2f33
3b3ed17d147bb1d71b9867a8ae63e1f6afa4eb3f12fc6b75a3ea765a8
dbf93a72f9b6b3aca99d92f195245001e30d752c3c7b1e97afea17fa2
6997b651268fa8c526cb7fb69793cc491b1b43edf24a2c9946f980c9c
8ad3bdf165a785b46822d7a77bbb8b0b485b56b980a9483e501a560cc
18af0cc428660a3240c8c802dd78fb48b7d5e5d39ec7566f23558b49b
9b816a7c9827956368b7313f75ccd1a8201e5867008268f8d3c49702f
b408f4bfb7c56f278861b29ae5153c99b06459223c960032904e00cae
327a5005ed0fc6325f697f69bad0750b7ba9350b9b2b6b30f0b493986
591090448546162258b328cf009cae6add78cedf54d4b49d034b927b3
bfbfbdb8b6ba591544d662dd03ca31ca963ba2008caed94382463201a
7a6eb1241e3abef0addca6576b35d4ac9d80cf945cc72467d7636d20f
a48a3aa926878dff00e47ef00ffd84aeff00f4867a00eca8a00e3748f
f0092dbe27ffb16f46ffd29d4ebb2a00f0cd2f4e963b69fc5b6f67aa6
a30e9be27d46e2ff00479a39d92e2da4ba768ee2181fe532c60aca855
72c370fbc571b7e2bd40dc6b5a9c96ba7ead6f0c5aae8d72ef6fa6cd2
fdbe259a073317d840445dcbb130e1a262720e280205b5b9d4346bbd3
96cf5dff84c34f9f517b1252582dd27759d52e1252366c759723e63cb
e08ca9c43e2b8d3c61710d8e83a1ea566f7de09d67495fb4e9934096d
34a2d7ca8247640171b241c9c641c75e4037bc6acde27f847a45a69cc
f0ddeab71a6a40841df1badc45248081c868d6390b0ea3cb6ee2bd1e8
0381f8bba7a6adabf80b4e92eaf2d567f10cc866b3b868664ff00894e
a1ca3af2a7e95cd7807e00e95e12d775ed4a3f1a78c6f46ae61662faa
cb14ea63f333be58d97cdcefe370f97079393401d8ffc2bbd3bfe863f
197fe14777ff00c5d1ff000aef4eff00a18fc65ff851ddff00f17401c
cfc47f0659693a2e97a843ad789ae5e2f1268988af35ab89e26cea96a
3e64772a7ae46470707b57ac500717e32d1efe6f1ae877da7c25adaf5
24d37552064790089d0b8e857f752c5ff006f351fc
7. Explain about socket, connect, bind, listen and accept function.

(DEC 2012)

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 63

SOCKET FUNCTION:

The function is called to create a socket to perform client server application.


#include<sys/socket.h>
int socket(int family, int type, int protocol);

Returns non negative descriptor if OK.

Else -1 on error.

Family - specifies the protocol family.

1. AF_INET-IPV4

protocol

2. AF_INET6-IPV6

protocol

Type - specifies the socket type.

1. Stream Socket (SOCK_STREAM) Used for TCP


Connection
2. Datagram Socket (SOCK_DGRAM) Used for UDP
Connection
3. Raw Socket (SOCK_RAW) Used for both TCP & UDP &
ICMP.

Protocol- set to 0.

Error Code :
Value in errno
EPROTONOSUPPORT

Cause of the error


Error in arguments

EACCES

Permission to create socket is denied.

ENOBUFS

The system has no available buffer space.

THE CONNECT CALL:

The connect function is used by a TCP client to establish a connection with a TCP
server.

#include<sys/socket.h>

int connect(int sockfd,const struct sochaddr *servaddr, socklen_t


addrlen);
o

Return 0 if OK

Else -1 on error

Sockfd-> socket descriptor value.

Servaddr- pointer to socket address structure . the socket address


structure must contain the IP address and port number of the
server.

Addrlen-> Length o fhte server address.

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

ERROR CODE:
Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EISCONN

If the socket is already connected.

ETIMEDOUT

If the connection is not established

ECONNREFUSED

If the port number specified is not waiting on the server for

ENETUNREACH

connection

OR

When the destination is unreachable from some intermediate

EHOSTUNREACH

router.

BIND FUNCTION:

The bind function assigns a local protocol address to a socket . internet protocol
address is a combination of either 32 bit IPV4 address or 128 bits IPv6 address along
with a 16 bits TCP or UDP port number
int bind(int sockfd, const struct sockaddr *myaddr, socklen_t addrlen);
o

It returns 0 if OK & -1 on error

Sockfd- socket description

My addr the address of a structure that specifies an ip address and port


number.

Addrlen- The size of the address structure in bytes.

Return code:
Return 0 if successful & -1 on error.
ERROR CODE
Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EADDRINUSE

If the address is already bound to it.

EFAULT

If the local address argument pointer is invalid.

PROCESS SPECIFIES
IP ADDRESS
Wild card

PORT
0

Wild card

Non zero

Local IP

address
Local IP
address

Non Zero

RESULT

Kernel chooses IP address and port


Kernel chooses IP address and process specifies port
Process specifies IP address, kernel chooses port
Process specifies the IP address & port

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 65

THE LISTEN CALL:


It is called only by a TCP server and it performs two functions.
a. The listen function converts an unconnected socket into a passive socket
indicating that the kernel should accept the incoming connection request
directed to this socket.
b. It specifies the maximum number of connection the kernel should queue
for this socket.
#include <sys/socket.h>
int listen (int sockfd, int backlog);

It return 0 if OK, -1 on error.


The kernel maintains two queues:
1. Incomplete connection queue:
It contains an entry for each SYN that arrived from a client for which the
server is awaiting completion of the three way handshake.
2. Completed connection queue:
It contains an entry for each client with the TCP three way handshake has
completed .
Sockfd- socket descriptor
Backlog- size of incoming connection request.
ERROR CODE:

Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

THE ACCEPT FUNCTION:


The accept is called by the TCP server to return the next completed connection

from the front of the completed connection queue. Accept creates a new socket and
return the descriptor of the new socket to the caller. The server can transfer data on
the new socket after finishing the server closes it.
#include <sys/socket.h>
int accept (int sockfd, struct sockaddr *cliaddr, socklen_t addrlen);
Non negative descriptor if OK
Else -1 on error
Sockfd-> socket descriptor
Cliaddr-> client IP address
Addrlen-> length of the second argument.
The connected socket is closed each time while the listening socket

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

remains open for the life of the server. This is supported only in stream.
ERROR CODE
Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EOPNOTSUPP

socket is not a SOCKET_STREAM.

8. Explain the various socket functions required to implement a single server


module. Explain with the help of a flow chart the sequence in which these
functions may be used.

(MAY 2011)

The function calls are


1. Socket function

2. Bind

3. Listen

4. Accept

5. Read

6. Write

7. Close

TCP SERVER

TCP CLIENT

Connection establishment

Blocks until connection


from client

Data(request)
Data (reply)

process request

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 67

End of file notification

SOCKET FUNCTION:

The function is called to create a socket to perform client server application.


#include<sys/socket.h>
int socket(int family, int type, int protocol);

Returns non negative descriptor if OK.

Else -1 on error.

Family - specifies the protocol family.


1. AF_INET-IPV4

protocol

2. AF_INET6-IPV6

protocol

Type - specifies the socket type.

1.Stream Socket (SOCK_STREAM) Used for TCP Connection


2.Datagram Socket (SOCK_DGRAM) Used for UDP Connection
3.Raw Socket (SOCK_RAW) Used for both TCP & UDP & ICMP.

Protocol - set to 0.

Error Code :
Value in errno
EPROTONOSUPPORT

Cause of the error


Error in arguments

EACCES

Permission to create socket is denied.

ENOBUFS

The system has no available buffer space.

BIND FUNCTION:

The bind function assigns a local protocol address to a socket . internet protocol
address is a combination of either 32 bit IPV4 address or 128 bits IPv6 address along
with a 16 bits TCP or UDP port number
int bind(int sockfd, const struct sockaddr *myaddr, socklen_t addrlen);
o

It returns 0 if OK & -1 on error

Sockfd- socket description

My addr the address of a structure that specifies an ip address and port


number.

Addrlen- The size of the address structure in bytes.

Return code:
Return 0 if successful & -1 on error.

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

ERROR CODE
Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EADDRINUSE

If the address is already bound to it.

EFAULT

If the local address argument pointer is invalid.

PROCESS SPECIFIES
IP ADDRESS

RESULT

Wild card

PORT
0

Wild card

Non zero

Local IP

address
Local IP

Kernel chooses IP address and process specifies port


Process specifies IP address, kernel chooses port

Non Zero

address

Kernel chooses IP address and port

Process specifies the IP address & port

THE LISTEN CALL:


It is called only by a TCP server and it performs two functions.
1. The listen function converts an unconnected socket
into a passive socket indicating that the kernel
should accept the incoming connection request
directed to this socket.
2. It specifies the maximum number of connection the
kernel should queue for this socket.
#include <sys/socket.h>
int listen (int sockfd, int backlog);

It return 0 if OK, -1 on error.


The kernel maintains two queues:
3. Incomplete connection queue:
It contains an entry for each SYN that arrived from a client for which the
server is awaiting completion of the three way handshake.
4. Completed connection queue:
It contains an entry for each client with the TCP three way handshake has
completed .
Sockfd- socket descriptor
Backlog- size of incoming connection request.
ERROR CODE:
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 69

Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

THE ACCEPT FUNCTION:


The accept is called by the TCP server to return the next completed connection

from the front of the completed connection queue. Accept creates a new socket and
return the descriptor of the new socket to the caller. The server can transfer data on
the new socket after finishing the server closes it.
#include <sys/socket.h>
int accept (int sockfd, struct sockaddr *cliaddr, socklen_t addrlen);
Non negative descriptor if OK
Else -1 on error
Sockfd-> socket descriptor
Cliaddr-> client IP address
Addrlen-> length of the second argument.
The connected socket is closed each time while the listening socket
remains open for the life of the server. This is supported only in stream.

ERROR CODE

Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EOPNOTSUPP

socket is not a SOCKET_STREAM.

CLOSE FUNCTION:
It is used to close the socket and terminate a TCP connection.
#include<unistd.h>
int close(int sockefd);

It return 0 if OK

Else -1 on error.

It marks the socket as closed and return to the process immediately.

The socket descriptor is no longer usable by the process , it cannot be


used as an argument to read or write.

But TCP will try to send any data that is already queued to be sent to the
other end.

After this the normal TCP connection termination sequence takes place.

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

9. Explain the various socket functions required to implement a simple client


module. Explain with the help of a flow chart the sequence in which these
functions may be used.

(MAY 2011)

The function calls are


1. Socket function
3. Read

2. Connect

4. Write

5. Close

SOCKET FUNCTION:

The function is called to create a socket to perform client server application.


#include<sys/socket.h>
int socket(int family, int type, int protocol);

Returns non negative descriptor if OK.

Else -1 on error.

Family - specifies the protocol family.


3. AF_INET-IPV4

protocol

4. AF_INET6-IPV6

protocol

Type - specifies the socket type.

1.Stream Socket (SOCK_STREAM) Used for TCP Connection


2.Datagram Socket (SOCK_DGRAM) Used for UDP Connection
3.Raw Socket (SOCK_RAW) Used for both TCP & UDP & ICMP.

Protocol - set to 0.

Error Code :
Value in errno
EPROTONOSUPPORT

Cause of the error


Error in arguments

EACCES

Permission to create socket is denied.

ENOBUFS

The system has no available buffer space.

TCP SERVER

TCP CLIENT

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 71

Connection establishment

Blocks until connection


from client

Data(request)

Data (reply)

process request

End of file notification

THE CONNECT CALL:

The connect function is used by a TCP client to establish a connection with a TCP
server.

#include<sys/socket.h>

int connect(int sockfd,const struct sochaddr *servaddr, socklen_t


addrlen);
o

Return 0 if OK

Else -1 on error

Sockfd-> socket descriptor value.

Servaddr- pointer to socket address structure . the socket address


structure must contain the IP address and port number of the
server.

Addrlen-> Length o fhte server address.

ERROR CODE:
Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EISCONN

If the socket is already connected.

ETIMEDOUT

If the connection is not established

ECONNREFUSED

If the port number specified is not waiting on the server for

ENETUNREACH

connection

OR

When the destination is unreachable from some intermediate

EHOSTUNREACH

router.

CLOSE FUNCTION:

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

It is used to close the socket and terminate a TCP connection.


#include<unistd.h>
int close(int sockefd);

It return 0 if OK

Else -1 on error.

It marks the socket as closed and return to the process immediately.

The socket descriptor is no longer usable by the process , it cannot be


used as an argument to read or write.

But TCP will try to send any data that is already queued to be sent to the
other end.

After this the normal TCP connection termination sequence takes place.

10. Explain in detail the socket functions for elementary TCP functions with a
neat diagram.
SCENARIO BETWEEN THE CLIENT AND SERVER:
First the server is started then sometimes later a client is started that
connects to a server. The client sends a request to the server the server process
the request and the send back a reply to the client. This continues until the client
closes its end of the connection which sends an end-of file notification to the
server. The server then closes its end of the connection and either terminates or
waits for a new client connection.
The function calls are
2. Socket function

2. Bind

3. Listen

4. Accept

5. Read

6. Write

7. Close
TCP SERVER

TCP CLIENT

Connection establishment

Blocks until connection


from client

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 73

Data(request)
Data (reply)

process request

End of file notification

SOCKET FUNCTION:

The function is called to create a socket to perform client server application.


#include<sys/socket.h>
int socket(int family, int type, int protocol);

Returns non negative descriptor if OK.

Else -1 on error.

Family - specifies the protocol family.


5. AF_INET-IPV4

protocol

6. AF_INET6-IPV6

protocol

Type - specifies the socket type.

1.Stream Socket (SOCK_STREAM) Used for TCP Connection


2.Datagram Socket (SOCK_DGRAM) Used for UDP Connection
3.Raw Socket (SOCK_RAW) Used for both TCP & UDP & ICMP.

Protocol - set to 0.

Error Code :
Value in errno
EPROTONOSUPPORT

Cause of the error


Error in arguments

EACCES

Permission to create socket is denied.

ENOBUFS

The system has no available buffer space.

BIND FUNCTION:

The bind function assigns a local protocol address to a socket . internet protocol
address is a combination of either 32 bit IPV4 address or 128 bits IPv6 address along
with a 16 bits TCP or UDP port number
int bind(int sockfd, const struct sockaddr *myaddr, socklen_t addrlen);
o

It returns 0 if OK & -1 on error

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

Sockfd- socket description

My addr the address of a structure that specifies an ip address and port


number.

Addrlen- The size of the address structure in bytes.

Return code:
Return 0 if successful & -1 on error.
ERROR CODE
Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EADDRINUSE

If the address is already bound to it.

EFAULT

If the local address argument pointer is invalid.

PROCESS SPECIFIES
IP ADDRESS

RESULT

Wild card

PORT
0

Wild card

Non zero

Local IP

address
Local IP
address

Kernel chooses IP address and port


Kernel chooses IP address and process specifies port
Process specifies IP address, kernel chooses port

Non Zero

Process specifies the IP address & port

THE LISTEN CALL:


It is called only by a TCP server and it performs two functions.
3. The listen function converts an unconnected socket
into a passive socket indicating that the kernel
should accept the incoming connection request
directed to this socket.
4. It specifies the maximum number of connection the
kernel should queue for this socket.
#include <sys/socket.h>
int listen (int sockfd, int backlog);

It return 0 if OK, -1 on error.


The kernel maintains two queues:
5. Incomplete connection queue:
It contains an entry for each SYN that arrived from a client for which the
server is awaiting completion of the three way handshake.
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 75

6. Completed connection queue:


It contains an entry for each client with the TCP three way handshake has
completed .
Sockfd- socket descriptor
Backlog- size of incoming connection request.
ERROR CODE:

Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

THE ACCEPT FUNCTION:


The accept is called by the TCP server to return the next completed connection

from the front of the completed connection queue. Accept creates a new socket and
return the descriptor of the new socket to the caller. The server can transfer data on
the new socket after finishing the server closes it.
#include <sys/socket.h>
int accept (int sockfd, struct sockaddr *cliaddr, socklen_t addrlen);
Non negative descriptor if OK
Else -1 on error
Sockfd-> socket descriptor
Cliaddr-> client IP address
Addrlen-> length of the second argument.
The connected socket is closed each time while the listening socket
remains open for the life of the server. This is supported only in stream.
ERROR CODE
Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EOPNOTSUPP

socket is not a SOCKET_STREAM.

THE CONNECT CALL:

The connect function is used by a TCP client to establish a connection with a TCP
server.

#include<sys/socket.h>

int connect(int sockfd,const struct sochaddr *servaddr, socklen_t


addrlen);
o

Return 0 if OK

Else -1 on error

Sockfd-> socket descriptor value.

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

Servaddr- pointer to socket address structure . the socket address


structure must contain the IP address and port number of the
server.

Addrlen-> Length o fhte server address.

ERROR CODE:
Value in errno
EBADF

Cause of the error


Not a valid socket descriptor

ENOTSOCK

If the first argument is not specified.

EISCONN

If the socket is already connected.

ETIMEDOUT

If the connection is not established

ECONNREFUSED

If the port number specified is not waiting on the server for

ENETUNREACH

connection

OR

When the destination is unreachable from some intermediate

EHOSTUNREACH

router.

CLOSE FUNCTION:
It is used to close the socket and terminate a TCP connection.
#include<unistd.h>
int close(int sockefd);

It return 0 if OK

Else -1 on error.

It marks the socket as closed and return to the process immediately.

The socket descriptor is no longer usable by the process , it cannot be


used as an argument to read or write.

But TCP will try to send any data that is already queued to be sent to the
other end.

After this the normal TCP connection termination sequence takes place.

11. Compare the IPV4, IPV6, UNIX domain and datalink socket address
structures, state your assumptions.

(MAY 2008)

SOCKET ADDRESS STRUCTURES


Each protocol suite defines its own socket address structures. The
name of the structure begins with sockaddr_.
Various socket address structures are
1. Generic Socket Address Structure
2. IPv4 Socket Address Structure
3. IPv6 Socket Address Structure
GENERIC SOCKET ADDRESS STRUCTURE
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 77

ne SIN6_LEN
ct sockaddr_in
uct sockaddr_in6

/* required
struct
sockaddrfor compile time tests*/

uint8_t sa_len;
/* length of the structure */
sin_len;
/* length of the structure */
_t sin6_len;
/*
length of the
structure */
sa_family_t
sa_family;
/* address family : AF_ XXX value */
mily_t sin_family;
/* AF_INET */
Name
:
sockaddr
mily_t sin6_family; Char
/* AF_INET6
*/
sa_data[14];
/* protocol specific address */
in_port_t sin_port;
/* 16 bit port*/
Header
:
<sys / socket.h>
in_port_t sin6_port; ;
/* Transport Layer port in Network Byte Order */
struct in_addr sin_addr;
/* 32 bit IPv4
address
in
network
order */
uint32_t sin6_flowinfo;
/*Priority & Structure
flow label in :network byte ordered */
n_zero[8];
/* Unused*/
struct in6_addr in6_addr ; /* IPv6 address in network byte order */

in_zero[8];
uct in_addr

uct in6_addr
r_t s_addr;

/* Unused*/

/* 32 bit IPv4 address in network byte order */

_t s6_addr[16]; /* 128 bit IPv6 address in network byte order */


IPv4 SOCKET ADDRESS STRUCTURE (OR) INTERNET
SOCKET ADDRESS STRUCTURE
Name

Header

Structure

sockaddr_in
<netinet / in.h>

IPv6 SOCKET ADDRESS STRUCTURE


Name
Header

:
:

Structure :

sockaddr_in6
<netinet / in.h>

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

COMPARISON OF SOCKET ADDRESS STRUCTURE


IPv4

IPv6

sockaddr_in()

sockaddr_in6()

UNIX
sockaddr_un()

AF_LOCAL
len lenAF_INET
len
AF_INET6
Path
name
16 #
bit port # (upto 104
16 bit port
IPv4 Address
32 bit 32
flowbitlabel
bytes )
Unused
128 bit IPv6 Address

Fixed Length

Fixed Length

(16 bytes)

(16 bytes)

Variable Length

12. Explain any three address conversion functions in detail.

(MAY 2012)

Refer Q. No. 04
13. Explain in detail the socket functions involved in a basic TCP client
server
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 79

communication.

(MAY 2012)
Refer Q. No. 10

14. Explain TCP Connection Establishment and Termination with a neat sketch.
(MAY 2012)
TCP CONNECTION ESTABLISHMENT : ( Three Way Handshake)
CLIENT

SERVER

Socket, Connect (blocks)


(active open)

SYN J

Socket, Bind, Listen,


Accept (blocks)
(passive open)

SYN K, ACK J + 1
Connect returns
ACK K+1
Accept returns
Step 1 : The server must be prepared to accept an incoming connection. This is
normally done by calling socket, bind and listen. This is called as
passive open.
Step 2 : The Client issues an active open by calling connect, This causes
the client TCP to send a SYN (Synchronize) segment to tell the server
the clients initial sequence number for the data that the client will send
on the connection. No data is sent with SYN. It contains only IP
Header, TCP Header and possible TCP options.
Step 3 : The server must acknowledge the clients SYN and the server must also
send its own SYN containing the initial sequence number for the
data that the server sends. The server also sends the acknowledgement
of the clients SYN in a single segment.
Step 4 : The client must acknowledge the servers SYN.
The maximum number of packets required for the exchange is
three, hence this is called as three way handshake.

TCP OPTIONS :
Each SYN message contains TCP options such as
1. MSS Option
2. Window Scale Option
3. Timestamp Option
1. MSS Option

Maximum

Segment

Size

TCP_MAXSEG
2. Window Scale Option

The maximum window size that the

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

TCP can
advertise to other TCP is 65535.
3. Timestamp Option

Needed for high speed connections

to prevent
possible data corruption caused by lost packets
that then reappear.
TCP CONNECTION TERMINATION :
CLIENT

SERVER

Close
(active close)

FIN M
(passive close)
read returns 0
ACK M + 1
FIN N
ACK N+1

TCP uses four segments to terminate the connection.


Step 1 : The client calls close and performs active close. TCP sends FIN segment.
Step 2 : The server receives the FIN and performs the passive close. The received
FIN is acknowledged by TCP.
Step 3 : THE server sends the FIN segment to the client.
Step 4 : The client acknowledges the FIN segment received from server and finally
terminates the connection.

15. Draw a TCP socket flow diagram and explain the functions.

(DEC 2011)

Refer Q. No. 10
16. Explain the following in detail :
(i) Iterative server
(ii) Concurrent server.

(DEC 2011)

Refer Q. No. 3

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 81

ANNA UNIVERSITY QUESTIONS


PART A
1.

What is a Socket?

(DEC 2011 / 2012)


Refer Q. No. 52

2.

Specify the Socket Address structure?

(MAY 2010)

Refer Q. No. 53
3. What do you mean by socket abstraction?

(DEC 2007)

Refer Q. No. 54
4. How shall local and remote socket addresses be obtained. (DEC 2007)

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

Refer Q. No. 55
5.What is the use of bind () system Call?

(MAY 2007)

Refer Q. No. 56
6. Explain the socket structure in brief.

(MAY 2009)

Refer Q. No. 57
7. Distinguish between an iterative server and concurrent server.
(MAY 2009 / 2012)
Refer Q. No. 58
8. Distinguish between an TCP sockets and UDP sockets

(MAY 2011)

Refer Q. No. 59
9. Give the structure of struct sockaddr.

(MAY 2011)

Refer Q. No. 60
10. Define well-known port.

(DEC 2011/2012)

Refer Q. No. 61
11. Define socket and list out its types.

(MAY 2007)

Refer Q. No. 62
12. Distinguish between TCP Sockets and UDP Sockets.

(MAY 2011)

Refer Q. No. 63
13. What is meant by host byte ordering?

(MAY 2011)

Refer Q. No. 64

PART - B
Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 83

1. Explain the TCP layering in details


with neat sketch.

(MAY

2007)
Refer Q. No. 1
2. Explain the following system calls
in details

(MAY

2007/2009)
o

CONNECT()

BIND()

LISTEN()

ACCEPT()
Refer Q. No. 2
3. Differentiate between the iterative
server and concurrent server?
(MAY 2007 / 2008)
Refer Q. No. 3
4. Discuss the syntactical issues of various address
conversion functions.
(MAY 2008)
Refer Q. No. 4

5.

Write notes on byte ordering functions.

(MAY 2008 / DEC 2012)

Refer Q. No. 5
6.

Explain about socket, connect, bind, listen and accept function.


(DEC 2012)
Refer Q. No. 7

7.

Explain the various socket functions required to implement a single


server module. Explain with the help of a flow chart the sequence in
which these functions may be used.

(MAY 2011)

Refer Q. No. 8
8.

Explain the various socket functions required to implement a simple


client module. Explain with the help of a flow chart the sequence in
which these functions may be used.

(MAY 2011)

Refer Q. No. 9
9.

Compare the IPV4, IPV6, UNIX domain and datalink socket address
structures, state your assumptions.

(MAY 2008)

Refer Q. No. 10
10.

Explain any three address conversion functions in detail. (MAY 2012)

IT 2351 / NETWORK PROGRAMMING AND MANAGEMENT

UNIT-1

Refer Q. No. 04
11.

Explain in detail the socket functions involved in a basic


TCP client

ServerCommunication.

(MAY 2012)

Refer Q. No. 10

12. Explain TCP Connection Establishment and Termination with


a neat
sketch.
(MAY 2012)
Refer Q. No. 14
13.

Draw a TCP socket flow diagram and explain the functions.

(DEC 2011)

Refer Q. No. 10
14.

Explain the following in detail :


(i) Iterative server
(ii) Concurrent server.

(DEC 2011)

Refer Q. No. 3

Prepared By : Mr. P. Saravanan,MCA.,ME.,(Ph.d) Asso.Prof/IT, MEC

Page 85

Anda mungkin juga menyukai