CS2363 EE Question+Bank

32
1 Prepared By Suresh Kumar. M Assistant Professor Department of Computer Science and Engineering 219-Sri Venkateswara College of Engineering QUESTION BANK CS2363 Computer networks UNIT I PART A 1. Define and compare LAN, WAN. LAN 1.Scope of LAN is restricted to a small/ single building 2. LAN is owned by same organization 3. Data rate of LAN 10-100mbps WAN 1. scope of WAN spans over large geographical area country/ Continent 2. a part of n/w asserts are owned or not owned 3 .Data rate of WAN is Gigabyte. 2. What is circuit switching? In a circuit-switched network, a dedicated communication path is established between two stations through the nodes of the network. That path is a connected sequence of physical links between nodes. 3. What is packet switching? In a packet-switched network, it‘s not necessary to dedicate transmission capacity along a path through the network. Rather, data are sent out in a sequence of small chunks, called packets. Packet switching is mainly used in terminal-to-computer and computer-to-computer communications. 4. Define Full Duplex and simplex transmission system. With Full duplex transmission, two stations can simultaneously send and receive data from each other. This mode is known as two-way simultaneous. The signals are transmitted in only one direction. One is the sender and another is the receiver. 5. Draw the diagram of twisted pair cable? 6. Why sliding window flow control is considered to be more efficient than stop and wait flow control. In sliding window flow control, the transmission link is treated as a pipeline that may be filled with frames in transit. But with stop-and-wait flow control only one frame may be in the pipe at a time. 7. List the various frequencies of wireless transmission. Terrestrial Microwave (2GHz to 40GHz), Broadcast Radio (30MHz to 1GHz), Infrared (3 x 10 11 to 2 x 10 14 ).

Transcript of CS2363 EE Question+Bank

Page 1: CS2363 EE Question+Bank

1

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

219-Sri Venkateswara College of Engineering

QUESTION BANK

CS2363 Computer networks UNIT I

PART A

1. Define and compare LAN, WAN.

LAN

1.Scope of LAN is restricted to a

small/ single building

2. LAN is owned by same

organization

3. Data rate of LAN 10-100mbps

WAN

1. scope of WAN spans over large

geographical area country/

Continent

2. a part of n/w asserts are owned or

not owned

3 .Data rate of WAN is Gigabyte.

2. What is circuit switching?

In a circuit-switched network, a dedicated communication path is established between

two stations through the nodes of the network. That path is a connected sequence of

physical links between nodes.

3. What is packet switching?

In a packet-switched network, it‘s not necessary to dedicate transmission capacity

along a path through the network. Rather, data are sent out in a sequence of small

chunks, called packets. Packet switching is mainly used in terminal-to-computer and

computer-to-computer communications.

4. Define Full Duplex and simplex transmission system.

With Full duplex transmission, two stations can simultaneously send and receive data

from each other. This mode is known as two-way simultaneous. The signals are

transmitted in only one direction. One is the sender and another is the receiver.

5. Draw the diagram of twisted pair cable?

6. Why sliding window flow control is considered to be more efficient than stop and

wait flow control.

In sliding window flow control, the transmission link is treated as a pipeline that may

be filled with frames in transit. But with stop-and-wait flow control only one frame

may be in the pipe at a time.

7. List the various frequencies of wireless transmission.

Terrestrial Microwave (2GHz to 40GHz), Broadcast Radio (30MHz to 1GHz),

Infrared (3 x 1011

to 2 x 1014

).

Page 2: CS2363 EE Question+Bank

2

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

8. Draw the diagram of coaxial cable?

9. Draw the diagram of optical fiber?

10. Differentiate between lost frame and damaged frame? What is the difference

between stop and wait and sliding window protocol?

Lost frame is the frame that fails to arrive at the other side. The damaged frame is a

recognizable frame does arrive, but some of the bits are in error. In stop and wait

protocol, we can send one frame at a time where as in sliding window protocol we can

send multiple frames at a time.

11. What do you mean by error control and Flow Control?

Error control refers to mechanism to detect and correct errors that occur in the

transmission of frames. Flow control is a technique for assuring that a transmitting

entity does not overwhelm a receiving entity with data.

12. Define piggybacking.

The technique of temporarily delaying outgoing acknowledgment so that they can be

hooked onto the next outgoing data frame is widely known as piggybacking.

Page 3: CS2363 EE Question+Bank

3

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

13. What is OSI? Define HDLC.

OSI is Open Systems Interconnection and is developed by the International

Organization for Standardization (ISO). HDLC stands for High Level Data Link Control.

It has three stations, two links, and three types of data transfer.

14. What are the key elements of a protocol?

Protocol is used for communications between entities in a system and must speak the same

language. Protocol is the set of rules governing the exchange of data between 2 entities. It

defines what is communicated, how it is communicated, when it is communicated

Key elements of Protocol:

Syntax – It refers to the structure or format of data meaning the order in which they are

presented.

Semantics – It refers to the meaning of each section of bit. How to do interpretation.

Timing – When data should be sent and how fast they can be sent.

15. List the uses of a network access layer.

Exchange of data between the computer and the network

Sending computer provides address of destination

May invoke levels of service

Dependent on type of network used (LAN, packet switched etc.)

16. What are the uses of transport layer?

Reliable data exchange

Independent of network being used

Independent of application

17. What is protocol data unit (PDU)?

At each layer, protocols are used to communicate and Control information is added to

user data at each layer. Transport layer may fragment user data. Each fragment has a

transport header added and header consists of Destination SAP, Sequence number and

Error detection code.

18. What are the uses of internet layer in TCP/IP?

Systems may be attached to different networks

Routing functions across multiple networks

Implemented in end systems and routers

19. What is a layered Network Architecture?

A layer is created when a different level of abstraction occurs at protocol.

Each layer should perform a well defined function.

Function of each layer should be chosen using internationality standardized

protocols. Boundaries between should be chosen to minimize information flow

across the interfaces.

A set of layers and protocol is called network architecture. A list of protocols

used by a system is called protocol stack.

Page 4: CS2363 EE Question+Bank

4

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

20. What is the need for layering?

It reduces the design complexity.

It decomposes the problem of building a network into more manageable

components.

It provides a modular design, if we want to add some new service, you may

only need to modify the functionality at one layer, reusing the functions

provided at all other layers

21.Compare OSI and Internet Protocol.

OSI TCP

It distinguishes between It does not distinguish between

service,Interface,protocol service, interface, protocol

Protocols are well hidden Protocols are not just hidden

Dejure. Standard Fit Model Defacto standard Fit protocol then

then protocol model

In transport layer only connection In Transport layer choice is for

Oriented services are available Connection oriented/connection less.

It contains 7 layers It contains 5 layers

22. How do layers of the internet model correlate to the layers of the OSI model?

OSI TCP/IP

Physical Layer Physical Layer

Data Link Layer Network Access Layer

Network Layer IP Layer

Transport Layer TCP Layer

Session Layer Application Layer

Presentation Layer

Application Layer

23. What is the use of data link layer in OSI?

Frame synchronization: Data is divided by data link layer as frames ,a

manageable unit.

Flow Control: Sending station does not overwhelm receiving station.

Error Control: Any error in bits must be detected and corrected using some

mechanism.

Addressing: Two stations in a multi point that involved in transmission must

be specified using physical address

Access Control: When two or more devices are connected to the same link,

Access control mechanism is needed to determine which device has control

over the link at any given time.

24. Why is flow control and error control duplicated in different layers?

Like the data link layer, the transport layer is responsible for flow and error control .

Flow control and error control at data link layer is node-to-node level. But at transport

layer, flow control and error control is performed end-end rather than across a single

link.

Page 5: CS2363 EE Question+Bank

5

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

25. List the key ingredients of technology that determines nature of a LAN. List the

common topologies available for LAN.

Topology, Transmission medium and Medium access control technique are the

technology that determines nature of a LAN. Star Topology, Ring Topology Bus

Topology and Tree Topology are the topologies available for LAN.

26. What are the functions of physical layer and presentation layer?

Encoding/ decoding of signals, preamble generation/removal (for synchronization)

and Bit transmission/ reception are the functions of physical layer. Translation,

Encryption / Decryption, Authentication and Compression are the functions of

presentation layer.

27. What is mean by data communication?

Data communication is the exchange of data (in the form of 1s and 0s) between two devices

via some form of transmission medium (such as a wire cable).

28. What are the three criteria necessary for an effective and

efficient network? The most important criteria are performance, reliability and security. Performance of the network depends on number of users, type of transmission medium, the capabilities of the connected h/w and the efficiency of the s/w. Reliability is measured by frequency of failure, the time it takes a link to recover from the failure and the network’s robustness in a catastrophe. Security issues include protecting data from unauthorized access and viruses.

29. What are the three fundamental characteristics determine the

effectiveness of the data communication system?

The effectiveness of the data communication system depends on three fundamental characteristics:

Delivery: The system must deliver data to the correct destination. Accuracy: The system must deliver data accurately.

Timeliness: The system must deliver data in a timely manner.

30. What are the advantages of distributed processing?

Advantages of distributed processing include security/encapsulation, distributed databases, faster problem solving, security through redundancy and collaborative processing.

31. Why are protocols needed?

In networks, communication occurs between the entities in different systems. Two entities cannot just send bit streams to each other and expect to be understood. For

communication, the entities must agree on a protocol. A protocol is a set

of rules that govern data communication.

Page 6: CS2363 EE Question+Bank

6

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

32. Why are standards needed?

Co-ordination across the nodes of a network is necessary for an efficient communication. If there are no standards, difficulties arise. A standard

provides a modelor basis for development to which everyone has agreed.

33. For n devices in a network, what is the number of cable links

required for a Mesh and ring toplogy?

Mesh topology – n (n-1)/2, Ring topology – n

34. What is the difference between a passive and an active hub?

An active hub contains a repeater that regenerates the received bit patterns

before sending them out. A passive hub provides a simple physical connection between theattached devices.

35. Distinguish between peer-to-peer relationship and a primary-

secondary relationship. Peer-to-peer relationship: All the devices share the link equally.

Primary-secondary relationship: One device controls traffic and the others must transmit through it.

36. Assume 6 devices are arranged in a mesh topology. How

many cables are needed? How many ports are needed for each

device?

Number of cables=n (n-1)/2=6(6- 1)/2=15

Number of ports per device=n-1=6-1=5

37. Group the OSI layers by function.

The seven layers of the OSI model belonging to three subgroups. Physical, data link and

network layers are the network support layers; they deal with the physical aspects of

moving data from one device to another. Session, presentation and application layers are

the user support layers; they allow interoperability among unrelated software systems.

The transport layer ensures end-to-end reliable data transmission.

38. What are header and trailers and how do they get added and removed? Each layer in the sending machine adds its own information to the

message it receives from the layer just above it and passes the whole package to the layer just below it. This information is added in the

form of headers or trailers. Headers are added to the message at the layers 6,5,4,3, and 2. A trailer is added at layer2. At the receiving machine, the headers or trailers attached to the data unit at the

corresponding sending layers are removed, and actions appropriate to that layer are taken.

Page 7: CS2363 EE Question+Bank

7

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

39. The transport layer creates a communication between the source and destination. What are the three events involved in a connection?

Creating a connection involves three steps: connection establishment, data

transfer and connection release.

40. What is the DC component?

Direct current is a zero-frequency signal with constant amplitude.

41. How does NRZ-L differ from NRZ-I?

In the NRZ-L sequence, positive and negative voltages have specific meanings: positive for 0 and negative for 1. in the NRZ-I sequence,

the voltages are meaningless. Instead, the receiver looks for changes from one level to another as its basis for recognition of 1s.

42. What are the functions of a DTE? What are the functions of a DCE?

Data terminal equipment is a device that is an information source or an information sink. It is connected to a network through a DCE. Amplitude Time

1 0 0 0 0 0 0 0 0 0 0 1 0 0

3

Data circuit-terminating equipment is a device used as an interface between a DTE and a network.

43. What does the electrical specification of EIA-232 describe?

The electrical specification of EIA-232 defines that signals other than data

must be sent using OFF as less than -3 volts and ON as greater than +3 volts. The data must be transmitted using NRZ-L encoding.

44. Discuss the mode for propagating light along optical channels.

There are two modes for propagating light along optical channels,

multimode and single mode.

Multimode: Multiple beams from a light source move through the core in

different paths.

Single mode: Fiber with extremely small diameter that limits beams to a

few angles, resulting in an almost horizontal beam.

45. What is refraction?

The phenomenon related to the bending of light when it passes from one

medium to another.

Page 8: CS2363 EE Question+Bank

8

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

46 What is meant by Ethernet and MAC control?

Ethernet is a networking topology developed in 1970 which is governed by the IEEE

802.3 specification. MAC control field contains any protocol control information

needed for the functioning of the MAC protocol. For example, a priority level could

be indicated here.

47 What is CSMA/CD?

It is a protocol used to sense whether a medium is busy before transmission but it has

the ability to check whether a transmission has collided with another.

48 List the rules for CSMA/CD.

1. If the medium is idle, transmit; otherwise go to step 2.

2. If the medium is busy, continue to listen until the channel is idle, and then transmit

immediately.

3. If a collision detected during transmission, transmit a brief jamming signal to all

station to indicate collision has occurred and then cease transmission.

4. After transmitting a jamming signal, wait for some time, then transmit again.

49 What is preamble?

A 7-octet pattern of alternating 0s and 1s is used by the receiver to establish bit

synchronization is called as preamble.

50 When a transmitting station will insert a new token on the ring?

It will insert a new token when the station has completed transmission of its frame.

The leading edge of the transmitted frame has returned to the station.

51 What is Early Token Release (ETR)?

ETR allows a transmitting station to release a token as soon as it completes frame

transmission, whether or not the frame header has returned to the station.

52 What is Frame Status (FS)?

It contains the error detected (E), address recognized (A), and frame coped (F)

indicators. Each indicator is represented by a symbol, which is R for ―reset‖ or

―false‖ and S for ―set‖ or ―true‖.

53 Give the applications of wireless LANs.

LAN extension, cross building interconnect, nomadic access, and advantages hoc

networks.

54 What is a bridge? List the reason for using bridges in LAN.

Bridge is a hardware networking device used to connect two LANs. A bridge

operates at data link layer of the OSI layer.

Reliability, performance, security, and geography are the reason for using bridges in

LAN

Page 9: CS2363 EE Question+Bank

9

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

55 What is No-transition?

A station of this type is either stationary or moves only within the direct

communication range of the communicating stations of a single BSS

(basic service set)

56 What are the functions of a bridge?

The function of a bridge between two LANs A and B are:

Reads all frames transmitted on A and accepts those addressed to stations on B

Using medium access control protocol for B, retransmits the frames onto B

Does the same for B-to-A traffic.

57 What is spanning tree routing?

The spanning tree approach is a mechanism in which bridges automatically develop a

routing table and update that table in response to changing topology.

58 Compare FDDI with token ring 802.5.

FDDI 802.5

No priority and reservation bits It has priority scheme by using

reservation bits.

No need of converting a token to start of

data frame by inverting token bits because

of high data rate

It converts a token to data frame

changing token frame.

A station that transmits data frames

releases a new token as soon as it

completes data.

A station that data transmissions after

releasing back its own transmission,

release the token.

59 Ethernet stipulates a minimum size of a frame. Why is it necessary?

To detect collision. To identify valid frame from garbage, valid full format

should contain 64 bytes from destination address to checksum. So if the data portion is less

than 46 bytes, pad field is used to fill out the frame to minimize size.

60 Give the format of Ethernet address.

Preamble

64

Dest addr

48

Src addr

48

Type

16

Body CRC

32

61 What is meant by the contention period of Ethernet? How many lines are

required to connect n – systems in Direct Mesh topology?

When several stations on an Ethernet have data to send, there are contention periods during

which collisions happen and no data is successfully transmitted.

n(n-1)/2 lines are required.

62 What does IEEE 10 Base 5 standard signify?

10 represents data rate 10 Mbps.

5 refers to segment length 5* 100 m that can run without repeaters

Base represents Base band communication

Page 10: CS2363 EE Question+Bank

10

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

63 Define Repeater, Hub.

Repeaters and hubs are interconnecting devices.

Repeater: Repeaters extends the Ethernet segment and it repeats the signal. It does

not amplifies the signal.

Hub: A Hub has several point to point segments coming out. It is a multi way

repeater. It broadcasts any signal through all outgoing lines.

64 What is meant by Exponential back of algorithm?

After first collision, each station waits either 0 or 1 slot time before trying again. If 2

stations collide and each one picks same random number 0/1,. .After second collision,

each one picks either 0,1,2 or 3 slot at random and waits. If collision occurs again , then

next time the number of slots to wait is chosen at random from 0 to [23 – 1]. This

algorithm is called binary exponential ―back off algorithm‖.

65. Define a switch and a bridge. Switches are hardware or software device capable of creating temporary connections between

more devices which are not directly connected. It is a multi input/output port device. It transfers

data coming from one input port to one or more output ports. This function is called as

forwarding. Bridges are used to interconnect LANs. A bridge observes and forwards all frames

that it receives.

66.Define Spanning Tree Algorithm.

Bridge connects n/w and removes loop in the path using spanning tree algorithm It constructs

a spanning tree of edges between hosts that maintain connectivity of the graph with no loops.

It is a dynamic algorithm. The algorithm works as Frame Forwarding, Address Learning and

Loop Resolution.

67. What are different types of bridge? What are the limitations of bridges?

Simple Bridge connect 2 LAN

Multi port Bridge connect more than 2 LANs

Transparent Bridge it learns on its own about connected LANs.

limitations of bridges:Scalability and Hetrogenity

68. Mention the functions of Bridges.

1. A bridge should have enough buffer space to store the frames until it is transmitted.

2. It should be able to distinguish addresses of host on different LAN.

3. It can contain information about other bridges.

. 4. It should follow congestion control mechanisms to overcome congestion.

5. It works at layer 1 and layer 2 level.

69.Name any two network connecting devices? Can a bridge replace repeater for

interconnecting 2 segments of a n/w?

Repeater repeats the signal to the actual strength so that they can travel and works at

physical layer. Repeater operates on the physical layer level. Here collision

probability is more.

Bridge is an network connecting device. It does forwarding & filtering frames using

LAN destination address. Bridges are used to connect LAN or WAN and works at

data link layer level. Collision Probability is more.

Page 11: CS2363 EE Question+Bank

11

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

A bridge cannot replace repeater for interconnecting 2 segments of a network because

functions of them are entirely different.

70.What are the advantages of switches? Write the frame format for FDDI.

In switches, the sending information are directly transmitted to the concern receiver.

8 8 48 48 32 8 24

Start of

Control

Dest Src

Body

CRC

End of

Status

frame addr addr

frame

71. What is Token ring? What is the use of bit stuffing?

Token ring is a set of nodes are connected together in a ring. Data flow always in a particular

direction around the ring. Bit stuffing is bit oriented protocol. It is used to detect the error

during the transmission of the stream of bits.

PART-B

1. List and discuss the various techniques available in error detection. (ReferWilliam

stallings)

2. Explain about internet architecture (ReferWilliam stallings)

3. Explain about OSI network architecture (ReferWilliam stallings)

4. Explain Sliding window flow control and stop and wait flow control in detail.(Refer

Peterson)

5. Explain about Token Ring andfiber distributed data(FDDI) interface in detail.(Refer

Peterson)

6. Explain in detail about IEEE 802.11 with example

7. Describe about link layer Flow Control. .(Refer Peterson)

8. Explain about Physical links and Channel access on links. (ReferWilliam stallings)

9. Discuss about Framing. .(Refer Peterson)

10. Describe about the layering and protocols. .(Refer Peterson)

11.Discuss the various line encoding techniques used to send analog and digital data on

digital channels. .(Refer Peterson)

12. Explain the Mesh and star topologies of the networks in detail with diagram.(Refer my

notes)

13. write short notes on transmission media. .(Refer Peterson)

14. with an example ,illustrate how CRC will calculate with an example. .(Refer my notes)

15. compare and contrast the Go-Back-N ARQ Protocol with selective repeat ARQ.

ReferWilliam stallings)

16. Explain in detail the error detection and error corrections.(ReferWilliam stallings)

17.Write in detail about Bluetooth and Wi-Fi. .(Refer Peterson)

18.Explain about learning Bridges and the spanning tree algorithm in detail. .(Refer

Peterson)

19. Explain the following: Switches and Bridges.(Refer Peterson)

Page 12: CS2363 EE Question+Bank

12

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

UNIT – II

PART A

1. Differentiate Packet Switching and circuit Switching.

Issue Datagram subnet Circuit Switching

2. What is Virtual circuit Switching? In the virtual circuit approach, the relationship between all packets belonging to a

message or session is preserved single route is chosen between sender and receiver at the

beginning of the session. When the data are sent all packets of the transmission travel one

after another along that route Virtual circuit transmission is implemented in two formats -

PVC, SVC.

3. What is Switched virtual circuit?

Here virtual circuit is created wherever is needed and exist only for duration of the

specific exchange. It can be used with connection establishment and connection termination.

4. What are the different types of source routing approach?

Rotation, Stripping off and Using pointers are the different types of source routing approach.

5. Define Unicasting, Broadcasting and Multicasting.

Unicasting: Transmitting data from a single sender to a single receiver.

Broadcasting: Transmitting data from a single source to all the other nodes in the network

Multicasting: Transmitting data from a single source to a group of destination nodes.

6. Classify the following addresses

23.85.48.119 --------- Class A, 127.24.34.56 ------------- Class A

159.78.9.10 ------------ Class B, 195.20.10.11. ------------ Class C

220.36.123.47 ------------ Class D, 245.31.220.225------------ Class 3

7. What is IP address?

An Internet Address is made of four bytes (32 bits) that define a host‘s connection to a

network. There are currently 5 different field lengths patterns, each define a class of

addresses. These are designed to cover the needs of different types of organizations, class A,

B, C, D, E.

Class Netid Hostid

Circuit setup Not Required Required

Transmission path No Transmission path dedicated path

Delay Packet transmission delay Call setup delay

Addressing Each packet contains the full

source and destination address

Only data is sent

Bandwidth Dynamic Bandwidth Fixed Bandwidth

Routing Each packet is routed

independently

Entire data is sent through the

same path

Congestion control Difficult Easy if enough buffers can be

allocated in advance for each VC

set up

Complexity In the transport layer In the network layer

Suited for Connection-oriented and

connectionless service

Connection-oriented service

Page 13: CS2363 EE Question+Bank

13

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

8. How many network addresses and host addresses are supported by class A, class B

networks?

Class A: Number of networks = 127

Number of hosts = 224

-1

Class B : Number of networks = 214

-1

Number of hosts = 216

– 1 = 65,535

9. Differentiate Physical Address and Logical Address.

Physical Address Logical Address

1. It is implemented by data link layer. It is implemented by n/w layer.

2. It contains 48 bits. It contains 32 bits

3. It is a local addressing system. It is an universal address system.

4. Another name MAC address. Another name IP address.

5. It is flat in nature Hierarchical in nature

6. Does not give any clue for routing Its structure gives clue for routing

10. Define Router.

A router operates as the physical, data link and network layer of the OSI model ,

A router is termed as an intelligent device. Therefore, its capabilities are much

more than those of a repeater or a bridge.

11. What does a router do when it receives a packet with a destination address that it

does not have an entry for, in its routing table?

Default Router: If IP Software is not able to find the destination, from routing table then it

sends the datagram to default router. It is useful when a site has small set of local address

connected to it and connected to the rest of the Internet.

12. Define ARP.

Associates an IP address with physical address. It is used to find the physical address of the

node when its Internet address is known. Any time a host/router needs to find the physical

address of another host on its network, it formats an ARP query packet that includes the IP

address and broadcasts it. All hosts in the network process the ARP packet but only the

required station sends back physical address.

13. Define RARP

Allows a host to discover its internet address when it knows only its physical address ( a

diskless computer). The host wishing to retrieve its internet address broadcasts an RARP

query packet that contains its physical address to every host on its physical network. A

server on the network recognizes the RARP packet and returns the host‘s internet address.

14. What do you mean by ICMP?

ICMP is an error reporting mechanism. It does not specify the action to be taken for each

possible error. The source must relate the error to an individual application program and take

other actions to correct the problem.

15. List out functions of IP.

IP services unreliable, best-effort, connectionless packet system.

Unreliable – delivery is not guaranteed

Connectionless – each pocket is treated independent from others

Best-effort delivery – it makes an earnest attempt to deliver packets.

Page 14: CS2363 EE Question+Bank

14

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

It defines basic unit of data transfer through TCP/IP.

IP s/w performs routing function – finds a path from source to destination.

IP includes a set of rules that embody the idea of unreliable packet delivery

16. What is the use of TTL in IP header?

It lets how long that datagram is allowed to live in the network. The source sets that

time. Routers and hosts in the path of that datagram should decrement TTL and

removes it when TTL = 0 and send an error message to the source. TTL is written hops or

time in seconds.

17. What is internetworking and what are its principles?

Internet is an interconnected set of networks. From outside it looks like a simply layer

n/w. A collection of communication networks interconnected by routers is called

internetworking. The principle of inter networks are provide a link between networks and

routing for delivery of packets.

18. What are the important fields in a routing table?

Destination, Cost and Next Hop

19. What is Trace route option?

Record Route/ Trace Route: Here source creates an empty list of IP addresses and

each router on the path of the datagram adds its IP address to the list whereas a router get a

datagram that has record route option, it adds its addresses to the list. To add, it compares

pointer & length. If pointer > length, the list is full. So host forwards a datagram without

inserting its address to it. Record route is useful only if source & destination agrees.

0 8 16 24 31

Code (7) Length Pointer

First IP address

Second IP address

20. Write the difference between Distance vector routing and Link state routing.

Distance Vector Routing Link state routing

1. Basic idea is each node sends its

knowledge about the entire network to its

neighbours.

1. Basic idea is every node sends its

knowledge about its neighbours to the

entire network

2. It is dynamic routing 2. It is dynamic routing

3. RIP uses Distance vector routing 3. OSPF uses link state routing

21. List some of the unicast routing protocols. Routing Information Protocol (RIP) for IP Open Shortest Path First (OSPF)

22. To whom ICMP reports error message?

ICMP allows routers to send error messages to other router or hosts. ICMP is an error

reporting mechanism. It does not specify the action to be taken for each possible error. It is

informing the source that the error has occurred and the source has to take actions to rectify the

errors.

Page 15: CS2363 EE Question+Bank

15

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

23. Which class IP addresses are used for multicast and unicast?

Unicast : Class A, Class B , Class C Multicast: Class D

24. What is Permanent virtual circuit ?

In this technique the same virtual circuit provided between two users on a continuous basis.

The circuit is dedicated to a specific user. No one else can use it. Because it always in place,

it can be used without connection establishment and connection termination

25. What is the use of a router?

A router is useful for interconnecting two or more heterogeneous networks that differ in

their physical characteristics such as frame size, transmission rates, topologies, addressing

etc. A router has to determine the best possible transmission path among several available

paths.

26. What is meant by hop count? The pathway requiring the smallest number of relays, it is called

hop-count routing, in which every link is considered to be of equal length and given the value one.

27. What are data grams?

In datagram approach, each packet is treated independently from all others. Even when one packet represents just a place of a

multipacket transmission, the network treats it although it existed alone. Packets in this technology are referred to as datagram.

28. What are the functions of MAC?

MAC sub layer resolves the contention for the shared media. It contains synchronization, flag, flow and error control specifications necessary

to move information from one place to another, as well as the physical address of the next

station to receive and route a packet.

30. What is protocol data unit?

The data unit in the LLC level is called Protocol Data Unit (PDU). It

contains four fields.

Destination Service Point Address DSAP)

Source Service Access Point

Control field

Information field

31. What are headers and trailers and how do they get added and removed?

The control data added to the beginning of a data is called headers. The control data added to the end of a data is called trailers. At the sending

machine, when the message passes through the layers each layer adds the headers or trailers. At the receiving machine, each layer removes the data meant for it and passes the rest to the next layer.

Page 16: CS2363 EE Question+Bank

16

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

32. What are the responsibilities of network layer?

The network layer is responsible for the source-to-destination delivery of packet across multiple network links. The specific responsibilities of network layer include the following:

Logical addressing.

Routing.

33. How the packet cost referred in distance vector and link state routing?

In distance vector routing, cost refer to hop count while in case of link state routing, cost is a weighted value based on a variety of factors such as security levels, traffic or the state of the link.

PART B (Refer all in Peterson)

1. What do you mean by switching? Explain Virtual circuit switching techniques.

2. (i) Explain Packet switching technique in detail.

(ii) Explain in detail about source routing approach.

3. Explain about Address Resolution Protocol.

4. Explain in detail about Dynamic Host Configuration Protocol and Internet Control

Message Protocol.

5. Explain the differences between the adaptive and non adaptive routing

6. (i) Explain in detail about IP addressing.

(ii) Explain the Datagram delivery and Forwarding in Internet Protocol.

7. Explain the IP datagram format, fragmentation and reassembly.

8. Explain the Routing Information protocol/Distance vector routing in detail.

9. Explain about the OSPF and Interdomain routing (BGP)routing algorithms.

10. Describe about Queuing discipline

11. Discuss about Subnetting and CIDR.

12. Describe about Ipv6

13. Describe distance Vector Routing

14. compare The distance Vector and Link state routing Protocol

15. Discuss in detail about the OSPF routing Protocol

16. Define fragmentation and Explain Why the IPV4 and IPV6 Protocol need to fragment

some packets

17. . Discuss in detail the various aspects of IPv6

18. Write short Notes on (1.)internet Protocol (2).Routers

19. Explain in detail about Distance vector routing protocol with an example

20. Discuss the various Switching Techniques used in networks

21. For The Routing Table shown Below, what does the router do with packets addressed to

the following addresses?

Subnet Number Subnet Mask Next hop

(1) 128.96.180.192 128.96.170.0 255.255.254.0 Interface 0

(2) 128.96.167.151 128.96.168.0 255.255.254.0 Interface 1

(3) 128.96.169.192 128.96.166.0 255.255.255.0 R2

(4) 128.96.165.121 128.96.164.0 255.255.252.0 R3

Default R4

Page 17: CS2363 EE Question+Bank

17

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

UNIT – III

PART A

1. Give any two Transport layer service

1. Multiplexing:-

Transport layer performs multiplexing/ demultiplexing function. Multiple

applications employ same transport protocol, but use different port number. According

to lower layer n/w protocol, it does upward multiplexing or downward multiplexing.

(eg) X.25 can have 4095 VC. Multiple services can use that single VC using upward

multiplexing. (eg) X.25 can use only 3bit/7bit/15bit sequence number. So a high

speed network may need a larger sequence space. For that downward multiplexing /

splitting used to improve throughput.

2. Reliability : [ Error Control and Flow Control ]

2. How an application process running in one host is addressed by another process

through TCP?

It uses socket address (host, port).

Port represents a particular transport service in a host.

3. What are the various adaptive retransmission policy of TCP.

Simple average

Exponential / weighted average

Exponential RTT backoff

Jacobson‘s Algorithm

4. What is the wrap around time for TCP Sequence Number. What is the Wrap

around time for T3 link with 45 Mbps data rate?

Once a segment with sequence x survives in Internet, TCP cannot use the same sequence

no. How fast 32-bit sequence no space can be consumed? 32-bit sequence no is adequate

for today‘s network. Wrap Around Time for T3-45Mbps (232

x 8)

/45Mbps=763.55sec=12.73 min

5. What do you mean by congestion?

Any given node has a number of I/O ports attached to it. There are two buffers at each

port—one to accept arriving packets & another one to hold packets that are waiting to

depart. If packets arrive too fast node than to process them or faster than packets can be

cleared from the outgoing buffers, then there will be no empty buffer.

The first such strategy is to discard any incoming packet for which there is no

available buffer space. The alternative is for the node that is experiencing these

problems to exercise some sort of flow control over its neighbors so that the traffic flow

remains manageable.

6. Name the policies that can prevent congestion.

a. Additive Increase Multiplicative decrease

b. Slowstart mechanism

c. Fast retransmit and fast recovery

Page 18: CS2363 EE Question+Bank

18

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

7. What is TINYGRAM?

1byte data + 20 byte IP header + 20 byte TCP header=41 byte => known as ‗

TINYGRAM‘overhead is more . ( - for one byte data over head is 40 byte)

8. Give the datagram format of UDP.

Source port address:- It is the address of the application program that has created the

message.

Destination port address:- It is the address of the application program that will receive

the message.

Source port

Address

16 bits

Destination port

Address

16 bits

Total Length

16 bits

Checksum

16 bits

Total Length :- It defines the total length of the user datagram in bytes.

Checksum :- It is a 16 – bit field used in error correction.

9. What is function of transport layer?

The protocol in the transport layer takes care in the delivery of data from

one application program on one device to an application program on

another device. They act as a link between the upper layer protocols and

the services provided by the lower layer.

9. What are the duties of the transport layer?

The services provided by the transport layer

End-to- end delivery

Addressing Reliable

delivery Flow control Multiplexing

11. What is the difference between network layer delivery and the

transport layer delivery?

Network layer delivery: * The network layer is responsible for the the source-to-destination delivery of packet

* The transport layer is responsible for source-to-destination delivery

of the entire message. Transport layer delivery across multiple network links. The transport layer

is responsible for source-to-destination delivery of the entire message.

Page 19: CS2363 EE Question+Bank

19

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

12. What are the four aspects related to the reliable delivery of data?

The four aspects are, Error control, Sequence control, Loss control,

Duplication control.

13. What is meant by segment?

At the sending and receiving end of the transmission, TCP divides long transmissions into smaller data units and packages each into a frame called a segment.

14. What is meant by segmentation?

When the size of the data unit received from the upper layer is too long for the network layer datagram or data link layer frame to handle, the transport protocol divides it into smaller usable blocks. The dividing

process is called segmentation.

15. What are the types of multiplexing?

The types of multiplexing are,

Upward multiplexing

Downward multiplexing

10. What are the two possible transport services?

Two basic types of transport services are,

Connection service

Connectionless services

16. The transport layer creates the connection between source and destination. What are the three events involved in the connection?

For security, the transport layer may create a connection between the two end ports. A connection is a single logical path between the source

and destination that is associated with all packets in a message. Creating a connection involves three steps:

Connection establishment

Data transfer & Connection release.

17. What is meant by congestion?

Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources.

18. Why the congestion occurs in network?

Congestion occurs because the switches in a network have a limited

Page 20: CS2363 EE Question+Bank

20

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

buffer size to store arrived packets. 19. What is meant by quality of service?

The quality of service defines a set of attributes related to the performance of the connection. For each connection, the user can request a particular

attribute each service class is associated with a set of attributes.

20. What are the two categories of QoS attributes?

The two main categories are

User Oriented

Network Oriented

21. List out the user related attributes?

User related attributes are

SCR – Sustainable Cell Rate

PCR – Peak Cell Rate

MCR- Minimum Cell Rate

CVDT – Cell Variation Delay Tolerance

22. What are the networks related attributes?

The network related attributes are,

Cell loss ratio (CLR)

Cell transfer delay (CTD) Cell delay

variation (CDV) Cell error ratio (CER)

23. What are the rules of nonboundary-level masking?

The bytes in the IP address that corresponds to 255 in the

mask will be repeated in the subnetwork address.

The bytes in the IP address that corresponds to 0 in the

mask will change to 0 in the subnetwork address

For other bytes, use the bit-wise AND operator.

24. Define Gateway.

A device used to connect two separate networks that use different

communication protocols.

25. What is LSP?

In link state routing, a small packet containing routing information sent by a router to all other router by a packet called link state packet.

Page 21: CS2363 EE Question+Bank

21

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

26. What is the main difference between TCP & UDP?

TCP UDP

It provides Connection oriented service Provides connectionless service.

Connection Establishment delay will be

there

No connection establishment delay

Provides reliable service Provides unreliable, but fast service

It is used by FTP, SMTP It is used by audio, video and

multimedia applications.

27. Give some examples for situations using UDP.

It is very useful for audio or video delivery which does not need

acknowledgement. It is useful in the transmission of multimedia data.

28. How does TCP sender window size change using effective window?

Calculation of effective window: TCP on Receiver side must keep

Last Byte Received – Last Byte Read <= Max Rcv Buffer.

It advertises a window size of Advertised window = Max Rev buffer – (Last

ByteReceived – Last ByteRead )(i.e.) free space in received buffer.

TCP on sender side

Sender calculates an effective window,

Effective Window = Advertised window –(Last Byte sent – Last Byte Acknowledged)

If Effective. Window > 0 Source can send data.

29. What are the different phases in TCP state machine?

Connection Establishment, Data transfer and Connection Release

30. How check sum is calculated in TCP?

To compute checksum, UDP/TCP prepends a pseudo header to datagram.

Source IP address

Destination IP address

Zero Protocol TCP

Length

Pseudo header is not transmitted nor they included in length. To compare checksum,

Store zeroes in CHECKSUM field

Entire object (pseudo header, header , data) is divided into 16 bits.

Added & taken ones complemented.

31. What is SYN segment?

It is used to start a TCP connection and provides agreement between sender and

receiver on sequence number

32. Name the policies that can prevent congestion.

a. DEC bit.

b. Random Early Detection(RED).

c. Source based congestion avoidance.

Page 22: CS2363 EE Question+Bank

22

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

33. How do transport services differ from the data link layer services?

The data link layer services are at node to node level. But the transport layer services are

end to end level. Both the layers are having the flow control and error control mechanisms.

The data link layer offers at node to node level. But the transport layer offers at end to end

level. Data link layer is responsible for node to node delivery of the frames while transport

layer is responsible for end to end delivery of the entire message.

34. What are the TCP services to provide reliable communication?

Error control,Flow control,Connection control and Congestion control

35. Define the DEC bit mechanism.

Each router under this mechanism monitors the load and explicitly notifies the end nodes

when congestion is going to occur. This notification is implemented by setting a binary

congestion bit which is known as DEC bit, in the header of the packet that follows to the

router. The destination host copies this DEC bit into the corresponding ACK and sends back

to source. Now source can adjust its sending rate to avoid congestion.

36.List out various congestion control and congestion avoidance techniques

congestion control: AIMD, slow start, Fast retransmit and Recovery

congestion avoidance techniques: DEC bit , RED

37. What is a bus topology?

Bus topology uses a multipoint medium and all stations are attached through

appropriate hardware interfacing known as a tap. A full duplex operation is used for

transmission and reception of data in a bus.

38. What is tree topology?

Tree topology is generalization of bus topology. Transmission medium is a branching

cable with no closed loops. It begins at a point known as headend, where one or more

cables start, and each of these may have branches.

39. What is ring topology?

In the ring topology, the network consists of a set of repeaters joined by point-to-

point links in a closed loop. The repeater is a device which receives data in one link

and transmits them in other link.

40. What is star topology? List the advantages of it.

In star topology, each station is directly connected to a common central node. Central

node is referred as star coupler which uses two point-to-point links, one for transmission

in each direction. Its advantages are scalable and easy to identify the fault.

41. What is ARQ? What are the two types of error in flow control and error control?

Automatic Repeat Request is used to retransmit the information automatically when

the packet is lost while transmit. The two types of error in flow control and error control are

single bit error and burst error.

Page 23: CS2363 EE Question+Bank

23

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

42. What is peer to peer process?

Communication between peer to peer process, a protocol defines a communication

service that it exports locally, along with a set of rules governing the messages that

the protocol to implement this service.

PART B [Refer only in Peterson]

1. Write short notes on (i) TCP segment format.(ii) Wrap around time.

iii) silly window syndrome.

2. Explain TCP sliding window algorithm for flow control.

3. (i) Explain DECbit mechanism in detail. (8)

(ii)Explain the slow start mechanism. (8)

4. Describe about congestion control algorithms in detail

5. Discuss about congestion avoidance algorithm in detail.

6. Explain Adaptive retransmission policy in detail.

7. Explain the real transport protocol of UDP and how will you calculate checksum in

UDP? What is the significance of Pseudo Header in UDP?

8. Explain the TCP Connection establishment and termination using Timeline diagram.

9. Explain TCP state Transition diagram.

10. Explain the significance of Clark‘s solution and Nagle‘s algorithm

11. Explain connection establishment and connection closing in TCP.

12. What is PUSH mechanism? Explain CODE BITS in TCP header.

13. Explain the working of TCP using The state Diagram

14. Explain adaptive flow control in detail and its uses

15. How the connection is established using three-way handshaking, explain in detail

16. Discuss briefly about the techniques used to improve Qos

Page 24: CS2363 EE Question+Bank

24

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

UNIT – IV

PART A

1.lossless compression

Ensures that the data recovered from the compression/decompression process

is exactly the same as the original data. A lossless compression algorithm is used to

compress file data, such as executable code, text files, and numeric data, because programs

that process such file data cannot tolerate mistakes in the data.

2. lossy compression

does not promise that the data received is exactly the same as the data

sent. This is because a lossy algorithm removes information that it cannot later restore.

Hopefully, however, the lost information will not be missed by the receiver. Lossy algorithms

are used to compress still images, video, and audio.

3. Delta encoding,

simply encodes a symbol

as the difference from the previous one. Thus, for example, AAABBCDDDD would

be represented as A001011000. Note that delta encoding is likely to work well for

encoding images where adjacent pixels are similar. It is also possible to perform RLE

after delta encoding, since we might find long strings of 0s if there are many similar

symbols next to each other.

4. Block Diagram for JPEG Compression

5. DCT phase

In jpeg compression,The first phase applies the discrete cosine transform (DCT) to the block.

If the image is a signal in the spatial domain, then DCT transforms this signal

into an equivalent signal in the spatial frequency domain. This is a lossless operation

but a necessary precursor to the next, lossy step. It takes

an 8 × 8 matrix of pixel values as input and outputs an 8 × 8 matrix of frequency

coefficients.

6.Quantization phase:

It is the second phase of JPEG compression where the insignificant bits of the frequency

coefficients obtained from DCT phase are dropped. This phase is lossy.

7.Encoding phase:

This is the final phase of JPEG compression where the quantized frequency coefficients are

encoded in a compact form. This results in additional compression, but this compression is

lossless.

Page 25: CS2363 EE Question+Bank

25

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

8.Data compression:

The goal of data compression,

is to remove as much redundancy from the data as possible,

so that we may encode it in as few bits as possible. There is a requirement that the sending

and receiving hosts to process every byte of data in the

message

9. Authentication means verifying the identity of the remote Participant.

10.Digital signature:

A digital signature is a special case of a message integrity code, where the code can have

been generated only by one participant.eg. RSA signature, where, a given participant

is the only one that knows its own private key, the participant uses this key to produce

the signature

11.Public and Private key:

Any of several encryption algorithms (e.g., RSA), in which

each participant has a private key (shared with no one else) and a public key (available

to everyone). A secure message is sent to a user by encrypting the data with that user‘s

public key; possession of the private key is required to decrypt the message, and so

only the receiver can read it.

12. Cryptographic hash functions

typically don‘t involve the use of keys. Instead, the idea is to map a potentially large

message into a small fixed-length number, analogous to the way a regular hash function

maps values from a large space into values from a small space.

13.Define PKI.

Public Key Infrastructure(PKI), is a complete scheme for certifying binding between

public key and identities. PKI starts with ability to verify the identities and bind them to keys

OUT-of-Band.(range something ouside the n/w).

14. Define X.509 authentication.

One of the major standard for certicates is known as X.509.It includes

a) Identity of the entity being certified

b) Public key of the entity being certified

c) Identity of the signer

d) Digital signature

e) Dig Sig Algorithm identifier

f) Timer Expiration(optional)

15.Define CA.

Certification Authority(CA) is an entity claim to be trust worthy for verifying identities

and issuing public key certificates. They are classified as Commercial CA, Govermental

CA and Even Free CA. You must use own keys if CA is used. It is also known as Self

certifying certificates.

17.Define Nonce.

Nonce is the random number which is used only once in the message.

Page 26: CS2363 EE Question+Bank

26

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

18. Define PGP.

Pretty good Privacy(PGP) is the widely used approach to provide security for Email.

It provides authentication, confidentiality, data integrity and Non-repudiation.

19. Define Handshake protocol in security.

A pair of of TLS participants negotiate at run time which cryptography to use.

The participants negotiate the choice of

a) data integrity Hash, MD5 or SHA used to implement HMAC.

b) Symmetric key cipher for confidentiality among the possibilities are DES, AES ,

3DES

c) Session key establishment approach .

20. Define Record Protocol.

With in session establish by the handshake protocol TLS record protocols add

confidentialty and integrity to the underline transport services. Messages handed down from

the application layer are

a) Fragmented or coalesced into blocks of convenient size.

b) Optionally compressed

c) Integrity protected using Hmac.

d) Encrypted using a symmetric key cipher.

e) Past to the transport layer for transmission.

21.Define Firewalls.

A firewall is a system that is a sole point of connectivity between the sited it protects and

the rest of the network.

22. Define Demilitarized Zone(DMZ).

DMZ is used to hold services such as DNS and Email server that need to be accessible to

the outside.

22. Define Packet filter.

It filter the packet from third person using firewall mechanism, but it will not detect the

state of the packet where it arrive.

Part B.

1.Explain in detail about Video Compression.(Refer in Peterson)

2. Explain in detail about Image Compression.(Refer in Peterson)

3.Explain in detail about Audio Compression.(Refer in Peterson)

4.Explain in detail about PGP.(Refer in William stallings)

5. Explain in detail about TLS and IP security. .(Refer in Peterson)

6. Discuss in Detail about Firewalls. .(Refer in William stallings)

7.Disucuss in detail about Kerberos. .(Refer in Peterson)

8. Explain in detail about key predistribution. .(Refer in Peterson)

9.Explain in detail abot Diffie-Hellmann Algorithm.(Refer in Peterson)

10.Explain in detail about modes of operation in security.(Refer in William stallings)

Page 27: CS2363 EE Question+Bank

27

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

UNIT – V

PART A

1. List the capabilities provided by the SIP (Session Intimation Protocol).

User location

User availability

User capabilities

Session setup

Session management

2. What is the Domain Name System responsible for?

The Domain Name System converts domain names (of the form www.vtubooks.com)

into IP numbers.

3. Why do we need a Domain Name System? What role does the DNS Resolver play

in the DNS system?

IP numbers uniquely identify hosts on the Internet: however they are difficult to remember.

We therefore need a memorable way of identifying hosts. A DNS Resolver is responsible for

making requests of the local DNS server in behalf of clients.

4. How does a DNS Resolver bootstrap the Domain Name Lookup process?

A DNS Resolver must know the IP address of at least one DNS server. It uses this

address to start the DNS Lookup process.

5. What are the four main properties of HTTP?

Global Uniform Resource Identifier.

Request-response exchange.

Statelessness.

Resource metadata.

6. What are the four groups of HTTP Headers?

The four groups of HTTP headers are General headers, Entity Headers, Request

Headers and Response Headers.

7. What is WWW and SMTP?

The SMTP is used for connection between sending mail. WWW is an internet

application that allows user to view pages and move from one web page to another.

8. What do you mean by active web pages?

When a client send a HTTP request for an active Web page, the Web server sends back an

HTTP response that contains an HTML page as usual. HTML page also contains a small

program that executes on the client computer inside the Web browser.

9. What are the transmission modes of FTP?

i. Stream mode: Default mode and data is delivered from FTP to TCP as a continuous

stream of data.

ii. Block mode: Data is delivered from FTP to TCP in terms of blocks. Each data block

follows the three byte header.

Page 28: CS2363 EE Question+Bank

28

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

iii. Compressed mode: File is compressed before transmitting if size is big. Run length

encoding method is used for compression.

10. Compare the HTTP and FTP:

S.No FTP HTTP

1. FTP transfers the file from client to

server and server to client.

HTTP transfer the file from server to

client.(i.e. web pages)

2. It uses two different port

connections. (i.e. port 20 and port

21)

HTTP use only one port connection.

(i.e. Port 80)

3. Uses TCP protocol. It also use TCP protocol.

11. List the two types of DNS message.

DNS messages are: Query and Response. The query message consists of the header

and the question records. The response message consists of a header, question record,

answer record, authoritative record and additional record.

12. Define threats.

Information access threats intercept or modify data on behalf of users who should not have

access to that data. Service threats exploit service flaws in computers to inhibit use by

legitimate users.

13.What is meant by attack?

An attack on system security that derives from an intelligent threat: that is an

intelligent act that is a deliberate attempt to evade security services and violate the

security policy of a system.

14. What is use of digital signature? What are the basic functions of e-mail?

Data appended to, or a data unit that allows a recipient of the data unit to prove the

source and integrity if the data unit and protect against forgery. Basic functions of e-

mail: composition, Transfer, Reporting, Displaying, and Disposition.

15. What is a URL and web browser?

Uniform Resource Locator is a string identifier that identifies a page on the World

Wide Web. Web browser is a software program that interprets and displays the

contents of HTML web pages.

16. What is rlogin? What are the two methods of HTTP?

Remote login is used to login into remote system and access its contents.

Two methods of HTTP are GetMethod( ) and PostMethod( ).

17. What is the main difference between FTP & HTTP?

FTP – Out – of – band, HTTP – In – band.FTP uses two parallel TCP connections to transfer

a file. They are Control Connection and Data connection.

18. What are the advantages of stateless server of HTTP?

Because of the statelessness of HTTP, it need not remember any transaction,

request or response. This results in a very simple implementation without the need

for complex state machines.

Page 29: CS2363 EE Question+Bank

29

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

19. What is the use of MIME Extension?

MIME converts binary files, executed files into text files. Then only it can be

transmitted using SMTP

SMTP cannot transmit text data including national language characters. MIME translates all

these non ASCII codes to SMTP 7 bit ASCII code

Messages – more than certain size can be translated by MIME into SMTP acceptable size

20. Which protocol support email and give details about that protocol?

SMTP is a standard protocol for transferring mails using TCP/IP

SMTP standardization for message character is 7 bit ASCII

SMTP adds log info to the start (i.e.) path of the message

21. How will you categorize DNS.

Internet is divided into many top level domains. Each domain is divided into sub

domain and so on.Topmost domains are categorized into generic and countries.

Generic domain categories:

com- commercial

gov- US government

edu- educational

org- profile organization

mil- US military

net- network providers.

23.Name some of the country category

uk - United kingdom, sg -singapore

jp - Japan, in - India

24.What an application program of DNS does?

The application program interested in obtaining IP address of a domain name calls

a library program "Resolver". Resolver sends UDP packet to nearest DNS server

(local DNS server)

Local DNS server looks up domain name and returns IP address to resolver as in

previous part. Resolver returns IP address to application program.

25. Describe why HTTP is designed as a stateless protocol.

Maintaining state across request-response connections significantly increase the

initial interactions in a connection since the identity of each party needs to be established

and any saved state must be retrieved. HTTP is therefore stateless to ensure that the

Internet is scalable since state is not contained in the HTTP request/response pairs by

default.

Page 30: CS2363 EE Question+Bank

30

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

26. Give an example for hierarchy of name servers.

27. What are the tables containing name servers?

Name servers are {name, value, type, class, TTL}

28. Define MIB. MIB is a companion specification that helps that helps client indicate which piece of

information it wants to retrieve and also helps the server know which variable in memory to

read to satisfy the request. The MIB defines the specific pieces of information—the MIB

variables—that you can retrieve from a network node. The current version of MIB, called

MIB-II, organizes variables into 10 different groups.

29. Define WSDL.

Web services definition language.

<wsdl:data types>

<wsdl:message>

<wsdl:port>

<wsdl:binding>

<wsdl:services>

30. Define MEP.

Message exchange pattern (MEP) that gives the sequence in which the message has to be

transmitted including the fault message to be sent when an error disrupts the message flow.

Page 31: CS2363 EE Question+Bank

31

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

31. What are the features of SOAP protocol?

Soap Envelope

Soap Part

Soap header

Soap header

Soap header

Soap Proxy

XML

Soap Default

32. Define Session Control Protocol and mention the different categories.

Many multimedia applications need a protocol called the session control protocol. For

example, suppose that we wanted to be able to make IP-based telephone calls across the

Internet. Session control protocol provides a mechanism to notify the intended recipient to

expect such a call for example, by sending a message to some multimedia device that would

cause it to make a ringing sound. We would also be able to support features like call

forwarding, three-way calling,

and so on using SCP.

The protocols that have been defined include

■ SDP (Session Description Protocol)

■ SAP (Session Announcement Protocol)

■ SIP (Session Initiation Protocol)

■ SCCP (Simple Conference Control Protocol)

33. Define Session Initiation Protocol (SIP)

SIP is an application-layer protocol that resembles HTTP. However, it is designed with a

different

sort of applications in mind, and thus provides quite different capabilities than HTTP.

The capabilities provided by SIP can be grouped into five categories:

■ User location: determining the correct device with which to communicate to

reach a particular user

■ User availability: determining if the user is willing or able to take part in a

particular communication session

■ User capabilities: determining such items as the choice of media and coding

scheme to use

■ Session setup: establishing session parameters such as port numbers to be used

by the communicating parties

■ Session management: a range of functions including transferring sessions (e.g.,

to implement ―call forwarding‖) and modifying session parameters

34. What are the informations included in SDP?

SDP conveys the following information:

■ The name and purpose of the session

■ Start and end times for the session

■ The media types (e.g., audio, video) that comprise the session

■ Detailed information needed to receive the session (e.g., the multicast address

Page 32: CS2363 EE Question+Bank

32

Prepared By Suresh Kumar. M Assistant Professor

Department of Computer Science and Engineering

to which data will be sent, the transport protocol to be used, the port numbers,

the encoding schemes)

35. Define peer-to-peer network.

A peer-to-peer network allows a community of users to pool their resources (content, storage,

network bandwidth, disk bandwidth, CPU), thereby providing access to larger archival stores,

larger video-audio conferences, more complex searches and computations, and so on, than

any one user could afford individually.

For example, in the context of sharing MP3 files it means not having

to download music from a central site, but instead being able to access music files

directly from whoever in the Internet happens to have a copy of the required .mp3 file stored

on their computer.

PART B

1. Discuss how the Simple Mail Transfer Protocol (SMTP) is useful in electronic mail.

2. Describe about the World Wide Web (WWW).

3. What is Domain Name Service (DNS) and explain in detail about the domain

hierarchy and name servers.

4. Discuss about MIME, IMAP and POP3

5. Explain about HTTP.

6. Explain the SMTP and HTTP . Give their uses, state strengths and weaknesses.

7. Explain The role Of DNS in computer network

8. what is the idea used in public key encryption systems

9. Explain the salient Features of the SMTP protocol

10. Discuss about the components of network Management on the Internet

11. Write short notes on symmetric –Key –cryptography

12. How does the E-Mail system Work?

13. Explain in detail about WWW.

Note

All u can refer some problems based, what I taught in the class.