You are on page 1of 2

MSIT31 COMPUTER NETWORKS II ASSIGNMENT TA 1. 2. 3. 4. Explain the concepts of protocol & protocol stack.

k. 05M List the different layers in the OSI model. Explain each one of them in brief.10M How does the TCP/IP protocol stack compare with the OSI model? 05M What is the need for an IP address? Discuss the different classes of IP addresses. Given an IP address, how do you find its class? 05M 5. Differentiate between the following: Unicast / multicast/ broadcast addresses Direct/indirect routing 05M 6. Explain the different fields that makeup the IP header. 10M 7. Discuss the two categories of ICMP messages. 10M ASSIGNMENT TB

1. The computer networks or the Internet is a _________, _________ system. 2. What is a protocol ? 3. The two types of routing are _________ routing and ________________ routing. 4. The IP datagram header has the IP address of __________ and ___________ systems. 5. Flow control is achieved through the use of ___________ mechanism. 6. UDP offers __________ to __________ data communication. 7. TCP offers __________ duplex data transfer service. 8. In TCP/IP the two communicating process can be best described using the ________ model. 9. The number of connections required for FTP operation is __________. 10. Information regarding the file, such as file type, structure, transmission mode are sent to the server ________ the data transfer takes place. 11. What is connectionless - iterative server? 12. What is cryptography? 13. What is public key? 14. A traditional method of _________ involves demonstrating possession of a secret. 15. Explain the Encapsulation and Decapsulation mechanism used in UDP. PART - B 1. a) Explain briefly the OSI architecture, its salient features such as layered architecture, peer-to-peer processes and layer organisation. b) Make a brief comparison between OSI and TCP/IP models. 2. a) Briefly explain the IP datagram header. b) Explain unicast, multicast and broadcast addresses. 3. a) Explain the format of an ARP packet. b) Write a note on RARP.

4. a) Explain UDP checksum computation with an example. b) Explain multiplexing and demultiplexing mechanism in UDP. 5. a) Explain the flow control mechanism in TCP. b) Explain the need of pushing data operation in TCP. 6. a) Write a brief description about client-server model. b) Briefly explain, how the control connection is created in FTP. 7. Explain briefly the steps involved in storing an image file into the server from client side. 8. a) Explain the application of cryptography to security. b) Discuss the secret key cryptography. c) What is key distribution ? Explain.