You are on page 1of 2

Department of Computer Science and Engineering

Mawlana Bhashani Science and Technology University


CSE 4107: Network Routing and Switching
Assignment-3

TCP/UDP:

1. Describe the types of data delivery in network


2. Compare the TCP header and the UDP header. List the fields in the TCP header that are
missing from UDP header. Give the reason for their absence.
3. Explain the header of TCP segment/ explain the key features of TCP.
4. The following is a dump of a UDP header in hexadecimal format.
0632000DOO lCE217
i. What is the source port number?
ii. What is the destination port number?
iii. What is the total length of the user datagram?
iv. What is the length of the data?
5. Write the following well known UDP protocol port number and function.
6. RPC, SNMP, Echo and NTP.
7. Draw and describe the UDP format / Explain the UDP datagram.
8. What is the minimum and maximum size of UDP
9. Write the following well known TCP protocol port number and function.
FTP, SMTP, BOOTP and HTTP.
10. Draw and describe the TCP segment format. Explain the following fields in the IP Packet
header i) time to live ii) fragment offset iii)header checksum
11. Explain connection establishment process in TCP.
QoS and VPN:

1. How are congestion control and quality of service related?


2. Explain how congestion is managed effectively by TCP.
3. What is a virtual private network (VPN)? Mention the different types of VPN and
benefits of deploying a VPN.
4. Explain the operation of fair queuing scheduler in context with packet scheduling of
integrated service.
5. What is the relationship between the average data rate and the peak data rate?
6. Give the overview of QoS methods in integrated services.
7. Explain the leaky bucket traffic shaping algorithm with state diagram and algorithm
8. Describe thee four general techniques to improve quality of service?
9. Explain Token Bucket Traffic Shaping
10. Differentiate between leaky bucket and token bucket traffic shaping.
11. What are the factors that affect QoS of VoIP.
12. How is jitter estimated in real time traffic?

Mobile Ad-Hoc Networks, Wireless sensor networks:

1. List the security issues in adhoc networks. Explain the types of attacks
2. Explain Mobile Ad-Hoc Networks (MANET) and Vehicular Ad-hoc Network (VANET).
Give two significant difference of them.
3. State and explain the classification of routing protocols used in Adhoc network.
4. What are ad-hoc networks? Mention their applications types and unique features.
5. What is the role of a cluster head in the clustering protocol?
6. Explain AODV protocol
7. Explain security of ad-hoc networks and various types of attacks.
8. What is sensor network? Explain clustering in Sensor networks.
9. State and explain the block diagram of a typical wireless sensor node.
10. What do clustering protocols specify? Explain any one clustering protocol in detail.

You might also like