Professional Documents
Culture Documents
1. What are the three criteria necessary for an effective and efficient network?
(Remember)
The most important criteria are performance, reliability and security.
Performance of the network depends on number of users, type of transmission medium, and
the capabilities of the connected h/w and the efficiency of the s/w.
Reliability is measured by frequency of failure, the time it takes a link to recover from the
failure and the network’s robustness in a catastrophe.
Security issues include protecting data from unauthorized access and viruses.
2. Group the OSI layers by function? (Create) (APR/MAY 2021)
The seven layers of the OSI model belonging to three subgroups.
Physical, data link and network layers are the network support layers; they deal with the
physical aspects of moving data from one device to another.
Session, presentation and application layers are the user support layers; they allow
interoperability among unrelated software systems.
The transport layer ensures end-to-end reliable data transmission.
3. What are header and trailers and how do they get added and removed?
(Remember & Understand)
Each layer in the sending machine adds its own information to the message it receives from
the layer just above it and passes the whole package to the layer just below it. This
information is added in the form of headers or trailers. Headers are added to the message at
the layers 6,5,4,3, and 2. A trailer is added at layer2. At the receiving machine, the headers or
trailers attached to the data unit at the corresponding sending layers are removed, and actions
appropriate to that layer are taken.
4. What are the features provided by layering? ( MAY /JUNE 2013) (Remember)
- It decomposes the problem of building a network into more manageable components.
- It provides a more modular design.
5. Why are protocols needed? (Understand)
In networks, communication occurs between the entities in different systems. Two entities
cannot just send bit streams to each other and expect to be understood. For communication,
the entities must agree on a protocol. A protocol is a set of rules that govern data
communication.
6.What are the two interfaces provided by protocols? (Analyze)
Service interface- defines the operations that local objects can perform on the protocol.
Peer interface- defines the form and meaning of messages exchanged between protocol
peers to implement the communication service.
7. What is Transmission media? Give Examples. (Remember)(NOV/DEC 2019)
- Twisted pair(the wire that phone connects to)
- Coaxial cable(the wire that TV connects to)
- Optical fiber(the medium most commonly used for high-bandwidth, long-distance
links)
- Space(radio waves, microwaves and infra red beams propagate through)
8.Define Signals? (Remember)
Signals are actually electromagnetic waves traveling at the speed of light. The speed of light
is, however, medium dependent-electromagnetic waves traveling through copper and fiber do
so at about two-thirds the speed of light in vacuum.
9. What is wave’s wavelength? (Remember)
The distance between a pair of adjacent maxima or minima of a wave, typically measured in
meters, is called wave’s wavelength.
10. Define Modulation? (Remember)
Modulation -varying the frequency, amplitude or phase of the signal to effect the
transmission of information. A simple example of modulation is to vary the power
(amplitude) of a single wavelength.
11. Explain the two types of duplex? (Understand)
- Full duplex-two bit streams can be simultaneously transmitted over the links at the
same time, one going in each direction.
- Half duplex-it supports data flowing in only one direction at a time.
12. What is CODEC? (Remember)
A device that encodes analog voice into a digital ISDN link is called a CODEC, for
coder/decoder.
13. What is a buffer? (Remember)
Each receiving device has a block of memory called a buffer, reserved for storing incoming
data until they are processed.
14. What are the major duties of Network Layer ( MAY/JUNE 2012) (Understand)
Logical Addressing
Routing
Datagram Encapsulation
Fragmentation and Reassembly
Error Handling and Diagnostics
15. Write the parameters used to measure network performance. (MAY /JUNE 2016)
(Understand)
Bandwidth
Throughput
Latency
Jitter
Error rate
Interplay of factors
16. What is the use of Switch? ( MAY / JUNE 2012 ) (Remember)
It is used to forward the packets between shared media LANs such as Ethernet. Such switches
are sometimes known by the obvious name of LAN switches.
17. What is the function of Bridge? (NOV 2010) ( NOV / DEC 2011 ) ( MAY 2012)
(APRIL / MAY 2015) (MAY/JUNE 2017) (Remember)
Bridge is used to connect two LANs.Bridges simply accept LAN frames on their inputs and
forward them out on all other outputs.
18. What is Spanning tree? (Remember)
It is for the bridges to select the ports over which they will forward frames.
19. What are the three pieces of information in the configuration messages?(Remember)
1. The ID for the bridge that is sending the message.
2. The ID for what the sending bridge believes to the root bridge.
3. The distance, measured in hops, from the sending bridge to the root bridge.
20. What is broadcast? (Remember)
Broadcast is simple – each bridge forwards a frame with a destination broadcast address out
on each active (selected) port other than the one on which the frame was received.
21. What is multicast? (NOV / DEC 2011 ) (Remember)
It can be implemented with each host deciding for itself whether or not to accept the
message.
22. What are the limitations of bridges? (NOV /DEC 2013) (Understand)
1. Scalability 2. Heterogeneity
23. Define source routing. (NOV /DEC 2013) (Remember)
In computer networking, source routing allows a sender of a packet to partially or completely
specify the route the packet takes through the network.
24. What is the difference between switch and bride?(NOV / DEC 2012) (Analyze)
• Packet forwarding in Bridges are performed using software. Packet forwarding in Switches
are performed using ASICs (Application Specific Integrated Circuits).
• Switches operate comparatively higher speeds that Bridges.
• Method of switching of a Bridge is store and forward. Method of switching of a Switch can
be store and forward, cut-through or fragment-free.
• Normally a Switch has more ports than a Bridge.
• Bridges can operate only in half duplex mode, but a Switch can operate both in half duplex
or full duplex mode.
25. What are the three criteria necessary for an effective and efficient network?
(Remember)
The most important criteria are performance, reliability and security. Performance of the
network depends on number of users, type of transmission medium, the capabilities of the
connected h/w and the efficiency of the s/w. Reliability is measured by frequency of failure,
the time it takes a link to recover from the failure and the network’s robustness in a
catastrophe. Security issues include protecting data from unauthorized access and viruses.
26. Group the OSI layers by function. (Remember)
The seven layers of the OSI model belonging to three subgroups.
Network support layers: Consisting of Physical, data link and network layers and they deal
with the physical aspects of moving data from one device to another. User support layers:
Consists of Session, presentation and application layers and they allow interoperability
among unrelated software systems. The transport layer ensures end-to-end reliable data
transmission
27. What are the features provided by layering? (Remember)
It decomposes the problem of building a network into more manageable components.Rather
than implementing a monolithic piece of software that does everything implement several
layers, each of which solves one part of the problem. It provides more modular design. To
add some new service, it is enough to modify the functionality at one layer, reusing the
functions provided at all the other layers.
28. What are the two interfaces provided by protocols? (Remember)
Service interface and Peer interface
Service interface-defines the operations that local objects can perform on the protocol.
Peer interface-defines the form and meaning of messages exchanged between protocol
peers to implement the communication service.
29. What is LAN? (Remember)
A LAN is a common name used to describe a group of devices that share a geographic
location. LAN is limited to single building or campus.
30. What is OSI? (Remember)
A standard that specifies a conceptual model called Open systems Interconnection network
interface model, which breaks networked communications into seven layers: Application,
Presentation, Session, Transport, Network, Data link, Physical.
31. State the major functions performed by the presentation layer of the ISO OSI
model. (Nov Dec 2006) (Remember)
Presentation layer is concerned with the format of data exchanged between peers, for
example, whether an integer is 16, 32, or 64 bits long and whether the most significant bit is
transmitted first or last, or how a video stream is formatted.
32. State the purpose of layering in networks? (May Jun 2007) (Remember)
A layer is a collection of related functions that provides services to the layer above it and
receives services from the layer below it. To execute the functions by each layer is
independent.
33. What are the two fundamental ways by which network performance is measured?
(Remember)
1. Bandwidth 2. Latency
34. Define the term medium access control mechanism . (Remember)
The protocol that determines who can transmit on a broadcast channel are called medium
access control (MAC) protocol. The MAC protocols are implemented in the Mac sub-layer
which is the lower sub-layer of the data link layer.
35. What is bridge? (Remember)
Bridge is a hardware networking device used to connect two LANs. A bridge operates at data
link layer of the OSI reference model.
36. What is a repeater? (Remember)
Repeater is a hardware device used to strengthen signals being transmitted on a network.
37. Define router(Remember)
A network layer device that connects networks with different physical media and translates
between different network architecture.
38. Outline the need for Switching. (Remember) (NOV/DEC 2019)
Switching is a networking concept which makes use of a device called switch that manages
networked connections between devices on a star networks. (Remember)
39. Define topology and mention the types of topologies. (Remember)
Topology defines the physical or logical arrangement of links in a network Types of topology
- Mesh- Star- Tree- Bus- Ring
40. Define Hub. (Remember)
In a star topology, each device has a dedicated point to point link only to a central controller
usually called a hub
41. Give an advantage for each type of network topology. (Remember)
1. Mesh topology:* Use of dedicated links guarantees that each connection can carry its own
data load, thus eliminating traffic problems.* Robust and privacy / security.
2. Star topology:* Less expensive than mesh.* Needs only one link and one input and output
port to connect it any number of others.* Robustness.
3. Tree topology:* same as those of a star.
4. Bus topology:* Ease of installation.* Uses less cabling than mesh, star or tree topologies.
5. Ring topology:* A ring is relatively easy to install and reconfigure.* Each device is linked
only to its immediate neighbors.* Fault isolation is simplified.
42. List the layers of OSI mode(Remember)
Physical- Data Link - Network - Transport- Session- Presentation- Application.
43. Define OSI model.
The open system Interconnection model is a layered framework for the design of network
system that allows for communication across all types of computer systems.
44. Which OSI layers are the network support layers?- (Remember)
Physical- Data link - Network layers.
45. Which OSI layers are the user support layers?- (Remember)
Session- Presentation- Application.
46. What are the responsibilities of physical layer, data link layer, network layer, transport
layer,session layer, presentation layer, application layer.(Analyse) .(APR/MAY 2021)
(i) Physical layer-Responsible for transmitting individual bits from one node to the next.
(ii) Data link layer – Responsible for transmitting frames from one node to the next
(iii) Network layer – Responsible for the delivery of packets from the original source to the
final destination.
(iv) Transport layer – Responsible for delivery of a message from one process to another.
(v) Session layer – To establish, manage and terminate sessions.
(vi) Presentation layer – Responsible to translate, encrypt and compress data.
(vii) Application layer – Responsible for providing services to the user. To allow access to
network resources.
47. Define the term transmission medium.
The transmission medium is the physical path between transmitter and receiver in a data
transmission system. The characteristics and quality of data transmission are determined both
the nature of signal and nature of the medium.
48. What are the types of transmission media?
Transmission media are divided into two categories. They are as follows:
(i) Guided transmission media(ii) Unguided transmission media.
49. How do guided media differ from unguided media?
A guided media is contained within physical boundaries, while an unguided medium is
boundless.
50. What are the three major classes of guided media?
Categories of guided media.1. Twisted – pair cable.2.Coaxial cable.3.Fiber – optic cable.
51. What is piconet and scatternet? (NOV/DEC 2016) (Remember)
A piconet is a network of devices connected using Bluetooth technology. The network ranges
from two to eight connected devices. When a network is established, one device takes the
role of the master while all the other devices act as slaves.Piconet gets its name from the
word "pico", which means very small.
A scatternet is a type of ad hoc computer network consisting of two or more piconets. The
terms "scatternet" and "piconet" are typically applied to Bluetooth wireless technology.
52. List the metrics that influence the performance of computer networks. (Understand)
(April/May 2018)
i)Bandwidth ii)Throughput iii)Latency iv) Jitter v) Error Rate vi) Interplay of factors.
53. Which layer implements the node to node channel connection in OSI layered
Architecture? (Analyse)(April May 2018)
Data Link Layer
PART – B
1. Describe about circuit switching and packet switching.
(Understand)(NOV2011/NOV2012/ MAY/JUNE 2017,NOV/DEC 2019,APR/MAY 2021)
2. What is Ethernet? Explain in detail. (NOV 2011) (Remember)
3. Discuss in detail about the layers of OSI model.(Evaluate)(MAY2011/NOV2010)
NOV/DEC 2016) (APR/MAY 2021)
4. Discuss in detail about HDLC. (Evaluate)(MAY2011)
5. Explain the different approaches of framing in detail. (MAY2011)
(Understand),(April/May 2018)
6. Draw the OSI network architecture and explain the functionalities of everylayer in detail.
(NOV/DEC 2015) (NOV/DEC 2016) (Analyze & Understand),(April/May 2018,
NOV/DEC 2019)
7. Explain the challenges faced in building a network.(MAY/JUNE 2017) (Understand)
8. Consider a bus LAN with a number of equally spaced stations with a data rate of 9 Mbps
and a bus length of 1 km. What is the mean time to send a frame of 500 bits to another
station, measured from the beginning of transmission to the end of reception? Assume a
propagation speed of 150 m/s. If two stations begin to monitor and transmit at the same time,
how long does it need to wait before an interference is noticed? (MAY/JUNE 2017) (Apply)
9. Explain the frame format for token ring and its frame format (NOV/DEC 2011)
(Understand)
10. With a neat sketch explain about IP service model, packet format, fragmentation and
reassembly.(NOV/DEC 2016). (Create)
11. Consider sending a 3500-byte datagram that has arrived at a router R1 that needs to be
sent over a link that has an MTU size of 1000 bytes to R2. Then it has to traverse a link with
an MTU of 600 bytes. Let the identification number of the original datagram be 465. How
many fragments are delivered at the destination? Show the parameters associated with each
of these fragments. ii. Explain the working of DHCP protocol with its header (MAY/JUNE
2017) (Apply)
PART – C
1. Using the example network given in Figure, give the virtual circuit tables for all the
switches after each of the following connections is established. Assume that the sequence of
connections is cumulative; that is, the first connection is still up when the second connection
is established, and so on. Also assume that the VCI assignment always picks the lowest
unused VCI on each link, starting with 0, and that a VCI is consumed for both directions of a
virtual circuit.
(a) Host A connects to host C. (b) Host D connects to host B.
(c) Host D connects to host I. (d) Host A connects to host B.
(e) Host F connects to host J. (f ) Host H connects to host A. (Apply)
2. Calculate the total time required to transfer a 100 0-KB file in the following cases,
assuming an RTT of 50 ms, a packet size of 1 KB data, and an initial 2×RTT of “
handshaking” before data is sent: We will count the transfer as completed when the last data
bit arrives at its destination. An alternative interpretation would be to count until the last
ACK arrives back at the sender, in which case the time would be half an RTT (25ms) longer.
a) The bandwidth is 1.5 Mbps, and data packets can be sent continuously.
b) The bandwidth is 1.5 Mbps, but after we finish sending each data packet
we must wait one RTT before sending the next.
c) The bandwidth is “infinite,” meaning that we take transmit time to be zero,
and up to 20 packets can be sent per RTT.
d) The bandwidth is infinite, and during the first RTT we can send one
packet (21−1), during the second RTT we can send two packets (22−1),
during the third we can send four (23−1), and so on. (Apply)
3. Consider a point-to-point link 4 km in length. At what bandwidth would propagation delay
(at a speed of 2×108m/s) equal transmit delay for 100-byte packets ? What about 512-byte
packets?
4. Suppose a 1-Gbps point-to-point link is being set up between the Earth and a new lunar
colony. The distance from the moon to the Earth is approximately 385,000 km, and data
travels over the link at the speed of light—3×10 8 m/s.
a) Calculate the minimum RTT for the link.
b) Using the RTT as the delay, calculate the delay × bandwidth product for the link.
c) What is the significance of the delay × bandwidth product computed in (b)?
d) A camera on the lunar base takes pictures of the Earth and saves them in digital format to
disk. Suppose Mission Control on Earth wishes to download the most current image,
which is 25 MB. What is the minimum amount of time that will elapse between when the
request for the data goes out and transfer is finished?
5. Suppose a 128-Kbps point to point link is set up between the Earth and a rover on Mars.
The distance from the Earth to Mars(When they are closest to each other)is approximately 55
Giga meters, and data Travels over the link at the speed of light at 3*108 m/s.
i)Calculate the ,minimum RTT for the link.
ii)Calculate the delay-bandwidth product for the link.
iii)A camera on the rover takes pictures of its surroundings and sends these to Earth? Assume
that each image is in 5Mb in size.(April May 2018)
ASSIGNMENT QUESTIONS
1. A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per
minute with each frame carrying an average of 10,000 bits. What is the throughput of this
network?(Apply)
2. What is the propagation time if the distance between the two points is 48,900? Assume the
propagation speed to be 2.4 x 108 metre/second in cable.
(Remember)
3. A device is sending out data at the rate of 2000 bps. How long does it take to send a file of
1, 00,000 characters? (Evaluate)
4. Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice
signal. It is required to sample the signal at twice the highest frequency (two samples per
hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits?
(Apply)
5. How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line
if the transfer is asynchronous? (Assuming 1 start bit and 1 stop bit)
(Evaluate)
6. In a digital transmission, the receiver clock is 0.1% faster than the sender clock. How
many extra bits per second does the receiver receive if the data rate is 1 Mbps?
(Evaluate)
UNIT II –
PART – A
ASSIGNMENT QUESTIONS
1. A 4480-byte datagram is to be transmitted through an Ethernet with a maximum data size
of 1500 bytes frames. Show the values of total length, M flag, Identification and fragment
offset filed in each of the fragments created out of the datagram. (Remember)
2. In a packet switching network, if the message size is 48 bytes and each packet contains a
header of 3 bytes. If 24 packets are required to transmit the message, what is the packet size?
(Apply)
3. Suppose the length of an ethernet cable is 2500 metres. If the speed of propagation in a
thick coaxial cable is 200,000,000 m/s how long does it take for a bit to travel from the
beginning to the end of the network? Assume that there is a 10 micro second delay in the
equipment. (Apply)
4. The data rate of an Ethernet is 10Mbps. How long does it take to create the smallest frame?
Assume the smallest frame size is 64 bytes. (Apply)
5.Explain what might happen if two stations are accidentally assigned the same hardware
address. (Understand)
6.If sharing reduces cost, why are shared networks used only for local communication?.
(Understand)
7. Why wireless LAN cannot use the same CSMA/CD mechanism that Ethernet uses?
(Understand)
UNIT III
PART – A
34. Differentiate between connection less operation and connection oriented operation.
(APRIL / MAY 2013) (Analyze)
36. Identify the class of the following IP Address: ( NOV / DEC 2015 ) (Analyze)
(a) 110.34.56.45 - Class A
(b) 212.208.63.23 -Class
39. What are the metrics used by routing protocols? (APR/MAY 2015) (Create)
PART – B
1. Explain the two approaches of packet switching techniques.(NOV2011) (Understand)
2. Explain IP addressing method. (Understand)
3. Define routing & explain distance vector routing and link state routing
(Understand)(APR/MAY 2021)
4. Define bridge and explain the type of bridges. (NOV2011)(Remember & Understand)
5. Explain sub netting .(DEC 2012) (Understand)
6. Write short notes about repeaters, routers and gateways.(MAY 2012) (Remember)
7. Explain about ARP Protocol.(NOV/DEC 2012,NOV/DEC 2019) (Understand)
8. Explain about Error Reporting Protocol-ICMP (DEC 2012) (Understand)
9. Write Short notes on Interdomain Routing. (DEC2012) (Remember)
10. Suppose hosts A and B have been assigned the same IP address on the same
Ethernet, on which ARP is used. B starts up after A. What will happened to A’s
existing connections? Explain how ‘self-ARP’ might help with this problem.
(NOV/DEC2013) (Apply)
11. Write notes on the following: (i) Internet protocol. (ii) Routers. (NOV 2010)(Remember)
12. Discuss in detail the various aspects of IPV6.(NOV 2010, NOV/DEC 2019)
(Evaluate)
13. Describe with example how CIDR addresses the two scaling concerns in the internet.
(NOV/DEC 2013) (Remember)
14. Describe the Distance Vector Routing Protocol with examples. Mention the limitations of
the same. (NOV/DEC 2013) (APR/MAY2015) (Remember)
15. Explain the shortest path algorithm with suitable illustrations. (APR/MAY 2015)
(Understand)
16. Explain the various fields of the TCP header and the working of the TCP protocol.
(APR/MAY 2015) (Understand)
17. Describe distance vector routing. (NOV/DEC 2015, NOV/DEC 2019)(Remember)
18. Explain multicast routing in detail. (NOV/DEC 2015) (NOV/DEC 2016)(Understand)
19. With a neat diagram explain Distance vector routing protocol. (MAY /JUNE 2016)
(Analyze)
20. Explain about IPV4 classful and classless addressing. and IPV6.(MAY /JUNE
2016,April/May 2018,NOV/DEC 2019) (Understand)
21. Explain in detail the operation of OSPF protocol by considering a suitable network.
( NOV/DEC 2016)(MAY /JUNE 2017) (Understand)
22.Explain the working of Protocol Independent Multicast (PIM) in detail.(MAY /JUNE
2017) (Understand)
23.Explain the Routing Information protocol(April May 2018)
24. Explain the operation of protocol Independent Multicast(PIM)(April/May 2018)
25.Outline the need of Distance Vector Multicast Routing Protocol(DVMRP)
26. (i)Explain the media access control algorithm, CSMA/CD used in Ethernet. Why the
same algorithm cannot be used in wireless LAN?
(ii)Consider sending a 2400-byte datagram into a link that has an MTU of 700 bytes. Suppose
the original datagram is stamped with the identification number 422. How many fragments
are generated? What are the values in various fields in the IP datagrams generated related to
Fragmentation? (Analyse)(April May 2018)
27.(i) Explain the error reporting using ICMP protocol. How does Trace Route program make
use of the routers between source and destination?(Understand) (Nov/Dec 2018)
(ii) Suppose all the interfaces in each of three subnets are required to have the prefix
223.1.17/24. Also suppose that subnet 1 is required to support atleast 60 interfaces. Subnet 2
is to support atleast 90 interfaces, Subnet3 is to support atleast 12 interfaces. Provide three
network addresses that satisfy these constraints(Apply)April May 2018)
28. How error correction is handled at different layers in an IP network? (Understand(
(Nov/Dec 2018)
PART – C
1. What examples can you find to demonstrate compute delay for the packet?
(Evaluate)
2. Can you substitute an alternative protocol for PIM? Justify your answer.
(Create)
3. For the network given in Figure, give the datagram forwarding table for each node.
The links are labeled with relative costs; your tables should forward each packet via
the lowest-cost path to its destination (Apply)
4. Explain the link –state algorithm in detail.(Understand) (April May 2018)
5. Consider the network shown in Fig. Compute the shortest path from C to all nodes
using link – state algorithm. Also Update the forwarding table of node
6. Assume you are given a network ID 165.121.0.0.You are responsible for creating
subnets on the network ,and each subnet must provide at least 900 host IDs.What
subnet mask meets the requirement for the minimum number of host IDs and
provides the greatest number of subnets? (NOV/DEC 2019) (Analyze)
ASSIGNMENT QUESTIONS
1. For the following network, develop the datagram forwarding table for all the nodes. The
links are labeled with relative costs. The tables should forward each packet via the least cost
path to destination. (Create)
2.Consider the following segment of the Internet that consists of 7 nodes and 11 links and
answer the questions below:
Determine the shortest route tree based on the home node “1”, and connecting to all other
nodes, using the Dijkstra algorithm. (Apply)
3.A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum
number of hosts it can handle? (Remember)
4. What is the purpose of a subnet mask?Is the subnet mask 255.255.0.255 valid for a Class A
address? (Understand)
5. Consider the following internet address: 136.27.32.104 (Apply)
a) Convert this address into Binary format.
b) Convert this address into Hex format.
c) What class does this internet address represent?
d) If we apply a subnet mask of FFFFFE00, obtain the relevant network, subnet and
host addresses for the given internet address
6. Consider a router that interconnects three subnets: Subnet 1, Subnet 2 and Subnet 3.
Suppose all of the interfaces in each of these three subnets are required to have the prefix
223.1.17/24. Also suppose that Subnet 1 is required to support at least 60 interfaces, Subnet 2
is to support at least 90 interfaces, and Subnet 3 is to support at least 12 interfaces. Provide
three network addresses (of the form A.B.C.D/X) that satisfy these constraints. (Understand)
UNIT IV –
PART – A
22. What is meant by PORT or MAILBOX related with UDP? (NOV / DEC 2012)
(Remember)
A software Port (usually just called a ‘port’) is a virtual data connection that can be used by
programs to exchange data directly, instead of going through a file or other temporary storage
location. The most common of these are TCP and UDP port which are used to exchange data
between computers on the Internet. Port 505/udp uses the mailbox protocol for service.
23. Differentiate between TCP and UDP. (NOV/DEC 2016, NOV/DEC 2019) (Analyze)
TCP is connection oriented – once a connection is established, data can be sent bidirectional.
UDP is a simpler, connectionless Internet protocol. Multiple messages are sent as packets in
chunks using UDP.
24. List some of the Quality of Service parameters of transport layer.(APR/MAY 2015)
(Remember)
26. What is the difference between congestion control and flow control? (NOV/DEC
2015) (Understand)
Flow control and congestion control are two network traffic control mechanisms used in
computer networks, they have their key differences.
Flow control is an end to end mechanism On the other hand, congestion control is a
that controls the traffic between a sender and mechanism that is used by a network to
a receiver, when a fast sender is transmitting control congestion in the network.
data to a slow receiver.
Congestion control prevents loss of packets But, flow control refers to mechanisms
and delay caused due to congestion in the used to handle the transmission between a
network. Congestion control can be seen as a particular sender and a receiver.
mechanism that makes sure that an entire
network can handle the traffic that is coming
to the network.
Quality of service (QoS) refers to a network's ability to achieve maximum bandwidth and
deal with other network performance elements like latency, error rate and uptime. QoS is
exclusively applied to network traffic generated for video on demand, IPTV, VoIP, streaming
media, videoconferencing and online gaming.
28. What do you mean by slow start in TCP congestion? (MAY/JUNE 2016)
(Remember)
TCP slow start is an algorithm which balances the speed of a network connection. Slow
start gradually increases the amount of data transmitted until it finds the network’s
maximum carrying capacity.
29. List the different phases used in TCP connection. (MAY/JUNE 2016)
(Remember)
The three Phases of TCP connection includes
->Connection Establishment
->Data Transfer
->Connection Termination
TCP “Three-Way Handshake” Connection Establishment Procedure(Apr/May 2021)
30. Give the comparison of unicast, multicast and broadcast routing (NOV/DEC 2016)
(MAY/JUNE 2017, NOV/DEC 2019) (Analyze)
Data is transported over a network by three simple methods i.e. Unicast, Broadcast, and
Multicast.
Unicast: from one source to one destination i.e. One-to-One
Broadcast: from one source to all possible destinations i.e. One-to-All
Multicast: from one source to multiple destinations stating an interest in receiving the
traffic i.e. One-to-Many
PART – B
ASSIGNMENT QUESTIONS
1. Hosts A and B are communicating over a TCP connection, and Host B has already
received from A all bytes up through byte 126. Suppose Host A then sends two
segments to Host B back-to-back. The first and second segments contain 80 and 40
bytes of data respectively. In the first segment, the sequence number is 127, the
source port number is 302, and the destination port number is 80. Host B sends an
acknowledgment whenever it receives a segment from Host A. a - In the second
segment sent from Host A to B, what are the sequence number, source port number,
and destination port number? (Apply)
2. Suppose that the five measured SampleRTT values are 106ms, 120ms, 140ms, 90ms,
and 115ms. Compute the EstimatedRTT after each of these SampleRTT values is
obtained, using a value of alpha = 0.125 and assuming that the value of
EstimatedRTT was 100ms just before the first of these 5 samples were obtained.
Compute also the DevRTT after each sample is obtained, assuming a value of beta =
0.25 and assuming the value of DevRTT was 5ms just before the first of these five
samples was obtained. Last, Compute the TCP TimeoutInterval after each of these
samples is obtained. (Apply)
3. Consider sending a large file from a host to another over a TCP connection that has no
loss. a - Suppose TCP uses AIMD for its congestion control w/o slow start. Assuming
cwnd increases by 1MSS every time a batch of ACKs is received and assuming
approximately constant roundtrip times, how long does it take for cwnd increase from
6MSS to 12MSS (Assuming no loss events)? b - What is the average throughout (in
terms of MSS and RTT) for this connection up through time = 6 RTT ? (Apply)
UNIT V
PART – A
HTTP Response
6. What is the purpose of Domain Name System? Present the information contained in a
DNS resource record. (MAY/JUNE 2017) (Remember)
Domain Name System can map a name to an address and conversely an address to name.
DNS Resource Records define data types in the Domain Name System (DNS).DNS Resource
Records (RRs) describe the characteristics of a zone or domain and have a binary format,
which is used in queries and responses, and a text format used in zone files. It contains details
such as
1. Zone File Format
2. Zone File Directives
3. DNS Generic Record Formats
4. Resource Record (RR) Types
7. Discuss the three main division of the domain name space. (Remember)
Domain name space is divided into three different sections: generic domains, country
domains & inverse domain.
Generic domain: Define registered hosts according to their generic behavior, uses generic
suffixes.
Country domain: Uses two characters to identify a country as the last suffix.
Inverse domain: Finds the domain name given the IP address.
8. Discuss the TCP connections needed in FTP. (Remember)
FTP establishes two connections between the hosts. One connection is used for data transfer,
the other for control information. The control connection uses very simple rules of
communication. The data connection needs more complex rules due to the variety of data
types transferred.
9. Discuss the basic model of FTP. (Remember)
The client has three components: the user interface, the client control process, and the client
data transfer process. The server has two components: the server control process and the
server data transfer process. The control connection is made between the control processes.
The data connection is made between the data transfer processes.
10. Name four factors needed for a secure network? (Remember)
Privacy: The sender and the receiver expect confidentiality.
Authentication: The receiver is sure of the sender’s identity and that an imposter has not sent
the message.
Integrity: The data must arrive at the receiver exactly as it was sent.
Non-Reputation: The receiver must able to prove that a received message came from a
specific sender.
11. How is a secret key different from public key? (Analyze)
In secret key, the same key is used by both parties. The sender uses this key and an
encryption algorithm to encrypt data; the receiver uses the same key and the corresponding
decryption algorithm to decrypt the data. In public key, there are two keys: a private key and
a public key. The private key is kept by the receiver. The public key is announced to the
public.
12. What is a digital signature? (Remember)
Digital signature is a method to authenticate the sender of a message. It is similar to that of
signing transactions documents when you do business with a bank. In network transactions,
you can create an equivalent of an electronic or digital signature by the way you send data.
13. What are the advantages & disadvantages of public key encryption?
(Understand)
Advantages: a) Remove the restriction of a shared secret key between two entities. Here
each entity can create a pair of keys, keep the private one, and publicly distribute the other
one. b) The no. of keys needed is reduced tremendously. For one million users to
communicate, only two million keys are needed.
Disadvantage: If you use large numbers the method to be effective. Calculating the cipher
text using the long keys takes a lot of time. So it is not recommended for large amounts of
text.
14. What are the advantages & disadvantages of secret key encryption? (Understand)
Advantage:
Secret Key algorithms are efficient: it takes less time to encrypt a message. The reason is that
the key is usually smaller. So it is used to encrypt or decrypt long messages.
Disadvantages:
a) Each pair of users must have a secret key. If N people in world want to use this method,
there needs to be N(N-1)/2 secret keys. For one million people to communicate, a half-billion
secret keys are needed.
b) The distribution of the keys between two parties can be difficult.
15. Define permutation. (Remember)
Permutation is transposition in bit level.
Straight permutation: The no. of bits in the input and output are preserved.
Compressed permutation: The no. of bits is reduced (some of the bits are dropped).
Expanded permutation: The no. of bits is increased (some bits are repeated).
16. Define substitution & transposition encryption? (Remember)
Substitution: A character level encryption in which each character is replaced by another
character in the set.
Transposition: A Character level encryption in which the characters retain their plaintext but
the position of the character changes.
17. Define CGI.(Remember)
CGI stands for COMMON GATEWAY INTERFACE, which is used for communication
between HTTP servers and executable programs. It is used in crating dynamic documents.
18. What are the requests messages support SNMP and explain it? (Remember)
1. GET request 2. SET request
The former is used to retrieve a piece of state from some node and the latter is used to store a
new piece of state in some node.
19. Define PGP? (NOV 2010 ) (MAY 2012) (Remember)
Pretty Good Privacy is used to provide security for electronic mail. It provides authentication,
confidentiality, data integrity, and non repudiation.
20. Define SSH. (NOV/DEC 2019)(Remember)
Secure Shell is used to provide a remote login, and used to remotely execute commands and
transfer files and also provide strong client/server authentication / message integrity.
21. Expand POP3 and IMAP4. (NOV/DEC 2016) (APR/MAY 2021) (Analyze)
POP3 and IMAP are two different protocols (methods) used to access email from a remote
server.
POP3 stands for Post Office Protocol. POP3 downloads email from a server to a single
computer, then deletes it from the server. Because your messages get downloaded to a single
computer or device and then deleted from the server, it can appear that mail is missing or
disappearing from your Inbox if you try to check your mail from a different computer.
IMAP4 stands for Internet Messaged Access Protocol. IMAP allows users to store their
email on remote servers. This two-way protocol also allows the user to synchronize their
email among multiple devices, which is extremely important today, when most people have
at least two devices - their laptop and smartphone.
22. What DNS cache issue are involved in changing the IP address of a web server host
name? (NOV/DEC 2013),(April/May 2018) (Understand)
Whenever a DNS server does not have the answer to a query within its cache, the DNS server
can pass the query onto another DNS server on behalf of the client. If the server passes the
query onto another DNS server that has incorrect information, whether placed there
intentionally or unintentionally, then cache poising can occur
23. Differentiate application programs and application protocols.(NOV 2013) (Analyze)
Communicating systems use well-defined formats for exchanging messages. Each message
has an exact meaning intended to provoke a particular response of the receiver. Thus, a
protocol must define the syntax, semantics, and synchronization of communication; the
specified behavior is typically independent of how it is to be implemented. A protocol can
therefore be implemented as hardware, software, or both. Communications protocols have to
be agreed upon by the parties involved.[1] To reach agreement a protocol may be developed
into a technical standard. A programming language describes the same for computations, so
there is a close analogy between protocols and programming languages: protocols are to
communications as programming languages are to computations
24. List the function of POP. (APRIL/MAY 2011) (Remember)
POP stands for Post Office Protocol. POP is an application-layer Internet
standard protocol used by local e-mail clients to retrieve e-mail from a remote server over
a TCP/IP connection
25. What is Telnet? ( NOV /DEC 2011) (Remember)
Telnet is a network protocol used on the Internet or local area networks to provide a
bidirectional interactive text-oriented communication facility using a virtual terminal
connection. Telnet is a terminal emulation program for TCP/IP networks such as the Internet.
The Telnet program runs on our computer and connects our PC to a server on the network.
We can then enter commands through the Telnet program and they will be executed as if we
were entering them directly on the server console. This enables us to control the server and
communicate with other servers on the network
26. State the purpose of SNMP. (NOV / DEC 2011) (MAY / JUNE 2012)
(Understand)
Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for
managing devices on IP networks". Devices that typically support SNMP include routers,
switches, servers, workstations, printers, modem racks and more. It is used mostly in network
management systems to monitor network-attached devices for conditions that warrant
administrative attention. SNMP is a component of the Internet Protocol Suite as defined by
the Internet Engineering Task Force (IETF). It consists of a set of standards for network
management, including an application layer protocol, a database schema, and a set of data
objects.
27. Why name services are some time called as middleware? (NOV /DEC 2012)
(Understand)
The white pages in a telephone book provides a mapping from a person’s name to their
contact details (address and telephone number) Likewise a Naming Service provides a
mapping from a human readable name to a server’s IP address. A unique name is typically
assigned to each host in a network. It is then map the user friendly names in to router friendly
addresses. Name services are sometimes called as a middleware because they fill a gap
between application and the underlying network.
ASSIGNMENT QUESTIONS
1. Suppose you are sending an email from your Gmail account to your friend, who reads
the e-mail from a mail server using IMAP. Briefly describe how the email travels
from the host to your friend’s host. Also, what are the application layer protocols
involved? (Remember)
2. Suppose you needed to use HTTP to download a web page with three embedded
images. Draw diagrams, similar to those from class, depicting the main interactions
between the client and server when using non-persistent HTTP, persistent HTTP.
(Understand)
3. Why do you think DNS uses UDP, instead of TCP, for its query and response
messages? (Remember)