CN - Question Bank

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 45

RAMCO INSTITUTE OF TECHNOLOGY

Department of Computer Science and Engineering


Academic Year: 2021 – 2022 (Odd Semester)

Semester/Class : V Semester B.E.CSE


Course Code & Title : CS8591 Computer Networks
Name of the Faculty Member : Mrs M.Swarna Sudha

QUESTION BANK AND UNIVERSITY TWO MARKS WITH ANSWERS


UNIT I – INTRODUCTION AND PHYSICAL LAYER
1. What is Data Communication?
Data Communication is the exchange of data between two devices via some form of
transmission medium such as wire cable. For data communication to occur, the
communicating devices must be part of a communication system made up of a combination
of hardware and software.

2. Give the components of data communication.


 Message – the message is the information to be communicated.
 Sender – the sender is the device that sends the data message.
 Receiver – the receiver is the device that receives the message.
 Medium – the transmission medium is the physical path by which a message travels from
sender to receiver.
 Protocol – A protocol is a set of rules that govern data communication.

3. What is Network? (or) Define the term Computer Network?


A network is the interconnection of a set of devices capable of communication. A device can
be a host (or an end system as it is sometimes called) such as large computer, desktop,
laptop, workstation, cellular phone, or security system.

4. List out the three basic criteria necessary for an effective and efficient network.
The most important criteria are performance, reliability and security.
Performance of the network depends on number of users, type of transmission medium,
the capabilities of the connected hardware and the efficiency of the software.
Reliability is measured by frequency of failure, the time it takes a link to recover from the
failure.
Security issues include protecting data from unauthorized access and viruses.

5. What are the three fundamental characteristics determine the effectiveness of the data
communication system?
The three fundamental characteristics are
 Delivery: The system must deliver data to the correct destination.
 Accuracy: The system must deliver data accurately.
 Timeliness: The system must deliver data in a timely manner.
 Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven
delay in the delivery of audio or video packets
6. What is the need for protocols?
In networks, communication occurs between the entities in different systems. Two
entities cannot just send bit streams to each other and expect to be understood. For
communication, the entities must agree on a protocol. A protocol is a set of rules that
govern data communication.

7. Define the term protocols. (Nov/Dec 2015)


A protocol is synonymous with rule. It consists of a set of rules that govern data
communications. It determines what is communicated, how it is communicated and when it
is communicated. The key elements of a protocol are syntax, semantics and timing

8. List the services provided by data link layer/ State the issues of data link layer.
(Nov/Dec 2015& Nov/Dec 2016, Nov-2018,Nov-2012)
 Reliable data transfer
 Framing
 synchronization
 Error detection and control
 Flow control.
.
9. Define flow control. (May/June 2016 , April/May 2015)
Flow control refers to a set of procedures used to restrict the amount of data. The sender
can send before waiting for acknowledgment.

10. Write the parameters used to measure networks performance.(May/June 2016)


 Bandwidth commonly measured in bits/second is the maximum rate that information
can be transferred
 Throughput is the actual rate that information is transferred
 Latency the delay between the sender and the receiver decoding it, this is mainly a
function of the signals travel time, and processing time at any nodes the information
traverses
 Jitter variation in packet delay at the receiver of the information
 Error rate the number of corrupted bits expressed as a percentage or fraction of the
total sent

7. List the metrics that influence the performance of computer network (May-2018)
Performance of a network depends on a number of factors,
 Number of users
 Type of transmission medium
 Capabilities of the connected hardware
 Efficiency of software.

11. How number of duplex mode link is calculated for mesh topology?
In a mesh topology, every device has a dedicated point-to-point link to every other
device.If there are n nodes in a fully connected mesh nodes We need n (n - 1) simplex
physical links. If each physical link allows duplex mode communication a mesh topology,
we need n(n-1)/2 duplex mode links.

12. What do you mean by error control? (April/May 2015)


 The purpose of error control is to ensure that the information received by the receiver is
exactly the information transmitted by the sender. As the communication channel is
highly unreliable, the receiver must be able to deal with the received data, if it contains
error.
 The term error control is defined as the process of identification or correction of error
occurred in the transmitted data.

13. Differentiate circuit and packet switched networks. (May/June 2014,April/May 2107)
Circuit Switching Packet Switching
It has a dedicated path It does not have a dedicated path
Path is established for entire conversation Route is established for each packet
Fixed Bandwith Dynamic Bandwidth
e.g. Telephone System e.g. Computer Networks

14. Define the following terms: (Nov./Dec. 2017)


• Bandwidth- The bandwidth of a network is given by the number of bits that can be
transmitted over the network in a certain period of time.
• Latency- The duration of message to travel from one end of a network to other. It is
measured in terms of time.
Latency = Propagation + transmit + queue

15. Write down the requirements to build a computer network? (May-2018)


 Network Interface Card (NIC)
 Hub
 Switches
 Cables and connectors
 Router
 Modem

16. Name some services provided by the application layer. (April/May 2011)
Specific services provided by the application layer include the following.
-     Network virtual terminal.
-     File transfer, access and management (FTAM).
-     Mail services.
-     Directory services.

17. Compare Byte Oriented versus Bit-Oriented protocol. (Nov./Dec. 2017)


Byte Oriented Protocol
 Byte-oriented framing protocol is a communications protocol in which full bytes are used
as control codes. Also known as character-oriented protocol. It uses Sentinel approach
and Byte-Counting Approach
Bit Oriented Protocol
 A bit-oriented protocol is a communications protocol that sees the transmitted data as an
opaque stream of bits with no semantics, or meaning. Control codes are defined in terms
of bit sequences instead of characters. Bit oriented protocol can transfer data frames
regardless of frame contents. Frames are viewed as collection of bits. High level data link
protocol is used.

18. How the performance can be measured and evaluated?


Performance can be measured using transit time and response time. Transit time is the
amount of time required for a message to travel from one device to another. Response
time is the elapsed time between an inquiry and a response
Performance can be evaluated by two networking metrics: throughput and delay

19. Distinguish between peer-to-peer relationship and a primary-secondary


Peer-to-peer relationship: All the devices share the link equally.
Primary-secondary relationship: One device controls traffic and the others must
transmit through it.

20. Define line configuration and give its types. (Nov/Dec 2010)
Line configuration refers to the way two or more communication devices attach to a link. A
link is a communications pathway that transfers data from one device to another.
There are two possible line configurations:
i. Point to point and
ii. Multipoint.

21. Define OSI model.


The open system Interconnection model is a layered framework for the design of network
system that allows for communication across all types of computer systems.

22. Group the OSI layers by function.


The seven layers of the OSI model belonging to three subgroups.
i) Physical, data link and network layers are the network support layers; they deal with
the physical aspects of moving data from one device to another.
ii) Session, presentation and application layers are the user support layers; they allow
interoperability among unrelated software systems.
iii) The transport layer ensures end-to-end reliable data transmission

23. What are the responsibilities of physical layer, data link layer, network layer, transport
layer, session layer, presentation layer, application layer.
(i)      Physical layer – Responsible for transmitting individual bits from one node to the next.
(ii)     Data link layer – Responsible for transmitting frames from one node to the next.
(iii)    Network layer – Responsible for the delivery of packets from the original source to the
final destination.
(iv)    Transport layer – Responsible for delivery of a message from one process to another.
(v)     Session layer – To establish, manage and terminate sessions.
(vi)    Presentation layer – Responsible to translate, encrypt and compress data.
(vii)   Application layer – Responsible for providing services to the user. To allow access to
network resources.

24. What are the different network topologies to organize computer networks?
Topology defines the physical or logical arrangement of links in a network The term
physical topology refers to the way in which a network is laid out physically. Two or more
devices connect to a link; two or more links form a topology. i) Star Topology
ii) Ring Topology
i) Mesh Topology
iv) Bus Topology

25. Give an advantage for each type of network topology.


a. Mesh: secure
b. Bus: easy installation
c. Star: robust
d. Ring: easy fault isolation
26. The Lucky Ducky corporation has a fully connected mesh network consisting of eight
devices. Calculate the total number of cable links needed and the number of ports for
each device.
Solution:
The formula for the number of links for a fully connected mesh is n(n – 1) / 2, where n is the
number of devices.
Number of links = n (n – 1) / 2
                         = 8(8 – 1) / 2 = 28.
Number of ports per device = n – 1
                        = 8 – 1 = 7.

27. Define the term transmission medium. What are the types of transmission media?
The transmission medium is the physical path between transmitter and receiver in a data
transmission system. The characteristics and quality of data transmission are determined both
the nature of signal and nature of the medium.
Transmission media are divided into two categories. They are as follows:
(i)      Guided transmission media
(ii)     Unguided transmission media

28. What is Encapsulation?


The data portion of a packet at level N-1 carries the whole packet (data, header and may be
trailer) from level N. The concept is called encapsulation.

29. Which layer implements the node to node channel connection in OSI layered
architecture? [Nov-2018]
The data link layer is responsible for the node to node delivery of the message. The main
function of this layer is to make sure data transfer is error free from one node to another, over
the physical layer. When a packet arrives in a network, it is the responsibility of DLL to
transmit it to the Host using its MAC address.

30. What is the maximum number of characters or symbols that can be represented
by Unicode??
Unicode uses 32 bits to represent a symbol or a character. We can define 2 32 different symbols
or characters.

31. A color image uses 16 bits to represent a pixel. What is the maximum number
of different colors that can be represented?
With 16 bits, we can represent up to 216 different colors

32. When a party makes a local telephone call to another party, is this a point-to- point or
multipoint connection? Explain the answer.
The communication is only between a caller and the callee. A dedicated line is established
between them. The connection is point-to-point.

33. Compare the telephone network and the Internet. What are the similarities and
differences?
 The telephone network was originally designed for voice communication; the Internet
was originally designed for data communication.
 The two networks are similar in the fact that both are made of interconnections of small
networks.
 The telephone network, is mostly a circuit-switched network; the Internet is mostly a
packet-switched network.
34. Write about address : Physical , Logical and port address
 Physical address is the local address of a node; it is used by the data link layer to deliver
data from one node to another within the same network.
 Logical address defines the sender and receiver at the network layer and is used to
deliver messages across multiple networks.
 Port address (service-point) identifies the application process on the station

35. How do guided media differ from unguided media?


   A guided media is contained within physical boundaries, while an unguided medium is
boundless.
  
36. What are the three major classes of guided media?
Categories of guided media.
 Twisted – pair cable.
 Coaxial cable.
 Fiber – optic cable.

37. What is a coaxial cable?


A type of cable used for computer network as well as cable television. The name arises from
the structure in which a metal shield surrounds a centre wire. The shield protects the signal on
the inner wire from electrical interference.

38. Name the advantage of optical fiber over twisted pair and coaxial cable.
 Higher bandwidth.
 Less signal attenuation.
 Immunity to electromagnetic interference.
 Resistance to corrosive materials.
 More immune to tapping.
 Light weight.

39. What is the disadvantage of optical fiber as a transmission medium?


 Installation / Maintenance.
 Unidirectional.
 Cost – More expensive than those of other guided media.

40. What are the types of addresses (identifiers) used in each of the following layers?
 Application layer –Specific addresses
 Network layer – Logical addresses
 Data-link layer- Physical address
PART – B
1. Explain with relevant diagram the functions of physical and datalink layer. (May-2019)
2. Describe the functions of the layers in the OSI reference model. ( Nov/Dec 2017,April/May
2108,Nov/Dec 2016,Nov/Dec 2105
3. Explain the features of the various unguided transmission media in terms of frequency band,
modulation scheme used, noise immunity, bandwidth and data rate.
4. Explain the various topologies.
5. Describe the categories of network.
6. Discuss in detail about the network performance measures. (Nov/Dec 2016)
7. What is the difference between Internet architecture and OSI architecture?(April 2017)
8. Explain ant two error detection mechanisms in detail. (May/June 2016)
9. Draw the OSI network architecture and explain the functionalities of each layer in detail
(Nov/Dec 2016 , Nov/Dec 2015)
10. Discuss in detail about Internet Architecture. (April/May 2015)
11. Discuss the approaches used for error detection in networking ( Nov/Dec 2017,May/June
2016) (April/May 2015, Nov/Dec 2012)
12. Consider a bus LAN with a number of equally spaced stations with a data rate of 9 Mbps and
a bus length of 1 km. What is the mean time to send a frame of 500 bits to another station,
measured from the beginning of transmission n to the end of reception? Assume a
propagation speed of 150 m/s. If two stations begin to monitor and transmit at the same time,
how long does it need to wait before an interference is noticed?

PART-C
1. Assume six devices are arranged in a mesh topology. How many cables are needed? How
many ports are needed for each device?
 Cable links: n (n – 1) / 2 = (6  5) / 2 = 15
 Number of ports: (n – 1) = 5 ports needed per device
Note: The number of cables for each type of network is:
 Mesh: n (n – 1) / 2
 Star: n
 Ring: n – 1
 Bus: one backbone and n drop lines

2. For each of the following four networks, discuss the consequences if a connection fails.
 Five devices arranged in a mesh topology
 Five devices arranged in a star topology (not counting the hub)
 Five devices arranged in a bus topology
 Five devices arranged in a ring topology
Note:
 Mesh topology: If one connection fails, the other connections will still be
working.
 Star topology: The other devices will still be able to send data through the hub;
there will be no access to the device which has the failed connection to the hub.
 Bus Topology: All transmission stops if the failure is in the bus. If the drop-line
fails, only the corresponding device cannot operate.
 Ring Topology: The failed connection may disable the whole network unless it is
a dual ring or there is a by-pass mechanism

3. We have two computers connected by an Ethernet hub at home. Is this a LANor a WAN?
Explain the reason.
4. Performance is inversely related to delay. When we use the Internet, which of the following
applications are more sensitive to delay?
 Sending an e-mail
 Copying a file
 Surfing the Internet
Note: E-mail is not an interactive application. Even if it is delivered immediately, it may
stay in the mail-box of the receiver for a while. It is not sensitive to delay.
We normally do not expect a file to be copied immediately. It is not very sensitive to
delay.
Surfing the Internet is the an application very sensitive to delay. We except to get access
to the site we are searching
UNIT II – DATA LINK LAYER & MEDIA ACCESS

1. What do you understand by CSMA protocol? (April/May 2015)


While transmitting the data the sender simultaneously tries to receive it, as soon as it detects
collision, it stops transmitting message and send a jamming signal. Simply “Listen while you
talk”. Carrier Sense Multiple Access is a protocol used to sense whether a medium is busy
before attempting to transmit.

2. State hidden node problem.(May/June 2016)


In wireless networking, the hidden node problem or hidden terminal problem occurs when a
node is visible from a wireless access point (AP), but not from other nodes communicating
with that AP. This leads to difficulties in media access control sublayer. Consider the
following scenario: Station A can communicate with Station B. Station C can also
communicate with Station B. However, Stations A and C cannot communicate with each
other since they cannot sense each other on the network, because they are out of range of each
other. This creates a very difficult and important arbitration problem that a MAC protocol
needs to resolve.

3. Write the types of connecting devices in internetworking.( May/June 2016)


The various internetworking devices are Switches, Hubs, Repeaters, Bridges, Routers and
Gateway.

4. What is Bluetooth? Which frequency band is used for bandwidth?( May/June 2016)
Bluetooth is a low cost, low power; short range wireless communication technology .It
works in the range of 2.4GHz to 2.484 GHz. It is an ad hoc network which means that the
network is formed spontaneously.

5. Expand ICMP and Write the function.(May/June 2016)


Internet Control Message Protocol is a companion to IP protocol which provides error
reporting and assistance mechanism to IP. In ICMP collection of error messages that are
sent back to the source host whenever a router or host is unable to process an IP datagram
successfully.

6. What is meant by exponential back off? (Nov/Dec 2016)


Once an adaptor has detected a collision and stopped its transmission, it waits a certain
amount of time and tries again. Each time it tries to transmit but fails, the adaptor doubles
the amount of time it waits before trying again. This strategy of doubling the delay
interval between each transmission attempt is a general technique known as
exponential back off.

7. When is ICMP redirects message used? (April/May 2017)


An ICMP redirect is an error message sent by a router to the sender of an IP packet.
Redirects are used when a router believes a packet is being routed sub optimally and it would
like to inform the sending host that it should forward subsequent packets to that same destination
through a different gateway

8. Write the mechanism of stop and wait flow control. ( Nov/Dec 2016)
In stop and wait flow control, the sender sends a single frame to receiver & waits for an
acknowledgment. The next frame is sent by sender only when acknowledgment of previous
frame is received. The main advantage of stop & wait protocols is its accuracy. Next frame is
transmitted only when the first frame is acknowledged. So there is no chance of frame being lost

9. What is the need of ARP? (Nov /Dec 2015)


ARP- Address Resolution protocol is used to translate a host’s IP address to MAC address.
Typically, a host uses ARP to determine the hardware address of another host.

10. What is Scatternet? (Nov /Dec 2016)


A bluetooth network is called a piconet. A piconet can have up to eight stations, one of
which is called the primary, the rest are called secondaries. A piconet can have only one
primary station. Several piconets can be established and linked together in a topology
called a scatternet.

11. What is the access method used by wireless LAN? (May/June 2014)
The access method used by wireless LAN is CSMA/CA-Carrier Sense Multiple Access
with collision Avoidance.

12. What is the network address in a class A subnet with the IP address of one of the
host as25.34.12.56 and mask 255.255.0.0? (May/June 2014)
25.34.12.56
255.255.0.0
25.34.0.0

13. Identify the class of the following IP address: (Nov /Dec 2015)
(a) 110.34.56.45-Class A address
(b) 212.208.63.23- Class C Address

14. Show the Ethernet frame format.( Nov./Dec. 2017,May-2019)

15. Define 802.11 (May-2018)


802.11 is an evolving family of specifications for wireless local area networks (WLANs)
developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
The IEEE 802.11 is the first WLAN standard that has secured the market in large extent. The
primary goal of the standard was the specification of a simple and robust that offers time
bounded and asynchronous services
16. What do you mean by Switching? [May-2018]
Switching is the most valuable asset of computer networking. The mechanism for exchange
of information between different computer networks and network segments is called switching
in Networking. In a network, a switch is a device that channels incoming data from any of
multiple input ports to the specific output port that will take it toward its intended destination.

17. What are the draw backs of wired networks? (Apr/May 2010)
 Infra-Structure Required.
 It will not survive disaster
 It is not flexible.
 Planning is required to establish a wired network.
 Additional cabling with the right plugs and probably internetworking units have
to be provided.

18. What is meant by flow control? (May/June 2016)


Flow control is a set of procedures used to restrict the amount of data that the sender can
send before waiting for an acknowledgement.

19. Write the design issues of data link layer? (Nov/Dec 2015,Nov/Dec 2016)
 Services provided to network layer.
 Framing
 Error control
 Flow control

20. What is bit stuffing and why it is needed in HDLC?( April/May 2011)
Bit stuffing is the process of adding one extra 0 whenever there are five consecutive 1s in the
data so that the receiver does not mistake the data for a flag. Bit stuffing is needed to handle
data transparency.

21. What is the average size of an Ethernet frame? (May/June 2014)


The average size of an Ethernet frame is 64 bytes.

22. What is meant by Ethernet? State advantages of Ethernet.


 Ethernet is a multiple access network, meaning that a set of nodes send and receive
frames over a shared link. It is very popular LAN standard. It operates at 10 Mbps.
 It uses 1-persistent CSMA/CD for media access.
Advantages of Ethernet
 Inexpensive
 Easy to install

23. What are the various persistence methods in media access?


i) 1-Persistent
ii) Non-Persistent
iii) P-Persistent

24. What is fast Ethernet?


Fast Ethernet is a local area network (LAN) transmission standard that provides a data rate of
100 megabits per second (referred to as "100BASE-T"). Workstations with existing 10
megabit per second (10BASE-T) Ethernet card can be connected to a Fast Ethernet network.
25. What is mean by internetworks? What is the need of internetwork?
When two or more networks are connected, they become internetwork or internet. An
arbitrary collection of networks interconnected to provide some sort of host-host to packet
delivery service
Need of Internetwork:
To exchange data between networks, they need to be connected to make an Internetwork.

26. How does the switch decide which output port to place each packet?
It looks at the header of the packet for an identifier that it uses to make the decision.
The different methods of switching are i) Virtual Circuit approach, ii) Datagram approach iii)
Source Routing.

27. Define Infrared Technology.


It uses diffuse light reflected at walls; furniture etc. or directed light if a line-of-site exists
between sender and receiver. Sender can be simple LED or laser diode and Receiver can
be photodiode.

28. Highlight the characteristics of datagram networks.


 Every packet contains enough information to enable any switch to decide how to get it to
destination.
 Each packet is forwarded independently of previous packets that might have been sent to
the same destination.
 A switch or link failure might not have any serious effect on communication.

29. How does a netid differ from a network address?


A network address has both netid and hostid with 0’s for the hostid.

30. Identify the class and default subnet mask of the IP address 217.65.10.7
IP address 217.65.10.7 belongs to class C address and default subnet mask is 255.255.255.0.

31. What is DHCP?


DHCP provides static and dynamic address allocation that can be manual or automatic. The
Dynamic Host Configuration Protocol has been derived to provide dynamic configuration.
DHCP is also needed when a host moves from network to network or is connected and
disconnected from a network. DHCP provides temporary IP addresses for a limited time. The
DHCP server issues a lease for an IP address to a client for a specific time.

32. What do you mean by ARP and RARP?


ARP stands for Address resolution protocol, maps an IP address to a MAC address.
RARP stands for Reverse Address resolution protocol, maps an MAC address to a IP
address.

33. What is the purpose of wireless LAN and give some examples of WLAN.
The main goal of wireless LAN is to replace office cabling and to introduce a higher
flexibility for ad hoc communication in group meeting. Examples:
 IEEE 802.11
 HIPERLAN
 Bluetooth
34. List out the advantages and disadvantages of WLAN
Advantages: Disadvantages
 Flexibility  Quality of Service
 Planning  Cost
 Design  Government Restrictions
 Robustness  Safety and Security

35. What is the access method used by wireless LANs?


The wireless LAN access method is CSMA/CA (Carrier  Sense Multiple Access with
Collision Avoidance).

36. How is error controlled in data link controlled protocol?


In a data link control protocol, error control is activated by retransmission of damaged
frame that have not been acknowledged by other side which requests a retransmission.

37. How does ARQ correct an error?


Anytime an error is detected in an exchange, a negative acknowledgment (NAK) is returned
and the specified frames are retransmitted.

38. What is the purpose of the timer at the sender site in systems using ARQ?
The sender starts a timer when it sends a frame. If an acknowledgment is not received within
an allotted time period, the sender assumes that the frame was lost or damaged and resends
it.

39. What is damaged frame?


A damaged frame is recognizable frame that does arrive, but some of the bits are in error.
(Have been altered during transmission)

40. What is HDLC?


HDLC is a bit oriented datalink protocol designed to support both half-duplex and full
duplex communication over point to point and multiport link.

41. Give data transfer modes of HDLC?


1.   NRM – Normal Response Mode
2.   ARM – Asynchronous Response Mode
3.   ABM - Asynchronous Balanced Mode

42. How many types of frames HDLC uses?


1.   U-Frames
2.   I-Frames
3.   S-Frame

43. State phases involved in the operation of HDLC?


1.   Initialization
2.   Data transfer
3.   Disconnect

44. Define piggybacking?


The inclusion of an acknowledgment to a previously received packet in an outgoing data
packet is known as piggybacking.

45. Write the concepts of CSMA/CD


Carrier Sense Multiple Access with collision detection is a protocol used to sense whether a
medium is busy before transmission but is has the ability to detect whether a transmission
has collided with another.

46. What is the use of p/f bit in the HDLC frame?


P/F bit is subfield in HDLC frame. The P/F field is a single bit with a dual purpose, when it
is set it can mean poll or final. It means poll when the frame is sent by a primary station to
secondary station and it mean final when the frame is sent by a secondary to a primary
station.

47. What is hub? State important types of hubs.


Networks require a central location to bring media segment together. These central locations
are called hubs.
types of hubs
1.   Passive hub
2.   Active hub
3.   Intelligent hub

48. Mention the function of hub.


      1.   Facilitate adding/deleting or moving work stations
      2.   Extend the length of network
      3.   It provides centralize management services
      4.   Provides multiple interfaces.

49. What is the main function of gateway and which layer it operates? Name the factors
gateway handles?
A gateway is a protocol converter and gateway operates at all seven layers of OSI model.
The factors gate ways handles data rate, data size, data format.

50. What is meant by active hub?


A central hub in a network that retransmits the data it receives. A central connecting device
in a network that regenerates signals on the output side to keep the signal strong. Also called
a "multiport repeater.

51. What is the function of ACK timer?


ACK timer is used in flow control protocols to determine when to send a separate
acknowledgment in the absence of outgoing frame.

52. What is Bluetooth? Which frequency band is used for bandwidth?( May/June 2016)
- Bluetooth is a low cost, low power, short range wireless communication technology
- 2.4GHz to 2.484 GHz.

53. List the functions of bridge? (April/May 2015 , April/May 2017)


 Frame filtering and forwarding
 Learning the address
 Routing

54. What are the types of bridges?


 Transparent bridge
 Source Routing bridge
Transparent bridge - Transparent bridge keep a suitable of addresses in memory to determine
where to send data
Source Routing bridge - Source Routing bridge requires the entire routing table to be included in
the transmission and do not route packet intelligently.
72. State the function of bridges.
1. Frame filtering and forwarding
2. Learning the address
3. Routing

55. What is the function of NIC?


NIC is used to allow the computer to communicate on the network. It supports transmitting,
receiving and controlling traffic with other computers on network.

56. What is the purpose of the NAV?


The network allocation vector (NAV) is a timer for collision avoidance.

57. Name the four types of S frames.


- Receive ready(RR)
- Receive not ready (RNR)
- Reject (REI)
- Selective reject (SREJ)

58. What are the four SONET layers?


SONET defines four layers. The photonic layer is the lowest and performs physical layer
activities. The section, line and path layers correspond to the OSI model’s data link layer.

59. What is a virtual tributary?


A virtual tributary is a partial payload that can be inserted into an STS-1 and combined with
other partial payloads to fill out the frame.

60. What are the responsibilities of data link layer?


Specific responsibilities of data link layer include the following.
a) Framing
b) Physical addressing
c) Flow control
d) Error control
e) Access control

61. Mention the types of errors.


There are 2 types of errors a) Single-bit error. b) Burst-bit error.
Single bit error: The term single bit error means that only one bit of a given data unit (such
as byte character/data unit or packet) is changed from 1 to 0 or from 0 to 1.
Burst error: Means that 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.

62. Mention the purpose of hamming code.


A hamming code can be designed to correct burst errors of certain lengths. So the simple
strategy used by the hamming code to correct single bit errors must be redesigned to be
applicable for multiple bit correction.

63. What are three popular ARQ mechanisms?


 Stop and wait ARQ,
 Go – Back – N ARQ and
 Selective Report ARQ.

64. How can the parity bit detect a damaged data unit?
In parity check, (a redundant bit) a parity bit is added to every data unit so that the total
number of 1s is even for even parity checking function (or odd for odd parity).
65. How can we use the Hamming code to correct a burst error?
By rearranging the order of bit transmission of the data units, the Hamming code can
correct burst errors.

66. In the Hamming code for a data unit of m bits how you do compute the number of
redundant bits ‘r’ needed?
In the Hamming code, for a data unit of m bits, use the formula 2r > = m + r + 1 to
determine r, the number of redundant bits needed.
67. What is a bridge, repeater and router?
 Bridge is a hardware networking device used to connect two LANs. A bridge operates at
data link layer of the OSI reference model.
 Repeater is a hardware device used to strengthen signals being transmitted on a network.
 Router:A network layer device that connects networks with different physical media and
translates between network architectures.

68. List any two functions which a bridge cannot perform?


 Bridge cannot determine most efficient path.
 Traffic management function.

69. State important types of hubs. What is the difference between a passive and an active
hub?
 Passive hub  Active hub  Intelligent hub
Active hub –It contains a repeater that regenerates the received bit patterns before
sending them out.
Passive hub-It provides a simple physical connection between the attached devices.

70. Mention the function of hub.


 Facilitate adding/deleting or moving work stations
 Extend the length of network
 It provides centralize management services
 Provides multiple interfaces

71. Define VCI. (Nov/Dec 2016)


A VCI (Virtual Channel Identifier) is used in asynchronous transfer mode (ATM) cell
networks. Each ATM cell header has a VCI, which is a 16-bit numeric field, for logical
virtual channel identification. Each VCI works with a virtual path identifier (VPI) to
facilitate end-to-end data packet transfer.

72. What will the maximum number of frames sent but unacknowledged for a sliding
window of size n-1 ( n is the sequence number) (May/June 2014)
For a sliding window of size n - 1 (n sequence numbers), there can be a maximum of
n frames sent but unacknowledged.
PART B

1. Discuss your understanding of bit oriented protocol namely HDLC. (May-2019)


2. What is the need for error detection? Explain with typical examples.
3. Given a remainder of 111, a data unit of 10110011 and a divisor of 1001, is there an error in
the data unit. Justify your answer with necessary principles. (May/June 2014)
4. Obtain the 4 bit CRC code for the data bit sequence 10011011100 using the polynomial
5. x4+x2+1 ( April/May 2017)
6. How is frame order and flow control achieved using the data link layer?
(May/June 2014)
7. What is the need for error detection? Explain with typical examples. Explain
8. Methods used for error detection and error correction. (April/May 2015
9. Explain in detail the error detection and error corrections
10. Explain selective-repeat ARQ flow control method. (Nov/Dec 2016)
11. Explain in detail about: i) HDLC , ii) PPP (May/June 2016
12. Outline the working principle of Bluetooth Technology. (May-2019)
13. Explain the architecture of IEEE 802.11 Wireless LAN. (May 2019)
14. Consider a network scenario and explain the functions of ARP and RARP protocols with
frame formats. (May 2019)
15. Explain sliding window protocol explain selective repeat and go back –N. (Nov/Dec 2016    
16. Explain the CSMA and CSMA/CD algorithms. (April/May, Nov/Dec 2012).  
17. Explain in details about the access method and frame format used in Ethernet and token ring
(April/May 2015 Nov/Dec 2015)
18. Explain the functions of Wi-Fi and Bluetooth in detail. (Nov/Dec 2017)
19. Show and explain the ARP packet format for mapping IP addresses into Ethernet addresses.
Nov/Dec 2017 
20. Explain in detail about HDLC and PPP (May/June 2016)
21. Give the comparison between different wireless technologies ? Enumerate 802.11 protocol
stack in detail. (May/June 2016)
22. How is frame order and flow control achieved using the data link layer? (May/June 2014
Nov/Dec 2105)
23. Explain the physical properties of Ethernet 802.3 with necessary diagram of transceiver and
adapter. (Nov/Dec 2016)
24. With a neat sketch explain about IP service model, packet format, fragmentation and
reassembly. (Nov/Dec 2016)
25. Write a short note on: i) DHCP ii)ICMP. (May/June 2016)
26. Write a short note on: i) Ethernet ii) Wireless LAN. (Nov/Dec 2015)
27. Explain in detail ARP, DHCP, ICMP. (Nov/Dec 2015)
28. Explain in details about the access method and frame format used in Ethernet
and token ring. (April/May 2015)
29. Discuss the MAC layer functions of IEEE 802.11. (April/May 2015)
30. Briefly define key requirements of wireless LAN. (April/May 2015)
31. Describe the CSMA/CD protocol and comment on its performance for medium access.
(May/June 2014)
32. Write a short note on FDDI, Bridges and Switches. (May/June 2014)
               
33. If the frame is 1101011011 and generator is 10011 what would be the transmitted frame?
34. Explain the functions of Wi-Fi and Bluetooth in detail.
35. Compare Stop and Wait ARQ scheme with sliding window ARQ scheme
36. Explain the different approaches of framing in detail.
Part C
1. Suppose the following sequence of bits arrives over a link:
011010111110101001111111011001111110
Show the resulting frame after any stuffed bits have been removed. Indicate any errors
that might have been introduced into the frame.
Hint: The .. marks each position where a stuffed 0 bit was removed. There were no
stuffing errors detectable by the receiver; the only such error the receiver could identify
would be seven 1’s in a row.
1101 0111 11.. 10 11111..010 11111.. 110
2. Show that two-dimensional parity allows detection of all 3-bit errors.
3. Consider an ARQ protocol that uses only negative acknowledgments (NAKs), but no
positive acknowledgments (ACKs). Describe what timeouts would have to be
scheduled. Explain why an ACK-based protocol is usually preferred to a NAK-based
protocol.
4. Describe a protocol combining the sliding window algorithm with selective ACKs.
Your protocol should retransmit promptly, but not if a frame simply arrives one or two
positions out of order. Your protocol should also make explicit what happens if several
consecutive frames are lost.
5. Suppose we want to transmit the message 1011 0010 0100 1011 and protect it from
errors using the CRC8 polynomial x8 +x2 +x1+1.
(a) Use polynomial long division to determine the message that should be transmitted.
(b) Suppose the leftmost bit of the message is inverted due to noise on the transmission
link. What is the result of the receiver’s CRC calculation? How does the receiver know
that an error has occurred?
6. Why is collision detection more complex in wireless networks than in wired networks
such as Ethernet?
7. Using 5-bit sequence numbers, what is the maximum size of the send and
receivewindows for each of the following protocols?
Stop-and-Wait ARQ,b. Go-Back-NARQ,c. Selective-Repeat ARQ

8. Design a bidirectional algorithm for the Go-Back-N ARQ Protocol using piggybacking.
Note that both parties need to use the same algorithm.

9. How does the Ethernet address lA:2B:3CAD:5E:6F appear on the line in binary?

10. If an Ethernet destination address is 07:01:02:03:04:05, what is the type of the address
(unicast, multicast, or broadcast)?

UNIT III- NETWORK LAYER


1. What is IP?
The Internetworking protocol is the transmission mechanism used by the TCP/IP protocols.
It is an unreliable and connectionless datagram protocol-a best - effort delivery service. IP
provides no error checking or tracking. IP assumes the unreliability of the underlying layers
and does its best to get a transmission through to its destination, but with no guarantees.

2. What is an IP address?
 An IP address is a 32 - bit address that uniquely and universally define the connection of
a host or a router to the Internet.
 The sender must know the IP address of the destination computer before sending a
packet.

3. What are the categories of IP addresses?


IP addresses were divided into five categories as follows.
Class A
Class B
Class C
Class D
Class E

4. Identify the class and default subnet mask of the IP address 217.65.10.7.
It belongs to class C.Default subnet mask – 255.255.255.192

5. What is the class of each of the following addresses?


a.   10011101        10001111        11111100        11001111 – Class B
b.   11011101        10001111        11111100        11001111 – Class C
c.   01111011        10001111        11111100        11001111 – Class A
d.   11101011        10001111        11111100        11001111 – Class D
e.   11110101        10001111        11111100        11001111 – Class E

6. Find the class of each address.


a.   4.23.145.90 – Class A
b.   227.34.78.7 – Class D
c.   246.7.3.8 – Class E
d.   29.6.8.4 – Class A
e.   198.76.9.23 – Class C

7. Define Routing. (Nov/Dec 2015)


 Routing is usually performed by a dedicated device called a router.
 Routing is a key feature of the Internet because it enables messages to pass from one
computer to another and eventually reach the target machine.

8. Give comparison of unicast, multicast and broadcast routing. (Nov/ Dec 2016)
UNICAST ROUTING MULTICAST ROUTING BROADCAST ROUTING
There is one source and one There is one source and group In broadcast routing, the
destination of destinations relationship between the
source and destination is one-
to-all.
In Unicasting, the router In Multicasting, the router In Broadcasting, the router
forwards the received forwards the received packets forwards the received packets
packets through only one of through several of its
its interfaces. interfaces. through all of its interfaces.

9. What is fragmentation and reassembly? (Nov/ Dec 2016,May-2019)


Fragment the high-level message into low-level packets at the source, transmit the
individual low-level packets over the network, and then reassemble the fragments back
together at the destination. This general technique is usually called fragmentation and
reassembly.

10. What are the metrics used by routing protocols? (Apr./May 2015)
Path length, reliability, delay, bandwidth, load and communication cost.

11. What is Border gateway Protocol. (Nov./Dec.2017)


Border Gateway Protocol (BGP) is an inter domain routing protocol using path vector
routing. In path vector routing, there is one node in each autonomous system that acts on
behalf of the entire autonomous system known as speaker node. The speaker node in an AS
creates a routing table and advertises it to speaker nodes in the neighboring ASs. A speaker
node advertises the path in its autonomous system or other autonomous systems.

12. Differentiate between routing table and forwarding table. (Nov./Dec.2017)

Forwarding table Routing Table


Forwarding refers to the router-local action
of transferring the packet from an input link Routing refers to the network-wide process
interface to the appropriate output link that contain network addresses and the
interface. ).It refers to packets which reach a associated interface or next hop
system but are not destined for this system.

Forwarding table is used when a packet is The routing table is the table that is built up
being forwarded. by the routing algorithms as a precursor to
building the forwarding table.
It contains the mapping from a network It contains mappings from network numbers
number to an outgoing interface and some to next hops and may also contain
MAC information, such as the Ethernet information about when it should discard
address of the next hop. some information.
It needs to be structured to optimize the The routing table needs to be optimized for
process of looking up a network number when the purpose of calculating changes in
forwarding a packet topology.
Example: Example:
Network Interface MAC Network Next Hop
Number Address Number
18 if0 8:0:2b:e4:b:12 18 171.69.245.1

13. How do routers differentiate the incoming unicast, multicast and broadcast IP
packets.
(Apr./May 2017)
The routers differentiate the incoming unicast, multicast and broadcast packets based on the
destination IP address in the packet.
 The address 255.255.255.255 represents the Broadcast packet, it will be sent to all
destinations.
 The addresses 224.0.0.0 through 239.255.255.255 represent the multicast packet.
 All the remaining addresses in Class A, B, C represent the unicast packet.

14. Why is IPv4 to IPv6 transition required? (Apr./May 2017)


To overcome the following deficiencies of IPV4, IPv6 (Internetworking Protocol, version
6), also known as IPng (Internetworking Protocol, next generation), was proposed.
1. Address depletion problem in the Internet.
2. Real -time audio and video transmission requires minimum delay strategies and
reservation of resources not provided in the IPv4 design.
3. No encryption or authentication is provided by IPv4.

15. What are the two major mechanisms defined to help transition from IPv4 to IPv6?
(May-2019)
 Dual Stack
 Tunneling
 Header translation

16. How does a router differ from a bridge? (Apr./May 2015)


Router Bridge
Router operates at the network Bridge operates at the data link layer of OSI
layer of OSI model model.
Difficult to setup and configure Relatively easy to configure
Router focuses on logical
Bridge focuses on MAC address of host or node.
addresss of a host or node.

17. Compare IPV4 and IPV6.


IPV4 IPV6
IPV4 Address is 32 bits IPV6 Address is 128 bits
Reservation of resources is not Reservation of resources is provided by the
provided in the IPV4 design. priority and Flow label field in IPV6 header.
No encryption or authentication is Encryption and authentication are provided by
provided by IPV4. using extension header.
IPV4 Header is 20-60 bytes length. IPV6 base Header is 40 bytes length.

18. What are the benefits of Open Shortest Path First (OSPF) protocol? (May-2018)
 Authentication
 Support for hierarchy within a single routing domain
 Multiple same cost paths
 Integrated support for unicast and multicast routing
 OSPF is a true LOOP- FREE (route-free loop) routing protocol.
 Fast convergence of OSPF: The route changes can be transmitted to the entire
autonomous system in the shortest time.
 The concept of area division is proposed. After the autonomous system is divided
into different regions, the summary of routing information between the regions is
adopted, which greatly reduces the quantity of routing information to be
transmitted. It also makes routing information not expand rapidly as the network
scale increases
19. What is multicast routing? (May-2018)
Multicast IP Routing protocols are used to distribute data (for example, audio/video streaming
broadcasts) to multiple recipients. Using multicast, a source can send a single copy of data to
a single multicast address, which is then distributed to an entire group of recipients.

30. Define sub-netting. (Nov /Dec 2015)


Subnetting provides an elegantly simple way to reduce the total number of network numbers
that are assigned. The idea is to take a single IP network number and allocate the IP
addresses with that network to several physical networks, which are now referred to as
subnets. Routers within the subnetwork use a subnet mask to discover the physical network
to which a packet should be forwarded. Subnetting introduces a third level to the two-level
hierarchical IP address.

20. Define Routers. (or) What is the function of router?


Routers relay packets among multiple interconnected networks. They route packets from one
network to any number of potential destination networks on Internet. Routers operate in the
physical, data link and network layer of OSI model.

21. Define multicasting.


In multicast communication, there is one source and a group of destinations. The relationship
is one-to-many. In this type of communication, the source address is a unicast
address, but the destination address is a group address, which defines one or more
destinations. The group address identifies the members of the group. In multicasting, the
router may forward the received packet through several of its interfaces.

22. Mention the difference between Distance vector and Link state routing.
Distance vector routing Link state routing
Sharing the knowledge about the whole Sharing knowledge about the neighborhood
networks only to neighbours as measures with every other router by flooding
of distance and vector.
The least cost route between any two Every router can calculate the shortest path
nodes is the route with minimum distance tree to form the routing table.

Best for simple, flat and non-hierarchical


Best for large, hierarchical networks
networks

Routing Information Protocol (RIP) is an Open Shortest Path First (OSPF) is an


implementation of the distance vector implementation of the link state routing
routing protocol. protocol.

23. What is the address space of IPV6? List the advantages of IPV6.
The address space of IPV6 is 2128. The advantages of IPV6 are,
 Larger address space : 128 bit long
 Better header format. New header format which simplifies and speeds up the
routing process. Options do not need to be checked by routers.
 New options: additional functionalities.
 Allowance for extension
 Support for resource allocation.
 Support for more security

24. Define flooding. What is the drawback of flooding?


Flooding means that a router sends its information to all of its neighbours and all of its
output ports.
A router receives a packet and, without even looking at the destination group address, sends
it out from every interface except the one from which it was received. Flooding broadcasts
packets, but creates loops in the systems.

25. What are the advantages of flooding?


-     Simple
-     Needs no network information or routing tables
-     Robust for failure prone networks.
-     Shortest path is always found.

26. What is source based tree multicast routing?


In the source-based tree approach, each router needs to have one shortest path tree for each
group. The shortest path tree for a group defines the next hop for each network that has loyal
member(s) for that group.

27. When does a node send its partial routing table to all its immediate neighbors?
The table is sent both periodically and when there is a change in the table.
 Periodic Update A node sends its routing table, normally every 30 s, in a periodic update.
The period depends on the protocol that is using distance vector routing.
 Triggered Update A node sends its two-column routing table to its neighbors anytime
there is a change in its routing table. This is called a triggered update.

28. What are the solutions for instability of two node problem?
 Defining Infinity- to redefine infinity to a smaller number, such as 100
 Split Horizon Information about the routing for a particular packet is never sent back in
the direction from which it was received.
 The split horizon strategy can be combined with the poison reverse strategy.

29. Write the features of RIP.


The Routing Information Protocol (RIP) is an intra-domain routing protocol used inside an
autonomous system. It is a very simple protocol based on distance vector routing.
 The metric used in RIP is called a hop count. It is defined as the number of links
(networks) that have to be used to reach the destination.
 Infinity is defined as 16, which means that any route in an autonomous system using RIP
cannot have more than 15 hops.
 The next-node column defines the address of the router to which the packet is to be sent
to reach its destination.

30. What is routing protocol and how it is classified?


o A routing protocol is a combination of rules and procedures that let routers in the Internet
inform each other of changes.
o It allows routers to share whatever they know about the internet or their neighbourhood.
31. What is PIM?
Protocol Independent Multicast (PIM) is a collection of multicast routing protocols, each
optimized for a different environment. There are two main PIM protocols,
PIM Dense Mode(PIM-DM) - It is used in a dense multicast environment and uses RPF and
pruning and grafting strategies to handle multicasting.
PIM Sparse Mode(PIM-SM) - It is used in a sparse multicast environment such as a WAN.

32. What is Area Border router?


Area is a collection of networks, hosts, and routers all contained within an autonomous
system. At the border of an area, special routers called area border routers summarizes the
information about the area and sends it to other areas.

29. Define the term broad casting.


A form of delivery in which one copy of a packet is delivered to each computer on a network.

30. What is the purpose of subnetting?


 When we divide a network into several subnets, we have three levels of hierarchy
 The netid is the first level, defines the site.
 The subnetid is the 2nd level, defines the physical subnetwork. The hostid is the 3rd level
defines the connection of the host to the subnetwork.

31. What are the benefits of subnetting a network?


1.   Reduced network traffic
2.   Optimized network performance
3.   Simplified network management
4.   Facilities spanning large geographical distance.

32. Define Masking.


Masking is a process that extracts the address of the physical network from an IP address.

33. What is the difference between boundary level masking and non-boundary level
masking.
Boundary level Masking:
If the masking is at the boundary level, the mask numbers are either 255 or 0, finding the
subnetwork address is very easy.
Non Boundary level Masking:
If the masking is not at the boundary level, the mask numbers are not just 255 or 0,
finding the subnetwork address involves using the bitwise AND operators.

34. In routing what does the term SHORTEST mean?


The term Shortest mean the combination of many factors including shortest, cheapest ,
fastest most reliable and so on.
35. Why is adaptive routing superior to non adaptive routing?
Adaptive routing is superior to non adaptive routing because adaptive routing may select a
new route for each packet in response to change in condition and topology of the networks.

36. What is the router’s role in controlling the packet lifetime?


As packet is generated, each packet is market with a lifetime, usually the number of hops that
are allowed before a packet is considered lost and, accordingly destroyed. As each router
encounters the packet subtracts 1 from the total before passing it on. When the lifetime total
reaches 0, the packet is destroyed.

37. What are the most popular routing algorithms?


a.   Distance Vector routing
b.   Link State routing

38. What are the three main elements of distance vector algorithms.
a.   Knowledge about the entire autonomous system.
b.   Routing only to neighbours
c.   Information sharing at regular intervals

39. What are the services offered by network  layer?


a.   Logical addressing
b.   Routing

40. Distinguish between adaptive and non adaptive routing algorithms.


Non adaptive Routing:
 Once a pathway to a destination has been selected the router sends all packets for that
destination along that one route.
 The routing decisions are not based on the condition or topology of the networks.
Adaptive Routing:
 Router may select a new route for each packet.(even packets belonging to the same
transmission)
 The routing decisions are based on the condition or topology of the networks.

41. What are the three main elements of Link state routing?
1.   Knowledge about the neighborhood.
2.   Sharing with every other network.
3.   Information sharing when there is a change.

42. What algorithm does link state routing use to calculate the routing tables.
Dijkstra algorithm is used to calculate the routing table.

43. Differentiate virtual circuit and datagram’s.


VC is connection oriented and datagram is connectionless.

44. What is adaptive routing algorithm?


Adaptive routing algorithms change their routing decisions to reflect changes in the topology
and usually the traffic as well. Distance vector and link state are examples of this.

45. What is the time to live field in IP header?


Time to live field is counter used to limit packet lifetimes counts in second and default value is
255 sec.
46. What are the main disadvantages of distance vector routing?
 Split horizon
 Count to infinity problem

47. Why is it that in a broadcast network, the network layer is often thin or even non
existent?
Network layer is responsible for host to host delivery and for routing the packets through
the routers or switches. In broadcast there is no need of addressing the packets, routing and
address verification.

48. What is meant by routing algorithm?


The algorithm that manages routing tables and makes the routing decisions is called
routing algorithm.

49. What are the desirable properties of a routing algorithms?


1.   Correctness
2.   Simplicity
3.   Robustness
4.   Stability
5.   Fairness
6.   Optimality

50. What are the types of routing algorithms?


1.   Non adaptive routing algorithm
2.   Adaptive routing algorithm

PART-B

1. With an example network scenario explain the mechanism of routing information protocol
and specify the routing table contents. (May 2019)
2. Discuss the fundamentals and advantages of open shortest path first protocol. (May 2019)
3. Write the shortest path algorithm with a suitable illustration. (April/May 2015)
4. Explain the distance vector routing algorithm. Mention the limitations of the same.
(April/May 2015)
5. Explain about IPV6? Compare IPV4 and IPV6. (May/June 2016)
6. Discuss in detail about any two Multicast routing with neat sketches. (Nov/Dec 2015,2016)
7. Discuss in detail about open source shortest path routing with neat diagrams.(Nov/Dec 2016)
8. With a neat diagram explain Distance vector routing protocol.
(May/June 2016, April/May 2015, Nov/Dec 2015)
9. Explain the building and distribution of link state packets in link state routing algorithm.
(Nov/Dec 2017)
10. Elaborate on multicast routing protocols. (Nov/Dec 2017)
11. Explain the RIP algorithm with a suitable example of your choice. (May/June 2014)
12. Discuss the IP address modes and write short notes on ARP. (May/June 2014)
13. Explain link state routing and discuss its advantages over distance vector routing.
14. State which layers of the ISO OSI model the following interconnecting device operates.
a.   Repeaters
b.   Bridges
c.   Routers
d.   Gateways
15. State the major difference between Distance Vector Routing and Link state Routing.
16. plain the network layer in the Internet and IP addressing
17. Write a note on various internetworking devices
18. Compare Bridges and routers
19. Explain shortest path algorithm with a suitable illustration
20. Explain the working of Protocol Independent Multicast (PIM) in detail.
21. Discuss in detail the various aspects of IPV6.
22. For the network given, give link state routing tables
PART C

1. i.    What is sub netting? Discuss. Also state which classes of IP address can be sub netted.
       ii.    What is subnet masking? Discuss.
      iii.   How can we prove that we have 2,147,483,648 addresses in class A?
      iv.   What is the sub network address if the destination address is 200.45.34.56 and the
subnet mask is  255.255.240.0
2. i  In classful addressing how is an IP address in class A, Class B and Class C divided?
Discuss
      ii. Given the address 23.56.7.91 and the default class  A mask, find the beginning address
      iii Given the address 201.180.56.5 and the default class C mask, find the beginning address
3. Assume that the shortest distance between nodes a, b, c, and d to node y and the costs from
node x to nodes a, b, c, and d are given below:

What is the shortest distance between node x and node y, Dxy, according to the Bellman-Ford
equation

4. Use Dijkstra’s algorithm to find the shortest path tree and the forwarding table for node A
in the Figure below

5. For the network given, give global distance-vector tables when


i. Each node knows only the distances to its immediate neighbours.
ii. Each node has reported the information it had in the preceding step
to its immediate neighbours.
iii. Step (ii) happens a second time.
UNIT IV- TRANSPORT LAYER

1. What is the difference between congestion control and flow control? (Nov/Dec 2015)
Congestion Control Flow Control
Flow control means preventing the source
Congestion control means preventing the source
from sending data that the receiver will end
from sending data that will end up getting
up dropping because it runs out of buffer
dropped by a router because its queue is full.
space.
This is more complicated, because packets from
This is fairly easy with a sliding window
different sources travelling different paths can
protocol
converge on the same queue.
Congestion control is a method of ensuring that Flow control is controlled by the receiving
everyone across a network has a "fair" amount side. It ensures that the sender only sends
of access to network resources, at any given what the receiver can handle.
time.

2. Differentiate between TCP and UDP. (Nov/Dec 2016)


TCP- Transmission Control Protocol UDP- User Datagram Protocol
It provides Connection oriented service Provides connectionless service.
Connection Establishment delay will be there No connection establishment delay
Provides reliable service Provides unreliable, but fast service
It is used by DNS, SNMP, audio, video and
It is used by FTP, SMTP
multimedia applications.

3. When can an application make use of UDP? (May/June 2014)/ What are the uses of
UDP?
 UDP is suitable for a process that requires simple request-response communication with
little concern for flow and error control
 UDP is suitable for a process with internal flow and error control mechanisms.
 UDP is a suitable transport protocol for multicasting.
 UDP is used for management processes such as SNMP
 UDP is used for some route updating protocols such as Routing Information Protocol

4. List the different phases used in TCP connection. (May/June 2016)


In TCP, connection-oriented transmission requires three phases
 Connection establishment - The connection establishment in TCP is called Three-way
handshaking
 Data transfer - After connection is established, bidirectional data transfer can take place.
The client and server can both send data and acknowledgments.
 Connection termination

5. What do you mean by QOS? (Nov/Dec 2015, Nov-2018)


The quality of service defines a set of attributes related to the performance of the
connection. For each connection, the user can request a particular attribute each service class
is associated with a set of attributes. Parameters-Bandwidth, Latency or Delay, Jitter, Packet
loss ratio
6. List some of the Quality of Service parameters of transport layer? (April/May 2015)
 Error control
 Desired average and maximum delay
 Throughput
 Priority Level
 Resilience

7. How does transport layer perform duplication control? (April/May 2015)


TCP and UDP protocols are used in transport layer. In TCP all the segments are
numbered. TCP all the segments are transmitted as IP datagrams and since IP datagrams can
arrive out of order, TCP segments can arrive out of order. Since IP datagrams can get
duplicated, a receiving TCP will discard duplicate data using the sequence number.

8. What is meant by slow start in TCP? (May/June 2014, May/June 2016)


At the beginning of a connection, TCP sets the congestion window size to the maximum
segment size. For each segment that is acknowledged, TCP increases the size of the
congestion window by one maximum segment size until it reaches a threshold of one half of
the allowable window size. This is called Slow Start it is used with additive increase.

9. List the advantages of connection oriented services over connectionless service


(Apr/May 2017)
In a connectionless service, the packets are sent from one party to another with no need
for connection establishment or connection release. The packets are not numbered; they
may be delayed or lost or may arrive out of sequence. There is no acknowledgment
either. Ex: UDP
In a connection-oriented service, a connection is first established between the sender
and the receiver. Data are transferred. At the end, the connection is released. It provides
reliable service. Ex: TCP

10. How do fast retransmit mechanism of TCP works? (Apr/May 2017)


In TCP, whenever, one segment is lost the receiver receives so many out-of-order
segments that they cannot be saved, so it sends an acknowledgement with the same value.
The sender receives more than three acknowledgments with the same value (three
duplicates), then it will retransmit the missing segment immediately. This is referred as fast
retransmission mechanism.

11. What are the approaches used to provide a range of Quality of service (QoS)?(Nov/ Dec
2017)
The approaches used to provide a range of Quality of service are, Integrated Services and
Differentiated Services. Both models emphasize the use of quality of service at the network
layer. Integrated Services is a flow-based QoS model, which means that a user needs to
create a flow, a kind of virtual circuit, from the source to the destination and inform all
routers of the resource requirement. Differentiated Services is a class-based QoS model
designed for IP.

12. What are the services provided by Transport Layer Protocol? [May-2018]
a. End to End delivery
b. Addressing
c. Reliable delivery
d. Flow control
e. Multiplexing

13. Define congestion control. [May-2018]


 Congestion control is defined as try to avoid traffic congestion.
 The probable reason for a packet loss in a fired network is a temporary overload some
point in the transmission path, (i.e.,) a state of congestion at a node
 Congestion may appear from time to time even in carefully designed networks.

14. What are the services provided by transport layer protocol? (April/May 2018)
a.   End to End delivery
b.   Addressing
c.   Reliable delivery
d.   Flow control
e.   Multiplexing

15.State the purpose of service model in computer network. (May-2019)


The network-service model defines the characteristics of end-to-end transport of data
between one "edge" of the network and the other, that is, between sending and receiving end
systems.

16.What are the fields on which the UDP checksum is calculated? Why?
UDP checksum includes a pseudo header, the UDP header and the data coming from the
application layer.

17. What is function of transport layer?


The transport layer is responsible for reliable data delivery.(i.e) Process-to-process
delivery. Functions of transport layer
i.          Transport layer breaks messages into packets
ii.         It performs error recovery if the lower layers are not adequately error free.
iii.        Function of flow control if not done adequately at the network layer.
iv.        Function of multiplexing and Demultiplexing sessions together.
v.         This layer can be responsible for setting up and releasing connections across the
network.

18. Why TCP services are called Stream delivery services?


TCP allows the sending process to deliver data as a stream of bytes and the receiving
process to obtain data as a stream of bytes. TCP creates an environment in which the two
processes seem to be connected by an imaginary "tube" that carries their data across the
Internet. The sending process produces (writes to) the stream of bytes, and the receiving
process consumes (reads from) them.

19. What are the four major aspects of reliable delivery at the transport layer?
At the transport layer, reliable delivery has 4 aspects;
i.          Error control
ii.         Sequence control
iii.        Loss control
iv.        Duplication control
20. Define segment
 The unit of data transfer between two devices using TCP is a segment.
 TCP groups a number of bytes together into a packet called a segment. TCP adds a
header to each segment (for control purposes) and delivers the segment to the IP layer
for transmission.

21.What is meant by congestion? Why the congestion occurs in network?
When load on network is greater than its capcity, there is congestion of data packets.
Congestion occurs because routers and switches have queues or buffers.

21. What is Transport Control Protocol (TCP)?


TCP is called a connection-oriented, reliable transport protocol. Transmission Control
Protocol (TCP) is a process-to-process (program-to-program) protocol. TCP uses port
numbers. TCP is a connection oriented protocol; it creates a virtual connection between two
TCPs to send data. In addition, TCP uses flow and error control mechanisms at the transport
level.

20. Define the term (i) Host (ii) IP


a.   Host : An end user’s computer connection to a network. In an internet each computer
is classified as a host or a router.
b.   IP: Internet Protocol that defines both the format of packet used on a TCP/IP internet
and the mechanism for routing a packet to its destination.

21. What is UDP? What are the advantages of using UDP over TCP?
The User Datagram Protocol (UDP) is called a connectionless, unreliable transport
protocol. UDP is a very simple protocol using a minimum of overhead. Sending a small
message by using UDP takes much less interaction between the sender and receiver than
using TCP.
Advantages of using UDP over TCP
Does not include the overhead needed to detect and maintain connection oriented
semantics

22. Give some examples of application where UDP is preferred over TCP.
1.   In multicasting
2.   Route update protocol in RIP
23. What is RTT?
 RTT is an acronym for Round Trip Time;
 It is the time needed for a segment to reach a destination and for an acknowledgment to
be received.

24. How is RTT used in networking?


Transport protocols like TCP which expects an acknowledgement to arrive after data has
been successfully received, keep an estimate of the current RTT on each connection. They
use the RTT estimate to determine how long to wait for an acknowledgment before
retransmitting the segment.

25. How is RTT computed?


The sending side records the clock when it transmits a packet, and then examines the clock
again when an acknowledgment arrives. By subtracting the two values, it obtains a single
estimate of the round trip time. It then combines that single estimate with previous estimates
to get an average

26. Do TCP,UDP  or both compute RTT?


Only TCP computes RTT but UDP does not compute.

27. Write the purpose of these timers in TCP:


a.   Retransmission timer
b.   Persist timer
c.   Keep alive timer
d.   Time waited timer
(a)  retransmission timer – The retransmission timer is to control a lost or discarded segment
and resend a duplicate packet after the time expires.
(b)  After the sending window has been closed (with zero credit) a persist timer is used by the
source to periodically probe the destination host to see if the window has actually been
changed. The purpose is to prevent deadlock situations where a credit to open the window
has been lost.
(c)  The keep alive timer is an optional feature in some TCP implementations. It is used to
prevent a long idle connection between two TCP’s
(d)  Time waited timer is used during connection termination.

28. List the strategies of controlling Congestion.


i). Allocating resources in advance
ii). Allowing packet's to be discarded when they can’t be processed
iii). Restricting the number of packet's in the subnet
iv). Using flow controlling to avoid congestion and
v). Choking of input when the subnet is overloaded.

29. What are the types of congestion control algorithms?


Congestion control refers to the mechanisms and techniques to control the congestion and
keep the load below the capacity. Congestion control algorithms are divided into 2 types.
They are as follows:
Open loop congestion control (Prevention) Closed loop congestion control
 Retransmission policy (Removal)
 Window policy  Back pressure
 Acknowledgment policy  Choke packet
 Discarding policy  Implicit signalling
 Admission policy  Explicit signalling

30. Define the term Jitter.


Jitter is the variation in delay for packets belonging to the same flow.

31. “DNS can use the services of UDP or TCP using port 53”. Discuss when UDP is used
and when TCP is used.
UDP is used when the size of the response message is less than 512 bytes. TCP is used when
the size of the response message is greater than 512 bytes.

32. What are the scheduling techniques designed to improve the quality of services?
 FIFO queuing
 Priority queuing
 Weighted fair queuing
33. Define Traffic Shaping.
It is a mechanism to control the amount and rate of the traffic sent to the network. Two
techniques can shape traffic.
 Leaky bucket
 Token bucket

34. Define Resource Reservation.


A flow of data needs resources such as a buffer, bandwidth, CPU time and so on. The
quality of service is improved if these resource are reserved beforehand.
35. What is an silly window syndrome?
When either the sending application program creates data slowly or the receiving
application program consumes data slowly or both. This problem is called the silly window
syndrome.

36. List the flag used in TCP header?


TCP header contains six flags.
They are URG, ACK, PSH, RST, SYN and FIN.

37. What is the purpose of urgent pointer in the TCP header?


In certain circumstances, it may be necessary for a TCP sender to notify the receiver of
urgent data that should be processed by the receiving application as soon as possible. This 16 bit
field tells the receiver when the last byte of urgent data in the segment ends.

38. How TCP differ from the sliding window protocols.


TCP differs from the sliding window protocols in the following ways:
1.   When using TCP, applications treat the data sent and received as an arbitrary byte
stream. The sending
-     TCP module divides the byte stream into a set of packets called segments, and sends
individual segments within an IP datagram.
-     TCP decides where segment boundaries start and end.
2.   The TCP sliding window operates at the byte level rather than the packet (or
segment) level. The left and right window edges are byte pointers.
3.   Segment boundaries may change at any time. TCP is free to retransmit two adjacent
segments each containing 200 bytes of data as a single segment of 400 byte.
4.   The size of the send and receive window change dynamically.

39. What is a port?


Applications running on different hosts communicate with TCP with the help of a
concept called as ports. A port is a 16 bit unique number allocated to a particular application.

40. What is Socket?


The communication structure needed for socket programming is called socket.
A port identifies a single application on a single computer.
Socket = IP address + Port number

41. What is a datagram socket?


A structure designed to be used with connectionless protocols such as UDP.

42. Write how the TCP provides the reliability?


A number of mechanisms provide the reliability.
1. Checksum
2. Duplicate data detection
3. Retransmission
4. Sequencing
5. Timers

43. “TCP software is implemented as finite state machines.” Discuss.


To keep track of all the different events happening during connection establishment ,
connection termination and data transfer.

44. What is stream socket?


A structure designed to be used with a connection oriented protocol such as TCP

45. Give the strategies TCP uses to avoid congestion.


1.   Slow start and additive increase
2.   Multiplicative decrease

46. What is the purpose of choke packet.


It is packet sent by router to the source to inform it of congestion.

47. State any 2 socket primitives for TCP and state their function.
1.   Listen
a.   int listen (int sd , int backlog)
2.   Close
a.   int close (int sd)

48. What is meant by slow start in TCP?


At the beginning of a connection, TCP sets the congestion window size to the maximum
segment size. For each segment that is acknowledged, TCP increases the size of the congestion
window by one maximum segment size until it reaches a threshold of one half of the allowable
window size. This is called Slow Start it is used with additive increase.

49. What is transport entity?


The main goal of the transport layer is to provide efficient, reliable and cost effective
service to its users, normally processes in the application layer. The hardware and software
within the transport layer that does the work is called the transport entity.

50. What is concatenation?


When the size of the data units belonging to a single session are so small that several can
fit together into a single datagram or frame, the transport protocol combines them into a single
data unit. The combining process is called concatenation.

51. What is the purpose of sequence control?


a.  If a longer data unit has been segmented the numbers indicate the order of reassembly.
b.  If several shorter units have been concatenated the  numbers indicate the end of each
subunit and allow them to be separated accurately at the destination.

52. How transport layer performs Duplication control?


Sequence number allow the receiver to identity and discard duplicate segments.

53. Define Multiplexing.


Many to one relationship.The process of accepting messages from different
processes, differentiated by their assigned port number. After adding the header, the
transport layer passes the packet to the network layer.
54. What are the two ways of multiplexing done at the transport layer?
Multiplexing occurs at the transport layer in 2 ways
i.          Upward Multiplexing:
The multiple transport layer connection uses the same network connections.
ii.         Downward Multiplexing
The transport layer connection uses the multiple network connections.

55. What are the service primitives in simple transport protocol?


The parameters of the service primitive and library procedures are follow.
i.          LISTEN
ii.         CONNECT
iii.        SEND
iv.        RECEIVE
v.         DISCONNECT

56. What is the function of transmission timer?


The main function is to retransmit acknowledged segment.

57. What is meant by well known port? What is the numbers?


Well known port means they are reserved for use by well known application protocols
such as HTTP and FTP. The port number ranging from 0 to 1023 are well known port numbers.

58. What are the three steps involved in establishing a connection?


Connection establishment involves the following:
i.          Host A sends a packet to announce its wish for connection and includes its
initialization information about traffic from A to B.
ii.         Host B sends a packet to acknowledge (confirm) the request of A.
iii.        Host B sends a packet that includes its initialization information about
traffic from B to A.
iv.        Host A sends a packet to acknowledge (confirm) the request of B.

59. What are the steps involved while terminating a connection?


4 actions are needed to close the connections in both directions.
i.          Host A sends a packet announcing its wish for connection termination.
ii.         Host B sends a segment acknowledging the request of A. After this, the
connection is closed in one direction, but not in the other.
iii.        When host B has finished sending its own data, it sends a segment to
indicate that it wants to close the connection.
iv.        Host A acknowledge (confirm) the request of B.

60. What is the difference between network service and transport service?
A network service is generally unreliable whereas transport service is reliable. The
network service is only used by the transport entities and transport service must be convenient
and easy to use.

61. List some of the Quality of service parameters of transport layer


a.   Error and loss levels
b.   Desired average and maximum delay
c.   Throughput
d.   Priority level
PART – B

1.Explain the congestion control techniques used to improve QOS of the computer network.
(May 2019)
2.Explain the operation of Go-Back-N protocol (May 2019)
3.With a diagram explain about TCP connection management (May 2019)
4.How is congestion controlled? Explain in detail about congestion control techniques in
transport layer. (Nov/Dec 2016)
5.Explain various fields of the TCP header and the working of the TCP protocol. (Nov/Dec 2016)
6.Define UDP. Discuss the operation of UDP. Explain UDP checksum with one example.
(May/June 2016)
7.Explain in detail the various TCP congestion control mechanisms. (May/June 2016)
8.With neat architecture, explain TCP in detail. (Nov/Dec 2015)
9.Explain in detail of about domain name system. (Nov/Dec 2015)
10. List the various congestion control mechanisms. Explain any one in detail.
11. Explain the various fields of TCP header and the working of the TCP protocol.
(April/May 2015)
12. Explain the three way handshake protocol to establish the transport level connection.
(April/May 2015)
13. Explain the principles of congestion control in TCP. (May/June 2014)
14. Discuss the Random Early Detection mechanism and derive the expression for drop
Probability. (May/June 2014)
12. Explain a TCP congestion control algorithm (Nov/Dec 2015,Nov/Dec 2017, Nov/Dec 2016)
13. Identify and explain the states involved in TCP (April/May 2018)
14. Discuss any one TCP congestion avoidance mechanism ((April/May 2017)
15. Explain adaptive flow control in detail and its uses. (Nov/Dec 2010)
16. Explain the duties of Transport layer.
17. Draw a TCP state transition diagram for connection management.(Nov/Dec 2017)
18. Explain the TCP transmission policy, Congestion control.
19. Explain the following issues of transport protocol
a.   Establishing a connection
b.   Terminating a connection
20. Explain the various fields of TCP header with the help of a neat diagram.
21. Explain the various steps that are followed in releasing a TCP connection.
PART- C

1. i. List and discuss the various primitives for a simple transport services
ii.“DNS can use the service of UDP or TCP using port 53” Discuss when UDP is used and
when TCP is used.
iii.    Highlight the features of UDP and briefly discuss the same.

2. i. Discuss connection establishment and connection release in TCP


ii.     Discuss how TCP provides reliability using error control.
iii.    Discuss the strategies TCP uses to avoid congestion.

3. In a network using the Selective-Repeat protocol with m = 4 and the sending window of size
8, the value of variables are Sf = 62, Sn = 67, and Rn = 64. Packet 65 has already been
acknowledged at the sender site; packets 65 and 66are received out-of-order at the receiver
site. Assume that the network does not duplicate the packets.
a. What are the sequence numbers of pending data packets (in transit, corrupted,or lost)?
b. What are the acknowledgment numbers of pending ACK packets (in transit,corrupted, or
lost)?

4. With TCPs slow start and AIMD for congestion control, show how the window size will
vary for a transmission where every 5th packet is lost. Assume an advertised window size of
50 MSS.

5. Specify the justification for having variable field lengths for the fields in the TCP header.
UNIT V APPLICATION LAYER

1. What is DNS ?( April/May 2018)


DNS is an essential part of the Internet. It manages to translate all the inquiries into
IP addresses, and like this, it can identify different devices that are connected to the
network.

2. Write the uses of HTTP.( Nov./Dec. 2017,April/May 2018)


HTTP stands for hypertext transfer protocol. It's a protocol that allows communication
between different systems. Most commonly, it is used for transferring data from a web server
to a browser to view web pages.

3. Define SMTP. (Nov/Dec 2015, April/May 2015)


The protocol that supports email on the Internet is called Simple Mail Transfer Protocol.
SMTP uses commands and responses to transfer messages between MTA client and MTA
server. SMTP communication between mail servers uses TCP port 25.

4. State the usage of conditional get in HTTP. (April/May 2017)


This request of asking the server for a document considering a specific parameter is
called a Conditional GET Request. A conditional GET is an HTTP GET request that may
return an HTTP 304 response (instead of HTTP 200). In this request, a specific request header
is sent If-Modified-Since. This header sends a RFC 2822 formatted date as the value. The
proxy which is between the Server and the client checks the date, and the cached document, if
the condition matches, A 304 Not Modified header is sent back to the client in the response.

5. Present the information contained in a DNS resource record. (April/May 2017)


Each domain name (each node on the tree) is associated with a record called the resource
record. The server database consists of resource records. Resource records are also what is
returned by the server to the client.

6. Mention the types of HTTP messages. (Nov/Dec 2015)


The Hypertext Transfer Protocol(HTTP) is a protocol used mainly to access data on the
World Wide Web. HTTP uses the services of TCP. The types of HTTP messages are
 Request message- It consists of a request line, a header, and sometimes a body. Request
line consists of request method, URL, HTTP version.
 Response message - It consists of status line, a header, and a body. Status line includes
the version, status code and status phrase.

7. What do you mean by TELNET?(May/June 2014)


Telnet is a client/server application that allows a user to log on to a remote machine
giving the user access to the remote system.

8. Mention the different levels in domain name space. (May/June 2016)


DNS is hierarchical in structure. In this design the names are defined in an inverted-tree
structure with the root at the top. The tree can have only 128 levels: level 0 (root) to level
127. From the root, the assigned top-level domains in the U.S. are:
 GOV - Government body.  COM - Commercial entity.
 EDU - Educational body.  MIL - U. S. Military.
 INT - International organization  ORG - Any other organization not
 NET - Networks previously listed.

9. What is a post office protocol? (Nov/Dec 2016)


Post Office Protocol is a message Access Protocol. An e-mail protocol that allows
retrieval of e-mail messages from an e-mail server using remote connection. The client opens
a connection to the server on TCP port 110. The client POP3 software is installed on the
recipient computer; the server POP3 software is installed on the mail server. Mail access
starts with the client when the user needs to download e-mail from the mailbox on the mail
server.

10. What is persistent HTTP? (Nov/Dec 2016)


HTTP persistent connection, also called HTTP keep-alive, or HTTP connection reuse, is
the idea of using a single TCP connection to send and receive multiple HTTP
requests/responses, as opposed to opening a new connection for every single
request/response pair.

11. Expand POP3 and IMAP4. (Nov/Dec 2016)


 POP3-Post Office Protocol 3
 IMAP4-Internet Message Access Protocol 4

12. Define URL. (May/June 2016, 2019)


A URL (Uniform Resource Locator) provides a way to locate a resource on the web. The
URL is a standard for specifying any kind of information on the Internet. The URL defines
four things: protocol, host computer, port, and path. The URL contains the name of the
protocol to be used to access the resource and a resource name.

13. What are the two types of user Agents?


a.   Command driven and
b.   GUI based.

14. What do you mean by Web Services Description Language (WSDL)? (Nov./Dec. 2017)
WSDL is a standard format to describe a Web Service. A WSDL document is composed
by two sections:
 An abstract interface section- It defines the signatures of procedures (RPC-style) or
messages (document-style)
 A deployment section- It defines the service location and the supported transport protocols

15. Write the uses of HTTP [May-2018]


 The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed,
collaborative, and hypermedia information systems. HTTP (Hyper Text Transfer
Protocol), is used for transferring information like document, file, image, video between
computers over internet.
 HTTP is the foundation of data communication for the World Wide Web.
 HTTP is an application protocol that runs on top of the TCP/IP suite of protocols (the
foundation protocols for the Internet).
 Hypertext is structured text that uses logical links (hyperlinks) between nodes containing
text.

14. What is DNS . What is the Domain Name System responsible for? [May-2018]
DNS client/server program can support an e-mail program to find the IP address of an e-
mail recipient. A user of an e-mail program may know the e-mail address of the recipient;
however, the IP protocol needs the IP address. The DNS client program sends a request to a
DNS server to map the e-mail address to the corresponding IP address.

The Domain Name System converts domain names (of the form ww.annauniversity.com)
into IP numbers.

15. What is PGP? (May/June 2014)


Pretty Good Privacy (PGP) is a popular approach to providing encryption and authentication
capabilities for electronic mail. The most interesting aspect of PGP is how it handles
certificates.PGP acknowledges that each user has his own set of criteria by which he wants to
trust keys certified by someone else and provides the tools needed to manage the level of
trust he puts in these certificates.

16. Draw a diagram that illustrate tunnelling strategy (May-2019)

17. Draw the scenario of electronic mail (May-2019)

18. Write the three main divisions of the DNS.


Generic domains
Country domains
Inverse domains

19. What are the groups of HTTP header?


 General Header - Gives general information about the message and can be present in both a
request and a response.
 Request Header - Presents only in a request message. It specifies the client's configuration
and the client's preferred document format
 Response header- Presents only in a response message. It specifies the server's configuration
and special information about the request.
 Entity Header- The entity header gives information about the body of the document

20. Define the term domain.


A domain is a subtree of the domain name space. The name of the domain is the domain
name of the node at the top of the subtree.

21. What are the two parts of addressing system in SMTP?


The addressing system used by SMTP consists of two parts:
 A local part and a domain name separated by an @ sign
 Local Part @ Domain Name

22. How does MIME enhance SMTP?


Multipurpose Internet Mail Extensions (MIME) is a supplementary protocol that allows
non-ASCII data to be sent through e-mail. MIME transforms non-ASCII data at the sender
site to NVT ASCII data and delivers them to the client MTA to be sent through the Internet.
The message at the receiving side is transformed back to the original data

23. What are the services provided by user agent?


 Composing Messages
 Reading Messages
 Replying to Messages
 Forwarding Message
 Handling mail boxes

24. Why HTTP is designed as a stateless protocol?


Maintaining state across request response connections significantly increases the initial
interactions in a connection since the identity of each party needs to be established and any
saved state must be retrieved. HTTP is therefore stateless to ensure that the Internet is scalable
since state is not contained in the HTTP request/response pairs by default.

25. Define the terms (i) Browser (ii) Hypertext Mark Up language.
a. Browser: A computer program that accesses and displays information from the world
wide web. A browser contains multiple application programs and uses an objects name
to determine which application should be used to access the objects. Web browser is a
software program that interprets and displays the contents of HTML web pages
b. Hypertext Markup Language: The source form used for documents on the world wide
web. HTML embeds commands that determine formatting along with the text to be
displayed. Ex: To move to a new line or indent text

26. What is a hypertext?


A set of documents in which a given document can contain text as well as embedded
reference to other documents.
27. What are categories of web documents?
 Static documents – The contents are fixed and stored in a server.
 Dynamic documents – created by a server only at a browser request.
 Active documents – It is a copy of a program retrieved by the client and run at the
client side.

28. What are basic functions of email system?


Basic functions of emails are:
a. Composition
b. Transfer
c. Reporting
d. Displaying
e. Disposition

29. What is WWW?


It is an internet application that allows users to view web pages and move from one web
page to another. It is the hypermedia system used on the internet in which a page of
information can contain text, images, audio or video clips and reference to other pages.

30. What are the transmission modes of FTP?


Transmission modes of FTP are:
(i) Stream mode: Default mode and data is delivered from FTP to TCP as a continuous
stream of data.
(ii) Block mode: Data is delivered from FTP to TCP in terms of blocks. Each data block
follows the three byte header.
(iii) Compressed mode: File is compressed before transmitting if size is big. Run
length
encoding method is used for compression.

31. Compare the HTTP and FTP


FTP:
FTP transfers the file from client to server and server to client. It uses two different port
connections i.e., port 20 for control connection and port 21 for data connection. It uses TCP
protocol
HTTP:
HTTP transfer the file from server to client (i.e., web page). It uses only one port connection
(ie port 80).It also uses TCP protocol.

32. Why is an application such as POP needed for electronic messaging?


Workstations interact with the SMTP host, which receives the mail on behalf of every
host in the organization, to retrieve messages by using a client-server protocol such as Post
Office Protocol, version 3(POP3). Although POP3 is used to download messages from the
server, the SMTP client still needed on the desktop to forward messages from the
workstation user to its SMTP mail server.
33. What is Generic Domains?
Generic domain defines registered hosts according to their generic behaviour. Each node
in the tree defines a domain, which is an index to the domain name space database .
 com – Commercial organizations
 edu - Educational
 gov - Government

34. What are the four properties of HTTP?


a. Global uniform resource identifier
b. Request response exchange
c. Statelessness
d. Resource meta data

35. Expand MIME.


Multipurpose Internet Mail Extension is an extension of SMTP that allows the transfer of
multimedia and other non ASCII messages.

36. What are the four groups of HTTP header?


The four groups of HTTP header are:
a.   General header
b.   Entity header
c.   Request header and
d.   Response header.

37. What role does the DNS resolver play in the DNS system?
A DNS resolver is responsible for moving requests of the local DNS server on behalf of
clients.

38. How does a DNS Resolver bootstrap the domain name lookup process?
A DNS resolver must know the IP address of at least one DNS server. IT uses this address to
start the DNS lookup process

39. What is an Electronic Mail?


Email is a popular application in which a user or computer sends a memo to one or more
recipients

40. What do you mean by hypermedia?


A set of documents in which a given document can contain text, graphics, video and
audio clips as well as embedded references to other documents world wide web pages are
hypermedia documents.

41. What is the web browser?


Web browser is a software program that interprets and displays the contents of HTML
web pages.

42. What is a post office protocol?


An e-mail protocol that allows retrieval of e-mail messages from an e-mail server using
remote connection.

43. What do you mean by active web pages?


When a client send a HTTP request for an active web page, the web server sends back an
HTTP response that contains an HTML page as usual. HTML page also contains a small
program that executes on the client computer inside the web browser.

44. What is mailing list?


Mailing list contains the address of destination users.

45. What is the application layer protocol world wide web?


World wide web is a repository of information of spread all over the world and linked
together.

46. What is the use of Mail transfer agent?


Mail transfer agent (MTA) transfers the email across the Internet.

47. What are the two main categories of DNS messages?


DNS has two types of messages : Query and response.

48. Why was there a need for DNS?


In DNS, when there is a change, such as adding a new host, removing a host or changing
an IP address, the change must be made to the DNS master file. The dynamic domain name
system (DDNS) has been devised to respond to this need.

PART – B
1. Discuss in detail about HTTP Operation. (May-2019)
2. Write your understanding on File Transfer Protocol. (May-2019)
3. Explain the basis of POP3 and IMAP mail access protocols (May 2019)
4. Give a detail note on DNS operation. (Nov/Dec 2010,2015,2016)
5. Explain in detail about SNMP messages.(Nov/Dec 2016,Nov/Dec 2017,May/June 2014)
6. Illustrate the role of POP3 in Electronic mail Applications. (Nov/Dec 2016)
7. Describe how SMTP Protocol is used in E-mail applications. (May/June 2016)
8. Explain HTTP with an example. (May/June 2016)
9. Explain in detail about Web service architecture. (May/June 2016)
10. Write short notes on the following: i) Email ii) HTTP. (Nov/Dec 2015)
11. Explain the message transfer using Simple Mail Transfer Protocol. (April/May 2015)
12. Explain the final delivery of email to the end user using POP3. (April/May 2015)
13. Write short notes on: i) Web Services ii)SNMP (April/May 2015)
14. Explain the SNMP protocol in detail. (May/June 2014)
15. Write short notes on DNS and FTP. (May/June 2014)
16. Explain the SMTP and HTTP.Give their uses, state, strengths and weakness (Nov 2010)
17. Tabulate the various HTTP request operations.(April/ 2018,Nov 2017,May 2016)
18. Draw the IMAP state transition diagram.(April/May 2018)
19. Explain in detail about the message format and message transfer in E-Mail (April 2011)
20. List the elements of network management and explain the operation of SNMP protocol in
detail.
PART C

1. Illustrate the sequence of events and the respective protocols involved while accessing a web
page from a machine when it is connected with internet for first time.

2. When an HTTP server receives a request message from an HTTP client, how does the server
know when all headers have arrived and the body of the message is to follow?

3. In a nonpersistent HTTP connection, how can HTTP inform the TCP protocol that the end of
the message has been reached?

4. In SMTP,
a. a non-ASCII message of 1000 bytes is encoded using base64. How many bytes are in the
encoded message? How many bytes are redundant? What is the ratio of redundant bytes to
the total message?
b. a message of 1000 bytes is encoded using quoted-printable. The message consists of 90
percent ASCII and 10 percent non-ASCII characters. How many bytes are in the encoded
message? How many bytes are redundant? What is the ratio of redundant bytes to the total
message?
c. Compare the results of the two previous cases. How much is the efficiency improved if the
message is a combination of ASCII and non-ASCII characters?.

You might also like