Professional Documents
Culture Documents
CN - Question Bank
CN - Question Bank
CN - Question Bank
4. List out the three basic criteria necessary for an effective and efficient network.
The most important criteria are performance, reliability and security.
Performance of the network depends on number of users, type of transmission medium,
the capabilities of the connected hardware and the efficiency of the software.
Reliability is measured by frequency of failure, the time it takes a link to recover from the
failure.
Security issues include protecting data from unauthorized access and viruses.
5. What are the three fundamental characteristics determine the effectiveness of the data
communication system?
The three fundamental characteristics are
Delivery: The system must deliver data to the correct destination.
Accuracy: The system must deliver data accurately.
Timeliness: The system must deliver data in a timely manner.
Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven
delay in the delivery of audio or video packets
6. What is the need for protocols?
In networks, communication occurs between the entities in different systems. Two
entities cannot just send bit streams to each other and expect to be understood. For
communication, the entities must agree on a protocol. A protocol is a set of rules that
govern data communication.
8. List the services provided by data link layer/ State the issues of data link layer.
(Nov/Dec 2015& Nov/Dec 2016, Nov-2018,Nov-2012)
Reliable data transfer
Framing
synchronization
Error detection and control
Flow control.
.
9. Define flow control. (May/June 2016 , April/May 2015)
Flow control refers to a set of procedures used to restrict the amount of data. The sender
can send before waiting for acknowledgment.
7. List the metrics that influence the performance of computer network (May-2018)
Performance of a network depends on a number of factors,
Number of users
Type of transmission medium
Capabilities of the connected hardware
Efficiency of software.
11. How number of duplex mode link is calculated for mesh topology?
In a mesh topology, every device has a dedicated point-to-point link to every other
device.If there are n nodes in a fully connected mesh nodes We need n (n - 1) simplex
physical links. If each physical link allows duplex mode communication a mesh topology,
we need n(n-1)/2 duplex mode links.
13. Differentiate circuit and packet switched networks. (May/June 2014,April/May 2107)
Circuit Switching Packet Switching
It has a dedicated path It does not have a dedicated path
Path is established for entire conversation Route is established for each packet
Fixed Bandwith Dynamic Bandwidth
e.g. Telephone System e.g. Computer Networks
16. Name some services provided by the application layer. (April/May 2011)
Specific services provided by the application layer include the following.
- Network virtual terminal.
- File transfer, access and management (FTAM).
- Mail services.
- Directory services.
20. Define line configuration and give its types. (Nov/Dec 2010)
Line configuration refers to the way two or more communication devices attach to a link. A
link is a communications pathway that transfers data from one device to another.
There are two possible line configurations:
i. Point to point and
ii. Multipoint.
23. What are the responsibilities of physical layer, data link layer, network layer, transport
layer, session layer, presentation layer, application layer.
(i) Physical layer – Responsible for transmitting individual bits from one node to the next.
(ii) Data link layer – Responsible for transmitting frames from one node to the next.
(iii) Network layer – Responsible for the delivery of packets from the original source to the
final destination.
(iv) Transport layer – Responsible for delivery of a message from one process to another.
(v) Session layer – To establish, manage and terminate sessions.
(vi) Presentation layer – Responsible to translate, encrypt and compress data.
(vii) Application layer – Responsible for providing services to the user. To allow access to
network resources.
24. What are the different network topologies to organize computer networks?
Topology defines the physical or logical arrangement of links in a network The term
physical topology refers to the way in which a network is laid out physically. Two or more
devices connect to a link; two or more links form a topology. i) Star Topology
ii) Ring Topology
i) Mesh Topology
iv) Bus Topology
27. Define the term transmission medium. What are the types of transmission media?
The transmission medium is the physical path between transmitter and receiver in a data
transmission system. The characteristics and quality of data transmission are determined both
the nature of signal and nature of the medium.
Transmission media are divided into two categories. They are as follows:
(i) Guided transmission media
(ii) Unguided transmission media
29. Which layer implements the node to node channel connection in OSI layered
architecture? [Nov-2018]
The data link layer is responsible for the node to node delivery of the message. The main
function of this layer is to make sure data transfer is error free from one node to another, over
the physical layer. When a packet arrives in a network, it is the responsibility of DLL to
transmit it to the Host using its MAC address.
30. What is the maximum number of characters or symbols that can be represented
by Unicode??
Unicode uses 32 bits to represent a symbol or a character. We can define 2 32 different symbols
or characters.
31. A color image uses 16 bits to represent a pixel. What is the maximum number
of different colors that can be represented?
With 16 bits, we can represent up to 216 different colors
32. When a party makes a local telephone call to another party, is this a point-to- point or
multipoint connection? Explain the answer.
The communication is only between a caller and the callee. A dedicated line is established
between them. The connection is point-to-point.
33. Compare the telephone network and the Internet. What are the similarities and
differences?
The telephone network was originally designed for voice communication; the Internet
was originally designed for data communication.
The two networks are similar in the fact that both are made of interconnections of small
networks.
The telephone network, is mostly a circuit-switched network; the Internet is mostly a
packet-switched network.
34. Write about address : Physical , Logical and port address
Physical address is the local address of a node; it is used by the data link layer to deliver
data from one node to another within the same network.
Logical address defines the sender and receiver at the network layer and is used to
deliver messages across multiple networks.
Port address (service-point) identifies the application process on the station
38. Name the advantage of optical fiber over twisted pair and coaxial cable.
Higher bandwidth.
Less signal attenuation.
Immunity to electromagnetic interference.
Resistance to corrosive materials.
More immune to tapping.
Light weight.
40. What are the types of addresses (identifiers) used in each of the following layers?
Application layer –Specific addresses
Network layer – Logical addresses
Data-link layer- Physical address
PART – B
1. Explain with relevant diagram the functions of physical and datalink layer. (May-2019)
2. Describe the functions of the layers in the OSI reference model. ( Nov/Dec 2017,April/May
2108,Nov/Dec 2016,Nov/Dec 2105
3. Explain the features of the various unguided transmission media in terms of frequency band,
modulation scheme used, noise immunity, bandwidth and data rate.
4. Explain the various topologies.
5. Describe the categories of network.
6. Discuss in detail about the network performance measures. (Nov/Dec 2016)
7. What is the difference between Internet architecture and OSI architecture?(April 2017)
8. Explain ant two error detection mechanisms in detail. (May/June 2016)
9. Draw the OSI network architecture and explain the functionalities of each layer in detail
(Nov/Dec 2016 , Nov/Dec 2015)
10. Discuss in detail about Internet Architecture. (April/May 2015)
11. Discuss the approaches used for error detection in networking ( Nov/Dec 2017,May/June
2016) (April/May 2015, Nov/Dec 2012)
12. Consider a bus LAN with a number of equally spaced stations with a data rate of 9 Mbps and
a bus length of 1 km. What is the mean time to send a frame of 500 bits to another station,
measured from the beginning of transmission n to the end of reception? Assume a
propagation speed of 150 m/s. If two stations begin to monitor and transmit at the same time,
how long does it need to wait before an interference is noticed?
PART-C
1. Assume six devices are arranged in a mesh topology. How many cables are needed? How
many ports are needed for each device?
Cable links: n (n – 1) / 2 = (6 5) / 2 = 15
Number of ports: (n – 1) = 5 ports needed per device
Note: The number of cables for each type of network is:
Mesh: n (n – 1) / 2
Star: n
Ring: n – 1
Bus: one backbone and n drop lines
2. For each of the following four networks, discuss the consequences if a connection fails.
Five devices arranged in a mesh topology
Five devices arranged in a star topology (not counting the hub)
Five devices arranged in a bus topology
Five devices arranged in a ring topology
Note:
Mesh topology: If one connection fails, the other connections will still be
working.
Star topology: The other devices will still be able to send data through the hub;
there will be no access to the device which has the failed connection to the hub.
Bus Topology: All transmission stops if the failure is in the bus. If the drop-line
fails, only the corresponding device cannot operate.
Ring Topology: The failed connection may disable the whole network unless it is
a dual ring or there is a by-pass mechanism
3. We have two computers connected by an Ethernet hub at home. Is this a LANor a WAN?
Explain the reason.
4. Performance is inversely related to delay. When we use the Internet, which of the following
applications are more sensitive to delay?
Sending an e-mail
Copying a file
Surfing the Internet
Note: E-mail is not an interactive application. Even if it is delivered immediately, it may
stay in the mail-box of the receiver for a while. It is not sensitive to delay.
We normally do not expect a file to be copied immediately. It is not very sensitive to
delay.
Surfing the Internet is the an application very sensitive to delay. We except to get access
to the site we are searching
UNIT II – DATA LINK LAYER & MEDIA ACCESS
4. What is Bluetooth? Which frequency band is used for bandwidth?( May/June 2016)
Bluetooth is a low cost, low power; short range wireless communication technology .It
works in the range of 2.4GHz to 2.484 GHz. It is an ad hoc network which means that the
network is formed spontaneously.
8. Write the mechanism of stop and wait flow control. ( Nov/Dec 2016)
In stop and wait flow control, the sender sends a single frame to receiver & waits for an
acknowledgment. The next frame is sent by sender only when acknowledgment of previous
frame is received. The main advantage of stop & wait protocols is its accuracy. Next frame is
transmitted only when the first frame is acknowledged. So there is no chance of frame being lost
11. What is the access method used by wireless LAN? (May/June 2014)
The access method used by wireless LAN is CSMA/CA-Carrier Sense Multiple Access
with collision Avoidance.
12. What is the network address in a class A subnet with the IP address of one of the
host as25.34.12.56 and mask 255.255.0.0? (May/June 2014)
25.34.12.56
255.255.0.0
25.34.0.0
13. Identify the class of the following IP address: (Nov /Dec 2015)
(a) 110.34.56.45-Class A address
(b) 212.208.63.23- Class C Address
17. What are the draw backs of wired networks? (Apr/May 2010)
Infra-Structure Required.
It will not survive disaster
It is not flexible.
Planning is required to establish a wired network.
Additional cabling with the right plugs and probably internetworking units have
to be provided.
19. Write the design issues of data link layer? (Nov/Dec 2015,Nov/Dec 2016)
Services provided to network layer.
Framing
Error control
Flow control
20. What is bit stuffing and why it is needed in HDLC?( April/May 2011)
Bit stuffing is the process of adding one extra 0 whenever there are five consecutive 1s in the
data so that the receiver does not mistake the data for a flag. Bit stuffing is needed to handle
data transparency.
26. How does the switch decide which output port to place each packet?
It looks at the header of the packet for an identifier that it uses to make the decision.
The different methods of switching are i) Virtual Circuit approach, ii) Datagram approach iii)
Source Routing.
30. Identify the class and default subnet mask of the IP address 217.65.10.7
IP address 217.65.10.7 belongs to class C address and default subnet mask is 255.255.255.0.
33. What is the purpose of wireless LAN and give some examples of WLAN.
The main goal of wireless LAN is to replace office cabling and to introduce a higher
flexibility for ad hoc communication in group meeting. Examples:
IEEE 802.11
HIPERLAN
Bluetooth
34. List out the advantages and disadvantages of WLAN
Advantages: Disadvantages
Flexibility Quality of Service
Planning Cost
Design Government Restrictions
Robustness Safety and Security
38. What is the purpose of the timer at the sender site in systems using ARQ?
The sender starts a timer when it sends a frame. If an acknowledgment is not received within
an allotted time period, the sender assumes that the frame was lost or damaged and resends
it.
49. What is the main function of gateway and which layer it operates? Name the factors
gateway handles?
A gateway is a protocol converter and gateway operates at all seven layers of OSI model.
The factors gate ways handles data rate, data size, data format.
52. What is Bluetooth? Which frequency band is used for bandwidth?( May/June 2016)
- Bluetooth is a low cost, low power, short range wireless communication technology
- 2.4GHz to 2.484 GHz.
64. How can the parity bit detect a damaged data unit?
In parity check, (a redundant bit) a parity bit is added to every data unit so that the total
number of 1s is even for even parity checking function (or odd for odd parity).
65. How can we use the Hamming code to correct a burst error?
By rearranging the order of bit transmission of the data units, the Hamming code can
correct burst errors.
66. In the Hamming code for a data unit of m bits how you do compute the number of
redundant bits ‘r’ needed?
In the Hamming code, for a data unit of m bits, use the formula 2r > = m + r + 1 to
determine r, the number of redundant bits needed.
67. What is a bridge, repeater and router?
Bridge is a hardware networking device used to connect two LANs. A bridge operates at
data link layer of the OSI reference model.
Repeater is a hardware device used to strengthen signals being transmitted on a network.
Router:A network layer device that connects networks with different physical media and
translates between network architectures.
69. State important types of hubs. What is the difference between a passive and an active
hub?
Passive hub Active hub Intelligent hub
Active hub –It contains a repeater that regenerates the received bit patterns before
sending them out.
Passive hub-It provides a simple physical connection between the attached devices.
72. What will the maximum number of frames sent but unacknowledged for a sliding
window of size n-1 ( n is the sequence number) (May/June 2014)
For a sliding window of size n - 1 (n sequence numbers), there can be a maximum of
n frames sent but unacknowledged.
PART B
8. Design a bidirectional algorithm for the Go-Back-N ARQ Protocol using piggybacking.
Note that both parties need to use the same algorithm.
9. How does the Ethernet address lA:2B:3CAD:5E:6F appear on the line in binary?
10. If an Ethernet destination address is 07:01:02:03:04:05, what is the type of the address
(unicast, multicast, or broadcast)?
2. What is an IP address?
An IP address is a 32 - bit address that uniquely and universally define the connection of
a host or a router to the Internet.
The sender must know the IP address of the destination computer before sending a
packet.
4. Identify the class and default subnet mask of the IP address 217.65.10.7.
It belongs to class C.Default subnet mask – 255.255.255.192
8. Give comparison of unicast, multicast and broadcast routing. (Nov/ Dec 2016)
UNICAST ROUTING MULTICAST ROUTING BROADCAST ROUTING
There is one source and one There is one source and group In broadcast routing, the
destination of destinations relationship between the
source and destination is one-
to-all.
In Unicasting, the router In Multicasting, the router In Broadcasting, the router
forwards the received forwards the received packets forwards the received packets
packets through only one of through several of its
its interfaces. interfaces. through all of its interfaces.
10. What are the metrics used by routing protocols? (Apr./May 2015)
Path length, reliability, delay, bandwidth, load and communication cost.
Forwarding table is used when a packet is The routing table is the table that is built up
being forwarded. by the routing algorithms as a precursor to
building the forwarding table.
It contains the mapping from a network It contains mappings from network numbers
number to an outgoing interface and some to next hops and may also contain
MAC information, such as the Ethernet information about when it should discard
address of the next hop. some information.
It needs to be structured to optimize the The routing table needs to be optimized for
process of looking up a network number when the purpose of calculating changes in
forwarding a packet topology.
Example: Example:
Network Interface MAC Network Next Hop
Number Address Number
18 if0 8:0:2b:e4:b:12 18 171.69.245.1
13. How do routers differentiate the incoming unicast, multicast and broadcast IP
packets.
(Apr./May 2017)
The routers differentiate the incoming unicast, multicast and broadcast packets based on the
destination IP address in the packet.
The address 255.255.255.255 represents the Broadcast packet, it will be sent to all
destinations.
The addresses 224.0.0.0 through 239.255.255.255 represent the multicast packet.
All the remaining addresses in Class A, B, C represent the unicast packet.
15. What are the two major mechanisms defined to help transition from IPv4 to IPv6?
(May-2019)
Dual Stack
Tunneling
Header translation
18. What are the benefits of Open Shortest Path First (OSPF) protocol? (May-2018)
Authentication
Support for hierarchy within a single routing domain
Multiple same cost paths
Integrated support for unicast and multicast routing
OSPF is a true LOOP- FREE (route-free loop) routing protocol.
Fast convergence of OSPF: The route changes can be transmitted to the entire
autonomous system in the shortest time.
The concept of area division is proposed. After the autonomous system is divided
into different regions, the summary of routing information between the regions is
adopted, which greatly reduces the quantity of routing information to be
transmitted. It also makes routing information not expand rapidly as the network
scale increases
19. What is multicast routing? (May-2018)
Multicast IP Routing protocols are used to distribute data (for example, audio/video streaming
broadcasts) to multiple recipients. Using multicast, a source can send a single copy of data to
a single multicast address, which is then distributed to an entire group of recipients.
22. Mention the difference between Distance vector and Link state routing.
Distance vector routing Link state routing
Sharing the knowledge about the whole Sharing knowledge about the neighborhood
networks only to neighbours as measures with every other router by flooding
of distance and vector.
The least cost route between any two Every router can calculate the shortest path
nodes is the route with minimum distance tree to form the routing table.
23. What is the address space of IPV6? List the advantages of IPV6.
The address space of IPV6 is 2128. The advantages of IPV6 are,
Larger address space : 128 bit long
Better header format. New header format which simplifies and speeds up the
routing process. Options do not need to be checked by routers.
New options: additional functionalities.
Allowance for extension
Support for resource allocation.
Support for more security
27. When does a node send its partial routing table to all its immediate neighbors?
The table is sent both periodically and when there is a change in the table.
Periodic Update A node sends its routing table, normally every 30 s, in a periodic update.
The period depends on the protocol that is using distance vector routing.
Triggered Update A node sends its two-column routing table to its neighbors anytime
there is a change in its routing table. This is called a triggered update.
28. What are the solutions for instability of two node problem?
Defining Infinity- to redefine infinity to a smaller number, such as 100
Split Horizon Information about the routing for a particular packet is never sent back in
the direction from which it was received.
The split horizon strategy can be combined with the poison reverse strategy.
33. What is the difference between boundary level masking and non-boundary level
masking.
Boundary level Masking:
If the masking is at the boundary level, the mask numbers are either 255 or 0, finding the
subnetwork address is very easy.
Non Boundary level Masking:
If the masking is not at the boundary level, the mask numbers are not just 255 or 0,
finding the subnetwork address involves using the bitwise AND operators.
38. What are the three main elements of distance vector algorithms.
a. Knowledge about the entire autonomous system.
b. Routing only to neighbours
c. Information sharing at regular intervals
41. What are the three main elements of Link state routing?
1. Knowledge about the neighborhood.
2. Sharing with every other network.
3. Information sharing when there is a change.
42. What algorithm does link state routing use to calculate the routing tables.
Dijkstra algorithm is used to calculate the routing table.
47. Why is it that in a broadcast network, the network layer is often thin or even non
existent?
Network layer is responsible for host to host delivery and for routing the packets through
the routers or switches. In broadcast there is no need of addressing the packets, routing and
address verification.
PART-B
1. With an example network scenario explain the mechanism of routing information protocol
and specify the routing table contents. (May 2019)
2. Discuss the fundamentals and advantages of open shortest path first protocol. (May 2019)
3. Write the shortest path algorithm with a suitable illustration. (April/May 2015)
4. Explain the distance vector routing algorithm. Mention the limitations of the same.
(April/May 2015)
5. Explain about IPV6? Compare IPV4 and IPV6. (May/June 2016)
6. Discuss in detail about any two Multicast routing with neat sketches. (Nov/Dec 2015,2016)
7. Discuss in detail about open source shortest path routing with neat diagrams.(Nov/Dec 2016)
8. With a neat diagram explain Distance vector routing protocol.
(May/June 2016, April/May 2015, Nov/Dec 2015)
9. Explain the building and distribution of link state packets in link state routing algorithm.
(Nov/Dec 2017)
10. Elaborate on multicast routing protocols. (Nov/Dec 2017)
11. Explain the RIP algorithm with a suitable example of your choice. (May/June 2014)
12. Discuss the IP address modes and write short notes on ARP. (May/June 2014)
13. Explain link state routing and discuss its advantages over distance vector routing.
14. State which layers of the ISO OSI model the following interconnecting device operates.
a. Repeaters
b. Bridges
c. Routers
d. Gateways
15. State the major difference between Distance Vector Routing and Link state Routing.
16. plain the network layer in the Internet and IP addressing
17. Write a note on various internetworking devices
18. Compare Bridges and routers
19. Explain shortest path algorithm with a suitable illustration
20. Explain the working of Protocol Independent Multicast (PIM) in detail.
21. Discuss in detail the various aspects of IPV6.
22. For the network given, give link state routing tables
PART C
1. i. What is sub netting? Discuss. Also state which classes of IP address can be sub netted.
ii. What is subnet masking? Discuss.
iii. How can we prove that we have 2,147,483,648 addresses in class A?
iv. What is the sub network address if the destination address is 200.45.34.56 and the
subnet mask is 255.255.240.0
2. i In classful addressing how is an IP address in class A, Class B and Class C divided?
Discuss
ii. Given the address 23.56.7.91 and the default class A mask, find the beginning address
iii Given the address 201.180.56.5 and the default class C mask, find the beginning address
3. Assume that the shortest distance between nodes a, b, c, and d to node y and the costs from
node x to nodes a, b, c, and d are given below:
What is the shortest distance between node x and node y, Dxy, according to the Bellman-Ford
equation
4. Use Dijkstra’s algorithm to find the shortest path tree and the forwarding table for node A
in the Figure below
1. What is the difference between congestion control and flow control? (Nov/Dec 2015)
Congestion Control Flow Control
Flow control means preventing the source
Congestion control means preventing the source
from sending data that the receiver will end
from sending data that will end up getting
up dropping because it runs out of buffer
dropped by a router because its queue is full.
space.
This is more complicated, because packets from
This is fairly easy with a sliding window
different sources travelling different paths can
protocol
converge on the same queue.
Congestion control is a method of ensuring that Flow control is controlled by the receiving
everyone across a network has a "fair" amount side. It ensures that the sender only sends
of access to network resources, at any given what the receiver can handle.
time.
3. When can an application make use of UDP? (May/June 2014)/ What are the uses of
UDP?
UDP is suitable for a process that requires simple request-response communication with
little concern for flow and error control
UDP is suitable for a process with internal flow and error control mechanisms.
UDP is a suitable transport protocol for multicasting.
UDP is used for management processes such as SNMP
UDP is used for some route updating protocols such as Routing Information Protocol
11. What are the approaches used to provide a range of Quality of service (QoS)?(Nov/ Dec
2017)
The approaches used to provide a range of Quality of service are, Integrated Services and
Differentiated Services. Both models emphasize the use of quality of service at the network
layer. Integrated Services is a flow-based QoS model, which means that a user needs to
create a flow, a kind of virtual circuit, from the source to the destination and inform all
routers of the resource requirement. Differentiated Services is a class-based QoS model
designed for IP.
12. What are the services provided by Transport Layer Protocol? [May-2018]
a. End to End delivery
b. Addressing
c. Reliable delivery
d. Flow control
e. Multiplexing
14. What are the services provided by transport layer protocol? (April/May 2018)
a. End to End delivery
b. Addressing
c. Reliable delivery
d. Flow control
e. Multiplexing
16.What are the fields on which the UDP checksum is calculated? Why?
UDP checksum includes a pseudo header, the UDP header and the data coming from the
application layer.
19. What are the four major aspects of reliable delivery at the transport layer?
At the transport layer, reliable delivery has 4 aspects;
i. Error control
ii. Sequence control
iii. Loss control
iv. Duplication control
20. Define segment
The unit of data transfer between two devices using TCP is a segment.
TCP groups a number of bytes together into a packet called a segment. TCP adds a
header to each segment (for control purposes) and delivers the segment to the IP layer
for transmission.
21.What is meant by congestion? Why the congestion occurs in network?
When load on network is greater than its capcity, there is congestion of data packets.
Congestion occurs because routers and switches have queues or buffers.
21. What is UDP? What are the advantages of using UDP over TCP?
The User Datagram Protocol (UDP) is called a connectionless, unreliable transport
protocol. UDP is a very simple protocol using a minimum of overhead. Sending a small
message by using UDP takes much less interaction between the sender and receiver than
using TCP.
Advantages of using UDP over TCP
Does not include the overhead needed to detect and maintain connection oriented
semantics
22. Give some examples of application where UDP is preferred over TCP.
1. In multicasting
2. Route update protocol in RIP
23. What is RTT?
RTT is an acronym for Round Trip Time;
It is the time needed for a segment to reach a destination and for an acknowledgment to
be received.
31. “DNS can use the services of UDP or TCP using port 53”. Discuss when UDP is used
and when TCP is used.
UDP is used when the size of the response message is less than 512 bytes. TCP is used when
the size of the response message is greater than 512 bytes.
32. What are the scheduling techniques designed to improve the quality of services?
FIFO queuing
Priority queuing
Weighted fair queuing
33. Define Traffic Shaping.
It is a mechanism to control the amount and rate of the traffic sent to the network. Two
techniques can shape traffic.
Leaky bucket
Token bucket
47. State any 2 socket primitives for TCP and state their function.
1. Listen
a. int listen (int sd , int backlog)
2. Close
a. int close (int sd)
60. What is the difference between network service and transport service?
A network service is generally unreliable whereas transport service is reliable. The
network service is only used by the transport entities and transport service must be convenient
and easy to use.
1.Explain the congestion control techniques used to improve QOS of the computer network.
(May 2019)
2.Explain the operation of Go-Back-N protocol (May 2019)
3.With a diagram explain about TCP connection management (May 2019)
4.How is congestion controlled? Explain in detail about congestion control techniques in
transport layer. (Nov/Dec 2016)
5.Explain various fields of the TCP header and the working of the TCP protocol. (Nov/Dec 2016)
6.Define UDP. Discuss the operation of UDP. Explain UDP checksum with one example.
(May/June 2016)
7.Explain in detail the various TCP congestion control mechanisms. (May/June 2016)
8.With neat architecture, explain TCP in detail. (Nov/Dec 2015)
9.Explain in detail of about domain name system. (Nov/Dec 2015)
10. List the various congestion control mechanisms. Explain any one in detail.
11. Explain the various fields of TCP header and the working of the TCP protocol.
(April/May 2015)
12. Explain the three way handshake protocol to establish the transport level connection.
(April/May 2015)
13. Explain the principles of congestion control in TCP. (May/June 2014)
14. Discuss the Random Early Detection mechanism and derive the expression for drop
Probability. (May/June 2014)
12. Explain a TCP congestion control algorithm (Nov/Dec 2015,Nov/Dec 2017, Nov/Dec 2016)
13. Identify and explain the states involved in TCP (April/May 2018)
14. Discuss any one TCP congestion avoidance mechanism ((April/May 2017)
15. Explain adaptive flow control in detail and its uses. (Nov/Dec 2010)
16. Explain the duties of Transport layer.
17. Draw a TCP state transition diagram for connection management.(Nov/Dec 2017)
18. Explain the TCP transmission policy, Congestion control.
19. Explain the following issues of transport protocol
a. Establishing a connection
b. Terminating a connection
20. Explain the various fields of TCP header with the help of a neat diagram.
21. Explain the various steps that are followed in releasing a TCP connection.
PART- C
1. i. List and discuss the various primitives for a simple transport services
ii.“DNS can use the service of UDP or TCP using port 53” Discuss when UDP is used and
when TCP is used.
iii. Highlight the features of UDP and briefly discuss the same.
3. In a network using the Selective-Repeat protocol with m = 4 and the sending window of size
8, the value of variables are Sf = 62, Sn = 67, and Rn = 64. Packet 65 has already been
acknowledged at the sender site; packets 65 and 66are received out-of-order at the receiver
site. Assume that the network does not duplicate the packets.
a. What are the sequence numbers of pending data packets (in transit, corrupted,or lost)?
b. What are the acknowledgment numbers of pending ACK packets (in transit,corrupted, or
lost)?
4. With TCPs slow start and AIMD for congestion control, show how the window size will
vary for a transmission where every 5th packet is lost. Assume an advertised window size of
50 MSS.
5. Specify the justification for having variable field lengths for the fields in the TCP header.
UNIT V APPLICATION LAYER
14. What do you mean by Web Services Description Language (WSDL)? (Nov./Dec. 2017)
WSDL is a standard format to describe a Web Service. A WSDL document is composed
by two sections:
An abstract interface section- It defines the signatures of procedures (RPC-style) or
messages (document-style)
A deployment section- It defines the service location and the supported transport protocols
14. What is DNS . What is the Domain Name System responsible for? [May-2018]
DNS client/server program can support an e-mail program to find the IP address of an e-
mail recipient. A user of an e-mail program may know the e-mail address of the recipient;
however, the IP protocol needs the IP address. The DNS client program sends a request to a
DNS server to map the e-mail address to the corresponding IP address.
The Domain Name System converts domain names (of the form ww.annauniversity.com)
into IP numbers.
25. Define the terms (i) Browser (ii) Hypertext Mark Up language.
a. Browser: A computer program that accesses and displays information from the world
wide web. A browser contains multiple application programs and uses an objects name
to determine which application should be used to access the objects. Web browser is a
software program that interprets and displays the contents of HTML web pages
b. Hypertext Markup Language: The source form used for documents on the world wide
web. HTML embeds commands that determine formatting along with the text to be
displayed. Ex: To move to a new line or indent text
37. What role does the DNS resolver play in the DNS system?
A DNS resolver is responsible for moving requests of the local DNS server on behalf of
clients.
38. How does a DNS Resolver bootstrap the domain name lookup process?
A DNS resolver must know the IP address of at least one DNS server. IT uses this address to
start the DNS lookup process
PART – B
1. Discuss in detail about HTTP Operation. (May-2019)
2. Write your understanding on File Transfer Protocol. (May-2019)
3. Explain the basis of POP3 and IMAP mail access protocols (May 2019)
4. Give a detail note on DNS operation. (Nov/Dec 2010,2015,2016)
5. Explain in detail about SNMP messages.(Nov/Dec 2016,Nov/Dec 2017,May/June 2014)
6. Illustrate the role of POP3 in Electronic mail Applications. (Nov/Dec 2016)
7. Describe how SMTP Protocol is used in E-mail applications. (May/June 2016)
8. Explain HTTP with an example. (May/June 2016)
9. Explain in detail about Web service architecture. (May/June 2016)
10. Write short notes on the following: i) Email ii) HTTP. (Nov/Dec 2015)
11. Explain the message transfer using Simple Mail Transfer Protocol. (April/May 2015)
12. Explain the final delivery of email to the end user using POP3. (April/May 2015)
13. Write short notes on: i) Web Services ii)SNMP (April/May 2015)
14. Explain the SNMP protocol in detail. (May/June 2014)
15. Write short notes on DNS and FTP. (May/June 2014)
16. Explain the SMTP and HTTP.Give their uses, state, strengths and weakness (Nov 2010)
17. Tabulate the various HTTP request operations.(April/ 2018,Nov 2017,May 2016)
18. Draw the IMAP state transition diagram.(April/May 2018)
19. Explain in detail about the message format and message transfer in E-Mail (April 2011)
20. List the elements of network management and explain the operation of SNMP protocol in
detail.
PART C
1. Illustrate the sequence of events and the respective protocols involved while accessing a web
page from a machine when it is connected with internet for first time.
2. When an HTTP server receives a request message from an HTTP client, how does the server
know when all headers have arrived and the body of the message is to follow?
3. In a nonpersistent HTTP connection, how can HTTP inform the TCP protocol that the end of
the message has been reached?
4. In SMTP,
a. a non-ASCII message of 1000 bytes is encoded using base64. How many bytes are in the
encoded message? How many bytes are redundant? What is the ratio of redundant bytes to
the total message?
b. a message of 1000 bytes is encoded using quoted-printable. The message consists of 90
percent ASCII and 10 percent non-ASCII characters. How many bytes are in the encoded
message? How many bytes are redundant? What is the ratio of redundant bytes to the total
message?
c. Compare the results of the two previous cases. How much is the efficiency improved if the
message is a combination of ASCII and non-ASCII characters?.