Sei sulla pagina 1di 13

CS 2363 COMPUTER NETWORKS

Part A Questions with Answers & Part B Questions


UNT ! " #ATA COMMUNCATON
$% What is &ean '( )ata *o&&uni*ation+
Data communication is the exchange of data (in the form of 1s and 0s) between two devices
via some form of transmission medium (such as a wire cable).
2% What are the three *riteria ne*essar( ,or an e,,e*ti-e an) e,,i*ient networ.+
The most important criteria are performance, reliability and security. erformance of the
networ! depends on number of users, type of transmission medium, the capabilities of the connected
h"w and the efficiency of the s"w. #eliability is measured by fre$uency of failure, the time it ta!es a
lin! to recover from the failure and the networ!%s robustness in a catastrophe. &ecurity issues include
protecting data from unauthori'ed access and viruses.
3% What are the three ,un)a&enta/ *hara*teristi*s )eter&ine the e,,e*ti-eness o, the
)ata *o&&uni*ation s(ste&+
The effectiveness of the data communication system depends on three fundamental
characteristics(
Delivery: The system must deliver data to the correct destination.
Accuracy: The system must deliver data accurately.
Timeliness: The system must deliver data in a timely manner.
0% What are the a)-anta1es o, )istri'ute) 2ro*essin1+
)dvantages of distributed processing include security"encapsulation, distributed databases,
faster problem solving, security through redundancy and collaborative processing.
3% Wh( are 2roto*o/s nee)e)+
*n networ!s, communication occurs between the entities in different systems. Two entities
cannot +ust send bit streams to each other and expect to be understood. ,or communication, the
entities must agree on a protocol. ) protocol is a set of rules that govern data communication.
6% Wh( are stan)ar)s nee)e)+
-o.ordination across the nodes of a networ! is necessary for an efficient communication. *f
there are no standards, difficulties arise. ) standard provides a modelor basis for development to
which everyone has agreed.
4% 5or n )e-i*es in a networ.6 what is the nu&'er o, *a'/e /in.s re7uire) ,or a
&esh an) rin1 to2o/o1(+
/esh topology 0 n (n.1)"1
#ing topology 0 n
8% What is the )i,,eren*e 'etween a 2assi-e an) an a*ti-e hu'+
)n active hub contains a repeater that regenerates the received bit patterns before sending
them out. ) passive hub provides a simple physical connection between the attached devices.
9% #istin1uish 'etween 2eer"to"2eer re/ationshi2 an) a 2ri&ar("se*on)ar( re/ationshi2%
eer.to.peer relationship( )ll the devices share the lin! e$ually. rimary.secondary
relationship( 2ne device controls traffic and the others must transmit through it.
$:% Assu&e 6 )e-i*es are arran1e) in a &esh to2o/o1(% ;ow &an( *a'/es are nee)e)+ ;ow
&an( 2orts are nee)e) ,or ea*h )e-i*e+
3umber of cables4n (n.1)"145(5.1)"1416
3umber of ports per device4n.145.146
$$% <rou2 the OS /a(ers '( ,un*tion%
The seven layers of the 2&* model belonging to three subgroups. hysical, data lin! and
networ! layers are the networ! support layers7 they deal with the physical aspects of moving data
from one device to another. &ession, presentation and application layers are the user support layers7
they allow interoperability among unrelated software systems. The transport layer ensures end.to.end
reliable data transmission.
$2% What are hea)er an) trai/ers an) how )o the( 1et a))e) an) re&o-e)+
8ach layer in the sending machine adds its own information to the message it receives from
the layer +ust above it and passes the whole pac!age to the layer +ust below it. This information is
added in the form of headers or trailers. 9eaders are added to the message at the layers 5,6,:,;, and 1.
) trailer is added at layer1. )t the receiving machine, the headers or trailers attached to the data unit
at the corresponding sending layers are removed, and actions appropriate to that layer are ta!en.
$3% The trans2ort /a(er *reates a *o&&uni*ation 'etween the sour*e an) )estination% What are
the three e-ents in-o/-e) in a *onne*tion+
-reating a connection involves three steps( connection establishment, data transfer and
connection release.
$0% What is the #C *o&2onent+
Direct current is a 'ero.fre$uency signal with constant amplitude.
$3% ;ow )oes NR="> )i,,er ,ro& NR="+
*n the 3#<.= se$uence, positive and negative voltages have specific meanings( positive for 0
and negative for 1. in the 3#<.* se$uence, the voltages are meaningless. *nstead, the receiver loo!s
for changes from one level to another as its basis for recognition of 1s.
$4% What are the ,un*tions o, a #TE+ What are the ,un*tions o, a #CE+
Data terminal e$uipment is a device that is an information source or an information sin!. *t is
connected to a networ! through a D-8.
)mplitude
1 0 0 0 0 0 0 0 0 0 0 1 0 0
Time;
Data circuit.terminating e$uipment is a device used as an interface between a DT8 and a networ!.
$4% What )oes the e/e*tri*a/ s2e*i,i*ation o, EA"232 )es*ri'e+
The electrical specification of 8*).1;1 defines that signals other than data must be sent using
2,, as less than .; volts and 23 as greater than >; volts. The data must be transmitted using 3#<.=
encoding.
$8% #is*uss the &o)e ,or 2ro2a1atin1 /i1ht a/on1 o2ti*a/ *hanne/s%
There are two modes for propagating light along optical channels, multimode and single
mode.
Multimode: /ultiple beams from a light source move through the core in different paths.
Single mode: ,iber with extremely small diameter that limits beams to a few angles, resulting in
an almost hori'ontal beam.
$9% What is re,ra*tion+
The phenomenon related to the bending of light when it passes from one medium to another.
2:%What are the res2onsi'i/ities o, )ata /in. /a(er+
&pecific responsibilities of data lin! layer include the following.
a) ,raming
b) hysical addressing
c) ,low control
d) 8rror control
e) )ccess control
2$% Mention the t(2es o, errors%
There are 1 types of errors
a) &ingle.bit error.
b) ?urst.bit error.
22% #e,ine the ,o//owin1 ter&s%
Single bit error( The term single bit error means that only one bit of a given data unit (such as
byte character"data unit or pac!et) is changed from 1 to 0 or from 0 to 1.
Burst error: /eans that 1 or more bits in the data unit have changed from 1 to 0 from 0 to 1.
23% What is re)un)an*(+
*t is the error detecting mechanism, which means a shorter group of bits or extra bits may be
appended at the destination of each unit.
20% >ist out the a-ai/a'/e )ete*tion &etho)s%
There are : types of redundancy chec!s are used in data communication.
a) @ertical redundancy chec!s (@#-).
b) =ongitudinal redundancy chec!s (=#-).
c) -yclic redundancy chec!s (-#-).
d) -hec!sum.
23% Write short notes on ?RC%
The most common and least expensive mechanism for error detection is the vertical
redundancy chec! (@#-) often called a parity chec!. *n this techni$ue a redundant bit:called a parity
bit, is appended to every data unit so, that the total number of 0%s in the unit(including the parity bit)
becomes even.
26% Write short notes on >RC%
*n longitudinal redundancy chec! (=#-), a bloc! of bits is divided into rows and a redundant
row of bits is added to the whole bloc!.
24% Write short notes on CRC%
The third and most powerful of the redundancy chec!ing techni$ues is the cyclic redundancy
chec!s (-#-) -#- is based on binary division. 9ere a se$uence of redundant bits, called the -#-
remainder is appended to the end of data unit.
28% Write short notes on CRC 1enerator%
) -#- generator uses a modulo.1 division.
1) *n the first step, the :.bit divisor is subtracted from the first : bit of thedividend.
1) 8ach bit of the divisor is subtracted from the corresponding bit of the dividend without
disturbing the next higher bit.
29% Write short notes on CRC *he*.er%
) -#- chec!er functions exactly li!e a generator. )fter receiving the data appended with the
-#- it does the same modulo.1 division. *f the remainder is all 0%s the -#- isdropped and the data
accepted. 2therwise, the received stream of bits is discarded and the dates are resent.
3:% <i-e the essentia/ 2ro2erties ,or 2o/(no&ia/%
) polynomial should be selected to have at least the following properties.
a) *t should not be
b) *t should be divisible by(x>1).
3$% #e,ine *he*.su&%
The error detection method used by the higher layer protocol is called chec!sum. -hec!sum
is based on the concept of redundancy.
32% What are the ste2s ,o//owe) in *he*.su& 1enerator+
The sender follows these steps
a) The units are divided into ! sections each of n bits.
b) )ll sections are added together using 1%s complement to get the sum.
c) The sum is complemented and become the chec!sum.
d) The chec!sum is sent with the data.
33% >ist out the ste2s ,o//owe) is *he*.su& *he*.er si)e%
The receiver must follow these steps
a) The unit is divided into ! section each of n bits.
b) )ll sections are added together using 1%s complement to get the sum.
c) The sum is complemented.
d) *f the result is 'ero.
30% Write short notes on error *orre*tion%
*t is the mechanism to correct the errors and it can be handled in 1 ways.
a) Ahen an error is discovered, the receiver can have the sender retransmit the entire data unit.
b) ) receiver can use an error correcting coder, which automatically corrects certain errors.
33% Mention the t(2es o, error *orre*tin1 &etho)s%
There are 1 error.correcting methods.
a) &ingle bit error correction
b) ?urst error correction.
36% What is the 2ur2ose o, ha&&in1 *o)e+
) hamming code can be designed to correct burst errors of certain lengths. &o the simple
strategy used by the hamming code to correct single bit errors must be redesigned to be applicable for
multiple bit correction.
34% #e,ine ,/ow *ontro/%
,low control refers to a set of procedures used to restrict the amount of data. The sender can
send before waiting for ac!nowledgment.
38% What is a 'u,,er+
8ach receiving device has a bloc! of memory called a buffer, reserved for storing incoming
data until they are processed.
39% Mention the *ate1ories o, ,/ow *ontro/%
There are 1 methods have been developed to control flow of data across communication
lin!s.
a) &top and wait. send one from at a time.
b) &liding window. send several frames at a time.
UNT " NETWORK >A@ER
$% What are the networ. su22ort /a(ers an) the user su22ort /a(ers+
Network support layers: The networ! support layers are hysical layer, Data lin! layer and 3etwor!
layer. These deals with electrical specifications, physical connection, transport timing and reliability.
User support layers: The user support layers are( &ession layer, resentation layer, )pplication layer.
These allow interoperability among unrelated software system.
2% With a neat )ia1ra& eA2/ain the re/ationshi2 o, EEE ProBe*t to the OS &o)e/+
The *888 has subdivided the data lin! layer into two sub layers(
1) =ogical lin! control (==-)
1)/edium access control (/)-)
==- is non.architecture specific. The /)- sub layer contains a number of distinct modules,
each carries proprietary information specific to the =)3 product being used.
3% What are the ,un*tions o, >>C+
The *888 pro+ect B01 models ta!es the structure of an 9D=- frame and divides it
into 1 sets of functions. 2ne set contains the end user portion of the 9D=- frame 0 the 2ther layers
=ogical =in! -ontrol, /edia )ccess -ontrol, hysical logical address, control information, and data.
These functions are handled by the *888B01.1 logical lin! control (==-) protocol.
0% What are the ,un*tions o, MAC+
/)- sub layer resolves the contention for the shared media. *t contains synchroni'ation,
flag, flow and error control specifications necessary to move information from one place to another,
as well as the physical address of the next station to receive and route a pac!et.
3% What is 2roto*o/ )ata unit+
The data unit in the ==- level is called rotocol Data Cnit (DC). *t contains four fields.
1) Destination &ervice oint )ddress (D&))
1) &ource &ervice )ccess oint
;) -ontrol field
:) *nformation field
6% What are hea)ers an) trai/ers an) how )o the( 1et a))e) an) re&o-e)+
The control data added to the beginning of a data is called headers. The control data added to
the end of a data is called trailers. )t the sending machine, when the message passes through the
layers each layer adds the headers or trailers. )t the receiving machine, each layer removes the data
meant for it and passes the rest to the next layer.
4% What are the res2onsi'i/ities o, networ. /a(er+
The networ! layer is responsible for the source.to.destination delivery of pac!et across
multiple networ! lin!s. The specific responsibilities of networ! layer include the following(
1) =ogical addressing.
1) #outing.
8% What is a -irtua/ *ir*uit+
) logical circuit made between the sending and receiving computers. The connection is made
after both computers do handsha!ing. )fter the connection, all pac!ets follow the same route and
arrive in se$uence.
9% What are )ata 1ra&s+
*n datagram approach, each pac!et is treated independently from all others. 8ven when one
pac!et represents +ust a place of a multipac!et transmission, the networ! treats it although it existed
alone. ac!ets in this technology are referred to as datagram.
$:% What are the two t(2es o, i&2/e&entation ,or&ats in -irtua/ *ir*uits+
@irtual circuit transmission is implemented in 1 formats.
1) &witched virtual circuit
1) ermanent virtual circuit.
$$% What is &eant '( swit*he) -irtua/ *ir*uit+
&witched virtual circuit format is comparable conceptually to dial.up line in circuit switching. *n this
method, a virtual circuit is created whenever it is needed and exits only for the duration of specific
exchange.
$2% What is &eant '( Per&anent -irtua/ *ir*uit+
ermanent virtual circuits are comparable to leased lines in circuit switching. *n this method,
the same virtual circuit is provided between two uses on a continuous basis. The circuit is dedicated
to the specific uses.
$3% #e,ine Routers%
D&) &&) -ontrol *nformation #outers relay pac!ets among multiple interconnected
networ!s. They #oute pac!ets from one networ! to any of a number of potential destination
networ!s on *nternet routers operate in the physical, data lin! and networ! layer of 2&* model.
$0% What is &eant '( ho2 *ount+
The pathway re$uiring the smallest number of relays, it is called hop.count routing, in which
every lin! is considered to be of e$ual length and given the value one.
$3% ;ow *an the routin1 'e */assi,ie)+
The routing can be classified as,
1) )daptive routing
1) 3on.adaptive routing.
$6% What is ti&e"to"/i-e or 2a*.et /i,eti&e+
)s the time.to.live field is generated, each pac!et is mar!ed with a lifetime, usually the
number of hops that are allowed before a pac!et is considered lost and accordingly, destroyed. The
time.to.live determines the lifetime of a pac!et.
$4% What is &eant '( 'router+
) brouter is a single protocol or multiprotocol router that sometimes act as a router and
sometimes act as a bridge.
$8% Write the .e(s ,or un)erstan)in1 the )istan*e -e*tor routin1%
The three !eys for understanding the algorithm are
1) Dnowledge about the whole networ!s
1) #outing only to neighbors
;) *nformation sharing at regular intervals
$9% Write the .e(s ,or un)erstan)in1 the /in. state routin1%
The three !eys for understanding the algorithm are
1) Dnowledge about the neighborhood.
1) #outing to all neighbors.
;) *nformation sharing when there is a range.
2:% ;ow the 2a*.et *ost re,erre) in )istan*e -e*tor an) /in. state routin1+
*n distance vector routing, cost refer to hop count while in case of lin! state routing, cost is a
weighted value based on a variety of factors such as security levels, traffic or the state of the lin!.
UNT " TRANSPORT >A@ER
$% What is ,un*tion o, trans2ort /a(er+
The protocol in the transport layer ta!es care in the delivery of data from one application program on
one device to an application program on another device. They act as a lin! between the upper layer
protocols and the services provided by the lower layer.
2% What are the )uties o, the trans2ort /a(er+
The services provided by the transport layer are(
1) 8nd.to. end delivery
1) )dressing
;) #eliable delivery
:) ,low control
6) /ultiplexing
3% What is the )i,,eren*e 'etween networ. /a(er )e/i-er( an) the trans2ort /a(er )e/i-er(+
1) The networ! layer is responsible for the the source.to.destination delivery of pac!et
1) The transport layer is responsible for source.to.destination delivery of the entire message.
;) Transport layer delivery across multiple networ! lin!s.
:) The transport layer is responsible for source.to.destination delivery of the entire
message.
0% What are the ,our as2e*ts re/ate) to the re/ia'/e )e/i-er( o, )ata+
The four aspects are, 8rror control, &e$uence control, =oss control, Duplication control.
3% What is &eant '( se1&ent+
)t the sending and receiving end of the transmission, T- divides long transmissions into
smaller data units and pac!ages each into a frame called a segment.
6% What is &eant '( se1&entation+
Ahen the si'e of the data unit received from the upper layer is too long for the networ! layer
datagram or data lin! layer frame to handle, the transport protocol divides it into smaller usable
bloc!s. The dividing process is called segmentation.
4% What is &eant '( Con*atenation+
The si'e of the data unit belonging to single sessions are so small that several can fit together
into a single datagram or frame, the transport protocol combines them into a single data unit. The
combining process is called concatenation.
8% What are the t(2es o, &u/ti2/eAin1+
The types of multiplexing are,
1) Cpward multiplexing
1) Downward multiplexing
9% What are the two 2ossi'/e trans2ort ser-i*es+
Two basic types of transport services are,
1) -onnection service
1) -onnectionless services
$:% The trans2ort /a(er *reates the *onne*tion 'etween sour*e an) )estination% What are the
three e-ents in-o/-e) in the *onne*tion+
,or security, the transport layer may create a connection between the two end ports. )
connection is a single logical path between the source and destination that is associated with all
pac!ets in a message. -reating a connection involves the following steps(
1) -onnection establishment
1) Data transfer E -onnection release.
$$% What is &eant '( *on1estion+
-ongestion in a networ! occurs if user sends data into the networ! at a rate greater than that
allowed by networ! resources.
$2% Wh( the *on1estion o**urs in networ.+
-ongestion occurs because the switches in a networ! have a limited buffer si'e to store
arrived pac!ets.
$3% What is &eant '( 7ua/it( o, ser-i*e+
The $uality of service defines a set of attributes related to the performance of the connection.
,or each connection, the user can re$uest a particular attribute each service class is associated with a
set of attributes.
$0% What are the two *ate1ories o, QoS attri'utes+
The two main categories are
1) Cser 2riented
1) 3etwor! 2riented
$3% >ist out the user re/ate) attri'utes+
Cser related attributes are
1) &-# 0 &ustainable -ell #ate
1) -# 0 ea! -ell #ate
;) /-#. /inimum -ell #ate
:) -@DT 0 -ell @ariation Delay Tolerance
$6% What are the networ.s re/ate) attri'utes+
The networ! related attributes are,
1) -ell loss ratio (-=#)
1) -ell transfer delay (-TD)
;) -ell delay variation (-D@)
:) -ell error ratio (-8#)
$4% What are the ru/es o, non'oun)ar("/e-e/ &as.in1+
The bytes in the * address that corresponds to 166 in the mas! will be repeated in
the subnetwor! address. The bytes in the * address that corresponds to 0 in the mas! will change to
0 in the subnetwor! address. ,or other bytes, use the bit.wise )3D operator.
$8% #e,ine <atewa(%
) device used to connect two separate networ!s that use different communication protocols.
$9% What is >SP+
*n lin! state routing, a small pac!et containing routing information sent by a router to all
other router by a pac!et called lin! state pac!et.
UNT"? " NETWORK SECURT@
$% Na&e ,our ,a*tors nee)e) ,or a se*ure networ.%
Privacy: The sender and the receiver expect confidentiality.
Autentication: The receiver is sure of the sender%s identity and that an imposter has not sent the
message.
!ntegrity: The data must arrive at the receiver exactly as it was sent.
Non"#eputation( The receiver must able to prove that a received message came from a specific
sender.
2% ;ow is a se*ret .e( )i,,erent ,ro& 2u'/i* .e(+
*n secret !ey, the same !ey is used by both parties. The sender uses this !ey and an
encryption algorithm to encrypt data7 the receiver uses the same !ey and the corresponding
decryption algorithm to decrypt the data.
*n public !ey, there are two !eys( a private !ey and a public !ey. The private !ey is !ept by
the receiver. The public !ey is announced to the public.
3% What is a )i1ita/ si1nature+
Digital signature is a method to authenticate the sender of a message. *t is similar to that of
signing transactions documents when you do business with a ban!. *n networ! transactions, you can
create an e$uivalent of an electronic or digital signature by the way you send data.
0% What are the a)-anta1es & )isa)-anta1es o, 2u'/i* .e( en*r(2tion+
A)-anta1esC
a) #emove the restriction of a shared secret !ey between two entities. 9ere each entity can
create a pair of !eys, !eep the private one, and publicly distribute the other one.
b) The no. of !eys needed is reduced tremendously. ,or one million users to communicate,
only two million !eys are needed.
#isa)-anta1esC
*f you use large numbers the method to be effective. -alculating the cipher text using
the long !eys ta!es a lot of time. &o it is not recommended for large amounts of text.
3% What are the a)-anta1es & )isa)-anta1es o, se*ret .e( en*r(2tion+
A)-anta1esC
&ecret Dey algorithms are efficient( it ta!es less time to encrypt a message. The reason is that
the !ey is usually smaller. &o it is used to encrypt or decrypt long messages.
#isa)-anta1esC
a) 8ach pair of users must have a secret !ey. *f 3 people in world want to use this method,
there needs to be 3 (3.1)"1 secret !eys. ,or one million people to communicate, a half.billion secret
!eys are needed.
b) The distribution of the !eys between two parties can be difficult.
6% #e,ine 2er&utation%
ermutation is transposition in bit level.
Straigt permutation( The no. of bits in the input and output are preserved.
$ompressed permutation( The no. of bits is reduced (some of the bits are dropped).
%&panded permutation( The no. of bits is increased (some bits are repeated).
4% #e,ine su'stitutiona/ & trans2ositiona/ en*r(2tion%
Substitutional: ) character level encryption in which each character is replaced by
another character in the set.
Transpositional: ) -haracter level encryption in which the characters retain their
plaintext but the position of the character changes.
UNT ! ? " APP>CATON >A@ER
$% What is the 2ur2ose o, #o&ain Na&e S(ste&+
Domain 3ame &ystem can map a name to an address and conversely an address to name.
2% #is*uss the three &ain )i-ision o, the )o&ain na&e s2a*e%
Domain name space is divided into three different sections( generic domains, country
domains E inverse domain.
A' (eneric domain: Define registered hosts according to their generic behavior, uses
generic suffixes.
B' $ountry domain: Cses two characters to identify a country as the last suffix.
$' !nverse domain( ,inds the domain name given the * address.
3% #is*uss the TCP *onne*tions nee)e) in 5TP%
,T establishes two connections between the hosts. 2ne connection is used for data transfer,
the other for control information. The control connection uses very simple rules of communication.
The data connection needs more complex rules due to the variety of data types transferred.
0% #is*uss the 'asi* &o)e/ o, 5TP%
The client has three components( the user interface, the client control process, and the client
data transfer process. The server has two components( the server control process and the server data
transfer process. The control connection is made between the control processes. The data connection
is made between the data transfer processes.
3% What is the ,un*tion o, SMTP+
The T-"* protocol supports electronic mail on the *nternet is called &imple /ail Transfer
(&/T). *t is a system for sending messages to other computer users based on email addresses.
&/T provides mail exchange between users on the same or different computers.
6% What is the )i,,eren*e 'etween a user a1ent DUAE an) a &ai/ trans,er a1ent DMTAE+
The C) prepares the message, creates the envelope, and puts the message in the envelope.
The /T) transfers the mail across the *nternet.
4% ;ow )oes MME enhan*e SMTP+
/*/8 is a supplementary protocol that allows non.)&-** data to be sent through &/T.
/*/8 transforms non.)&-** data at the sender site to 3@T )&-** data and deliverers it to the client
&/T to be sent through the *nternet. The server &/T at the receiving side receives the 3@T
)&-** data and delivers it to /*/8 to be transform feed bac! to the original data.
8% Wh( is an a22/i*ation su*h as POP nee)e) ,or e/e*troni* &essa1in1+
Aor!stations interact with the &/T host, which receives the mail on behalf of every host in
the organi'ation, to retrieve messages by using a client.server protocol such as ost 2ffice rotocol,
version ;(2;). )lthough 2; is used to download messages from the server, the &/T client
still needed on the des!top to forward messages from the wor!station user to its &/T mail server.
9% Write )own the three t(2es o, WWW )o*u&ents%
The documents in the AAA can be grouped into three broad categories( static, dynamic and
active.
A' Static: ,ixed.content documents that are created and stored in a server.
B' Dynamic( -reated by web server whenever a browser re$uests the document.
$' Active: ) program to be run at the client side.
$:% What is the 2ur2ose o, ;TM>+
9T/= is a computer language for specifying the contents and format of a web document. *t
allows additional text to include codes that define fonts, layouts, embedded graphics and hypertext
lin!s.
$$% #e,ine C<%
-F* is a standard for communication between 9TT servers and executable programs. *t is used in
crating dynamic documents.
$6 MARKS QUESTONS
UNT"
1. 8xplain the *&2.2&* model of computer networ! with a neat diagram.
1. Discuss the ma+or functions performed by the resentation layer and )pplication layer of the
*&2 2&* model.
;. 8xplain Transport =ayer and hysical =ayer.
:. Ahat are the ma+or components of an optical communication systemG Discuss.
6. Distinguish between point to point lin!s and multi point lin!s. Five relevant diagrams.
5. 8xplain Data =in! =ayer and 3etwor! =ayer.
H. -ompare -onnection oriented and connectionless service.
B. a) Ahat is the need for data encoding and explain the various data encoding schemes
and compare their features. (B)
b) 8xplain how hamming code can be used to correct burst errors. (B)
I. 8xplain the operation of the bit.oriented protocol 9D=- with the re$uired frames
10.8xplain the various error detection and correction /echanisms used in computer networ!.
11. Arite short notes on(
a) Fo bac! 3)#J (B)
b) &elective repeat )#J (B)
11. a) Discuss the ma+or functions performed by the resentation layer and )pplication layer of
the *&2 . 2&* model. (B)
b) -ompare -onnection oriented and connectionless service. (:)
c) Ahat are the ma+or components of an optical communication systemG Discuss. (:)
1;. a) ) bloc! of ;1 bits has to be transmitted. Discuss how the thirty two bit bloc! is transmitted
to the receiver using =ongitudinal #edundancy -hec!. (:)
b) -onsider a ;1 bit bloc! of data 11100111 11011101 00111001 10101001 that has to be
transmitted. *f =ongitudinal #edundancy -hec! is used what is the transmitted bit
streamG(:)
c) *n the 9amming code, for a data unit of KmK bits how do you compute the number of
redundant bits KrK neededG (:)
d) Ahat !inds of errors can @ertical #edundancy chec! determineG Ahat !inds of errors it
cannot determineG (:)
1:. Discuss stop and wait protocol
16. Discuss sliding window protocol using Fo bac! n.
15. 9ow does a To!en #ing =)3 operateG Discuss.
UNT"
1. 8xplain distance vector routing in detail.
1. 8xplain pac!et switching in detail.
;. Ahat are routersG 8xplain in detail.
:. Ahat are the services provided by D3& serverG 8xplain in detail.
6. ,ind the class of each * address. Five suitable explanation. (B x 1 4 15)
i) 11H.11.1:.BH
ii) 1I;.1:.65.11
iii) 1:.1;.110.B
iv) 161.6.16.111
v) 1;:.11.HB.65
vi) 1H1.1B.6B.1
vii) 00000000 11110000 11111111 00110011
viii) 10000000 11110000 11111111 00110011
5. &tate the ma+or difference between Distance @ector #outing and =in! &tate #outing. Discuss how
these routing techni$ues wor!.
H. Ahat is the sub networ! address if the destination address is 100.:6.;:.65 and the subnet
mas! is 166.166.1:0.0G
B. =ist and diagrammatically illustrate and discuss the four general categories of attac!.
I. Aith relevant example discuss about &ubstitution -iphers.
10. ?riefly discuss how D8& algorithm wor!s.
UNT"
1. a) erform a comparative study between the *&2 2&* model and the T-"* reference
model.(B)
b) Distinguish between point to point lin!s and multi point lin!s. Five relevant diagrams.
1. =ist and discuss the states used in the T- connection management finite state machine.
;. Discuss the various timers used by T- to perform its various operations.
:. resent a tutorial on Cser Datagram rotocol (CD).
6. Discuss the strategies T- uses to avoid congestion.
5. 8xplain CD E T-.
H. 8xplain lea!y buc!et and to!en buc!et algorithm.
B. 8xplain the duties of transport layer.
UNT"?
1. 8xplain the type of encryption"decryption method.
1. 8xplain about #&) algorithm
;. 8xplain about Data -ompression techni$ueG
:. Ahat is mean by ublic !ey cryptography and explain authentication 0 !ey distribution 0 !ey
agreement
6. 8xplain details about * &8-C#*TLG
5. 8xplain details about A8? &8-C#*TLG
H. 8xplain details about ,*#8A)==&G
UNT"?
1. 8xplain how security is provided in interact operations in detail.
1. Ahat is 9TT protocol used forG Ahat is the default port number of 9TT protocolG
;. Discuss the features of 9TT and also discuss how 9TT wor!s.
:. =ist and discuss the types of D3& records.
6. 8xplain AAA.
5. Ahat are the duties of ,T protocolG

Potrebbero piacerti anche