0 valutazioniIl 0% ha trovato utile questo documento (0 voti)
502 visualizzazioni13 pagine
Data communication is the exchange of data (in the form of 1s and 0s) between two devices via some form of transmission medium. Erformance of the networ! depends on number of users, type of transmission medium, the capabilities of the connected h"w and the efficiency of the s"w. Security issues include protecting data from unauthori'ed access and viruses.
Data communication is the exchange of data (in the form of 1s and 0s) between two devices via some form of transmission medium. Erformance of the networ! depends on number of users, type of transmission medium, the capabilities of the connected h"w and the efficiency of the s"w. Security issues include protecting data from unauthori'ed access and viruses.
Data communication is the exchange of data (in the form of 1s and 0s) between two devices via some form of transmission medium. Erformance of the networ! depends on number of users, type of transmission medium, the capabilities of the connected h"w and the efficiency of the s"w. Security issues include protecting data from unauthori'ed access and viruses.
UNT ! " #ATA COMMUNCATON $% What is &ean '( )ata *o&&uni*ation+ Data communication is the exchange of data (in the form of 1s and 0s) between two devices via some form of transmission medium (such as a wire cable). 2% What are the three *riteria ne*essar( ,or an e,,e*ti-e an) e,,i*ient networ.+ The most important criteria are performance, reliability and security. erformance of the networ! depends on number of users, type of transmission medium, the capabilities of the connected h"w and the efficiency of the s"w. #eliability is measured by fre$uency of failure, the time it ta!es a lin! to recover from the failure and the networ!%s robustness in a catastrophe. &ecurity issues include protecting data from unauthori'ed access and viruses. 3% What are the three ,un)a&enta/ *hara*teristi*s )eter&ine the e,,e*ti-eness o, the )ata *o&&uni*ation s(ste&+ The effectiveness of the data communication system depends on three fundamental characteristics( Delivery: The system must deliver data to the correct destination. Accuracy: The system must deliver data accurately. Timeliness: The system must deliver data in a timely manner. 0% What are the a)-anta1es o, )istri'ute) 2ro*essin1+ )dvantages of distributed processing include security"encapsulation, distributed databases, faster problem solving, security through redundancy and collaborative processing. 3% Wh( are 2roto*o/s nee)e)+ *n networ!s, communication occurs between the entities in different systems. Two entities cannot +ust send bit streams to each other and expect to be understood. ,or communication, the entities must agree on a protocol. ) protocol is a set of rules that govern data communication. 6% Wh( are stan)ar)s nee)e)+ -o.ordination across the nodes of a networ! is necessary for an efficient communication. *f there are no standards, difficulties arise. ) standard provides a modelor basis for development to which everyone has agreed. 4% 5or n )e-i*es in a networ.6 what is the nu&'er o, *a'/e /in.s re7uire) ,or a &esh an) rin1 to2o/o1(+ /esh topology 0 n (n.1)"1 #ing topology 0 n 8% What is the )i,,eren*e 'etween a 2assi-e an) an a*ti-e hu'+ )n active hub contains a repeater that regenerates the received bit patterns before sending them out. ) passive hub provides a simple physical connection between the attached devices. 9% #istin1uish 'etween 2eer"to"2eer re/ationshi2 an) a 2ri&ar("se*on)ar( re/ationshi2% eer.to.peer relationship( )ll the devices share the lin! e$ually. rimary.secondary relationship( 2ne device controls traffic and the others must transmit through it. $:% Assu&e 6 )e-i*es are arran1e) in a &esh to2o/o1(% ;ow &an( *a'/es are nee)e)+ ;ow &an( 2orts are nee)e) ,or ea*h )e-i*e+ 3umber of cables4n (n.1)"145(5.1)"1416 3umber of ports per device4n.145.146 $$% <rou2 the OS /a(ers '( ,un*tion% The seven layers of the 2&* model belonging to three subgroups. hysical, data lin! and networ! layers are the networ! support layers7 they deal with the physical aspects of moving data from one device to another. &ession, presentation and application layers are the user support layers7 they allow interoperability among unrelated software systems. The transport layer ensures end.to.end reliable data transmission. $2% What are hea)er an) trai/ers an) how )o the( 1et a))e) an) re&o-e)+ 8ach layer in the sending machine adds its own information to the message it receives from the layer +ust above it and passes the whole pac!age to the layer +ust below it. This information is added in the form of headers or trailers. 9eaders are added to the message at the layers 5,6,:,;, and 1. ) trailer is added at layer1. )t the receiving machine, the headers or trailers attached to the data unit at the corresponding sending layers are removed, and actions appropriate to that layer are ta!en. $3% The trans2ort /a(er *reates a *o&&uni*ation 'etween the sour*e an) )estination% What are the three e-ents in-o/-e) in a *onne*tion+ -reating a connection involves three steps( connection establishment, data transfer and connection release. $0% What is the #C *o&2onent+ Direct current is a 'ero.fre$uency signal with constant amplitude. $3% ;ow )oes NR="> )i,,er ,ro& NR="+ *n the 3#<.= se$uence, positive and negative voltages have specific meanings( positive for 0 and negative for 1. in the 3#<.* se$uence, the voltages are meaningless. *nstead, the receiver loo!s for changes from one level to another as its basis for recognition of 1s. $4% What are the ,un*tions o, a #TE+ What are the ,un*tions o, a #CE+ Data terminal e$uipment is a device that is an information source or an information sin!. *t is connected to a networ! through a D-8. )mplitude 1 0 0 0 0 0 0 0 0 0 0 1 0 0 Time; Data circuit.terminating e$uipment is a device used as an interface between a DT8 and a networ!. $4% What )oes the e/e*tri*a/ s2e*i,i*ation o, EA"232 )es*ri'e+ The electrical specification of 8*).1;1 defines that signals other than data must be sent using 2,, as less than .; volts and 23 as greater than >; volts. The data must be transmitted using 3#<.= encoding. $8% #is*uss the &o)e ,or 2ro2a1atin1 /i1ht a/on1 o2ti*a/ *hanne/s% There are two modes for propagating light along optical channels, multimode and single mode. Multimode: /ultiple beams from a light source move through the core in different paths. Single mode: ,iber with extremely small diameter that limits beams to a few angles, resulting in an almost hori'ontal beam. $9% What is re,ra*tion+ The phenomenon related to the bending of light when it passes from one medium to another. 2:%What are the res2onsi'i/ities o, )ata /in. /a(er+ &pecific responsibilities of data lin! layer include the following. a) ,raming b) hysical addressing c) ,low control d) 8rror control e) )ccess control 2$% Mention the t(2es o, errors% There are 1 types of errors a) &ingle.bit error. b) ?urst.bit error. 22% #e,ine the ,o//owin1 ter&s% Single bit error( The term single bit error means that only one bit of a given data unit (such as byte character"data unit or pac!et) is changed from 1 to 0 or from 0 to 1. Burst error: /eans that 1 or more bits in the data unit have changed from 1 to 0 from 0 to 1. 23% What is re)un)an*(+ *t is the error detecting mechanism, which means a shorter group of bits or extra bits may be appended at the destination of each unit. 20% >ist out the a-ai/a'/e )ete*tion ðo)s% There are : types of redundancy chec!s are used in data communication. a) @ertical redundancy chec!s (@#-). b) =ongitudinal redundancy chec!s (=#-). c) -yclic redundancy chec!s (-#-). d) -hec!sum. 23% Write short notes on ?RC% The most common and least expensive mechanism for error detection is the vertical redundancy chec! (@#-) often called a parity chec!. *n this techni$ue a redundant bit:called a parity bit, is appended to every data unit so, that the total number of 0%s in the unit(including the parity bit) becomes even. 26% Write short notes on >RC% *n longitudinal redundancy chec! (=#-), a bloc! of bits is divided into rows and a redundant row of bits is added to the whole bloc!. 24% Write short notes on CRC% The third and most powerful of the redundancy chec!ing techni$ues is the cyclic redundancy chec!s (-#-) -#- is based on binary division. 9ere a se$uence of redundant bits, called the -#- remainder is appended to the end of data unit. 28% Write short notes on CRC 1enerator% ) -#- generator uses a modulo.1 division. 1) *n the first step, the :.bit divisor is subtracted from the first : bit of thedividend. 1) 8ach bit of the divisor is subtracted from the corresponding bit of the dividend without disturbing the next higher bit. 29% Write short notes on CRC *he*.er% ) -#- chec!er functions exactly li!e a generator. )fter receiving the data appended with the -#- it does the same modulo.1 division. *f the remainder is all 0%s the -#- isdropped and the data accepted. 2therwise, the received stream of bits is discarded and the dates are resent. 3:% <i-e the essentia/ 2ro2erties ,or 2o/(no&ia/% ) polynomial should be selected to have at least the following properties. a) *t should not be b) *t should be divisible by(x>1). 3$% #e,ine *he*.su&% The error detection method used by the higher layer protocol is called chec!sum. -hec!sum is based on the concept of redundancy. 32% What are the ste2s ,o//owe) in *he*.su& 1enerator+ The sender follows these steps a) The units are divided into ! sections each of n bits. b) )ll sections are added together using 1%s complement to get the sum. c) The sum is complemented and become the chec!sum. d) The chec!sum is sent with the data. 33% >ist out the ste2s ,o//owe) is *he*.su& *he*.er si)e% The receiver must follow these steps a) The unit is divided into ! section each of n bits. b) )ll sections are added together using 1%s complement to get the sum. c) The sum is complemented. d) *f the result is 'ero. 30% Write short notes on error *orre*tion% *t is the mechanism to correct the errors and it can be handled in 1 ways. a) Ahen an error is discovered, the receiver can have the sender retransmit the entire data unit. b) ) receiver can use an error correcting coder, which automatically corrects certain errors. 33% Mention the t(2es o, error *orre*tin1 ðo)s% There are 1 error.correcting methods. a) &ingle bit error correction b) ?urst error correction. 36% What is the 2ur2ose o, ha&&in1 *o)e+ ) hamming code can be designed to correct burst errors of certain lengths. &o the simple strategy used by the hamming code to correct single bit errors must be redesigned to be applicable for multiple bit correction. 34% #e,ine ,/ow *ontro/% ,low control refers to a set of procedures used to restrict the amount of data. The sender can send before waiting for ac!nowledgment. 38% What is a 'u,,er+ 8ach receiving device has a bloc! of memory called a buffer, reserved for storing incoming data until they are processed. 39% Mention the *ate1ories o, ,/ow *ontro/% There are 1 methods have been developed to control flow of data across communication lin!s. a) &top and wait. send one from at a time. b) &liding window. send several frames at a time. UNT " NETWORK >A@ER $% What are the networ. su22ort /a(ers an) the user su22ort /a(ers+ Network support layers: The networ! support layers are hysical layer, Data lin! layer and 3etwor! layer. These deals with electrical specifications, physical connection, transport timing and reliability. User support layers: The user support layers are( &ession layer, resentation layer, )pplication layer. These allow interoperability among unrelated software system. 2% With a neat )ia1ra& eA2/ain the re/ationshi2 o, EEE ProBe*t to the OS &o)e/+ The *888 has subdivided the data lin! layer into two sub layers( 1) =ogical lin! control (==-) 1)/edium access control (/)-) ==- is non.architecture specific. The /)- sub layer contains a number of distinct modules, each carries proprietary information specific to the =)3 product being used. 3% What are the ,un*tions o, >>C+ The *888 pro+ect B01 models ta!es the structure of an 9D=- frame and divides it into 1 sets of functions. 2ne set contains the end user portion of the 9D=- frame 0 the 2ther layers =ogical =in! -ontrol, /edia )ccess -ontrol, hysical logical address, control information, and data. These functions are handled by the *888B01.1 logical lin! control (==-) protocol. 0% What are the ,un*tions o, MAC+ /)- sub layer resolves the contention for the shared media. *t contains synchroni'ation, flag, flow and error control specifications necessary to move information from one place to another, as well as the physical address of the next station to receive and route a pac!et. 3% What is 2roto*o/ )ata unit+ The data unit in the ==- level is called rotocol Data Cnit (DC). *t contains four fields. 1) Destination &ervice oint )ddress (D&)) 1) &ource &ervice )ccess oint ;) -ontrol field :) *nformation field 6% What are hea)ers an) trai/ers an) how )o the( 1et a))e) an) re&o-e)+ The control data added to the beginning of a data is called headers. The control data added to the end of a data is called trailers. )t the sending machine, when the message passes through the layers each layer adds the headers or trailers. )t the receiving machine, each layer removes the data meant for it and passes the rest to the next layer. 4% What are the res2onsi'i/ities o, networ. /a(er+ The networ! layer is responsible for the source.to.destination delivery of pac!et across multiple networ! lin!s. The specific responsibilities of networ! layer include the following( 1) =ogical addressing. 1) #outing. 8% What is a -irtua/ *ir*uit+ ) logical circuit made between the sending and receiving computers. The connection is made after both computers do handsha!ing. )fter the connection, all pac!ets follow the same route and arrive in se$uence. 9% What are )ata 1ra&s+ *n datagram approach, each pac!et is treated independently from all others. 8ven when one pac!et represents +ust a place of a multipac!et transmission, the networ! treats it although it existed alone. ac!ets in this technology are referred to as datagram. $:% What are the two t(2es o, i&2/e&entation ,or&ats in -irtua/ *ir*uits+ @irtual circuit transmission is implemented in 1 formats. 1) &witched virtual circuit 1) ermanent virtual circuit. $$% What is &eant '( swit*he) -irtua/ *ir*uit+ &witched virtual circuit format is comparable conceptually to dial.up line in circuit switching. *n this method, a virtual circuit is created whenever it is needed and exits only for the duration of specific exchange. $2% What is &eant '( Per&anent -irtua/ *ir*uit+ ermanent virtual circuits are comparable to leased lines in circuit switching. *n this method, the same virtual circuit is provided between two uses on a continuous basis. The circuit is dedicated to the specific uses. $3% #e,ine Routers% D&) &&) -ontrol *nformation #outers relay pac!ets among multiple interconnected networ!s. They #oute pac!ets from one networ! to any of a number of potential destination networ!s on *nternet routers operate in the physical, data lin! and networ! layer of 2&* model. $0% What is &eant '( ho2 *ount+ The pathway re$uiring the smallest number of relays, it is called hop.count routing, in which every lin! is considered to be of e$ual length and given the value one. $3% ;ow *an the routin1 'e */assi,ie)+ The routing can be classified as, 1) )daptive routing 1) 3on.adaptive routing. $6% What is ti&e"to"/i-e or 2a*.et /i,eti&e+ )s the time.to.live field is generated, each pac!et is mar!ed with a lifetime, usually the number of hops that are allowed before a pac!et is considered lost and accordingly, destroyed. The time.to.live determines the lifetime of a pac!et. $4% What is &eant '( 'router+ ) brouter is a single protocol or multiprotocol router that sometimes act as a router and sometimes act as a bridge. $8% Write the .e(s ,or un)erstan)in1 the )istan*e -e*tor routin1% The three !eys for understanding the algorithm are 1) Dnowledge about the whole networ!s 1) #outing only to neighbors ;) *nformation sharing at regular intervals $9% Write the .e(s ,or un)erstan)in1 the /in. state routin1% The three !eys for understanding the algorithm are 1) Dnowledge about the neighborhood. 1) #outing to all neighbors. ;) *nformation sharing when there is a range. 2:% ;ow the 2a*.et *ost re,erre) in )istan*e -e*tor an) /in. state routin1+ *n distance vector routing, cost refer to hop count while in case of lin! state routing, cost is a weighted value based on a variety of factors such as security levels, traffic or the state of the lin!. UNT " TRANSPORT >A@ER $% What is ,un*tion o, trans2ort /a(er+ The protocol in the transport layer ta!es care in the delivery of data from one application program on one device to an application program on another device. They act as a lin! between the upper layer protocols and the services provided by the lower layer. 2% What are the )uties o, the trans2ort /a(er+ The services provided by the transport layer are( 1) 8nd.to. end delivery 1) )dressing ;) #eliable delivery :) ,low control 6) /ultiplexing 3% What is the )i,,eren*e 'etween networ. /a(er )e/i-er( an) the trans2ort /a(er )e/i-er(+ 1) The networ! layer is responsible for the the source.to.destination delivery of pac!et 1) The transport layer is responsible for source.to.destination delivery of the entire message. ;) Transport layer delivery across multiple networ! lin!s. :) The transport layer is responsible for source.to.destination delivery of the entire message. 0% What are the ,our as2e*ts re/ate) to the re/ia'/e )e/i-er( o, )ata+ The four aspects are, 8rror control, &e$uence control, =oss control, Duplication control. 3% What is &eant '( se1&ent+ )t the sending and receiving end of the transmission, T- divides long transmissions into smaller data units and pac!ages each into a frame called a segment. 6% What is &eant '( se1&entation+ Ahen the si'e of the data unit received from the upper layer is too long for the networ! layer datagram or data lin! layer frame to handle, the transport protocol divides it into smaller usable bloc!s. The dividing process is called segmentation. 4% What is &eant '( Con*atenation+ The si'e of the data unit belonging to single sessions are so small that several can fit together into a single datagram or frame, the transport protocol combines them into a single data unit. The combining process is called concatenation. 8% What are the t(2es o, &u/ti2/eAin1+ The types of multiplexing are, 1) Cpward multiplexing 1) Downward multiplexing 9% What are the two 2ossi'/e trans2ort ser-i*es+ Two basic types of transport services are, 1) -onnection service 1) -onnectionless services $:% The trans2ort /a(er *reates the *onne*tion 'etween sour*e an) )estination% What are the three e-ents in-o/-e) in the *onne*tion+ ,or security, the transport layer may create a connection between the two end ports. ) connection is a single logical path between the source and destination that is associated with all pac!ets in a message. -reating a connection involves the following steps( 1) -onnection establishment 1) Data transfer E -onnection release. $$% What is &eant '( *on1estion+ -ongestion in a networ! occurs if user sends data into the networ! at a rate greater than that allowed by networ! resources. $2% Wh( the *on1estion o**urs in networ.+ -ongestion occurs because the switches in a networ! have a limited buffer si'e to store arrived pac!ets. $3% What is &eant '( 7ua/it( o, ser-i*e+ The $uality of service defines a set of attributes related to the performance of the connection. ,or each connection, the user can re$uest a particular attribute each service class is associated with a set of attributes. $0% What are the two *ate1ories o, QoS attri'utes+ The two main categories are 1) Cser 2riented 1) 3etwor! 2riented $3% >ist out the user re/ate) attri'utes+ Cser related attributes are 1) &-# 0 &ustainable -ell #ate 1) -# 0 ea! -ell #ate ;) /-#. /inimum -ell #ate :) -@DT 0 -ell @ariation Delay Tolerance $6% What are the networ.s re/ate) attri'utes+ The networ! related attributes are, 1) -ell loss ratio (-=#) 1) -ell transfer delay (-TD) ;) -ell delay variation (-D@) :) -ell error ratio (-8#) $4% What are the ru/es o, non'oun)ar("/e-e/ &as.in1+ The bytes in the * address that corresponds to 166 in the mas! will be repeated in the subnetwor! address. The bytes in the * address that corresponds to 0 in the mas! will change to 0 in the subnetwor! address. ,or other bytes, use the bit.wise )3D operator. $8% #e,ine <atewa(% ) device used to connect two separate networ!s that use different communication protocols. $9% What is >SP+ *n lin! state routing, a small pac!et containing routing information sent by a router to all other router by a pac!et called lin! state pac!et. UNT"? " NETWORK SECURT@ $% Na&e ,our ,a*tors nee)e) ,or a se*ure networ.% Privacy: The sender and the receiver expect confidentiality. Autentication: The receiver is sure of the sender%s identity and that an imposter has not sent the message. !ntegrity: The data must arrive at the receiver exactly as it was sent. Non"#eputation( The receiver must able to prove that a received message came from a specific sender. 2% ;ow is a se*ret .e( )i,,erent ,ro& 2u'/i* .e(+ *n secret !ey, the same !ey is used by both parties. The sender uses this !ey and an encryption algorithm to encrypt data7 the receiver uses the same !ey and the corresponding decryption algorithm to decrypt the data. *n public !ey, there are two !eys( a private !ey and a public !ey. The private !ey is !ept by the receiver. The public !ey is announced to the public. 3% What is a )i1ita/ si1nature+ Digital signature is a method to authenticate the sender of a message. *t is similar to that of signing transactions documents when you do business with a ban!. *n networ! transactions, you can create an e$uivalent of an electronic or digital signature by the way you send data. 0% What are the a)-anta1es & )isa)-anta1es o, 2u'/i* .e( en*r(2tion+ A)-anta1esC a) #emove the restriction of a shared secret !ey between two entities. 9ere each entity can create a pair of !eys, !eep the private one, and publicly distribute the other one. b) The no. of !eys needed is reduced tremendously. ,or one million users to communicate, only two million !eys are needed. #isa)-anta1esC *f you use large numbers the method to be effective. -alculating the cipher text using the long !eys ta!es a lot of time. &o it is not recommended for large amounts of text. 3% What are the a)-anta1es & )isa)-anta1es o, se*ret .e( en*r(2tion+ A)-anta1esC &ecret Dey algorithms are efficient( it ta!es less time to encrypt a message. The reason is that the !ey is usually smaller. &o it is used to encrypt or decrypt long messages. #isa)-anta1esC a) 8ach pair of users must have a secret !ey. *f 3 people in world want to use this method, there needs to be 3 (3.1)"1 secret !eys. ,or one million people to communicate, a half.billion secret !eys are needed. b) The distribution of the !eys between two parties can be difficult. 6% #e,ine 2er&utation% ermutation is transposition in bit level. Straigt permutation( The no. of bits in the input and output are preserved. $ompressed permutation( The no. of bits is reduced (some of the bits are dropped). %&panded permutation( The no. of bits is increased (some bits are repeated). 4% #e,ine su'stitutiona/ & trans2ositiona/ en*r(2tion% Substitutional: ) character level encryption in which each character is replaced by another character in the set. Transpositional: ) -haracter level encryption in which the characters retain their plaintext but the position of the character changes. UNT ! ? " APP>CATON >A@ER $% What is the 2ur2ose o, #o&ain Na&e S(ste&+ Domain 3ame &ystem can map a name to an address and conversely an address to name. 2% #is*uss the three &ain )i-ision o, the )o&ain na&e s2a*e% Domain name space is divided into three different sections( generic domains, country domains E inverse domain. A' (eneric domain: Define registered hosts according to their generic behavior, uses generic suffixes. B' $ountry domain: Cses two characters to identify a country as the last suffix. $' !nverse domain( ,inds the domain name given the * address. 3% #is*uss the TCP *onne*tions nee)e) in 5TP% ,T establishes two connections between the hosts. 2ne connection is used for data transfer, the other for control information. The control connection uses very simple rules of communication. The data connection needs more complex rules due to the variety of data types transferred. 0% #is*uss the 'asi* &o)e/ o, 5TP% The client has three components( the user interface, the client control process, and the client data transfer process. The server has two components( the server control process and the server data transfer process. The control connection is made between the control processes. The data connection is made between the data transfer processes. 3% What is the ,un*tion o, SMTP+ The T-"* protocol supports electronic mail on the *nternet is called &imple /ail Transfer (&/T). *t is a system for sending messages to other computer users based on email addresses. &/T provides mail exchange between users on the same or different computers. 6% What is the )i,,eren*e 'etween a user a1ent DUAE an) a &ai/ trans,er a1ent DMTAE+ The C) prepares the message, creates the envelope, and puts the message in the envelope. The /T) transfers the mail across the *nternet. 4% ;ow )oes MME enhan*e SMTP+ /*/8 is a supplementary protocol that allows non.)&-** data to be sent through &/T. /*/8 transforms non.)&-** data at the sender site to 3@T )&-** data and deliverers it to the client &/T to be sent through the *nternet. The server &/T at the receiving side receives the 3@T )&-** data and delivers it to /*/8 to be transform feed bac! to the original data. 8% Wh( is an a22/i*ation su*h as POP nee)e) ,or e/e*troni* &essa1in1+ Aor!stations interact with the &/T host, which receives the mail on behalf of every host in the organi'ation, to retrieve messages by using a client.server protocol such as ost 2ffice rotocol, version ;(2;). )lthough 2; is used to download messages from the server, the &/T client still needed on the des!top to forward messages from the wor!station user to its &/T mail server. 9% Write )own the three t(2es o, WWW )o*u&ents% The documents in the AAA can be grouped into three broad categories( static, dynamic and active. A' Static: ,ixed.content documents that are created and stored in a server. B' Dynamic( -reated by web server whenever a browser re$uests the document. $' Active: ) program to be run at the client side. $:% What is the 2ur2ose o, ;TM>+ 9T/= is a computer language for specifying the contents and format of a web document. *t allows additional text to include codes that define fonts, layouts, embedded graphics and hypertext lin!s. $$% #e,ine C<% -F* is a standard for communication between 9TT servers and executable programs. *t is used in crating dynamic documents. $6 MARKS QUESTONS UNT" 1. 8xplain the *&2.2&* model of computer networ! with a neat diagram. 1. Discuss the ma+or functions performed by the resentation layer and )pplication layer of the *&2 2&* model. ;. 8xplain Transport =ayer and hysical =ayer. :. Ahat are the ma+or components of an optical communication systemG Discuss. 6. Distinguish between point to point lin!s and multi point lin!s. Five relevant diagrams. 5. 8xplain Data =in! =ayer and 3etwor! =ayer. H. -ompare -onnection oriented and connectionless service. B. a) Ahat is the need for data encoding and explain the various data encoding schemes and compare their features. (B) b) 8xplain how hamming code can be used to correct burst errors. (B) I. 8xplain the operation of the bit.oriented protocol 9D=- with the re$uired frames 10.8xplain the various error detection and correction /echanisms used in computer networ!. 11. Arite short notes on( a) Fo bac! 3)#J (B) b) &elective repeat )#J (B) 11. a) Discuss the ma+or functions performed by the resentation layer and )pplication layer of the *&2 . 2&* model. (B) b) -ompare -onnection oriented and connectionless service. (:) c) Ahat are the ma+or components of an optical communication systemG Discuss. (:) 1;. a) ) bloc! of ;1 bits has to be transmitted. Discuss how the thirty two bit bloc! is transmitted to the receiver using =ongitudinal #edundancy -hec!. (:) b) -onsider a ;1 bit bloc! of data 11100111 11011101 00111001 10101001 that has to be transmitted. *f =ongitudinal #edundancy -hec! is used what is the transmitted bit streamG(:) c) *n the 9amming code, for a data unit of KmK bits how do you compute the number of redundant bits KrK neededG (:) d) Ahat !inds of errors can @ertical #edundancy chec! determineG Ahat !inds of errors it cannot determineG (:) 1:. Discuss stop and wait protocol 16. Discuss sliding window protocol using Fo bac! n. 15. 9ow does a To!en #ing =)3 operateG Discuss. UNT" 1. 8xplain distance vector routing in detail. 1. 8xplain pac!et switching in detail. ;. Ahat are routersG 8xplain in detail. :. Ahat are the services provided by D3& serverG 8xplain in detail. 6. ,ind the class of each * address. Five suitable explanation. (B x 1 4 15) i) 11H.11.1:.BH ii) 1I;.1:.65.11 iii) 1:.1;.110.B iv) 161.6.16.111 v) 1;:.11.HB.65 vi) 1H1.1B.6B.1 vii) 00000000 11110000 11111111 00110011 viii) 10000000 11110000 11111111 00110011 5. &tate the ma+or difference between Distance @ector #outing and =in! &tate #outing. Discuss how these routing techni$ues wor!. H. Ahat is the sub networ! address if the destination address is 100.:6.;:.65 and the subnet mas! is 166.166.1:0.0G B. =ist and diagrammatically illustrate and discuss the four general categories of attac!. I. Aith relevant example discuss about &ubstitution -iphers. 10. ?riefly discuss how D8& algorithm wor!s. UNT" 1. a) erform a comparative study between the *&2 2&* model and the T-"* reference model.(B) b) Distinguish between point to point lin!s and multi point lin!s. Five relevant diagrams. 1. =ist and discuss the states used in the T- connection management finite state machine. ;. Discuss the various timers used by T- to perform its various operations. :. resent a tutorial on Cser Datagram rotocol (CD). 6. Discuss the strategies T- uses to avoid congestion. 5. 8xplain CD E T-. H. 8xplain lea!y buc!et and to!en buc!et algorithm. B. 8xplain the duties of transport layer. UNT"? 1. 8xplain the type of encryption"decryption method. 1. 8xplain about #&) algorithm ;. 8xplain about Data -ompression techni$ueG :. Ahat is mean by ublic !ey cryptography and explain authentication 0 !ey distribution 0 !ey agreement 6. 8xplain details about * &8-C#*TLG 5. 8xplain details about A8? &8-C#*TLG H. 8xplain details about ,*#8A)==&G UNT"? 1. 8xplain how security is provided in interact operations in detail. 1. Ahat is 9TT protocol used forG Ahat is the default port number of 9TT protocolG ;. Discuss the features of 9TT and also discuss how 9TT wor!s. :. =ist and discuss the types of D3& records. 6. 8xplain AAA. 5. Ahat are the duties of ,T protocolG
Delivery: The System Must Deliver Data To The Correct Destination. Accuracy: The System Must Deliver Data Accurately. Timeliness: The System Must Deliver Data in A Timely Manner