Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
PART A
1. Define Computer Networks
A network is the interconnection of a set of devices capable of communication. In
this definition, a device can be a host (or an end system as it is sometimes called) such
as a large computer, desktop, laptop, workstation, cellular phone, or security system.
A device in this definition can also be a connecting device such as a router, which
connects the network to other networks, a switch, which connects devices together, a
modem (modulator-demodulator), which changes the form of data, and so on
2. How do layers of the internet model correlate to the layers of the OSI model?
The TCP/IP (Transmission Control Protocol/Internet Protocol) protocol suite was
developed in the early 1970s on the other hand OSI model was developed in 1978s.
The internet model has 4 layers : 4.Application, 3.Transport, 2.Internet, and 1.Network
Interface Layer.
On the other hand, The OSI model defines a networking framework to implement
protocols in seven layers: 7.Application 6. Presentation 5.Session 4.Transport
Network 2.Data Link and 1.Physical layer.
The OSI networking model correlates more accurately to the actual process of
communicating over a network,
3. What is a protocol? What are the key elements of a protocol?
Protocol is used for communications between entities in a system and must speak
the same language. Protocol is the set of rules governing the exchange of data between two
entities. It defines what is communicated, how it is communicated, when it is
communicated. The Key elements of a Protocol are as follows,
● Syntax – It refers to the structure or format of data meaning the order in which they
are presented.
● Semantics – It refers to the meaning of each section of bit. How to do interpretation.
● Timing – When data should be sent and how fast they can be sent.
4. What is the need for layers?
8. What are the propagation time and the transmission time for a 2.5-KB (kilobyte) message
(an e- mail) if the bandwidth of the network is 1 Gbps? Assume that the distance between
the sender and the receiver is 12,000 km and that light travels at 2.4 × 108 m/s.
Propagation time = (12,000 X 1000) / (2.4 X 10^8) = 50 ms
Transmission time = (2500 X 8) / 10^9 = 0.020 ms
UNITII
PART A
11. What is meant by Bit Stuffing and Byte Stuffing? Give example
Bit Stuffing
Bit stuffing is the process of adding one extra 0 whenever five consecutive 1s follow a
0 in the data, so that the receiver does not mistake the pattern 0111110 for a
flag.
Byte Stuffing
Byte stuffing is the process of adding one extra byte whenever there is a flag or
escape character in the text.
12. Write the mechanism of stop and wait flow control
Sender:
Rule 1) Send one data packet at a time.
Rule 2) Send next packet only after receiving acknowledgement for previous.
Receiver:
Rule 1) Send acknowledgement after receiving and consuming of data packet.
Rule 2) After consuming packet acknowledgement need to be sent (Flow Control)
UNIT III
PART A
24. Why is IPv4 to IPv6 transition required?
To send a request from an IPv4 address to an IPv6 address isn’t possible because
IPv4 and IPv6 transition is not compatible.
For solution to this problem, some technologies are used. These technologies are:
Dual Stack Routers, Tunnelling, and NAT Protocol Translation.
25. List the advantages of Connection Oriented Service over Connectionless service
26.
Differentiate between forwarding table and routing table
A routing table uses a packet's destination IP address to determine which IP address
should next receive the packet, that is, the "next hop" IP address.
A forwarding table uses the "next hop" IP address to determine which interface
should deliver the packet to that next hop, and which layer 2 address (e.g., MAC
address) should receive the packet on multipoint interfaces like Ethernet or Wi-Fi.
27. What does a router do when it receives a packet with a destination address that
it does not have an entry for, in its routing table?
Routers will look at the destination address on a packet, and try to find a match in its
routing table. If it cannot find a match it will drop the packet and send an ICMP
message to the source to tell it that is has no route to the destination network.
The default IPv4 network, 0.0.0.0/0, or default IPv6 network, ::/0, encompasses every
IP address for the protocol, and every address for the protocol will match a route to
the default network. Having a default route in the routing table prevents the router
from dropping packets with unknown destinations.
28. Expand PIM. Write its functions.
Protocol-Independent Multicast (PIM) is a family of multicast routing protocols for
Internet Protocol (IP) networks that provide one-to-many and many-to-many
distribution of data over a LAN, WAN or the Internet. It is termed protocol-
independent because PIM does not include its own topology discovery mechanism,
but instead uses routing information supplied by other routing protocols.
There are four variants of PIM:
● PIM Source-Specific Multicast, Bidirectional PIM
● PIM Dense Mode, PIM Sparse Mode
29. Mention any four applications of Multicasting.
Multimedia: A number of users ""tune in"" to a video or audio transmission
from a multimedia source station.
Teleconferencing: A group of workstations form a multicast group such that a
transmission from any member is received by all other group members.
Database: All copies of a replicated file or database are updated at the same
time. Distributed computation: Intermediate results are sent to all
participants.
Real-time workgroup: Files, graphics, and messages are exchanged among
active group members in real time.
UNIT IV
PART A
30. Diagrammatically represent the 3-way handshake for TCP connection
establishment.
31. How do fast retransmit mechanism of TCP works?
In TCP/IP, fast retransmit and recovery (FRR) is a congestion control algorithm
that makes it possible to quickly recover lost data packets. Without FRR, the TCP
uses a timer that requires a retransmission timeout if a packet is lost. No new or
duplicate packets can be sent during the timeout period. With FRR, if a receiver
receives a data segment that is out of order, it immediately sends a duplicate
acknowledgement to the sender. If the sender receives three duplicate
acknowledgements, it assumes that the data segment indicated by the
acknowledgements is lost and immediately retransmits the lost segment. With FRR,
time is not lost waiting for a timeout in order for retransmission to begin.
32. What do you mean by slow start in TCP congestion?
Slow start prevents a network from becoming congested by regulating the amount
of data that's sent over it. It negotiates the connection between a sender and
receiver by defining the amount of data that can be transmitted with each packet,
and slowly increases the amount of data until the network's capacity is reached
33. What is the difference between service point address, logical address and
physical address?
Service Point Address Logical Address Physical Address
There are many An IP address of the Each system having a
application running on system is called logical NIC(Network Interface
the computer. Each address. This address is Card) through which two
application run with a the combination of Net ID systems physically
port no.(logically) on the and Host ID. This address connected with each
computer. This port no. is used by network layer other with cables. The
for application is decided to identify a particular address of the NIC is
by the Kernel of the OS. network (source to called Physical address or
This port no. is called destination) among the mac address. This is
port address. networks. This address specified by the
can be changed by manfucture company of
changing the host the card. This address is
position on the network. used by data link layer.
So it is called logical
address.
34. Suppose TCP operates over a 1-Gbps link, utilizing the full bandwidth continuously.
How long will it take for the sequence numbers to wrap around completely?
Suppose an added 32-bit timestamp field increments 1000 times during this wrap
around time, how long it will take timestamp filed to wrap around?
UNIT V
PART A
35. Which protocol support email and give details about that protocol? What
are the basic functions of e-mail?
IMAP Protocol:
IMAP (Internet Message Access Protocol) – Is a standard protocol for accessing e-
mail from your local server. IMAP is a client/server protocol in which e-mail is
received and held for you by your Internet server. As this requires only a small
data transfer this works well even over a slow connection such as a modem.
POP3 Protocol:
The POP (Post Office Protocol 3) protocol provides a simple, standardized way
for users to access mailboxes and download messages to their computers.
SMTP Protocol:
The SMTP (Simple Mail Transfer Protocol) protocol is used by the Mail Transfer
Agent (MTA) to deliver your eMail to the recipient's mail server. The SMTP
protocol can only be used to send emails, not to receive them.
36. What are the four groups of HTTP Headers? What are the two methods of
HTTP?
HTTP header fields provide required information about the request or response,
or about the object sent in the message body. There are four types of HTTP
message headers:
General-header: These header fields have general applicability for both
request and response messages.
Client Request-header: These header fields have applicability only for
request messages.
Server Response-header: These header fields have applicability only for
response messages.
Entity-header: These header fields define meta information about the
entity-body or, if no body is present, about the resource identified by the
request.
37. What is the need for Urgent pointer?
TCP offers the ability to flag certain bytes of data as “urgent.” This feature allows
an application to process and forward any data that must be dealt with
immediately, without the data having to sit in the send queue for processing.
Instead, the data is packaged into a segment, the Urgent flag is set in the TCP
header, and a byte off-set marking the end of urgent data is specified in the
Urgent Pointer field.
38. State the difference between SMTP and MIME.
SMTP MIME
SMTP stands for Simple Mail Transfer Multipurpose Internet Mail Extensions
Protocol. (MIME) is a supplementary protocol
SMTP is a set of communication that allows non-ASCII data to be sent
guidelines that allow software to through SMTP. MIME transforms non-
transmit an electronic mail over the ASCII data at the sender site to NVT
internet is called Simple Mail Transfer ASCII data and deliverers it to the
Protocol. client SMTP to be sent through the
It is a program used for sending Internet. MIME converts binary files,
messages to other computer users executed files into text files. Then only
based on e-mail addresses. it can be transmitted using SMTP
It provides a mail exchange between
users on the same or different
computers, and it also supports:
It can send a single message to one or
more recipients.
Sending message can include text,
voice, video or graphics.
It can also send the messages on
networks outside the internet.
39. Present the information contained in a DNS resource record.
A resource record, commonly referred to as an RR, is the unit of information
entry in DNS zone files; RRs are the basic building blocks of host-name and IP
information and are used to resolve all DNS queries. Resource records come in a
fairly wide variety of types in order to provide extended name-resolution
services.
Different types of RRs have different formats, as they contain different data. Many
RRs share a common format. Each DNS Server contains RRs for the portion of the
name space for which it is authoritative.
40. What DNS cache issues are involved in changing the IP address of a web
server host name?
In other words, a DNS cache is just a memory of recent DNS lookups that your
computer can quickly refer to when it's trying to figure out how to load a website.