Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CN

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Set 1

1. An end system sends 50 packets per second using the User Datagram
Protocol (UDP) over a full duplex 100 Mbps Ethernet LAN connection. Each
packet consists 1500B of Ethernet frame payload data. What is the
throughput, when measured at the UDP layer?
2. A protocol used for finding the IP address that corresponds to a MAC
address. Discuss resolution process.
3. Why do we need a DNS system when we can directly use an IP address?
4. There are number of quality service offered by the transport layer.
Elaborate the role and responsibilities of this layer with their significance.
5. A program on machine X attempts to open a UDP connection to port 5376
on a machine Y, and a TCP connection to port 8632 on machine Z. However,
there are no application listening at the corresponding ports on Y and Z. An
ICMP port unreachable error will be generated by which machine?

Set 2

1. In symmetric-key cryptography, how do you think two persons can establish


a secret key between themselves?
2. Do the comparative analysis between the TCP header and the UDP header.
3. The total number of keys required for a set of n individuals to be able to
communicate with each other using secret key and public key cryptosystem,
respectively can be give value in terms of n.
4. Do you think a recursive resolution is normally faster than an interactive
one? Defend your answer.
Q5. Consider different activities related to email
m1: Send an email from a mail client to a mail server
m2: Download an email from mailbox server to a mail client
m3: Checking email in a web browser
List protocols associated with each one.

Set 3

Q1. UDP cannot handle congestion control. Why? Give relevant examples to
support your answer.
Q2. TCP starts slow, but doesn’t guarantee minimum communication rate. Is it
true? If so, Support it with relevant proof.
Q3. Packets of the same session may be routed through different paths. This
statement describes which all protocols that follow it on transport layer.
Q4. Encrypt the message "THIS IS AN EXERCISE" using a shift cipher with a key
of 20. Ignore the space between words. Decrypt the message to get the original
plaintext.
Q5. Which protocol does DHCP use at the Transport layer? Elaborate.
Set 4
1. MIME enhances SMTP. Conclude using various reasons why POP is needed
for electronic messaging?
2. To test the IP stack on your local host, which IP address would you ping?
3. Give the format of HTTP request message. Give the format of HTTP response
message. Take suitable examples to discuss concepts.
4. Justify why we need a DNS system when we can directly use an IP address?
5. Encrypt "INTERNET" using a transposition cipher with the following key:
35214 1 2 345.

Set 5
1. Compare the TCP header and the UDP header. List the fields in the TCP
header that are not part of the UDP header. Give reason for each missing field.
2. Cover the functionality of transport layer throughout the communication in
the network? What are the duties of the transport layer?
3. If a DNS domain name is voyager.fhda.edu, how many labels are involved
here? How many levels of hierarchy can be there in a DNS system?
4. At a party, which is more probable, a person with a birthday on a particular
day or two (or more) persons having the same birthday?
5. If a DNS domain name is hr.blr.google.com, how many labels are involved
here? How many levels of hierarchy?

Set 6
1. Network security can provide mainly five security services. Defend different role played by
each security services.
2. Elaborate the concept of Domain Name System. What is the purpose of Domain Name
System?
3. Give the role and responsibility of FTP. FTP needs TCP connections, how and why?
4. How End-to-end layers connectivity of devices are possible. Give your valuable response.
5. Give the format of HTTP request message. Give the format of HTTP response message.

Set7
1. In symmetric-key cryptography, how do you think two persons can establish a secret
key between themselves?
2. How can you maintain message confidentiality?
3. A TCP message consisting of 2100 bytes is passed to IP for delivery across
two networks. The first network can carry a maximum payload of 1200
bytes per frame and the second network can carry a maximum payload of
400 bytes per frame, excluding network overhead. Assume that IP overhead
per packet is 20 bytes. What is the total IP overhead in the second network
for this transmission?
4. What do you think would happen if the control connection were
accidentally severed during an FTP transfer?
5. The presentation layer formats the data to be presented to the application
layer. Justify your answer.

Set 8

1. When a person uses a money machine to get cash, is this message


authentication, an entity authentication, or both?
2. In a university, a student needs to encrypt her password (with a unique
symmetric key) before sending it when she logs in. Does encryption protect
the university or the student? Explain your answer.
3. How are congestion control and quality of service related?
4. The transport layer protocol encapsulates and de-capsulate messages, give
explanation with proper diagram.
5. What are the three criteria necessary for effective and efficient networks?
What are header and trailers and how do they get added and removed on
each layer?

Set 9

1. Name the policies that can prevent congestion.


2. What attributes can be used to describe a flow of data?
3. There are some advantages and disadvantages of using long passwords?
What are they?
4. How can a system prevent a guessing attack on a password? How can a bank
prevent PIN guessing if someone has found or stolen a bank card and tried
to use it?
5. A certification authority (CA) is a federal or state organization that binds a
public key to an entity and issues a certificate. Elaborate.
Set 10
1. Discuss in details the client/server paradigm.
2. Compare and contrast between the connection oriented and
connectionless services provided by transport layer.
3. An end system sends 50 packets per second using the User Datagram
Protocol (UDP) over a full duplex 100 Mbps Ethernet LAN connection. Each
packet consists of 1500B of Ethernet frame payload data. What is the
throughput, when measured at the UDP layer?
4. If size of a TCP segment is 1KB and header length value is 6, the sequence
number = 3500. Given that URG flag = 1 and URG pointer = 45. Then what
is the total size of data. How many of them are urgent, Give the sequence
numbers of urgent data.
5. In cases where reliability is not of primary importance, UDP would make a
good transport protocol. Give examples of specific cases.

Set 11
1. SCTP is a new transport layer protocol designed for multimedia
communication; explain the services offered by SCTP to the application
layer process.
2. The transport layer creates the connection between source and destination.
What are the three events involved in the connection? Discuss handshake
process of TCP protocol.
3. SMTP plays an important role in application layer? What is the difference
between a user agent (UA) and a mail transfer agent?
4. Suppose you are sending an email from your Hotmail account to your friend,
who reads his/her e-mail from his/her mail server using IMAP. Briefly
describe how your email travels from your host to your friend’s host. Also,
what are the application layer protocols involved?
5. How network security is important and explains how security can be
achieved in networking.
Set 12

1. The first duty of a transport layer protocol is to provide process to process


communication, justify the statement also describe three way handshake
process of TCP Protocol.
2. List the fields in the TCP header that are missing from UDP header. Give the
reason for their absence.
3. The maximum size of data that the application layer can pass on to the TCP
layer below can be of what length? What mechanism is used by TCP to
provide flow control as segments travel from source to destination?
4. What is traffic shaping? Name two methods to shape traffic.
5. Consider a TCP connection in a state where there are no outstanding Acks.
The sender sends two segments back to back. The sequence numbers of
first and second segments are 750 and 870 respectively. The first segment
was lost, but second was received correctly by the receiver. Let X be the
amount of data carried in first segment (in Bytes), Y be the Ack number sent
by the receiver. Find the value of X and Y.

You might also like