CN
CN
CN
1. An end system sends 50 packets per second using the User Datagram
Protocol (UDP) over a full duplex 100 Mbps Ethernet LAN connection. Each
packet consists 1500B of Ethernet frame payload data. What is the
throughput, when measured at the UDP layer?
2. A protocol used for finding the IP address that corresponds to a MAC
address. Discuss resolution process.
3. Why do we need a DNS system when we can directly use an IP address?
4. There are number of quality service offered by the transport layer.
Elaborate the role and responsibilities of this layer with their significance.
5. A program on machine X attempts to open a UDP connection to port 5376
on a machine Y, and a TCP connection to port 8632 on machine Z. However,
there are no application listening at the corresponding ports on Y and Z. An
ICMP port unreachable error will be generated by which machine?
Set 2
Set 3
Q1. UDP cannot handle congestion control. Why? Give relevant examples to
support your answer.
Q2. TCP starts slow, but doesn’t guarantee minimum communication rate. Is it
true? If so, Support it with relevant proof.
Q3. Packets of the same session may be routed through different paths. This
statement describes which all protocols that follow it on transport layer.
Q4. Encrypt the message "THIS IS AN EXERCISE" using a shift cipher with a key
of 20. Ignore the space between words. Decrypt the message to get the original
plaintext.
Q5. Which protocol does DHCP use at the Transport layer? Elaborate.
Set 4
1. MIME enhances SMTP. Conclude using various reasons why POP is needed
for electronic messaging?
2. To test the IP stack on your local host, which IP address would you ping?
3. Give the format of HTTP request message. Give the format of HTTP response
message. Take suitable examples to discuss concepts.
4. Justify why we need a DNS system when we can directly use an IP address?
5. Encrypt "INTERNET" using a transposition cipher with the following key:
35214 1 2 345.
Set 5
1. Compare the TCP header and the UDP header. List the fields in the TCP
header that are not part of the UDP header. Give reason for each missing field.
2. Cover the functionality of transport layer throughout the communication in
the network? What are the duties of the transport layer?
3. If a DNS domain name is voyager.fhda.edu, how many labels are involved
here? How many levels of hierarchy can be there in a DNS system?
4. At a party, which is more probable, a person with a birthday on a particular
day or two (or more) persons having the same birthday?
5. If a DNS domain name is hr.blr.google.com, how many labels are involved
here? How many levels of hierarchy?
Set 6
1. Network security can provide mainly five security services. Defend different role played by
each security services.
2. Elaborate the concept of Domain Name System. What is the purpose of Domain Name
System?
3. Give the role and responsibility of FTP. FTP needs TCP connections, how and why?
4. How End-to-end layers connectivity of devices are possible. Give your valuable response.
5. Give the format of HTTP request message. Give the format of HTTP response message.
Set7
1. In symmetric-key cryptography, how do you think two persons can establish a secret
key between themselves?
2. How can you maintain message confidentiality?
3. A TCP message consisting of 2100 bytes is passed to IP for delivery across
two networks. The first network can carry a maximum payload of 1200
bytes per frame and the second network can carry a maximum payload of
400 bytes per frame, excluding network overhead. Assume that IP overhead
per packet is 20 bytes. What is the total IP overhead in the second network
for this transmission?
4. What do you think would happen if the control connection were
accidentally severed during an FTP transfer?
5. The presentation layer formats the data to be presented to the application
layer. Justify your answer.
Set 8
Set 9
Set 11
1. SCTP is a new transport layer protocol designed for multimedia
communication; explain the services offered by SCTP to the application
layer process.
2. The transport layer creates the connection between source and destination.
What are the three events involved in the connection? Discuss handshake
process of TCP protocol.
3. SMTP plays an important role in application layer? What is the difference
between a user agent (UA) and a mail transfer agent?
4. Suppose you are sending an email from your Hotmail account to your friend,
who reads his/her e-mail from his/her mail server using IMAP. Briefly
describe how your email travels from your host to your friend’s host. Also,
what are the application layer protocols involved?
5. How network security is important and explains how security can be
achieved in networking.
Set 12