Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CS8591-Computer Networks Department of CSE 2020-2021

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

CS8591-Computer Networks Department of CSE 2020-2021

UNIT I INTRODUCTION AND PHYSICAL LAYER


Networks – Network Types – Protocol Layering – TCP/IP Protocol suite – OSI Model –
Physical Layer: Performance – Transmission media – Switching – Circuit-switched Networks
– Packet Switching
PART-A
1 Compare LAN and WAN.
LAN WAN
Scope of Local Area Network is Scope of Wide Area Network spans over large
restricted to a small/ single building geographical area country/ Continent
LAN is owned by some organization. A part of n/w asserts are owned or not
owned.
Data rate of LAN 10-.10-100mbps. Data rate of WAN is Gigabyte.
2 Define Full Duplex and simplex transmission system.
With Full duplex transmission, two stations can simultaneously send and receive data
from each other. This mode is known as two-way simultaneous. The signals are
transmitted in only one direction. One is the sender and another is the receiver.
3 Define networks.(Nov2012)
A computer network is a group of computer systems and other computing hardware
devices that are linked together through communication channels to facilitate
communication and resource-sharing among a wide range of users. Networks are
commonly categorized based on their characteristics.
4 Write the parameters used to measure network performance.(May 2016)
The parameters used to measure network performance are Latency, Throughput,
Delay and Bandwidth.
5 What are the four fundamental characteristics that the data communication system
depends on?
The four fundamental characteristics are: Delivery, Accuracy, Timeliness and Jitter.
6 What are the five components of data communications system?
The five components are Message,Sender,Receiver,Transmission Medium and
Protocol.
7 Define link and state the types of connection.
Alink is the communication pathway that transfers data from one device to another.
The two possible types of connections are point to point and multipoint
8 Define point to point and Multipoint.
Point to point – A point to point connection provides a dedicated link between two
devices
Multipoint – A multipoint connection is one in which more than two specific devices
share a single link.
9 What is Network topology? List its types.
Network topology is the interconnected pattern of network elements. A network
topology may be physical, mapping hardware configuration, or logical, mapping the
path that the data must take in order to travel around the network. The types are Bus
topology, Star topology,Mesh topology and Ring Topology.

St.Joseph’s College of Engineering Page 1 of 24


CS8591-Computer Networks Department of CSE 2020-2021
10 What is OSI?
OSI (Open Systems Interconnection) is reference model for how applications can
communicate over a network. It is partitioned into seven layers. It was developed by
the International Organization for Standardization (ISO).
11 What is a protocol? What are the key elements of a protocol? (Nov 15)
Protocol is used for communications between entities in a system and must speak the
same language. Protocol is the set of rules governing the exchange of data between two
entities. It defines what is communicated, how it is communicated, when it is
communicated. The Key elements of a Protocol are as follows,
 Syntax – It refers to the structure or format of data meaning the order in which they
are presented.
 Semantics – It refers to the meaning of each section of bit. How to do interpretation.
 Timing – When data should be sent and how fast they can be sent.
12 What are the uses of transport layer?
 Reliable data exchange
 Independent of network being used
 Independent of application
13 What is Protocol Data Unit (PDU)?
At each layer, protocols are used to communicate and Control information is added to
user data at each layer. Transport layer may fragment user data. Each fragment has a
transport header added and header consists of destination SAP, sequence number and
error detection code.
14 What are the uses of internet layer in TCP/IP?
 Systems may be attached to different networks
 Routing functions across multiple networks
 Implemented in end systems and routers
15 What is a layered Network Architecture?
 A layer is created when a different level of abstraction occurs at protocol. Each
layer should perform a well defined function.
 Function of each layer should be chosen using internationality standardized
protocols. Boundaries between should be chosen to minimize information flow across
the interfaces.
 A set of layers and protocol is called network architecture. A list of protocols used
by a system is called protocol stack.
16 Compare OSI and TCP.
Open System Interconnection Transmission Control Protocol
It distinguishes between Service, It does not distinguish between
Interface, Protocol Service,Interface,Protocol
Protocols are well hidden Protocols are not just hidden
Dejure standard Fit Model Defacto standard Fit Model
In transport layer only connection In Transport layer choice is for connection
oriented services are available oriented and connectionless
Contains 7 layers Contains 5 layers

St.Joseph’s College of Engineering Page 2 of 24


CS8591-Computer Networks Department of CSE 2020-2021
17 How do layers of the internet model correlate to the layers of the OSI model?
OSI TCP/IP
Physical Layer Physical Layer
Data Link Layer Network Access Layer
Network Layer IP Layer
Transport Layer TCP Layer
Session Layer
Presentation Layer Application Layer
Application layer
18 What is the use of data link layer in OSI? (Nov 15)
 Frame synchronization: Data is divided by data link layer as frames, a manageable
unit.
 Flow Control: Sending station does not overwhelm receiving station.
 Error Control: Any error in bits must be detected and corrected using some
mechanism.
 Addressing: Two stations in a multi point that involved in transmission must be
specified using physical address
 Access Control: When two or more devices are connected to the same link, Access
control mechanism is needed to determine which device has control over the link at
any given time.
19 List the key ingredients of technology that determines nature of a LAN. List the
common topologies available for LAN.
Topology, Transmission medium and Medium access control technique are the
technology that determines nature of a LAN. Star Topology, Ring Topology, Bus
Topology and Tree Topology are the topologies available for LAN.
20 What are the functions of physical layer and presentation layer?
Functions of Physical Layer-
 Encoding/ decoding of signals
 Preamble generation/removal (for synchronization)
 Bit transmission/ reception
Functions of Presentation Layer-
 Translation, Encryption / Decryption, Authentication and Compression
21 What are the functions of Application Layer? (Apr 11)
It enables the user (human/software) to access the network. It provides user interfaces
and support for services such as electronic mail, remote file access and transfer, shared
database management and other types of distributed information services. Services
provided by the application layer are Network Virtual terminal, File transfer, access
and management. Mail services, Directory services.
22 What are the major duties of Network Layer? (May 12)
It is used to send the data from source to destination with help of logical address.
23 Define Bandwidth
Bandwidth refers to the number of bits per second that a channel,a link, or even a
network can transmit.
St.Joseph’s College of Engineering Page 3 of 24
CS8591-Computer Networks Department of CSE 2020-2021
24 What is Throughput?
It is a measure of how data can actually sent through network.
25 What are the two types of line configuration? (Nov 10)
The two types of line configuration are Point to point line configuration and
multipoint line configuration.
Point to point line configuration
 It provides a dedicated link between 2 devices.
 Entire capacity of the link is reserved for transmission between 3 devices only
Eg: connection between remote control and TV’s control system
Multipoint line configuration
 Also called as multi drop connection
 Here the channel capacity is shared and
If many devices share the link simultaneously it is called spatially shared connection
26 List the difference between Packet Switching and Circuit Switching.
(May11,14,17)(Nov 11)
Issue Packet switching Circuit Switching
Circuit setup Not Required Required
Transmission path No Transmission path Dedicated path
Delay Packet transmission delay Call setup delay
Addressing Each packet contains the full Only data is sent
source and destination address
Bandwidth Dynamic Bandwidth Fixed Bandwidth
Routing Each packet is routed Entire data is sent through
independently the same path
Congestion control Difficult Easy if enough buffers can
be located in advance for
each VC set up
Complexity In the transport layer In the network layer
Suited for Connection-oriented and Connection-oriented
connectionless service service
27 What is transmission media ? Give example. (Nov 2019)
In data communication terminology, a transmission medium is a physical path
between the transmitter and the receiver i.e) it is the channel through which data is
sent from one place to another.
EX: Twisted pair cable, coaxial cable , infrared
28 Outline the need for switching. (Nov 2019)
 Switching is a mechanism that allows us to interconnect links to form a larger network.
 Switching provides a practical solution to the problem of connecting multiple devices in
a network.
 It is more practical than using a bus topology; it is more efficient than using a star
topology and a central hub.
 Switches are devices capable of creating temporary connections between two or more
devices linked to the switch.

St.Joseph’s College of Engineering Page 4 of 24


CS8591-Computer Networks Department of CSE 2020-2021
29 What are types of transmission media ?
In Guided media the waves are guided along a physical path.
Ex : coaxial cable, twisted pair
Unguided media provides a mean for transmitting Electro magnetic waves but not
guide them.

30 For n devices in a network, what is the number of cable links required for a mesh,
ring, bus, and star topology?
a. Mesh: n (n – 1) / 2b. Star: nc. Ring: n – 1d. Bus: one backbone and n drop lines
31 What is the significance of the twisting in twisted-pair cable?
Twisting ensures that both wires are equally, but inversely, affected by external
influences such as noise.
PART-B
1 Explain different types of Network in detail with neat diagram
2 With protocol graph, Explain about internet architecture. (May 15,17)
3 Discuss in detail about the layers in OSImodel. (Nov 10,11,12,15)( May12) (Nov 19)
4 Explain the various network topologies in detail.
5 Explain Transmission media and its types in detail.
6 Explain the various performance metrics in detail.
7 Explain Datagram Networks or packet switched networks in detail. (Nov 19)
8 Explain Circuit Switching in detail.(Nov 19)
9 Consider all links in the network use TDM with 24 slots and have a data rate of 1.536
Mbps. Assume that host A takes 500 msec to establish an end to end circuit with host B
before begin to transmit the file. If the file is 512 kilobytes, then how much time will it
take to send the file from host A to host B?
10 Consider the network having bandwidth of 1 MBps and message of size 1000 bytes has
to be sent. Each packet contains a header of 100 bytes if packet switching technique is
used. Out of the following, in how many packets the message must be divided so that
total time taken is minimum-
1. 1 packet
2. 5 packets
3. 10 packets
4. 20 packet
UNIT II DATA-LINK LAYER & MEDIA ACCESS
Introduction – Link-Layer Addressing – DLC Services – Data-Link Layer Protocols – HDLC
– PPP - Media Access Control - Wired LANs: Ethernet - Wireless LANs – Introduction –
IEEE 802.11, Bluetooth – Connecting Devices.
PART-A
1 List the advantages of a centralized scheme.
It may afford greater control over access for priorities, overrides, and guaranteed
capacity.
It enables the use of relatively simple access logic at each station.
It avoids problems of distributed coordination among peer entities.

St.Joseph’s College of Engineering Page 5 of 24


CS8591-Computer Networks Department of CSE 2020-2021
2 Mention some of the physical properties of Ethernet. (May 11)
The Ethernet is a multiple-access network, meaning that a set of nodes send and receive
frames over a shared link. An Ethernet is like a bus that has multiple stations plugged
into it.
3 When a transmitting station will insert a new token on the ring?
It will insert a new token when the station has completed transmission of its frame.
The leading edge of the transmitted frame has returned to the station.
4 List the rules for CSMA/CD.
1) If the medium is idle, transmit; otherwise go to step 2. 2) If the medium is busy,
continue to listen until the channel is idle, and then transmit immediately. 3) If a
collision detected during transmission, transmit a brief jamming signal to all station to
indicate collision has occurred and then cease transmission.
5 What is Early Token Release (ETR)?
ETR allows a transmitting station to release a token as soon as it completes frame
transmission, whether or not the frame header has returned to the station.
6 What is CSMA/CD? (Nov 11)
Carrier Sense Multiple Access with Collision Detection is one of the methods of
medium access. It is used to sense whether a medium is busy before transmission. If
the medium is busy, it refrains from transmitting the data or else proceeds with the
transmission. Also has the ability to check whether a transmission has collided with
another.
7 What is a bridge? (Nov 11)
Bridge is a hardware networking device used to connect two LANs. A bridge operates at
data link layer of the OSI layer. A bridge observes and forwards all frames that it
receives. It does forwarding & filtering frames using LAN destination address. Bridges
are used to connect LAN or WAN and works at data link layer level. Collision
Probability is more.
8 What is the advantage of FDDI over a basic token ring? (Nov 10)
FDDI Token Ring (IEEE 802.5)
No priority and reservation bits. It has priority scheme by using
reservation bits.
No need of converting a token to start of It converts a token to data frame
data frame by inverting token bits because changing token frame.
of high data rate.
A station that transmits data frames releases A station that data transmissions after
a new token as soon as it completes data. releasing back its own transmission,
release the token.
FDDI uses a timed token protocol Token Ring uses priority/reservation
token access
9 Give the format of Ethernet address.
Preamble Destaddr Srcaddr Type Body CRC
64 48 48 16 32

St.Joseph’s College of Engineering Page 6 of 24


CS8591-Computer Networks Department of CSE 2020-2021
10 What does IEEE 10 Base 5 standard signify?
 10 represents data rate 10 Mbps , 5 refers to segment length 5* 100 m that can run
 without repeaters .Base represents Base band communication.
11 What is meant by the contention period of Ethernet? How many lines are required to
connect n systems in Direct Mesh topology?
When several stations on an Ethernet have data to send, there are contention periods
during which collisions happen and no data is successfully transmitted. n (n-1)/2
lines are required.
12 Define Repeater and Hub.
Repeaters and hubs are interconnecting devices.
Repeater: Repeaters extends the Ethernet segment and it repeats the signal. It does not
amplify the signal.
Hub: A Hub has several point to point segments coming out. It is a multi way repeater.
It broadcasts any signal through all outgoing lines.
13 What is meant by Exponential back of algorithm?
After first collision, each station waits either 0 or 1 slot time before trying again. If two
stations collide and each one picks same random number 0/1.
After second collision, each one picks 0, 1, 2 or 3 slot at random and waits.
If collision occurs again, then next time the number of slots to wait is chosen at random
from 0 to [23 – 1]. This algorithm is called binary exponential “back off algorithm”.
14 Mention the different types of bridge. What are the limitations of bridges?
(Nov 13)
 Simple Bridge connects two LAN
 Multi port Bridge connect more than 2 LANs
 Transparent Bridge it learns on its own about connected LANs.
The limitations of bridges: Scalability and Heterogeneity
15 What are the functions of Bridges? (Nov 10,May 17)
 A bridge should have enough buffer space to store the frames until it is transmitted.
 It should be able to distinguish addresses of host on different LAN.
 It can contain information about other bridges.
 It should follow congestion control mechanisms to overcome congestion.
 It works at layer 1 and layer 2.

16 List out any four IEEE 802 standard with its name. (May 12)
 The IEEE 802 family of standards is maintained by the IEEE 802
LAN/MAN Standards Committee (LMSC).
 The most widely used standards are for the Ethernet family, Token
Ring, Wireless LAN, Bridging and Virtual Bridged LANs.
 An individual Working Group provides the focus for each area.
17 Define Bridge and Switch. (May 12)
Bridge: used to send the message from one LAN into another LAN.
Switch: used to send the data from one node into another node directly in the network.

St.Joseph’s College of Engineering Page 7 of 24


CS8591-Computer Networks Department of CSE 2020-2021
18 What is the access method used by wireless LAN? (May 14)
The access method used by wireless LAN is Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA)
19 Define hidden node problem. (May 16)
In wireless networking, the hidden node problem or hidden terminal problem occurs
when a node is visible from a wireless access point (AP), but not from other nodes
communicating with that AP. This leads to difficulties in media access control sub
layer.
20 What is Bluetooth?
Bluetooth is a standard for the short-range wireless interconnection of mobile phones,
computers, and other electronic devices. Bluetooth is a wireless technology standard
for exchanging data over short distances (using short-wavelength UHFradio waves in
the ISM band from 2.4 to 2.485 GHz) from fixed and mobile devices, and building
personal area networks (PANs).
21 Outline the use of Cyclic Redundancy Check. (Nov 19)
 A cyclic redundancy check (CRC) is an error-detecting code commonly used in
digital networks and storage devices to detect accidental changes to raw data.
 In the cyclic redundancy check, a fixed number of check bits, often called a
checksum, are appended to the message that needs to be transmitted.
 Mathematically, data receivers check on the check value attached by finding the
remainder of the polynomial division of the contents transmitted. If it seems that
an error has occurred, a negative acknowledgement is transmitted asking for
data retransmission.
 A cyclic redundancy check is also applied to storage devices like hard disks. In
this case, check bits are allocated to each block in the hard disk.
 When a corrupt or incomplete file is read by the computer, the cyclic
redundancy error is reported.

22 Distinguish between point-to-point and broadcast link. (Nov 19)


 A method of sending a signal where multiple parties may hear a single sender.
Radio stations are a good example of every day life "Broadcast Network". In this
case the radio station is a sender of information/signal and data is only expected to
flow in one direction only . ie. away from the radio broadcast tower.
 In networking, the Point-to-Point is a data networking commonly used to establish a
direct connection between two networking nodes.It can provide connection 1)Direct
Connection 2) Authentication3)Transmission encryption privacy.
23 Distinguish between forward error correction versus error correction by
retransmission.
In forward error correction, the receiver tries to correct the corrupted codeword;
in error detection by retransmission, the corrupted message is discarded (the
sender needs to retransmit the message).
UNIT-II / PART-B
1 Explain various flow control mechanisms. i)Stop Wait protocol ii)Sliding window protocol
(Nov 15)

St.Joseph’s College of Engineering Page 8 of 24


CS8591-Computer Networks Department of CSE 2020-2021
2 Explain in detail the error detection. (Nov 10,12),(May 12,16)
3 The message 11001001 is to be transmitted, using CRC error detection algorithm.
Assuming the CRC polynomial to be x3+1, determine the message that should be
transmitted. If the second left most bit is corrupted, show that it is detected by the
receiver. (May 13)
4 Discuss in detail about the Byte- oriented Protocols (PPP), Bit-oriented Protocols
(HDLC) and SONET. (May 16)(Nov 19)
5 Discuss in detail about the Bit- oriented Protocols.
6 Given a remainder of 111, a data unit of 10110011 and a divisor of 1001, is there an
error in the data unit. Justify your answer with necessary principles. (May 14)
7 How frame order and flow control is achieved using the data link layer? (May 14)
8 i) Explain the challenges faced in building a network.
ii) Obtain the 4-bit CRC code for the data bit sequence 10011011100 using the
polynomial x4+x2+1. (May 17)
9 Discuss in detail about the Ethernet. (May 12,15)(Nov 15)
10 Explain CSMA in detail.Describe the CSMA/CD protocol and comment on its
performance for medium access.(May11,14,17)(Nov 19)
11 Explain the functioning of wireless LAN in detail. (Nov10,12,15)(May 15)
12 Explain how hidden node and exposed node problem is solved in IEEE 802.11.(Nov 13)
13 Give the comparison between different wireless technologies? Enumerate 802.11
protocol stack in detail.(May16)
14 Explain the functions of MAC layer present in IEEE 802.11 with necessary diagrams.
(May17)
15 i) Explain the various connecting devices in detail
ii) Define Bluetooth and explain its architecture in detail.
UNIT III ROUTING
Network Layer Services – Packet switching – Performance – IPV4 Addresses – Forwardingof
IP Packets - Network Layer Protocols: IP, ICMP v4 – Unicast Routing Algorithms –Protocols
– Multicasting Basics – IPV6 Addressing – IPV6 Protocol.
UNIT-III / PART-A
1 Write on the packet cost referred in distance vector and link state routing. (May 2012)
In distance vector routing, cost refer to hop count while in case of link state routing,
cost is a weighted value based on a variety of factors such as security levels, traffic or
the state of the link.
2 What is source routing? (Nov 13)
Rotation, stripping off and using pointers are the different types of source routing
approach.
3 Define routing. (Nov12,15)
It is the process of building up the tables that allow the collect output for a packet to be
determined. It is a lot harder to create the forwarding tables in large, complex networks
with dynamically changing topologies and multiple paths between destinations.
Routing is a process that takes place in the background so that, when a data packet
turns up, we will have the right information in the forwarding table to be able to
forward, or switch, the packet.

St.Joseph’s College of Engineering Page 9 of 24


CS8591-Computer Networks Department of CSE 2020-2021
4 What is the role of VCI? (May 11)
An Incoming virtual circuit identifier (VCI) uniquely identifies the connection at this
switch and that will be carried inside the header of the packets that belong to this
connection. It is a potentially different outgoing VCI that will be used for outgoing
packets. The combination of incoming interface and incoming VCI uniquely identifies
the virtual connection.
5 What is packet switching? (Nov 12)
In a packet-switched network, it’s not necessary to dedicate transmission capacity along a path
through the network. Rather, data are sent out in a sequence of small chunks, called packets.
Packet switching is mainly used in terminal-to-computer and computer-to-computer
communications.
6 What is the function of a router? (Nov 10)
Routers relay packets among multiple interconnected networks. They route packets from
one network to any of a number of potential destination networks on internet. A router
operates as the physical, data link and network layer of the OSI model. A router is
termed as an intelligent device. Therefore, its capabilities are much more than those of a
repeater or a bridge. A router is useful for interconnecting two or more heterogeneous
networks that differ in their physical characteristics such as frame size, transmission
rates, topologies, addressing etc. A router has to determine the best possible transmission
path among several available paths. Destination, Cost and Next Hop are the important
fields in a routing table
7 Write the difference between Distance vector routing and Link state routing.
Distance Vector Routing Link state routing
Basic idea is each node sends its Basic idea is every node sends its
knowledge about the entire network to knowledge about its neighbors to the
its neighbors. entire network
It is dynamic routing It is dynamic routing
RIP uses Distance vector routing OSPF uses link state routing
8 What is subnetting? (Nov 11,15)
The whole network can’t manage by single server, so that the entire network divided
into small network in order to manage the network easily. Subnetting provides an
elegantly simple way to reduce the total number of network numbers that are assigned.
The idea is to take a single IP network number and allocate the IP address with that
network to several physical networks, which are now referred to as subnets.
9 What is subnet mask?
A subnet mask is a number that defines a range of IP addresses available within
a network. A single subnet mask limits the number of valid IPs for a specific network.
Multiple subnet masks can organize a single network into smaller networks (called
subnetworks or subnets).
10 Define CIDR?
CIDR, which stands for Classless Inter-Domain Routing, is an IP addressing scheme
that improves the allocation of IP addresses. It replaces the old system based on classes
A, B, and C. This helped to extend the life of IPv4 as well as slow the growth of routing
tables.

St.Joseph’s College of Engineering Page 10 of 24


CS8591-Computer Networks Department of CSE 2020-2021
11 How many network addresses and host addresses are supported byclass A,
class B networks?
 Class A: Number of networks = 127
Number of hosts = 224 -1
 Class B: Number of networks = 214 -1
Number of hosts = 216 – 1 = 65,535
12 What does a router do when it receives a packet with a destination address that
it does not have an entry for, in its routing table?
Default Router: If IP Software is not able to find the destination, from routing table
then it sends the datagram to default router. It is useful when a site has small set of
local address connected to it and connected to the rest of the Internet.
13 List out the functions of IP.
IP services are unreliable, best-effort, connectionless packet delivery system
 Unreliable – delivery is not guaranteed, Connectionless – each pocket is treated
independent from others, Best-effort delivery – it makes an earnest attempt to deliver
packets. It defines basic unit of data transfer through TCP/IP.
 IP s/w performs routing function and finds a path from source to destination.
IP includes a set of rules that embody the idea of unreliable packet delivery.
14 What do you mean by ICMP?
ICMP is an error reporting mechanism. It does not specify the action to be taken for
each possible error. The source must relate the error to an individual application
program and take other actions to correct the problem.
15 To whom ICMP reports error message will be sent?
ICMP allows routers to send error messages to other router or hosts. ICMP is an error
reporting mechanism. It does not specify the action to be taken for each possible error.
It is informing the source that the error has occurred and the source has to take actions
to rectify the errors.
16 When ICMP redirect message is used?(May 17)
An ICMP redirect is an error message sent by a router to the sender of an IP packet
Redirectsare used when a router believes a packet is being routed sub optimally and it
would like to inform the sending host that it should forward subsequent packets to that
same destination through a different gateway.
17 State the rules of non boundary-level masking? (May 12)
 The bytes in the IP address that corresponds to 255 in the mask will be repeated in
the sub network address
 The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the
sub network address
 For other bytes, use the bit-wise AND operator.
Example-
IP address 45 123 21 8
Mask 255 192 0 0
Subnet 45 64 0 0
123 01111011
192 11000000
64 01000000
18 What is the network address in a class A subnet with the IP addresses of one of the
hosts as 25.34.12.56 and mask 255.255.0.0? (May 14)
IP Address - 25.34.12.56 , Mask - 255.255.0.0 , Network Address - 25.34.0.0
St.Joseph’s College of Engineering Page 11 of 24
CS8591-Computer Networks Department of CSE 2020-2021
19 What is IP address?
An Internet Address is made of four bytes (32 bits) that define a host’s connection to a
network. There are currently 5 different field lengths patterns, each define a class of
addresses. These are designed to cover the needs of different types of organizations,
class A, B, C, D, E.
Class Netid Hostid
20 Explain Multicast routing?
Multicast IP Routing protocols are used to distribute data (for example, audio/video
streaming broadcasts) to multiple recipients. Using multicast, a source can send a
single copy of data to a single multicast address, which is then distributed to an entire
group of recipients.
21 Explain IPV6 protocol.(Nov 19)
IPv6 (Internet Protocol version 6) is a set of basics of IPv6 are similar to those of IPv4.
The most obvious improvement in IPv6 over IPv4 is that IP addresses are lengthened
from 32 bits to 128 bits. This extension anticipates considerable future growth of the
Internet and provides relief for what was perceived as an impending shortage of
network addresses. IPv6 also supports auto-configuration to help correct most of the
shortcomings in version 4, and it has integrated security and mobility features.
22 What is RIP?
RIP (Routing Information Protocol) is a widely-used protocol for managing
router information within a self-contained network such as a corporate local area
network or an interconnected group of such LANs. Using RIP, a gateway host (with a
router) sends its entire routing table (which lists all the other hosts it knows about) to
its closest neighbor host every 30 seconds. The neighbor host in turn will pass the
information on to its next neighbor and so on until all hosts within the network have
the same knowledge of routing paths, a state known as network convergence.
23 Explain about OSPF.
OSPF (Open Shortest Path First) is a router protocol used within larger autonomous
system networks in preference to the Routing Information Protocol (RIP), an older
routing protocol that is installed in many of today's corporate networks. Using OSPF, a
host that obtains a change to a routing table or detects a change in the network
immediately multicasts the information to all other hosts in the network so that all will
have the same routing table information.
24 Expand ICMP and write the function.
Internet Control Message Protocol. ICMP is an error reporting mechanism. It does not
specify the action to be taken for each possible error. The source must relate the error
to an individual application program and take other actions to correct the problem.
25 Write the types of connecting devices in networking.
The types of connecting devices in networking are Hub, Switch, Router and Bridge
26 What is PIM?
Protocol-Independent Multicast (PIM) is a family of multicast routing
protocols for Internet Protocol (IP) networks that provide one-to-many and many-to-
many distribution of data over a LAN, WAN or the Internet. It is termed protocol-
independent because PIM does not include its own topology discovery mechanism, but
instead uses routing information supplied by other routing protocols.
There are four variants of PIM:PIM Source-Specific Multicast, Bidirectional PIM
PIM Dense Mode, PIM Sparse Mode.
27 Why is IPV4 to IPV6 transition required?(May 17)
IPv4 and IPv6 networks are not directly interoperable, transition technologies are
designed to permit hosts on either network type to communicate with any other host.
St.Joseph’s College of Engineering Page 12 of 24
CS8591-Computer Networks Department of CSE 2020-2021
28 What is DVMRP?
The Distance Vector Multicast Routing Protocol (DVMRP), is a routing protocol used
to share information between routers to facilitate the transportation of IP
multicast packets among networks. The protocol is based on the RIP protocol. The
router generates a routing table with the multicast group of which it has knowledge
with corresponding distances. When a multicast packet is received by a router, it is
forwarded by the router's interfaces specified in the routing table.
29 Explain IPV4 protocol.
IPv4 (Internet Protocol Version 4) is the fourth revision of the Internet Protocol (IP)
used to identify devices on a network through an addressing system. The Internet
Protocol is designed for use in interconnected systems of packet-switched computer
communication networks.IPv4 is the most widely deployed Internet protocol used to
connect devices to the Internet. IPv4 uses a 32-bitaddress scheme
30 What are the differences between IPV4 and IPV6?
IPV4 IPV6
A 32-bit numeric address in IPv4 is IPv6 addresses are 128-bit IP address
written in decimal as four numbers written in hexadecimal and separated by
separated by periods. Each number can be colons. An example IPv6 address could be
zero to 255. written like this:
For example, 1.160.10.240 could be an IP 3ffe:1900:4545:3:200:f8ff:fe21:67cf
address.
31 Define a switch.
Switches are hardware or software device capable of creating temporary connections
between more devices which are not directly connected. It is a multi input/output port
device. It transfers data coming from one input port to one or more output ports. This
function is called as forwarding. Reliability, performance, security, and geography are
the reason for using bridges in LAN.
32 Identify the class of the following IP Address:(Nov 15)
(a) 110.34.56.45 (b) 212.208.63.23
110.34.56.45: This IP address belongs to Class A.
212.208.63.23: This IP address belongs to Class C.
33 Compare ARP and RARP.
ARP RARP
Address Resolution Protocol. Reverse Address Resolution Protocol.
Retrieves the physical address of the Retrieves the logical address for a
receiver. computer from the server.
ARP maps 32-bit logical (IP) address to 48- RARP maps 48-bit physical address to 32-
bit physical address. bit logical (IP) address.
34 What is DHCP ?(Nov 19)
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used
to dynamically assign an Internet Protocol (IP) address to any device, or node, on a
network so they can communicate using IP. DHCP automates and centrally manages
these configurations rather than requiring network administrators to manually assign
IP addresses to all network devices.
UNIT-III / PART-B
1 Explain Virtual circuit switching techniques. Or In the virtual circuit service model,
before a virtual circuit is setup, the source router needs to specify a path from the
source to the destination. What additional information do we need to maintain in the
routing table to support this function? Write down the resulting routing table. (May 12)

St.Joseph’s College of Engineering Page 13 of 24


CS8591-Computer Networks Department of CSE 2020-2021
2 Explain Packet Switching in detail.
3 Discuss about Link-state routing and routers. (Nov 12)(May 15)
4 Explain about the inter domain routing (BGP) routing algorithms.
5 Explain about IPV6?Compare IPV4 and IPV6 (May 16)
6 Explain the Routing Information protocol/Distance vector routing in detail.(Nov
13,15)(May 15,16)(Nov 19)
7 Explain in detail i) ICMP ii)ARP (Nov 19) iii)RARP.
8 Explain Multicast Routing features and explain DVMRP(Nov 15)
9 Explain the working of Protocol Independent Multicast (PIM) in detail. (May 17)
10 Explain Link state routing with Dijikstra's algorithm for the following graph.

11 Explain Distance Vector Routing Algorithm for the graph given below.

12 Explain in detail the operation of OSPF protocol by considering a suitable


network.(May 17)
13 Explain IPv4 datagram format in detail.
14 i) Explain IPv4 classful and classless addressing. (10) (Nov 19)
ii) Assume that you are given a network ID 165.121.0.0. You are responsible for
creating subnets on the network and each subnet must provide at least 900 host
IDs. What subnet mask meets the requirement for the minimum number of host
IDs and provide the greatest number of subnets ? (5)

UNIT IV TRANSPORT LAYER


Introduction – Transport Layer Protocols – Services – Port Numbers – User Datagram
Protocol – Transmission Control Protocol – SCTP.
UNIT IV - PART A
1 Give any two Transport layer service. (Dec 12)
Multiplexing: Transport layer performs multiplexing/de-multiplexing function.
Multiple applications employ same transport protocol, but use different port number.
According to lower layer n/w protocol, it does upward multiplexing or downward
multiplexing.Reliability: Error Control and Flow Control.
2 How IANA has divided port numbers?
IANA (Internet Assigned Number Authority) has divided port numbers into three ranges: 1)
Well Known ports 2) Registered ports 3) Dynamic Ports.

St.Joseph’s College of Engineering Page 14 of 24


CS8591-Computer Networks Department of CSE 2020-2021
3 Mention the various adaptive retransmission policy of TCP.
 Simple average
 Exponential / weighted average
 Exponential RTT backoff
 Jacobson’s Algorithm
4 List few well known ports for UDP.
Port Protocol Description
7 Echo Echoes a received datagram back to the sender
9 Discard Discards any datagram received
11 Users Active Users
13 Daytime Returns Date and Time
5 Why the congestion occur in network?
Congestion occurs because the switches in a network have a limited buffer size to
store arrived packets. And also because the packets arrive at a faster rate than what the
receiver can receive and process the packets.
6 Define congestion. (Nov 2011)
Congestion in a network occurs if user sends data into the network at a rate greater
than that allowed by network resources. Any given node has a number of I/O ports
attached to it. There are two buffers at each port. One to accept arriving packets &
another one to hold packets that are waiting to depart. If packets arrive too fast node
than to process them or faster than packets can be cleared from the outgoing buffers,
then there will be no empty buffer. Thus causing congestion and traffic in the network.
7 What is Tiny gram?
A very small packet of data is called a tiny gram. Too many tiny grams can congest a
network connection.
8 Give the datagram format of UDP?
The basic idea of UDP is for a source process to send a message to a port and for the
destination process to receive the message from a port.
Source port address: It is the address of the application program that has created the
message.
Destination port address: It is the address of the application program that will receive
the message.
Total Length: It defines the total length of the user datagram in bytes.
Checksum: It is a 16 bit field used in error correction.
Source Port Address 16 bits Destination Port Address 16 bits
Total Length 16 bits Checksum 16 bits
9 What is the main difference between TCP & UDP?
TCP UDP
It provides Connection oriented service Provides connectionless service.
Connection Establishment delay will be No connection establishment delay
there
Provides reliable service Provides unreliable, but fast service

It is used by FTP, SMTP It is used by DNS, SNMP, audio, video


and multimedia applications.

St.Joseph’s College of Engineering Page 15 of 24


CS8591-Computer Networks Department of CSE 2020-2021
10 What is TCP? (Nov11)
Transmission Control Protocol provides Connection oriented and reliable services.
TCP guarantees the reliable, in order delivery of a stream of bytes. It is a full-duplex
protocol, meaning that each TCP connection supports a pair of byte streams, one
flowing in each direction. It is used by FTP, SMTP.
11 Name the policies that can prevent (avoid) congestion.
DEC (Digital Equipment Corporation) bit, Random Early Detection (RED), Source
based congestion avoidance.
The congestion may be avoided by two bits:
 BECN - Backward Explicit Congestion Notification
 FECN - Forward Explicit Congestion Notification.
12 List out various congestion control techniques.
1) AIMD (Additive Increase Multiplicative Decrease)
2) Slow start 3) Fast retransmit 4) Recovery
13 What are the advantages of using UDP over TCP? (Nov 10)
UDP is very useful for audio or video delivery which does not need acknowledgement.
It is useful in the transmission of multimedia data. Connection Establishment delay
will occur in TCP.
14 What is the difference between service point address, logical address and physical
address?
Service point addressing Logical addressing Physical addressing
The transport layer header If a packet passes the If the frames are to be
includes a type of address network boundary we distributed to different
called a service point need another addressing to systems on the network,
address or port address, differentiate the source and the data link layer adds
which makes a data delivery destination systems. The the header, which defines
from a specific process on network layer adds a the source machine’s
one computer to a specific header, which indicates the address and the
process on another logical address of the destination Machine’s
computer. sender and receiver. address.
15 What is the use of UDP’s Pseudo header?
The pseudo header consists of three field from the IP header protocol number ,source
IP address and destination IP address plus the UDP length field (which is included
twice in checksum calculation).The pseudo header is used to check whether the
message is delivered between 2 endpoints.
16 Suppose TCP operates over a 1-Gbps link, utilizing the full bandwidth
continuously. How long will it take for the sequence numbers to wrap around
completely? Suppose an added 32-bit timestamp field increments 1000 times during
this wrap around time, how long it will take timestamp filed to wrap around?
(May 13)
Once a segment with sequence x survives in Internet, TCP cannot use the same
sequence no. How fast 32-bit sequence no space can be consumed? 32-bit sequence no
is adequate for today’s network. Wrap Around Timefor T3-45Mbps (232 x 8)
/45Mbps=763.55sec=12.73 min.

St.Joseph’s College of Engineering Page 16 of 24


CS8591-Computer Networks Department of CSE 2020-2021
17 Write short notes on congestion control. (Nov 12)
It involves preventing too much data from being injected into the network, thereby
causing switches or links to become overloaded. Thus flow control is an end to an end
issue, while congestion control is concerned with how hosts and networks interact.
18 What do you mean by slow start in TCP congestion? (May 16)
TCP slow start is an algorithm which balances the speed of a network connection. Slow start
gradually increases the amount of data transmitted until it finds the network’s maximum
carrying capacity.
19 Differentiate congestion control and flow control. (Nov 13,15)
Congestion Control Flow Control
 Congestion control means preventingthe  Flow control means preventing the source
source from sending data that willend up from sending data that the receiver will
getting droppedby a router because its end up dropping because it runs out of
queue is full. buffer space.
 This is more complicated, becausepackets  This is fairly easy with a sliding window
from different sources travelling different protocol
paths can convergeon the same queue.

20 What are the four aspects related to the reliable delivery of data? (May 12)
The four aspects are Error control, Sequence control, Loss control and Duplication
control.
21 What is UDP?
It stands for User Datagram Protocol. It is part of the TCP/IP suite of protocols used for
data transferring. UDP is a known as a "stateless" protocol, meaning it doesn't
acknowledge that the packets being sent, have been received.
22 List the different phases used in TCP Connection. (May 16)
The different phases used in TCP connection are Connection establishment Phase, Data
transfer and Connection Termination Phase
23 How do fast retransmit mechanism of TCP works?(May 17)
Fast Retransmit is an enhancement to TCP that reduces the time a sender waits before
retransmitting a lost segment. A TCP sender uses a timer to recognize lost segments. If
an acknowledgement is not received for a particular segment within a specified time,
the sender will assume the segment was lost in the network, and will retransmit the
segment. Duplicate acknowledgement is the basis for the fast retransmit mechanism
which works as follows: after receiving a packet (e.g. with sequence number 1), the
receiver sends an acknowledgement by adding 1 to the sequence number (i.e.,
acknowledgement number 2) which means that the receiver received the packet
number 1 and it expects packet number 2 from the sender. Let's assume that three
subsequent packets have been lost. In the meantime the receiver receives packet
numbers 5 and 6. After receiving packet number 5, the receiver sends an
acknowledgement, but still only for sequence number 2. When the receiver receives
packet number 6, it sends yet another acknowledgement value of 2. Because the sender
receives more than one acknowledgement with the same sequence number (2 in this
example) this is called duplicate acknowledgement.
St.Joseph’s College of Engineering Page 17 of 24
CS8591-Computer Networks Department of CSE 2020-2021
24 List the advantages of Connection oriented services over connectionless services.
(May 17)
Connection Oriented:
Advantages:
1. Buffers can be reserved in advance
2. Sequencing can be guaranteed.
3. Short headers.
25 Define SCTP
SCTP(Stream Control Transmission Protocol) is a reliable,message oriented transport
layer protocol.It combines the best features of UDP and TCP.It is mostly designed for
internet applications.
26 What is the use of SCTP Multiple stream service?
SCTP allows multi stream service in each connection, which is called association in
SCTP terminology. If one of the streams is blocked, the other streams can still deliver
their data. The idea is similar to multiple lanes on a highway. The figure shows the idea
of multi stream delivery.

27 Define Multihoming Concept of SCTP


Multihoming is the ability of an SCTPassociation to support multiple IP paths to its
peer endpoint. The benefit of multihoming associations is that it makes the association
more fault-tolerant against physical network failures and other issues on the interfaces.

28 What is piggybacking ? (Nov 19)


Piggybacking is used to improve the efficiency of bidirectional transmission.
When a frame is carrying data from A to B, it can also carry control information
about frames from B; when a frame is carrying data from B to A, it can also carry
control information about frames from A.
29 Outline stop-wait ARQ Mechanism.(Nov 19)
A stop-and-wait ARQ sender sends one frame at a time; it is a special case of the
general sliding window protocol with transmit and receive window sizes equal to one
in both cases. After sending each frame, the sender doesn't send any further frames
until it receives an acknowledgement (ACK) signal.
St.Joseph’s College of Engineering Page 18 of 24
CS8591-Computer Networks Department of CSE 2020-2021
UNIT IV - PART B
1 Write short notes on (May 12)
(i) TCP segment format (ii) Silly window syndrome (Or) discuss the silly window
syndrome and explain how to avoid it.
2 With neat architecture, Explain TCP and its sliding window algorithm for flow control.
(Nov 15)
3 Describe with examples the three mechanisms by which congestion control is achieved
in TCP. (Nov 13,15)(May 15,16)(Nov 19)
4 Discuss congestion avoidance algorithm likeDEC bit method and random early
detection in transport layer with an example. (May 12,17)
5 Why TCP does uses adaptive retransmission and describe its mechanism .(Nov13)
(Or)
Illustrate the features of TCP that can be used by the sender to insert record boundaries
into the byte stream. Also mention their original purpose.(May13)
6 Explain connection establishment and connection closing in TCP (Or) Describe how
reliable and ordered delivery is achieved through TCP. (Nov 13)(May 15)
7 Explain the significance ofClark’s solution and Nagle’s algorithm. (Or) What is the
need for Nagle’s algorithm? How does it determine when to transmit data? (May 13)
8 Discuss about queuing disciplines.
9 Define UDP.Discuss the operations of UDP.Explain UDP checksum with one
example.(May 16)
10 i) Explain the adaptive flow control and retransmission techniques used in TCP.
ii) With TCPs slow start and AIMD for congestion control show how the window size
will vary for a transmission where every 5th packet is lost. Assume an advertised
window size of 50 MSS. (May 17)
11 Explain SCTP in Detail (May 17)
12 Explain the Association establishment of SCTP through four-way handshake in detail.
13 i) Compare the features of TCP and UDP. (8) (Nov 19)
ii) Explain the TCP Header format . (5)
UNIT V APPLICATION LAYER
WWW and HTTP – FTP – Email –Telnet –SSH – DNS – SNMP.
UNIT V - PART A
1 Why do we need a Domain Name System? What role does the DNS Resolver play in
the DNS system? (Nov12)
Domain Name System can map a name to an address and conversely an address to
name. The Domain Name System converts domain names into IP numbers. IP
numbers uniquely identify hosts on the Internet: however they are difficult to
remember. We therefore need a memorable way of identifying hosts. A DNS Resolver
is responsible for making requests of the local DNS server in behalf of clients. A DNS
Resolver must know the IP address of at least one DNS server. It uses this address to
start the DNS Lookup process.
2 What are the four main properties of HTTP?
 Global Uniform Resource Identifier.
 Request-response exchange.
 Statelessness.
 Resource metadata.
St.Joseph’s College of Engineering Page 19 of 24
CS8591-Computer Networks Department of CSE 2020-2021
3 What is WWW and SMTP? (Nov 10,15)( May 15)
World Wide Web is an internet application that allows user to view pages and move
from one web page to another.
It helps to store and share data across varied distances. The TCP/IP protocol that
supports electronic mail on the Internet is called Simple Mail Transfer (SMTP).
It is a system for sending messages to other computer users based on e-mail addresses.
4 What are the four groups of HTTP Headers? What are the two methods of HTTP?
(May15) (Nov 15)
The four groups of HTTP headers are
 General headers
 Entity Headers
 Request Headers
 Response Headers.
Two methods of HTTP are
 GetMethod( )
 PostMethod( )
5 What is PGP? (Nov10, May 12)
Pretty Good Privacy (PGP) is used to provide security for electronic mail. It provides
authentication, confidentiality, data integrity, and non-repudiation. It is a program
using public key encryption popularly used with email.Pretty Good Privacy uses a
variation of the public key system. In this system, each user has an encryption key that
is publicly known and a private key that is known only to that user.PGP comes in two
public key versions -- Rivest-Shamir-Adleman (RSA) and Diffie-Hellman.
6 What are the transmission modes of FTP?
 Stream mode: Default mode and data is delivered from FTP to TCP as a
continuous stream of data.
 Block mode: Data is delivered from FTP to TCP in terms of blocks. Each data block
follows the three byte header.
 Compressed mode: File is compressed before transmitting if size is big. Run length
encoding method is used for compression.
7 Why is an application such as POP needed for electronic messaging? (May 12)
Workstations interact with the SMTP host, which receives the mail on behalf of every
host in the organization, to retrieve messages by using a client-server protocol such as
Post Office Protocol.
Although POP3 is used to download messages from the server, the SMTP client still
needed on the desktop to forward messages from the workstation user to its SMTP
mail server.
8 What are the TCP connections needed in FTP?
FTP establishes two connections between the hosts. One connection is used for data
transfer, the other for control information.
The control connection uses very simple rules of communication. The data connection
needs more complex rules due to the variety of data types transferred.

St.Joseph’s College of Engineering Page 20 of 24


CS8591-Computer Networks Department of CSE 2020-2021
9 Compare the HTTP and FTP.

FTP HTTP
FTP transfers the file from client to server HTTP transfer the file from server to
and server to client. client.(i.e. web pages)
It uses two different port connections. (i.e. HTTP use only one port connection. (i.e.
port 20 and port 21) Port 80)
FTP uses two parallel TCP connections to It also uses TCP protocol.
transfer a file. They are Control Connection
and Data connection.
10 What is the use of MIME Extension?
Multipurpose Internet Mail Extensions (MIME) is a supplementary protocol that
allows non-ASCII data to be sent through SMTP. MIME transforms non-ASCII data at
the sender site to NVT ASCII data and deliverers it to the client SMTP to be sent
through the Internet. MIME converts binary files, executed files into text files. Then
only it can be transmitted using SMTP
11 Which protocol support email and give details about that protocol? What are the
basic functions of e-mail?
SMTP is a standard protocol for transferring mails using TCP/IP
 SMTP standardization for message character is 7 bit ASCII
 SMTP adds log info to the start (i.e.) path of the message.
 Basic functions of e-mail: composition, Transfer, Reporting, Displaying, and
Disposition.
12 What is POP3?
POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for
receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held
for you by your Internet server. POP and IMAP deal with the receiving of e-mail and
are not to be confused with the Simple Mail Transfer Protocol (SMTP), a protocol for
transferring e-mail across the Internet.
13 What is IMAP?
Internet Message Access Protocol (IMAP) is a standard protocol for accessing e-mail
from your local server. IMAP is a client/server protocol in which e-mail is received
and held for you by your Internet server. MAP can be thought of as a remote file
server. POP3 can be thought of as a "store-and-forward" service.
14 What is use of digital signature?
Digital signature is a method to authenticate the sender of a message. It is similar to
that of signing transactions documents when you do business with a bank. In network
transactions, one can create an equivalent of an electronic or digital signature by the
way you send data. Data appended to, or a data unit that allows a recipient of the data
unit to prove the source and integrity if the data unit and protect against forgery.
15 What is a URL, web browser and rlogin?(May 2016)
 Uniform Resource Locator is a string identifier that identifies a page on the World
Wide Web.
 Web browser is a software program that interprets and displays the contents of
HTML web pages.
 Remote login or rlogin is used to login into remote system and access its contents.
16 Explain Cyber Squatting.
The practice of registering a domain only to turn around and sell it off to an interested
party at a much higher price even has a name. It is called cyber squatting.

St.Joseph’s College of Engineering Page 21 of 24


CS8591-Computer Networks Department of CSE 2020-2021
17 Discuss the three main division of the domain name space. (May 12)
Domain name space is divided into three different sections: generic domains, country
domains & inverse domain.
 Generic domain: Define registered hosts according to their generic behavior, uses
generic suffixes.
 Country domain: Uses two characters to identify a country as the last suffix.
 Inverse domain: Finds the domain name given the IP address.
18 Name four factors needed for a secure network?
Privacy: The sender and the receiver expect confidentiality.
Authentication: The receiver is sure of the sender’s identity and that an imposter has
not sent the message.
Integrity: The data must arrive at the receiver exactly as it was sent.
Non-Reputation: The receiver must able to prove that a received message came from a
specific sender.
19 Define SNMP. (May 12)
 Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for
managing devices onIP networks".
 Devices that typically support SNMP include routers, switches, servers, workstations,
printers, & modem. It is used mostly in network management systems to
monitornetwork-attached devices for conditions that warrant administrative attention.

20 What is meant by cryptography? (Nov 12)

 Cryptography, a word with Greek origins, means "secret writing." However, we use the
term to refer to the science and art of transforming messages to make them secure and
immune to attacks.
 Original message before being transformed is called plaintext. After the message is
transformed, is called cipher text.
 An encryption algorithm transforms the plaintext to cipher text; a decryption algorithm
transforms the cipher text back to plaintext. The term cipher is used to refer to
encryption and decryption algorithms.

21 Define Name Resolution.


To improve reliability, some of the name servers can be located outside the zone. The
process of looking up a name and finding an address is called name resolution.
22 Explain Email.
E-mail (electronic mail) is the exchange of computer-stored messages by
telecommunication. Email messages are usually encoded in ASCII text.
The architecture of the email system consists of two kinds of subsystems: the user
agents, which allow people to read and send email, and the message transfer agents,
which move the messages from the source to the destination.
23 What is Telnet?
A Telnet is a Transmission Control Protocol (TCP). Connection used to transmit data
with interspersed Telnet Control Information. The Telnet Protocol is built upon three
main ideas:

 The concept of a network virtual terminal


 The principle of negotiated options
 A symmetric view of terminals and processes.
Telnet is the standard TCP/IP protocol for virtual terminal service.

St.Joseph’s College of Engineering Page 22 of 24


CS8591-Computer Networks Department of CSE 2020-2021
24 What if TFTP?
Trivial file transfer protocol is designed for transferring bootstrap and configuration
files. It is so simple and can fit into ROM of a disc less memory. TFTP does reading and
writing of files.
Reading means copying files from server site to client site and writing in FTP means
copying a file from client site to server site.
25 Describe why HTTP is defined as a stateless protocol.
Maintaining state across request – Response connections significantly increases the
initial interactions in a connections since the identity of each party needs to be
established and any saved state much be retrieved. HTTP is therefore stateless to
ensure that internet is scalable since state is not contained in a HTTP request /
response pairs by default.
26 List the two types of DNS message.(May 16)
There are two types of DNS messages,
 Query
 Response
Query message – consists of the header and question records.
Response message – consists of header, question record, authoritative record and
additional record.
27 Mention the different levels in domain name space.(May 16)
Domain name space is divided into three different sections: generic domains, country
domains & inverse domain.
Generic domain: Define registered hosts according to their generic behavior, uses
generic suffixes.
Country domain: Uses two characters to identify a country as the last suffix.
Inverse domain: Finds the domain name given the IP address.
28 Define TELNET.
Telnet is a user command and an underlying TCP/IP protocol for accessing remote
computers. Through Telnet, an administrator or another user can access someone else's
computer remotely. On the Web, HTTP and FTP protocols allow you to request
specific files from remote computers, but not to actually be logged on as a user of that
computer. With Telnet, you log on as a regular user with whatever privileges you may
have been granted to the specific application and data on that computer.
29 State the usage of conditional get in HTTP. (May 17)

The GET method means retrieves whatever information (in the form of an entity) is
identified by the Request-URI. If the Request-URI refers to a data-producing process, it
is the produced data which shall be returned as the entity in the response and not the
source text of the process, unless that text happens to be the output of the process. The
semantics of the GET method change to a "conditional GET" if the request message
includes an If-Modified-Since, If-Unmodified-Since, If-Match, If-None-Match, or If-
Range header field. A conditional GET method requests that the entity be transferred
only under the circumstances described by the conditional header field(s). The
conditional GET method is intended to reduce unnecessary network usage by allowing
cached entities to be refreshed without requiring multiple requests or transferring data
already held by the client.
30 Present the information contained in a DNS resource record. (May 17)
Different types of resource records can be used to provide DNS-based data about
computers on a TCP/IP network. This section describes the following resource records
SOA, NS, A, PTR, CNAME, MX, SRV
St.Joseph’s College of Engineering Page 23 of 24
CS8591-Computer Networks Department of CSE 2020-2021
31 What is Http? (Nov 19)
 HTTP means Hyper Text Transfer Protocol. HTTP is the underlying protocol used by the
World Wide Web and this protocol defines how messages are formatted and transmitted,
and what actions Web servers and browsers should take in response to various commands.
 For example, when we enter a URL in our browser, this actually sends an HTTP command
to the Web server directing it to fetch and transmit the requested Web page. The other main
standard that controls how the World Wide Web works is HTML, which covers how Web
pages are formatted and displayed.

32 Present an outline of SSH . (Nov 19)


 Secure Shell (SSH) is a cryptographic network protocol for operating network services
securely over an unsecured network.
 Typical applications include remote command-line, login, and remote command
execution, but any network service can be secured with SSH. SSH provides a secure
channel over an unsecured network by using a client–server architecture, connecting an
SSH client application with an SSH server.
UNIT-V / PART-B
1 Discuss how the Simple Mail Transfer Protocol (SMTP) is useful in electronic mail.
(May 12,15)(Nov 13,15) (Nov 19)
2 Write in detail about PGP.
3 Describe about Secure Shell (SSH).
4 Explain the role of a DNS on a computer network, including its involvement in the
process of a user accessing a web page. (May 13)(Nov 15)(Nov 19)
5 Discuss about MIME, IMAP and POP3. (May 15,17)
6 Explain about HTTP. Give their uses, state strengths and weaknesses. (Nov 10,13)
7 Illustrate the features of TELNET. What is the need for network virtual terminal?
(May 13)
8 Explain about FTP. (Nov 12, 13), May 13)(Nov 19)
9 Explain WWW. (Nov 12)
10 Explain about SNMP and SMTP. (May 15)(Nov 19)
11 Explain in detail about web service architecture(May 16)
12 i)Describe how SMTP protocol is used in E-mail applications(May 16)
ii) Explain HTTP with an example. (Nov 15)
13 Describe how SMTP transfers message from one host to another with suitable
illustration. (May 17)

St.Joseph’s College of Engineering Page 24 of 24

You might also like