CS8591-Computer Networks Department of CSE 2020-2021
CS8591-Computer Networks Department of CSE 2020-2021
CS8591-Computer Networks Department of CSE 2020-2021
30 For n devices in a network, what is the number of cable links required for a mesh,
ring, bus, and star topology?
a. Mesh: n (n – 1) / 2b. Star: nc. Ring: n – 1d. Bus: one backbone and n drop lines
31 What is the significance of the twisting in twisted-pair cable?
Twisting ensures that both wires are equally, but inversely, affected by external
influences such as noise.
PART-B
1 Explain different types of Network in detail with neat diagram
2 With protocol graph, Explain about internet architecture. (May 15,17)
3 Discuss in detail about the layers in OSImodel. (Nov 10,11,12,15)( May12) (Nov 19)
4 Explain the various network topologies in detail.
5 Explain Transmission media and its types in detail.
6 Explain the various performance metrics in detail.
7 Explain Datagram Networks or packet switched networks in detail. (Nov 19)
8 Explain Circuit Switching in detail.(Nov 19)
9 Consider all links in the network use TDM with 24 slots and have a data rate of 1.536
Mbps. Assume that host A takes 500 msec to establish an end to end circuit with host B
before begin to transmit the file. If the file is 512 kilobytes, then how much time will it
take to send the file from host A to host B?
10 Consider the network having bandwidth of 1 MBps and message of size 1000 bytes has
to be sent. Each packet contains a header of 100 bytes if packet switching technique is
used. Out of the following, in how many packets the message must be divided so that
total time taken is minimum-
1. 1 packet
2. 5 packets
3. 10 packets
4. 20 packet
UNIT II DATA-LINK LAYER & MEDIA ACCESS
Introduction – Link-Layer Addressing – DLC Services – Data-Link Layer Protocols – HDLC
– PPP - Media Access Control - Wired LANs: Ethernet - Wireless LANs – Introduction –
IEEE 802.11, Bluetooth – Connecting Devices.
PART-A
1 List the advantages of a centralized scheme.
It may afford greater control over access for priorities, overrides, and guaranteed
capacity.
It enables the use of relatively simple access logic at each station.
It avoids problems of distributed coordination among peer entities.
16 List out any four IEEE 802 standard with its name. (May 12)
The IEEE 802 family of standards is maintained by the IEEE 802
LAN/MAN Standards Committee (LMSC).
The most widely used standards are for the Ethernet family, Token
Ring, Wireless LAN, Bridging and Virtual Bridged LANs.
An individual Working Group provides the focus for each area.
17 Define Bridge and Switch. (May 12)
Bridge: used to send the message from one LAN into another LAN.
Switch: used to send the data from one node into another node directly in the network.
11 Explain Distance Vector Routing Algorithm for the graph given below.
FTP HTTP
FTP transfers the file from client to server HTTP transfer the file from server to
and server to client. client.(i.e. web pages)
It uses two different port connections. (i.e. HTTP use only one port connection. (i.e.
port 20 and port 21) Port 80)
FTP uses two parallel TCP connections to It also uses TCP protocol.
transfer a file. They are Control Connection
and Data connection.
10 What is the use of MIME Extension?
Multipurpose Internet Mail Extensions (MIME) is a supplementary protocol that
allows non-ASCII data to be sent through SMTP. MIME transforms non-ASCII data at
the sender site to NVT ASCII data and deliverers it to the client SMTP to be sent
through the Internet. MIME converts binary files, executed files into text files. Then
only it can be transmitted using SMTP
11 Which protocol support email and give details about that protocol? What are the
basic functions of e-mail?
SMTP is a standard protocol for transferring mails using TCP/IP
SMTP standardization for message character is 7 bit ASCII
SMTP adds log info to the start (i.e.) path of the message.
Basic functions of e-mail: composition, Transfer, Reporting, Displaying, and
Disposition.
12 What is POP3?
POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for
receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held
for you by your Internet server. POP and IMAP deal with the receiving of e-mail and
are not to be confused with the Simple Mail Transfer Protocol (SMTP), a protocol for
transferring e-mail across the Internet.
13 What is IMAP?
Internet Message Access Protocol (IMAP) is a standard protocol for accessing e-mail
from your local server. IMAP is a client/server protocol in which e-mail is received
and held for you by your Internet server. MAP can be thought of as a remote file
server. POP3 can be thought of as a "store-and-forward" service.
14 What is use of digital signature?
Digital signature is a method to authenticate the sender of a message. It is similar to
that of signing transactions documents when you do business with a bank. In network
transactions, one can create an equivalent of an electronic or digital signature by the
way you send data. Data appended to, or a data unit that allows a recipient of the data
unit to prove the source and integrity if the data unit and protect against forgery.
15 What is a URL, web browser and rlogin?(May 2016)
Uniform Resource Locator is a string identifier that identifies a page on the World
Wide Web.
Web browser is a software program that interprets and displays the contents of
HTML web pages.
Remote login or rlogin is used to login into remote system and access its contents.
16 Explain Cyber Squatting.
The practice of registering a domain only to turn around and sell it off to an interested
party at a much higher price even has a name. It is called cyber squatting.
Cryptography, a word with Greek origins, means "secret writing." However, we use the
term to refer to the science and art of transforming messages to make them secure and
immune to attacks.
Original message before being transformed is called plaintext. After the message is
transformed, is called cipher text.
An encryption algorithm transforms the plaintext to cipher text; a decryption algorithm
transforms the cipher text back to plaintext. The term cipher is used to refer to
encryption and decryption algorithms.
The GET method means retrieves whatever information (in the form of an entity) is
identified by the Request-URI. If the Request-URI refers to a data-producing process, it
is the produced data which shall be returned as the entity in the response and not the
source text of the process, unless that text happens to be the output of the process. The
semantics of the GET method change to a "conditional GET" if the request message
includes an If-Modified-Since, If-Unmodified-Since, If-Match, If-None-Match, or If-
Range header field. A conditional GET method requests that the entity be transferred
only under the circumstances described by the conditional header field(s). The
conditional GET method is intended to reduce unnecessary network usage by allowing
cached entities to be refreshed without requiring multiple requests or transferring data
already held by the client.
30 Present the information contained in a DNS resource record. (May 17)
Different types of resource records can be used to provide DNS-based data about
computers on a TCP/IP network. This section describes the following resource records
SOA, NS, A, PTR, CNAME, MX, SRV
St.Joseph’s College of Engineering Page 23 of 24
CS8591-Computer Networks Department of CSE 2020-2021
31 What is Http? (Nov 19)
HTTP means Hyper Text Transfer Protocol. HTTP is the underlying protocol used by the
World Wide Web and this protocol defines how messages are formatted and transmitted,
and what actions Web servers and browsers should take in response to various commands.
For example, when we enter a URL in our browser, this actually sends an HTTP command
to the Web server directing it to fetch and transmit the requested Web page. The other main
standard that controls how the World Wide Web works is HTML, which covers how Web
pages are formatted and displayed.