Вы находитесь на странице: 1из 24

KUVEMPU UNIVERSITY 6Semester Sample Paper

ADVANCED COMPUTER NETWORK 1.a) Discuss architecture of WWW. Ans: WWW stands for World Wide Web. It is an architectural framework for accessing linked documents. Following points describe about the architecture of WWW:i)Form user point of view, www is the collection of web pages or simply pages. Each page contain links to other pages which may be present elsewhere on machines in the internet. ii) The idea of one page pointing to another one is called hypertext. iii) Pages are viewed with a program called browser, which fetches the requested pages, formats and display them. iv) On a web page, string of texts which is underlined are link to other pages. These are called hyperlinks. v) Pages fetching is done by the browser. Entire process of obtaining the web pages on the client machine divided into major processes:a) The dynamics happening on the client machine. b) The dynamics happening on the server machine. b) Explain client side and server side operations. Ans: Client Side Operation:- In Client Side operation, browse follows the hyperlinks on the web pages, so its need a way to name the pages on other machine in the web. Web pages are named using URL which has three part Name of protocol, DNS name of the machine where the page is located, and Name of the file containing the page. When a hyperlink is clicked:-* The browser locates the URL and asks DNS for IP address.

* When DNS replies with IP address browser makes TCP connection to port 80 on the machine and sends a request for the required file. * The server sends the required file and TCP connection has closed. * Browser displays all text file info, images and other information. Server Side Operation:- In server side operation, when URL is clicked the server offers following operations:* Accept a TCP connection from a client. * Get the name of the file requested disk. * Get the file from the disk. * Return the file to the client. * Release the TCP connection. 2. a) Explain different forms of routing. Ans: Different forms of Routing:- i) Next-hop routing:- The technique to make the content of routing table smaller is called next-hop routing. In this, the routing table holds only the address of the next hop instead of holding information about the complete route. ii) Network-specific routing:- It makes the routing table smaller and searching process simpler. In this, routing tables contain only one entry for define the address of all host connected with same physical network instead of an entry for each host. iii) Host-specific routing:- This is the inverse of network-specific routing. In this, the host address is given in the routing table and it also contains specific entry for each host. But it is good for certain purpose such as the route or providing security measure. iv) Default routing:- Default routing is a routing technique that used a default network address to route the packets to host connected to the network. 3. a) Explain the BGP protocol in detail. National ISP (IBGP) AS3 Ans: The Border Gateway Protocol is a inter autonomous system (AS) routing protocol. BGP is used to exchange routing information for the internet and is the protocol used between ISP. Customers connect to ISPs, and ISPs use BGP to exchange customer and ISP route. When BGP

is used between AS, the protocol is referred as External BGP (EBGP). If ISP is using BGP to exchange routes within an AS, the protocol is called Interior BGP. Regional ISP AS2 Customer3 Customer4 Regional ISP AS1 customer1 Customer2

BGP is very robust and scalable routing protocol. To achieve scalability BGP uses some attributes. a) Weight:- Weight is a Cisco defined attribute that is local to a router. This is not advertised to neighboring routers. If the router learns about more than one route to the same destination, the route with the highest weight will be preferred. b) Local preference: - This attribute is used to prefer an exit point the local AS. The local preference attribute is propagated throughout the local AS. If there are multiple exit points from the AS, the local preference attribute is used to select the exit point for a specific route. c) Multi-exit discriminator:- The multi-exit discriminator (MED) is used as a suggestion to an external AS regarding the preferred route into the AS that is advertising the metric. d) Origin:- This indicates how BGP learned about a particular route. The origin attribute can have three possible values. i) IGP: The route is interior to the originating AS.

ii) EGP: The route is learned via the Exterior BGP. iii) Incomplete: The origin of the route is unknown or learned in other way. e) AS _Path:f) Next hop:- The EBGP next-hop attribute is the IP address that is used to reach the advertising router. g) Community:- This attribute provides a way of grouping destinations called communities, to which routing decisions can be applied. b) Discuss on IP RIP packet format. Ans: An IP RIP Packet format consists of nine fields:Field Command Version number 1 Zero field AFI field 2 2 Zero field 2 IP address field 4 Zero field 4 Zero field 4 Metric field 4

Name field Size in 1 octel

i) Command: - This field indicates whether the packet is a request or a response. The request asks that a router send all or part of its routing table. The response can be an unsolicited regular routing update or a reply to a request. ii) Version number:- It specifies the RIP version which is in use. This field can signal different potentially incompatible versions. iii) Zero: - This field was added to provide backward compatibility with pre-standard varieties of RIP. It is not used by RFC 1058 RIP. iv) AFI: - It stands for Address-family Identifier. RIP is designed to carry routing information for several different protocols. Each entry has an AFI to indicate the type of address being specified. The AFI for IP is 2. v) IP Address: - It specifies the IP address for the entry. vi) Metric: - It indicates how many internetwork hops have been traversed in the trip to the destination. This value is between 1 and 15 for a valid route, or 16 for an unreachable route. 5. a) Explain internet security model? Ans: When two parties exchanging their information through internet. They need security

so that no one could access their information or messages. To accomplish it, a security model will designed to protect the information transmission form an opponent who may present a threat to confidentiality. This technique has two components:-- i) A security-related transformation on the information to be sent. ii) Some secret information shared by the two principals and it is hoped, unknown to the opponent. A third party is needed to achieve secure transmission Or a third party is needed to arbitrate dispute the two principals concerning the authenticity of a message transmission. Designing of Internet Security Model include following:-- i) Design an algorithm for performing the security-related transformation. ii) Generate secrete information to be used with the algorithm. iii) Develop methods for the distribution and sharing of the secret information. iv) Specify a protocol to be used by the two principals that makes use of the security algorithm and the secret information to achieve a particular security service.

b) What is STEGANOGRAPHY? Explain. Ans: Steganography:-This is technique that hides the message in other messages. The sender writes an innocuous message and then conceals on the same piece of paper. Some methods of stenography are: Character marking:- Selected letters of printed written text are over written in pencil. These marks are ordinarily not visible unless the paper is held at an angle to bright light. Invisible inks:- A number of substances can be used for writing but leave no visible trace until heat or some chemical is applied to the paper. Pin punctures:-Small pin punctures on selected letters are ordinarily not visible unless the paper is held up in front of a light. Typewriter correction ribbon:- It is used between lines typed with a black ribbon, the results of typing with the correction tape are visible only under a strong light.

The advantage of steganography is that the parties can employ the stenographer to reveal the secrecy of the message. It main disadvantage is that it requires a lot of overhead to hide few bits of information and once the system is discovered, it becomes useless without maintaining the secrecy. 6. What is multimedia? What is streaming server? Explain audio streaming process. Ans: Multimedia:- The combination of sound, graphics, animation, and video is called multimedia. It is a subset of hypermedia, which combines the aforementioned elements with hyper text. Streaming Server: A server technology designed by Apple Computer to send streaming QuickTime media files over the internet. It is built on RTP and RTSP standard internet protocols and it can set up a QuickTime streaming media Web broadcasting station capable of streaming digital videos and music files to the users over the network. Process of Audio Streaming: In audio streaming, clients request compressed audio files that reside on servers. Upon client request, the server directs an audio file to the client by sending file into socket. Before sending the files to the network, the file is segmented and encapsulated (by RTP) with special headers appropriate for audio traffic. 7. Explain classical encryption techniques. Ans: Classical Encryption Technique: i) Substitution Cipher:- A substitution cipher is one in which each character in the plaintext is substituted for another character in the cipher text. The receiver decrypts the cipher text to recover the plaintext. ii) Monoalphabetic Cipher:- This is one in which each character of the plaintext is replaced with a corresponding character of cipher text. The cryptogram in the news papers is monoalphabatic cipher. iii) Playfair Cipher: Playfair is multiple letter encryption cipher, which treats diagrams in the plaintext as single units and translates these units into cipher text diagram. The playfair algorithm is based on the use of a 5x5 matrix of letters constructed using keyword. The matrix is constructed by filling the letter of the keyword from left to right and from top to bottom, and then filling in the reminder of the matrix with the remaining letters in alphabetic order. iv) Hill Cipher: - This is a multi letter cipher algorithm. This encryption algorithm takes m successive plaintext letters and substitutes for them m cipher text letters. The substitution is determined by m linear equation in which each character is assigned a numerical values (a=0, b=1z=25). v) Transposition Cipher:- In a transposition cipher, the plaintext remains the same, but the order of character is shuffled around. In columnar transposition, the plaintext is written horizontally onto a piece of graph paper of fixed width and the cipher text vertically. A pure transposition cipher is easily recognized because it has the same letter frequencies as the original plaintext. In

decryption, cipher text written vertically onto a piece of graph of identical width and then reading the plaintext off horizontally. 1. a) Write a brief note on SMTP. Ans: SMTP stands for Simple Mail Transfer Protocol. I is a simple ACII protocol. To deliver a mail, the source machine establishes a TCP connection to port 25, of the destination computer. The sending machine, operating as a client waits for the receiving machine, operating as a server to talk first. The server starts by sending a line of text giving its identity and telling whether it is ready for receive a mail or not. If it is not, the client releases the connection and tries again later. If the sever is ready to accept email then the client announces from where the email is coming and where it is going. If such a recipient exists at the destination then server gives instructions to client to send email. No checksums are needed because TCP provide a reliable byte stream. When all the e-mail has exchanged in the both directions, the connection is released. To get a better feel for SMTP first go to a machine connected to the internet. On a Unix system, type telnet mail.isp.com 25. In windows system, click on start then run and type the command in the dialog box. 2. a) Discuss the following techniques of Routing: i) Next hop Routing: The technique to make the content of routing table smaller is called nexthop routing. In this, the routing table holds only the address of the next hop instead of holding information about the complete route. Thats why routing table becomes consistent with each other. ii) Network Specific Routing: It makes the routing table smaller and searching process simpler. In this, routing tables contain only one entry for define the address of all host connected with same physical network instead of an entry for each host. Ex- If 1000 hosts are attached to the same network, only one entry exists in the routing table instead of 1000. iii) Host Specific Routing: This is the inverse of network-specific routing. In this, the host address is given in the routing table and it also contains specific entry for each host. But it is good for certain purpose such as the route or providing security measure. Ex- If 1000 hosts are attached to the same network, 1000 entry exists in the routing table instead of 1. iv) Default Routing: Default routing is a routing technique that used a default network address to route the packets to host connected to the network. 3. a) With all nine fields explain OSPF packet format. Ans: OSPF packet format contain nine fields:Field Name Version number Type Packet Router Area Check AuthenID AuthenData

length

ID

-sum

tication Type 2

tication

Length in 1 bytes

Variable

An OSPF packet begins with a 24-byte header. i) Version number:- It Identifies the OSPF version used. ii) Type:- This identifies the OSPF packet type. Packet types can be:a) Hello:- It establishes and maintains neighbor relationships. b) Database description:- It describes the contents of the topological database. c) Link-state update:- It responds to a link-state request packet. These messages are also used for the regular dispersal of LSAs. d) Link-state request:- It requests pieces of the topological database from neighbor routers. e) Link-state knowledgment iii) Packet length:- It specifies the length of packet, including the OSPF header. iv) Router ID:- This indentifies the source of the packet. v) Area ID:- It indentifies the area to which the packet belongs. All OSPF packets are associated with a single area. vi) Checksum:- It check the entire packet content for any damage suffered in transit. vii) Authentication type:- All OSPF protocol exchanges are authenticated. The authentication type is configurable on per-area basis. viii) Authentication:- It contains authentication information. ix) Data:- This contains encapsulated upper-layer information.0 5. a) Explain Infrared vis Radio transmission. Ans: Infrared Transmission: Infrared technologies uses diffuse reflect light or directed light exists between sender and receivers to set up ad hoc connections. Sender can be LED or laser diodes while photodiodes act as a receiver.

Advantages: i) infrared technology is simple and extremely cheap senders and receivers, which are integrated in almost all mobile devices and receivers. ii) There is no license are required for infrared technology.. iii) IrDA implements data rates of up to 115 kbps while IrDA version 1.1 implements data rates of 1.152 and 4Mbps. Disadvantages: It has low band width. Infrared is quite easily shielded. They cannot penetrate walls or other obstacles for good transmission. Radio Transmission: It works in the range of 2.4GHz. It is also used to set up ad hoc connection for work group. A dvantages: i) Radio transmission includes long term experience with radio transmission for WAN and mobile devices. ii) It covers large area and can penetrate walls, plants etc. iii) It offers transmission rate up to 10mbps. Disadvantages: In radio transmission shielding is not simple so it can interfere with other senders or electrical devices can destroy data transmission via radio. It requires licenses. 1. a) Explain Open Shortest Path First (OSPF) routing protocol. Ans: OSPF is a routing protocol developed for Internet Protocol (IP) networks by the Interior Gateway Protocol (IGP). OSPF is a link-sate routing protocol that calls for the sending of linkstate advertisements to all other routers within same hierarchical area. Information on attached interfaces, metrics used, and other variables are included in OSPFLSAs. OSPF has two primary characteristic: i) This is an open protocol, which means that its specification is in the public domain. ii) OSPF is based on the SPF algorithm which sometimes is referred to as the Dijkstra algorithm. b) Discuss the features of real time protocol. Ans: . The features of Real Time Protocol (RTP) are: i)RTP provides end-to-end delivery services for data with real-time characteristics such as interactive audio and video. However, it does not provide any mechanism to timely delivery. It needs support from the lower layers of OSI model that actually have control over resources in switches and routers.

ii) RTP provides timestamps, sequence numbers as hooks for adding reliability, flow, and congestion control for packet delivery, but implementation is totally left to the application. iii) RTP is a protocol framework that is deliberately not complete. It is open to new payload formats and new multimedia software. By adding new profile and payload format specifications, one can tailor RTP to new data formats and new applications. iv) The flow and congestion control information of RTP is provided by Real-Time Control Protocol (RTCP) sender and receiver reports. v) RTP provides functionality and control mechanisms for carrying real-time content. 4. a) Explain different types of attacks. Ans: There are two types of attack: i) Passive Attack:- In this attack the goal of opponent is to obtain information that is being transmitted. It exists in two ways. One is release of message content that is easily understood. E-mail, sms and a transferred file may contain sensitive or confidential information. It is necessary to prevent the opponent from learning the content of the transmission. Another one is traffic analysis is more subtle and often is more applicable to military situation. It is used to guessing the nature of the communication taking place. ii) Active Attack:- It divided into four categories. a) Masquerade: This takes place when on entity pretends to be a different than other entity. b) Replay: This involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect. c) Modification of messages: It means that some portion of the message is altered or that messages are delayed or reordered to produce an unauthorized effect. d) Denial of service: It prevents or inhibits the normal use or management of communication facilities. 5. a) What is cryptography ? Explain one cryptographic algorithm. Or Write a short note on transposition cipher. Ans: Cryptography:- Cryptography is the science of using mathematics to encrypt and decrypt data. It enables us to store sensitive information or transmit it across insecure network so that it cannot be read by anyone except the intended recipient. Cryptography is the science of securing data. Transposition Cipher:- In a transposition cipher, the plaintext remains the same, but the order of character is shuffled around. In columnar transposition, the plaintext is written horizontally onto a piece of graph paper of fixed width and the cipher text vertically. A pure

transposition cipher is easily recognized because it has the same letter frequencies as the original plaintext. In decryption, cipher text written vertically onto a piece of graph of identical width and then reading the plaintext off horizontally. Ex: Plaintext Computer Graphics COMPUT ERGRAP HICS Cipher text CEHORIMGCPRSUATP. A pure transposition cipher is easily recognized because it has the same letter frequencies as the original plaintext. 7. Compare IEEE 802.11a, 802.11b, 802.11g WLAN architectures and blue tooth. Ans: Features Data Rate Frequency Modulation Channels Bandwidth Power 802.11a 54-72mbps 5Ghz OFDM 12/8 300 40-800mW 802.11b 11mbps 2.4Ghz DSSS/CCK 11/3 83.5 100mW 802.11g 54mbps 2.4Ghz DSSS/PBCC 11/3 83.5 (22Mhz per channel) 100mW Bluetooth 721-56kbps 2.4Ghz FHSS 79(1Mhz wide) 83.5 100mW

1.a) With the help of a neat diagram explain the architecture of WWW. Ans: b) Discuss the working of POP3 in an E-mail System. What are its limitations? Ans: POP3 stands for Post Office Protocol version 3. It begins when a user starts the mail reader. The mail reader calls up the ISP and establishes a TCP connection with the message transfer agent at port 110.Once the connection has been established, the POP3 protocol goes through three stages in sequence: Authorization:- This state deals with the user log in Transactions:- This state deals with the user collecting e-mail messages and marking them for deletion from the mailbox. Update:- The update state causes the e-mail messages to be deleted. During the authorization state, at times, when the server is set for three passwords trials, if you give the wrong password thrice, your mail box will get locked. Limitations: i) There is no folder structure for sorting e-mail messages that are saved on the POP3 server.

ii) The server has only one folder for incoming mails, which is the inbox. iii) No rules can be set at the POP3 server. All rules are set at the client end only. iv) To check e-mail, users have to download them first, they cannot see mails first before downloading the required mails. 2. a) What is Routing? Discuss direct and indirect Routing. 8 Ans: Routing: - Routing is a process of sending data packets or IP packets from the source to the destination with the help of protocols (IP, and TCP), and routers using connection-oriented or a connectionless network services. Direct Routing: - It occurs when the source and destination of the packet are on same physical network. In direct routing the final destination of the packet is a host connected to the same physical network. In direct routing, the sender extracts the network address of the destination packet and compares this address with the addresses of the network to which it is connected. If match is found, then packet is delivered directly. The sender uses the destination IP address to find the destination physical address. ARP maps the address of final destination to its corresponding physical address. Indirect Routing: - In an indirect delivery, the data packet goes from router to router until it reaches to its final destination connected to the same physical network. In an indirect routing, the sender uses the destination IP address and a routing table to find the IP address of the next router to which the packet should be delivered. ARP protocol is also used to find the physical address of next router. ARP maps the address of the next router and the physical address of the next router. 4. a) Briefly explain the WLAN architecture. Ans: WLAN architecture consists of three components: i) Wireless end stations: The wireless end station can be any device that can communicate using the 802.11 standard. These devices include laptops, workstations, and PDAs, as well as printers and scanners. ii) Access points: The access point (AP) is a device. It acts as a network platform for connections between WLANs or to a wired LAN and as a relay between stations attached to the same AP iii) Basic service sets (BSS): BSS is the logical component of wireless architecture. In general, it is a set of wireless stations controlled by a single management function and has two configuration options that is, Infrastructure BSS (IBSS) and Extended Service Set (ESS).

In an IBSS, the stations communicate directly to one another without the need for an access point. An ESS is a set of infrastructure BSSs that appear as a single BSS. This is important for connection redundancy but has some security issues that need to be addressed.

5. a) Discuss MAC layer of WLAN. Ans: MAC Layer stands for Medium Access Control Layer. It completes several tasks. It has to control medium access. It supports for roaming, authentication, and power conservation. The basic services provided by MAC are data service and optional time-bounded service. Both services can be offered by using an infrastructure-based network with the access point coordinating medium access. The mandatory basic method based on a version of CSMA/CA, an optional method avoiding the hidden terminal problem, and finally a contention-free polling method for timebounded service. The first two methods are summarized as distributed coordination function (DCF), the third method is called point coordination function (PCF). DCF offers only asynchronous service while PCF offers both asynchronous and time-bounded service but needs an access point to control medium access and avoid contention. The MAC mechanism are also called (Distribution foundation wireless) DFWMAC. Three parameters which defines the priorities of MAC are i) DCF inter-frame spacing (DIFS) ii) PCF inter-frame spacing (PIFS). iii) Short inter-frame spacing (SIFS). 7. a) Explain why audio and video need to be compressed. Ans: Audio and video need to be compressed because uncompressed audio and video consume a tremendous amount of storage and bandwidth. Compression also removes the inherent redundancies from digitized audio and video which reduce the amount of data that needs to be stored and transmitted by order of magnitude. An audio is compressed in following way: i) The analog signal is first sampled at some fixed rate. ii) Each of the samples is then rounded to one of a finite number of values. iii) Each of the quantization values is represented by a fixed number of bits. Video is compressed to remove spatial redundancy means to much white spaces in an image and temporal redundancy means repetition from image to subsequent image. b) What is iterative resolution? Ans: This is a resolution technique in which, a server sends back the information to the client or sends the name of the server that has the information. The client then iterates by sending a

request to this referred server. This server may return the information itself or send the name of another server. This process continues till the time the client received the required informations. 2. a) Explain the client and server side events when user click on a URL. Ans: Client Side Operation:- In Client Side operation, browse follows the hyperlinks on the web pages, so its need a way to name the pages on other machine in the web. Web pages are named using URL which has three part Name of protocol, DNS name of the machine where the page is located, and Name of the file containing the page. When a hyperlink is clicked:-* The browser locates the URL and asks DNS for IP address. * When DNS replies with IP address browser makes TCP connection to port 80 on the machine and sends a request for the required file. * The server sends the required file and TCP connection has closed. * Browser displays all text file info, images and other information. Server Side Operation:- In server side operation, when URL is clicked the server offers following operations:* Accept a TCP connection from a client. * Get the name of the file requested disk. * Get the file from the disk. * Return the file to the client. * Release the TCP connection 3. a) Explain any one routing algorithm with the help of an example. Ans: SPF (Shortest Path First) is a routing algorithm. When SPF router powered up, it initializes its routing protocol data structure and then waits for indications from lower-layer protocols that its interfaces are functional. To acquire neighbors, it uses OSPF Hello protocol. The router sends hello packets to its neighbors and receives their hello packets. On multi-access networks, the hello protocol elects a designed router and a backup designated router which allow a reduction in network traffic and in the size of the topological database and generates LSA for the entire network. These LSA is send by each router to inform others when a routers state changes and provide information about router adjacencies. By comparing established adjacencies to link states, failed routers can be detected and the network topology can

be altered appropriately. From the topological database generated from LSAs, each router calculates a shortest path tree which turn into a routing table. 4. Discuss the various features of WLAN and its protocol architecture. 15 Ans: Feature: i) WLANs are more flexible. With in radio coverage, nodes can communicate without further restriction. It is easy to carry. ii) Wireless network allow communication without previous planning. iii) Wireless networks can survive in disasters. iv) Wireless networks can be used everywhere we want. Protocol architecture of WLAN: In a typical WLAN setup, the IEEE 802.11 standard WLAN (Access Point) gets connected to an IEEE 802.3 standard Ethernet (Switch/HUB) via a bridge. The higher layers (application, TCP, IP) look the same for the wireless node as for the wired node. The IEEE 802.11 standard only covers the physical layer (PHY) and medium access layer (MAC) like the other 802.x LANs do. The physical layer is sub divided into the Physical Layer Convergence Protocol (PLCP) and the Physical Medium Dependent Sub Layer. The basic tasks of the MAC layer comprise medium access, fragmentation of user data, and encryption. The PLCP sublayer provides a carrier sense signal called Clear Channel Assessment (CCA), and provides a common PHY interface for the MAC, which is independent of the transmission technology. b) Explain accessing of audio and video through a web server. Ans: Audio accessing: To access audio from a web server, first user hears the audio file, and then establishes a TCP connection with the web server and sends the HTTP request for the object. After receiving the request the web server encapsulates the audio file in an HTTP response message and sends that message back to the user through TCP connection. Video accessing: Since video file stored in two different file audio and video. So, to access the video the user sends two separate requests to the server over two separate TCP connections. When the requests are reached to the server, then server also send back two separate HTTP responses one for audio and another for video which arrived at the client in parallel. 4. a) Explain Real-time streaming protocol. Ans: RTSP is a protocol that enables a media player to control the transmission of a media stream. RTSP messages use the port number 544 from the media stream. The RTSP specification, RFC 2326, permits RTSP messages to be sent over TCP or UDP. RTSP server keeps a track of the state of the client for each ongoing RTSP session. For example, the server keeps track of whether the client is in an initialization state, a play state, or a pause state. The session and sequence numbers, which are part of each RTSP request and response,

help the server to keep track of the session state. The session number is fixed throughout the entire session; the client increments the sequence number each time it sends a new message; the server echoes back the session number, and the current sequence number. b) Explain transmission of multimedia data from a streaming server to a helper application. Ans: Getting data from streaming server to helper application like the media player requires at least two servers where data is placed. One server is the HTTP server, and the second server is the streaming server. For example, when a user visits any songs/news web site, the web browser communicates with the web server where the user chooses the file that has music or news. The moment the user clicks any media file; media player requests for the media file to the streaming server and user receives the media file on the media player. b) Explain the architecture of an infrastructure-based IEEE 802.11. Ans: Infrastructure-based IEEE 802.11 architecture: In this, several nodes, called station (STA) are connected to access point (AP). Stations are terminals with access mechanism to the wireless medium and radio connect to the AP. The stations an AP which are within the same radio coverage form a basic service set (BSS). A distribution system connects several BSSs via the AP to form a single network and there by extends the wireless coverage area. This network is called an extended service set (ESS). Next, the distribution system connects the wireless networks via the APs with a portal, which forms the internetworking unit to other LANs. Instead of distribution system, distribution system services are defined in the standard. The APs provide synchronization with in a BSS, support power management, and can control medium access to support time bounded service. 6. a) Explain the CSMA/CA mechanism. Ans: CSMA/CA is a network contention protocol that listens to a network in order to avoid collisions, unlike CSMA/CD that deals with network transmissions once collisions have been detected. The basic mechanism is shown in following figure: If the mechanism is sensed idle for at least the duration of DIFS, a node can access the medium at once. This allows for short access delay under light load.

If the medium is busy, nodes have to wait for the duration of DIFS, entering a contention phase afterwards. Each node now chooses a random back off time with a contention window and additionally delays medium access for this random amount of time. The additionally waiting time is measured in multiples of slots. Slots time is derived from the medium propagation delay, transmitter delay and other PHY dependent parameters. 7. a) Briefly explain substitution ciphers. Ans: Substitution Cipher:- A substitution cipher is one in which each character in the plaintext is substituted for another character in the cipher text. The receiver decrypts the cipher text to recover the plaintext. There are four types of substitution: i) Monoalphabetic cipher:- In this each character of the plain text is replaced with a corresponding character of cipher text. ii) Homophonic cipher:- This is like a simple substitution cryptosystem, except a single character of plain text can map to one of several characters of cipher text. iii) Polygram cipher:- In this blocks of characters are encrypted in groups. iv) Polyalphabetic cipher:- It is made up of multiple simple substitution ciphers. The particular one used changes with the position of each character of plaintext. 7. What is video? List and explain the drawback of the current internet to drive the multimedia data. Ans: 8. Write short notes on:a) RTSP: RTSP stands for Real Time Streaming Protocol. It is defined in RFC2326. It provides facilities to the user such as- RTSP is a protocol that allows a media player to control the transmission of a media stream. Controlling of playback means pushing, forwarding, rewinding, repositioning and so on. It is an out-of-band protocol. In particular the RTSP messages are sent out-of-band, whereas the media stream, whose packet structure is not defined is considered in band. a) Time out timer Ans: Time out timer is used to help purge invalid routes from a RIP node. Routes that are not refreshed for a given period of time are likely to be invalid because of some change in the network. Thus, RIP maintains a timeout timer for each known route. When a route's timeout

timer expires, the route is marked invalid but is retained in the table until the route-flush timer expires. c) Best effort service. Ans: a) BGP path selection Ans: BGP selects only one path as the best path. When a path is selected it puts the selected path in the IP routing table and propagates the path to its neighbors. BGP uses following criteria to select a path:i)If the path specifies a next hop that is in accessible, drop the update. ii) Prefer the path with the largest weight. iii) If the weights are the same, prefer the path with the largest local preference. iv) If the local preferences are the same, prefer the path that was originated by BGP. v) If no route is originated, prefer the route that has the shortest AS_path. vi) If all paths have same AS_path length, prefer the path with the lowest origin type. vii) If the origin codes are same, prefer the path with lowest MED attribute. viii)If the paths have the same MED, prefer the external path over the internal path. ix) If the paths are also same, prefer the path through the closest IGP neighbor. x) Prefer the path with the lowest IP address as specified by the BGP router ID. b) Multimedia on internet Ans: Today, multimedia over the internet has achieved significant but limited success. For example, streaming stored audio/video with user interactivity delays of five to ten seconds is now commonplace in the internet. But during peak traffic periods, performance may be unsatisfactory, particularly when intervening links are congested. Internet phone and real time interactive video has, to date, been less successful than streaming stored audio/video. The design of multimedia application would certainly be more straightforward if there were some sort of first-class and second-class internet services, whereby first class packets were limited in number and received priority service in router queues. Now we have best effort service

by which we can make several design decisions and employ a few tricks to improve the userperceived quality of a multimedia networking application. c) Cryptography and Cryptanalysis. Ans: Cryptography:- Cryptography is the science of using mathematics to encrypt and decrypt data. It enables us to store sensitive information or transmit it across insecure network so that it cannot be read by anyone except the intended recipient. Cryptography is the science of securing data. Cryptanalysis: It is the science of analyzing and breaking secure communication. Cryptanalysts are also called attackers. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience and determination. b) Can BGP (Boarder Gateway Protocol) be used only by internet services providers? Explain. b) Explain the Routing Information Protocol (RIP) in detail. Ans:

ADVANCED COMPUTER NETWORK 1. What is POP? Explain the working of POP. Or Explain Post Office Protocol (POP). Ans: POP3 stands for Post Office Protocol version 3. It begins when a user starts the mail reader. The mail reader calls up the ISP and establishes a TCP connection with the message transfer agent at port 110.Once the connection has been established, the POP3 protocol goes through three stages in sequence: Authorization:- This state deals with the user log in Transactions:- This state deals with the user collecting e-mail messages and marking them for deletion from the mailbox. Update:- The update state causes the e-mail messages to be deleted. During the authorization state, at times, when the server is set for three passwords trials, if you give the wrong password thrice, your mail box will get locked.

2. Explain why audio and video to be compressed? Ans: Uncompressed audio and video consume a tremendous amount of storage and bandwidth. So these need to be compressed. Compression also removes the inherent redundancies from digitized audio and video which reduce the amount of data that needs to be stored and transmitted by order of magnitude. 3. What is DNS? Explain working of DNS. Ans: DNS stand for Domain Name System. It translates the domain name into IP address and also maps the domain name into Common Generic Name. Working of DNS:- Whenever an application program calls a library procedure called Resolver with its domain name as parameter. The Resolver sends an UDP packet to the local DNS server. The DNS server searches its table and returns the IP address which matches the domain name. Now, the program can establish a connection or send UDP packets. 4. Explain conventional encryption model. Ans: 5. Explain IEEE 802.11 standards. Ans: 6. What are the five basic functions that an E-mail system supports? Ans: Function of E-mail system:- i) Composition:- It helps in creating message, and support function such as insertion of address after extraction from the original message during replying. ii) Transfer:- It helps in sending messages to the destination. iii) Reporting:- This function repots the origin of E-mail whether it is delivered, lost or abandoned. iv) Displaying:- It displays the attached files comes with the E-mail using plug-in program. v) Disposition:- This is the final action of an E-mail. This constitutes the last stage. 7. Discuss different approaches used to make the routing table more efficient. Ans: 8. What are the limitations of the best effort service? Explain. Ans: Limitations of the best effort service are:

Packet loss: As an IP datagram crosses through a network over UDP, it passes through buffers in the routers in order to access outbound links. It is possible that one or more of the buffers in the route from sender to receiver is full and cannot admit the datagram. In this case, the IP datagram is discarded, never to arrive at the receiving application. Loss could be eliminated by sending the packets over TCP rather than over UDP. Excessive end-to-end delay: End-to-end delay is the accumulation of transmission, processing, and queuing delays in routers, propagation delays in the links, and end-system processing delays. Packet jitter: A crucial component of end-to-end delay is the random queuing delays in the routers. Because of these varying delays within the network, the time from when a packet is generated at the source until it is received at the receiver can fluctuate from packet to packet. This phenomenon is called jitter. 10. Briefly explain classification of security services. Ans: Security services are classified as follows: i) Confidentiality: It ensures that the information in a computer system and transmitted information are accessible only for reading by authorized party. ii) Authentication: This ensures that the origin of a message or electronic document is correctly identified, with an assurance that the identity is not false. iii) Integrity: It ensures that only authorized parties are able to modify the computer assets and transmitted information. iv) Non-repudiation: This requires that neither the sender nor the receiver of a message be able to deny the transmission. v) Access control: It requires that access to information resources may be controlled by or for the target system. vi) Availability: This requires that the computer system assets be available to authorized user when needed. 11. Explain Domain Name System (DNS). Ans: DNS stand for Domain Name System. It translates the domain name into IP address and also maps the domain name into Common Generic Name. It is a hierarchical scheme which employs domain based naming and uses a distributed database. It primarily maps host names and E-mail servers to IP addresses. DNS found in RFC 1034, 1035. 13. Compare direct and indirect forms of routing

Ans: Direct Routing: - It occurs when the source and destination of the packet are on same physical network. In direct routing the final destination of the packet is a host connected to the same physical network. In direct routing, the sender extracts the network address of the destination packet and compares this address with the addresses of the network to which it is connected. If match is found, then packet is delivered directly. The sender uses the destination IP address to find the destination physical address. ARP maps the address of final destination to its corresponding physical address. Indirect Routing: - In an indirect delivery, the data packet goes from router to router until it reaches to its final destination connected to the same physical network. In an indirect routing, the sender uses the destination IP address and a routing table to find the IP address of the next router to which the packet should be delivered. ARP protocol is also used to find the physical address of next router. ARP maps the address of the next router and the physical address of the next router 16. What is an audio? What is a video? Ans: Audio: An audio is collection of an analog signal that is only audible. Video: A video is sequence of frames, with frames typically being displayed at a constant rate. 17. List the drawbacks of the current internet to drive the multimedia data. Ans: The Internet has some drawbacks with regard to multimedia data. For example, the media player does not communicate with the streaming server directly. This delay, before play-out begins, is typically unacceptable for audio/video clips of moderate length. For this reason, audio/video streaming implementations typically have the server send the audio/video file directly to the media player process. In other words, a direct socket connection is made between the server process and the media player process.

18. Explain the advantages and disadvantages of wireless LAN. Ans: Advantages:- i) WLANs are more flexible. With in radio coverage, nodes can communicate without further restriction. ii) Wireless network allow communication without previous planning. iii) Wireless networks can survive in disasters.

Disadvantages:- i) WLANs offer lower quality due to less bandwidth than wired networks. ii) WLAN adapter are very costly. Ex- PC-Card is available in the range from 100 pounds. iii) WLANs are limited to low power senders and certain license-free frequency bands. iv) Using radio waves for data transmission might interfere with other high-tech equipment. 20. What is the purpose of time out timer? Ans: The purpose of the route timeout timer is to help purge invalid routes from a RIP node. Routes that are not refreshed for a given period of time are likely to be invalid because of some change in the network. Thus, RIP maintains a timeout timer for each known route. When a route's timeout timer expires, the route is marked invalid but is retained in the table until the route-flush timer expires. 21. Discuss in detail the architecture of WWW? Ans:- The architecture of WWW is two tiered. It consists of the client and the server. The client (web browser) requests for a web page. This page is retrieved from the server. The architecture depends on three key standards: HTML for encoding document content, Uniform Resource Locator (URL) for naming remote information objects in a global namespace, and HTTP for staging the transfer. The following figure shows the two-tiered architecture of WWW.

If the web pages are interacting with the database, then the architecture becomes three-tiered, as shown in the following figure.

22. What is cryptography? List the different cryptographic algorithms. Ans: Cryptography:- Cryptography is the science of using mathematics to encrypt and decrypt data. It enables us to store sensitive information or transmit it across insecure network so that it cannot be read by anyone except the intended recipient. Cryptography is the science of securing data. Different cryptographic algorithms are: Substitution cipher, , Monoalphabetic cipher, Playfair cipher, Hill cipher, Transposition cipher. 2. What is mod

Вам также может понравиться