Вы находитесь на странице: 1из 17

DEPARTMENT OF ELECTRONICS & COMM.ENGG. B.I.T.

, MESRA, RANCHI EC6103 Module 1: Local Area Networks: Background, Topologies and Transmission Media, LAN standards IEEE 802 reference Model, Logical Link Control, Medium Access Control, IEEE 802.3 Medium Access Control, Ethernet, Fast Ethernet,Gigabit Ethernet, Token Ring and FDDI, Medium Access Control, IEEE 802.5 Transmission Medium Options. Fibre Channel Elements, Fibre Channel Protocol Architecture, Fibre Channel Physical Media and Topologies. Text Books: 1. Data and Computer Communication, 7/e. by William Stallings. 2. Data Communication and Networking, 3/e. by Behrouz A. Forouzan. Module 2: Connecting devices and Backbone Networks: Bridges, Functions of a Bridge, Bridge Protocol Architecture, Fixed routing, Spanning tree approach, Connecting devices like Repeaters, Hubs, Bridges ,Two-layer switches, Routers and Three layer switches, Backbone Networks, Bus Backbone, Star Backbone, Connecting remote LANs, Wireless LANs, Applications, Architecture, IEEE 802.11, Architecture and Services, Medium Access Control, Physical layer. Text Books: 1. Data and Computer Communication, 7/e.by William Stallings. 2. Data Communication and Networking , 3/e. by Behrouz A. Forouzan. Module 3: Internetworking: Principles of Internetworking, Requirements, Architectural approaches, Connectionless Internetworking, Addressing, Routing techniques, Static versus Dynamic Routing, Internet Protocol (IP), Internet Control Message Protocol (ICMP), IPV6 Structure, Header, Address and Header Formats, ICMPV6. Text Books: 1. Data and Computer Communication, 7/e. by William Stallings. 2. Data Communication and Networking, 3/e. by Behrouz A. Forouzan. Module 4: Internet work Operations: Unicast and Multicast routing, Autonomous Systems, Unicast routing protocol OSPF, Internet Group Management Protocol (IGMP), Border Gateway Protocol, Multicast Trees, Integrated Service COMPUTER COMMUNICATION NETWORKS

Architecture, ISA Approach, Components, Services, Queuing Discipline, Resource Reservation Protocol (RSVP), Differentiated Services (DS). Text Books: 1. Data and Computer Communication, 7/e. by William Stallings. 2. Data Communication and Networking, 3/e. by Behrouz A. Forouzan. Module 5: Transport Protocols: Connection Oriented Transport Protocol Mechanisms, Reliable Sequencing networks services, Unreliable network services, TCP Services, TCP Header Format, TCP Mechanisms, TCP Implementation policy options, TCP Congestion Control, Retransmission Timer Management, Window Management, Quality of Service, User Datagram Protocol (UDP). Text Books: 1. Data and Computer Communication, 7/e. by William Stallings. 2. Data Communication and Networking, 3/e. by Behrouz A. Forouzan. Module 6: Network Security: Passive and Active Attacks, Symmetric Encryption, Encryption Algorithms, Key Distribution, Traffic Padding, Message Authentication, Hash function, Secure Hash function, Public-key Encryption, Digital Signature, RSA Public Key Encryption algorithm, Key Management, Secure Socket layer and Transport layer Security, SSL Architecture, SSL Record Protocol, Change Cipher Spec Protocol, Alert Protocol, Handshake Protocol, IP level security IPSEC, Application layer security PGP, Firewall, Virtual Private Networks. Text Books: 1. Data and Computer Communication, 7/e. by William Stallings. 2. Data Communication and Networking, 3/e. by Behrouz A. Forouzan. Module 7: Distributed Applications: Electronic Mail, Simple Mail Transfer Protocol (SMTP), Multipurpose Internal Mail Extension (MIME), Client Server Model, Socket Interface, Socket Programming, File Transfer, Simple Network Management Protocol (SNMP) SNMP V2 and SNMP V3, Hypertext Transfer Protocol (HTTP) Overview Message Entities, World Wide Web (WWW), HTML, Common Gateway Interface (CGI). Text Books: 1. Data and Computer Communication, 7/e. by William Stallings. 2. Data Communication and Networking, 3/e. by Behrouz A. Forouzan.

TUTORIAL EC6103 Module 1: Local Area Networks: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 1. 2. 3. 4. 5. 6. 7. What do backend networks mean? What are the typical characteristics? What is meant by Storage Area Network (SAN)? What is meant by a backbone LAN? Define LAN, MAN and WAN. Differentiate among Ring, Bus, Star and Tree topologies. Which are the popular transmission media used for Ring LAN? Compare the data rate achieved with each medium. Which are the popular transmission media used for Bus/Tree LAN? Compare the data rate achieved with each medium. Which are the popular transmission media used for Star LAN? Compare the data rate achieved with each medium. Differentiate among Baseband, Broadband and Carrierband transmission techniques in Bus LAN. What are the functions of Logical Link Control (LLC) layer? What are the three LLC services? Where are they used? What does Medium Access Control mean? Why is it needed? Briefly explain the following 3 approaches of MAC techniques giving examples. (a) Round robin (b) Reservation (c) Contention. Briefly explain the function of a Bridge connecting two LANs. What are the main design aspects of a MAC relay bridge? Differentiate between Layer 2 and Layer 3 switches. Why unshielded twisted pair Baseband is popular? What does a Hub mean? Show how twisted pair star wiring is effected using Header and Intermediate Hubs. Differentiate among shared medium bus, shared medium Hub and switching Hub. COMPUTER COMMUNICATION NETWORKS

8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26.

What are the two types of Layer 2 switches available? What are the differences between them? Discuss the characteristics of different high speed LANs. What does signal balancing mean? How the segmentation of medium helps signal balancing? Differentiate among Bi-directional (Baseband, single channel-broadband), Mid-split broadband and Dual cable broadband, transmission techniques. Why Baseband signalling is not used in Tree topologies? Why is most Baseband co-axil systems, a 50-ohm cable is preferred to a standard CATV 75 ohm cable? How segmentation is effected in Baseband configurations? Compare 10BASE5 and 10BASE2 co-axial Bus LANs (Ethernet and Cheaper net). What is Fast Ethernet? How it is different from traditional Ethernet? What is the purpose of auto negotiation? Describe the different sublayers of the physical layer of 100Mbps Ethernet. Compare the specification of 100 BASE-TX, 100 BASE-T4 and 100 BASE-FX. Compare the different fast Ethernet implementations. Compare the different gigabit Ethernet implementations (1000 BASE-Sx, 1000BASE-Lx, 1000BASE-CX, and 1000BASE-t). What is GMII in Gigabit Ethernet? Compare the physical sublayer of Fast and Gigabit Ethernet. What is meant by CSMA? How does CSMA/CD differ from CSMA? Compare CSMA with ALOHA and S-ALOHA. Differentiate among the following: (a) Non-Persistent CSMA (b) I-Persistent CSMA (c) P-Persistent CSMA Explain binary exponential back off. What are the different collision detection techniques? Why the collision detection time is more for a Broadband system than a Baseband system? What is the collision detection scheme employed in twisted pair Star-topology approach?

27. 28. 29. 30.

31. 32. 33. 34. 35. 36. 37. 38.

Differentiate between Token Bus and Token Ring techniques. How does a Token Ring scheme work as a MAC technique? What does Dedicated Token Ring (DTR) mean? How is a FDDI Ring standard different from IEEE802 Ring standard? Explain the features of Fibre channel switching fabric. Explain Fibre channel protocol architecture. What are the topology options for fibre channel? Under heavy loads, how do the behaviour of CSMA/CD and Token Ring differs?

Module 2: Connecting devices and Backbone Networks: 1. 2. 3. Differentiate between Passive Hubs and Active Hubs. What does a transparent bridge mean? An internet configuration, of 7 LANs A, B, C, D, E, F and G, connected via 7 bridges B1, B2, B3, B4, B5, B6 and B7 are shown in Figure 1. For fixed routing strategy, form the Control Routing matrix, and individual routing tables for each bridge.

STATION 1 LAN A

STATION 2

STATION 3

B1 LAN B

B7 LAN C

B2

B3 LAN D STATION 4

B4 LAN E STATION 5 Fig .1

B5 LAN F STATION 6

B6 LAN G STATION 7

4. 5.

Differentiate between Bridges and Routers, highlighting the layer of operation of both. For the network, shown in Figure 2, draw the spanning tree configuration, with Bridge 7, as the root bridge.

LAN 1
C=5 C=10

BRIDGE 1
C=5

BRIDGE 2
C=5

LAN2

LAN3

C=5

C=20

BRIDGE 3
C=10

BRIDGE 4
C=10

LAN 4
C=15 C=15

BRIDGE 5
C=15

BRIDGE 6
C=10

LAN 5
C=5

LAN 6
C=5

BRIDGE 7
C=5

BRIDGE 8
C=10

LAN 7

Fig. 2

6. 7. 8. 9. 10. 11. 12. 13.

What is the function of a MAC Relay bridge? Explain the concept of Source Routing. What does Spanning Tree Approach mean? How is it employed in routing? What are meant by Root port, Root Bridge, Root path cost, Designated port and Designated Bridge? How address learning is effected in adaptive routing? When do you say a port from a LAN to a Bridge is blocked in that direction? What is the possible problem caused by closed loop in routing? How is it solved? Distinguish among the following Routing directives. (a) Null, (b) Non-broad cast, (c) All-routes broadcast, (d) Single-route broadcast. Distinguish among the following 3 types of MAC addresses. (a) Individual, (b) Group, (c) All-stations. Which are the techniques used in route discovery in Source Routing? What does a backbone network mean? Differentiate between a Bus backbone and a Star backbone. What is the concept of Virtual Local Area Network (VLAN)? How does a VLAN reduce network traffic? What does a remote bridge mean? What are the advantages of Wireless LAN over Wired LAN? What is its limitation? Compare the infrastructure and adhoc mode of operation of Wireless Local Area Network. Why CSMA/CD protocol cannot be used in Wireless LAN? Describe the MAC protocol used in WLAN. Give the MAC layer frame format of Wireless LAN. Explain the Frame Control (FC) field of the frame. Explain the function of DCF MAC with RTS/CTS. What is the purpose of using RTS/CTS? Explain the protocol architecture of Wireless LAN. Explain the difference between 802.11a and 802.11b.

14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27.

Module 3: Internetworking: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. What does an Internet mean? What does a Subnetwork mean? What does an Intermediate System mean? Which are the main different features of the Subnetworks, an Internetworking facility must accommodate? Explain the Bridge protocol architecture. Differentiate between Relaying and Routing functions done by a Router. Differentiate between Connection-oriented operation and Connectionless operation. Quote examples of X.25 operating under LLC, on top of LLC and side-by-side of LLC. What is meant by Datagram lifetime? Segment an original datagram of 656 octets into 3 segments of 256, 240 and 160 octets, indicating the data length, offset and status of MORE flag for each segment. Why padding is necessary in an IP header? Differentiate among the three principal network classes. What is meant by Subnet mask? Explain the IP header format. What does Internet Control Message Protocol mean? Where is it used? How a Source quench message is used in flow control? What are meant by echo and echo reply? What are meant by timestamp and timestamp reply? What are meant by address mask request and address mask reply? What is the motivation behind implementation of IPv6 over IPv4? In what way IPv6 is different from IPv4? Compare the header formats of IPv6 and IPv4. What are the different types of addresses used in IPv6?

22.

If the NTP server Group has a group ID of A231 (Hex), then what will be the Permanently assigned multicast address for (i) All NTP servers in the Internet (ii) All NTP servers at the same site as the sender. What are the different conventional forms of representing IPv6 addresses? What you mean by unspecified address and loop back address? Determine the full format of the following IPv6 addressees: (i) FF05::B3 (ii) 0:A2:: 2163 How ICMPv6 is different from ICMPv4? Explain the three possible transition strategies from IPv4 to IPv6. It has been said that when IPv6 tunnels through IPv4 routers, IPv6 treats the IPv4 tunnels as linklayer protocols. Do you agree with this statement? Why or why not?

23. 24.

25. 26. 27.

Module 4: Internet work Operations: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Differentiate among Broadcast, Multiple Unicast and Multicast strategies. What are the requirements for Multicasting? Compare link state versus distance vector routing. What kind of information a routing table contains? How it is maintained? Discuss count to infinity problems with regard to Routing Information Protocol (RIP). Explain how does split horizon prevent counting to infinity problem? What is meant by an Autonomous system? Compare the two Unicast routing protocols RIP and OSPF. What is the role of the Dijkstras Algorithm in Unicast routing? OSPF, a link state protocol, is the preferred Interior Routing Protocol on the Internet. Explain. Give the message format of IGMP message and explain every field in brief. In IGMP, explain how a Host/Router joins or leaves a group. What is procedure for monitoring the membership? What is a path vector routing? Explain how the creation of loops is avoided in this mechanism?

13.

An autonomous system is shown in Figure 3, with the costs shown aside. Draw the resulting directed graph. Also draw the SPF tree for router RT6, and derive the Routing table for it.

N12 N 1 3 1 RT1 N3 N 2 3 RT2 RT3 2 N11 3 N4 8 6 1 1 1 RT4 8 8 8

N13 8 RT5 7 6 RT6 8

N14

Ia

7
N12

6 RT7

2
N15

RT9 1 1 2 RT11
1

1 lb N 8 3 5 RT10 N6 1 RT8

N9

H1

10

RT 12
2

4 N7

N10 Fig. 3

14. 15.

Name the three main categories of IGMP messages and briefly discuss their function. A multicast router list contains four groups (W, X, Y, Z). There are three hosts on the LAN. Host A has three logical messages belonging to group W and one loyal member belonging to group X. Host B has two loyal members belonging to group W and logical means belonging to group Y. Host C has no processes belonging to any group. Show the IGMP messages involved in monitoring. What is the purpose of IGMP? What is Border Gateway Protocol (BGP)? Why it is based on path vector routing instead of distance vector or link state routing? Briefly explain the following terms in Exterior Gateway Protocol. a. Neighbour Acquisition b. Neighbour Reachability c. Network Reachability. Explain the four different types of messages used by a router employing BGP. What you mean by Quality of Service? How the IP networks offer QoS? What is RSVP? Explain how it offers Quality of Service? Is it possible to guarantee QoS in two directions? What are the difficulties associated with the per flow reservation resources (such as RSVP)? How these difficulties are avoided by using Differentiated Services? Explain the two sets of functional elements associated with the Differentiated Service Architecture. Why queuing of packets are necessary in the IP networks? Explain the operation of Priority queuing model. Explain Weighted Fair Queuing (WFQ). What are the two major classes of service offered by the Intserv architecture? What are the two key features lying at the heart of Intserv (Integrated Services) architecture?

16. 17. 18.

19. 20. 21. 22. 23. 24. 25. 26. 27.

Module 5: Transport Protocols: 1. 2. 3. Why do the Transport layer services are important in a Communication network? Which are the three types of network services defined by ISO? Distinguish among Type A, Type B and Type C network services defined by ISO.

4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15.

Which are the possible ways by which a transport entity knows the address of a destination transport user? What are meant by primitives with respect to an O.S.I. layered architecture? Interrelate the following primitives: Request, Indication, Response and Confirm. What are meant by Protocol Data Units? Which are the flow control mechanisms, which could be adopted by a Transport protocol entity? Distinguish between Sliding window protocol and Credit Scheme flow control techniques. Why a Credit Scheme is often preferred to a simple Sliding window protocol by a Transport entity? Explain the Connection establishment and termination procedure, used by a Transport entity in the case of Type A networks. In a Non-sequencing network services, the credit scheme often can create problem. What is the nature of the problem? How is it solved? How is the EOL (End of Letter) used in stream traffic in a non-sequencing network with maximum TPDU size specified? What is meant by a failure prone Network Service? How a Transport entity deals with Reset and Restart conditions in such a case? Briefly explain the functions of the following timers in a Transport protocol. (a) Retransmission timer (b) Reconnection timer (c) Window timer (d) Retransmit RFC timer (e) Persistence timer (f) Inactivity timer. How duplicate detection is done by a Transport protocol entity in an unreliable network? Why the sequence number space has to be large in an unreliable network? How a deadlock condition can result in a credit scheme used for an unreliable network service? How is it avoided? Differentiate between Two-way handshake and Three-way handshake in connection establishment. Why a Three-way handshake is preferable to a Two-way handshake for connection establishment in an unreliable network? Explain the connection establishment and termination procedure for an unreliable network.

16. 17. 18. 19. 20. 21.

22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36.

What does Failure Recovery mean? Explain the functions of the following flags in a TCP header format. URG, ACK, PSH, RST, SYN, FIN. How a TCP entity perform connection establishment, data transfer and connection termination using various flags? What does a pseudo-header in TCP format mean? What does Urgent pointer in a Transport protocol header format mean? Differentiate between In-order and In-window Accept policies used in a TCP implementation. Differentiate among First only, Batch, Individual transmit policies in a TCP implementation. Compare the immediate and cumulative Acknowledge policies in a TCP implementation. Explain the technique of Retransmission Timer Management using Simple Average approach. Explain the technique of Retransmission Timer Management using Exponential Average approach. Explain the RTT Variance Estimation (Jacobsons Algorithm). Explain the technique of Window Management. What does Quality of Service mean? What are the characteristics attributed to it? What are the techniques adopted to improve the Quality of Service? How does UDP differ from TDP?

Module 6: Network Security: 1. 2. 3. 4. 5. 6. 7. What is network security? Identify the desirable properties of secure communication. Differentiate between passive and active attacks. What is meant by encryption? Differentiate between code and cipher methods of encryption. What do Plaintext and Cipher text mean? Differentiate between Conventional encryption and Public-key encryption. What is the main advantage of the latter method over the former method? What is symmetric key encryption method?

8.

Suppose N people want to communicate with each of N-1 other people using symmetric key encryption. All communication between any two people, I and J, is visible to all other people in this group of N and no other person in this group should be able to decode their communication. How many keys are required in the system as a whole? Now suppose that public key encryption is used. How many keys are required in this case? What are the different encryption algorithms available? Explain DES (Data Encryption Standard) algorithm. Discuss the strength of DES algorithm. What is the importance of key distribution? What is Merkles puzzle? What is Shamirs method for key distribution? Explain an automatic key distribution method for Connection oriented protocol. What is Traffic padding? What is meant by Message authentication? Why often Authentication is also needed besides encryption? What is Message Authentication? What are the different approaches to Message Authentication? Explain Message Authentication using a one-way Hash function. What is the purpose of Hash function? To be useful for Message Authentication, what should be the properties of a Hash function? What are the properties of secure Hash Function? What is public key encryption? How secure it is? Where it stands with conventional encryption standard? Differentiate between weak and strong Hash functions. What is meant by Digital signature? What are the factors it should take care of? Briefly explain two Digital signature schemes, which provide authentication. Explain the RSA public key encryption algorithm. Perform encryption and decryption using the RSA algorithm for the following i) P=3; q=11; d=7; m=5 ii) P=5; q=11; d=3; m=9 What does key management mean? What is meant by public-key certificate? What is the purpose of Secure Socket Layer (SSL)? Outline the features provided by SSL. Explain how SSL works.

9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26.

27. 28.

29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43.

What are the two services provided by SSL Record Protocol? What are the different steps in operation of SSL Record Protocol? What is the difference between SSL connection and SSL session? What does Change Cipher Spec Protocol mean? Explain Alert Protocol. Explain Handshake Protocol. What is IP Sec? Explain the two protocols defined by IPSec. Are both AH and ESP needed for IP Security? Why or Why not? What are the two protocols defined by TLS? Explain in brief. How the Application layer is made secured? Explain the implementation of PGP (Pretty Good Privacy) at the sender and receiver side. What is the purpose of a Firewall? Explain the both Packet Filter Firewall and Proxy Firewall. What is VPN (Virtual Private Network) and why it is used? Using RSA, choose p=3 and q=11, and encode the phrase hello. Apply the decryption algorithm to the encrypted version to recover the original plane text message. Summarize the key difference in the service provided by the Authentication Header (AH) protocol and the Encapsulation Security Payload (ESP) protocol in IPSEC.

Module 7: Distributed Applications: 1. 2. 3. 4. 5. 6. Give a generic diagram and explain how local e-mail service operates. What is SMTP? Explain how e-mail is delivered from the sender to the receiver by using this protocol. How connection setup, main transfer and connection closing are affected in Simple Mail Transfer Protocol? What are the limitations of SMTP? What is MIME? Explain in brief the purpose of all the five headers defined by IT. What are the two methods of data encoding defined by MIME? Explain in brief.

7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17.

Define a client server model. Differentiate between interactive and concurrent server. What you mean by a process? How it is related to a program? What do you understand by a socket? Define the socket structure and explain each field. Name the different socket types. What you mean by socket interface? Define the socket interface for connectionless interactive server. Define the socket interface for connection oriented concurrent server? Explain how it handles multiple clients simultaneously. What is the protocol used for the transfer of files over IP network? Show the basic model of such protocol. How the communication takes place over control and data connection? What is the purpose of FTP? What are the different types of file transfer? Describe the functions of two FTP connections. What are the three FTP transmission modes? Explain. Briefly explain the following key elements in a network management system. a. Manager b. Agent c. Management Information base d. Network management protocol. Briefly explain what is meant by a decentralised network management scheme. What is the concept of a party in a network management scheme? What are the main modifications effected in SNMPv2 over SNMP? What does the Structure of Management Information (SMI) mean? What is the main advantage of Get-Next-Request -PDU? What is the main advantage of Get-Bulk-Request -PDU? How does an agent respond to such a PDU? What is meant by a Trap-PDU? For what purpose it is used? Why do you require Snmp-Set-Serial No. in MIBs? Differentiate among Local, Proxied and Remote parties. What is meant by Party Auth Life time? How is it important in Message Authentication?

18. 19. 20. 21. 22. 23. 24. 25. 26. 27.

28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39.

How does clock synchronisation achieved in Message Authentication schemes? What are the possible problems, which could arise, if clock synchronisation is not done? Why a Manager has to periodically retrieve manager party clock values from agents? What are the improvements made in SNMPv3 over SNMPv2? What is the purpose of HTTP? What are its different characteristics? What is the difference between an HTTP PUT command and the HTTP POST command? When each of them is useful? Explain the architecture of World Wide Web (WWW). What does Uniform Resource Locator (URL) mean? What is the difference between static and dynamic documents? What is the function of HTML? How does a browser distinguish between a document that contains HTML and a document that contains arbitrary text? What does CGI stands for and what is its function?

Вам также может понравиться