Академический Документы
Профессиональный Документы
Культура Документы
In the NRZ-L sequence, positive and negative voltages have specific meanings: positivefor 0 and
negative for 1.
In the NRZ-I sequence, the voltages are meaningless. Instead, the receiver looks for changes from one
level to another as its basis for recognition of 1s.
It is the error detecting mechanism, which means a shorter group of bits or extra bits may be
appended at the destination of each unit.
For example, Bluetooth can be used to connect mobile phones to a headset, or a notebook computer
to a printer.
UNIT II
1. Define packet switch.
A packet switch is a device with several inputs and outputs leading to and from the hosts that the switch inter
connects. The core job of a switch is to take packets that arrive on an input and forward them to the right output
so that they will reach their appropriate destination.
2. What is LSP?
In link state routing, a small packet containing routing information send by a router to
all other router by a packet called Link State Packet (LSP).
3. What is segmentation and reassembly?
Fragmenting the high-level message into low-level packets at the source, transmit the individual low-level packets
over the network, and then reassemble the fragments back together at the destination. This general technique is
usually called fragmentation and reassembly. In the
case of ATM, however, it is often called segmentation and reassembly (SAR).
4. Define internetwork.
An internetwork is often referred to as a network of networks because it is made up of lots of smaller
networks. An internet is a logical network built out of a collection of physical networks.
5. What is an ARP?
ARP means Address Resolution Protocol. It is the protocol of the Internet architecture,
Used to translate high-level protocol addresses into physical hardware addresses.
Commonly used on the Internet to map IP addresses into Ethernet addresses.
5. What is subnetting?
The use of a single IP network address to denote multiple physical networks.
Routers within the sub network use a subnet mask to discover the physical network to which a
Packet should be forwarded.
Subnetting effectively introduces a third level to the two-level hierarchical IP address.
6. What is reliable flooding?
The basic idea is for a node to send its link-state information out on all of itsdirectly connected links,
With each node that receives this information forwarding it out on all ofits links.
This process continues until the information has reached all the nodes in the network.
7. Write short note on routers.
The nodes that interconnect the networks are called routers.
They are also sometimes called gateways.
Sliding window algorithm is an algorithm that allows the sender to transmit multiple packets before
receiving an acknowledgment.
As acknowledgments are returned for those packets in the window that were sent first,
The window slides and more packets may be sent.
The sliding window algorithm combines reliable delivery with a high throughput.
Service-point Addressing
Segmentation and reassembly
Connection Control
Flow Control
Error Control
Specific sender.
And transfer files and also provide strong client/server authentication / message integrity.
8.What are the types of security attacks?
The types of security attacks are,
Passive attacks,
Active attacks.
9. Define the terms Cryptanalysis and Cryptology.
Cryptanalysis : The art of breaking ciphers is called Cryptanalysis.
Cryptology : The art of devising ciphers and breaking them collectively is called as Cryptanalysis.
14.What is MPEG?
15.What is authenticator?
It includes redundant information about message content and is used to verify the authenticity
and dataintegrity of a message.
16.What is encryption and decryption?
Encryption transforms a original message. Sender encypts the plaintext and generates the ciphertext.Decryption
19.What is IPSec?
IPSec is a framework for providing all security services. It is mandatory in IPV6.
It has 2 parts
Authentication header
Encapsulation Security Payload
20.What is wireless security?
It provides authentication , message integrity and confidentiality to 802.11(Wi Fi)
21. What is a firewall ?
A firewall is a system that is the solepoint of connectivity between the site it protects and the
rest of the network. It is usually implemented as part of a router.
UNIT V
to retrieve messages by using a client-server protocol such as PostOffice Protocol, version 3(POP3).
the SMTP client still needed on the desktop to forward messages from the workstationuser to its SMTP
mail server.
6. Define URL.
URL means Uniform resource locator.
It is a text string used to identify the location of Internet resources.
It is a standard for specifying any kind of information on the internet.
7. List the types of HTTP messages.
The types of HTTP messages are,
Request message,
Response message.
8. In what way HTTP is similar to SMTP?
HTTP is like SMTP because the data transfer between the client and server look like
SMTP messages.
9. What is mean by IMAP?
IMAP means Internet Message Access Protocol. It is an application-layer protocol that
allows a user to retrieve his or her email from a mail server.
10. What is mean by FTP?
FTP means File Transfer Protocol. It is the standard protocol of the Internet architecture
for transferring files between hosts. It is built on top of TCP.
11. What is mean by DNS?
DNS means Domain name system. It is a client/server application that identifies each
host on the internet with an unique user friendly name.
12. What is mean by HTTP?
HTTP means Hyper Text Transport Protocol. It is an application-level protocol based
on a request/reply paradigm and used in the World Wide Web. HTTP uses TCP connections to
transfer data.
13. What is mean by SNMP?
SNMP means Simple Network Management Protocol. It is an Internet protocol that
allows the monitoring of hosts, networks, and routers.
14. What is Uniform Resource Identifier?
Uniform resource identifier is a generalization of the URL. It is used inconjunction with SIP to set up multimedia
sessions.
15. What is World Wide Web?
World Wide Web is a hypermedia information service on the Internet. It is a repository
or information spread all over the world and linked together.
16. what is an overlay network?
It is a logical network implemented on top of a physical network. Applications make their own
forwarding decisions, by extending traditional routers and switches to support a modest amount
of application specific processing.
17.what is MBONE?
Mulicast backbone is an overlay network that implements IP multicast.Mbone uses tunnels,
implements different forwarding algorithms, forwards packets to all downstream neighbours in a
shortest path multicast tree.
18.what is SOAP?
Simple Object Access Protocol-for mass customization. SOAP is based on web services
description language(WSDL) and both are used together.
19. what are the web services?
Webservices provides us the motivation for application to application communication. Enabling
application to interact directly with eachother called bussiness to bussiness integration, when
they are at different enterprise use enterprise application integration(EAI).
20.Give a note on Multimedia applications?
Audio and video conferencing are the types of multimedia applications
2 protocols are used-RTP,RSVP Multimedia applications need a session control protocol.
The various protocols for session control and call control are-SDP,SIP.SAP, SCCP.
The capabilities of SIP are-user location, user availability, session setup, session management.