Вы находитесь на странице: 1из 6

Chinnu

PMC1634 INTERNET TECHNOLOGY AND DISTRIBUTED APPLICATIONS

Part A
1.
Explain the diiferent layers of TCP/IP protocol.
2.
What are the various protocols in transport layer?
3.
Analyze the importance of network layer in TCP/IP protocol suite.
4.
Explain the use of checksum field in IP datagam.
5.
Compare HLEN and Total length fields in an IP datagram
6.
Examine the importance of reassembly table in an IP package
7.
Explain the significance of MTU table in IP package.
8.
TOS bits are important fields in an IP datagram.Evaluate this statement.
9.
What is fragmentation in IP?
10.
What are the various fields related to fragmentation in IP header format?
11.
What is the significance of MTU field in fragmentation?
12.
What are the two types of options in IP?
13.
Explain single byte option in IP.
14.
Explain multiple byte option in IP.
15.
What is the purpose of ARP protocol?
16.
Differentiate static mapping with dynamic mapping.
17.
Compare and contrast ARP and RARP.
18.
Explain the significance of ICMP protocol.
19.
What is the importance of Error reporting messages in ICMP protocol.
20.
Explain the significance of Query messages in ICMP protocol.
21.
What is meant by hop by hop option in IPv6?
22.
What is the need of Flow Label in IPv6?
23.
Explain the significance of Source routing in IPv6 extension header.
24.
What is the need of Router Solicitation message in ICMPv6 protocol.
25.
Analyse the need of Time-Exceeded message in ICMPv6 protocol.
26.
What is an autonomous system?
27.
Differentiate intra and inter domain routing.
28.
What is meant by interdomain routing?
29.
What is meant by intradomain routing?
30.
What is interior gateway routing?
31.
Explain the various interior gateway routing protocols.
32.
What is RIP?
33.
What are the two types of messages in RIP?
34.
Explain exterior gateway routing.
35.
What are the various exterior gateway routing protocols?
36.
What is Stub AS?
37.
Define a BGP session?
38.
Explain Border Gateway protocol.
39.
What is Multihomed AS
40.
Differentiate Internal and External BGP sessions.
41.
Explain the significance of Keepalive packet in BGP.
42.
What is Transit AS
43.
MOSPF is a data driven protocol. Analyze.
44.
What is Multicast Link State routing?
45.
Explain BOOTP.
46.
What is a socket address
47.
What is a port number? What are the two different types of port numbers?
48.
Differenitate well defined and ephimeral ports
49.
To define a process an identifier is required. Comment this statement
50.
What are sockets?
51.
What is the purpose of checksum field in UDP?
52.
UDP is a connectionless unreliable transport protocol. Comment on this
53.
What is a segment?
54.
TCP is a reliable transport protocol. Comment on this statement.
55.
What is a sequence number?
56.
Explain full duplex communication.
57.
What is an SYN segment?
58.
What is an ACK segment?
59.
What is meant by passive open?
60.
What is the relevance of flow-control in TCP?
61.
What is clark's solution?
62.
Explain SACK?
63.
Explain fast retransmission.
64.
What is cumulative ACK?
65.
What is retransmission after RTO in TCP?
66.
What is congestion window?
67.
Explain flat name space.
68.
What is hierarchial name space?
69.
What is a domain?
70.
Explain FQDN.
71.
Explain PQDN.
72.
What is the need of DNS?
73.
Explain embedding in Telnet with an example.
74.
What is NVT?
75.
Telnet was designed to operate in a time-sharing enviornment. Justify this statement
76.
Explain communication over control connection in FTP.
77.
Name any three types of communication in FTP.
78.
Explain communication over data connection in FTP.
79.
Compare stream and compressed mode of transmission.
80.
What is an MTA?
81.
What are the various services provided by an user agent?
82.
What is an user agent?
83.
What is an MAA?
84.
Name the two different user agent types.
85.
What is the purpose of SMTP?
86.
How is a connection terminated in SMTP?
87.
HTTP functions are like a combination of FTP and SMTP . Justify this statement.
88.
What is a request line in HTTP?
89.
What is a status line in HTTP?
90.
What is the significance of contributor count in RTP?
91.
What does synchronization SourceID signify in RTP?
92.
What is the purpose of RTCP?
93.
How would you describe encryption and decryption?
94.
With the help of a neat diagram, illustrate the functioning of encryption and decryption.
95.
Compare and contrast plain text and cipher text?
96.
Explain the relevance of Cryptography?
97.
What is meant by Modern cryptography?
98.
What is meant by Cryptography?
99.
Differentiate between Confidentiality and Non-repudiation?
100.
Differentiate between Non-repudiation and Authentication?
101.
Differentiate between Authentication and Data Integrity?
102.
List three goals of cryptography?
103.
Differentiate between Confidentiality and Data Integrity?
104.
Differentiate between Confidentiality and Authentication?
105.
Differentiate Non-repudiation and Data Integrity?
106.
List any three applications of Cryptography?
107.
What is meant by certificate authority?
108.
Explain Digital Signatures?
109.
How would you summarize public key infrastructure?
110.
What is meant by registration authority?
111.
What is meant by validation authority?
112.
How would you categorize wireless network?
113.
What is meant by wireless network?
114.
What is wireless network?
115.
What are the benefits of wireless networking?
116.
List various types of wireless technology.
117.
List the components of wireless network?
118.
What is meant by wireless network security?
119.
Identify the general security issue in wireless network?
Part B
120.
Differentiate between ARP and RARP protocols in network layer.
121.
Differentiate TCP/IP with OSI reference model.
122.
Explain the different layers of TCP/IP protocol suite.
123.
Describe any two network layer protocols
124.
Explain the format of IP datagram.
125.
What is Differentiated service?
126.
Explain the significance of TOS bits in IP.
127.
Distinguish between MTU table and Reassembly table
128.
The processing module is the heart of the IP package.Prove it.
129.
Time to live field is mainly designed to hold a timestamp.Judge this statement and also explain the importance
of this field
130.
Write a short note about fragmentation module and reassembly module in IP package
131.
Explain MTU in terms of fragmentation.
132.
Compare the various multiple byte options in IP .
133.
Compare Record route, Strict Source route and Loose source route options in IP.
134.
Differentiate ARP with RARP.
135.
Explain ARP packet format.
136.
What are the various error reporting messages?
137.
The echo-request and echo-reply messages are designed for diagnostic purposes.Evaluate this statement
138.
Explain query messages with its packet formats.
139.
Demonstrate the general format of ICMP messages with appropriate diagram.
140.
The time exceeded messages is generated in two cases. Explain both of them.
141.
Briefly explain router solicitation and advertisement in ICMP.
142.
Describe the use of timestamp request and reply also list out the formulas
143.
The router-solicitation and advertisement messages can help to find the address of the routers also to check the
routers are alive and functioning. Prove this statement.
144.
Distinguish between error reporting and query messages
145.
The authentication header of IPv6 header has dual purpose. Justify.
146.
Compare IPv4 and IPv6 headers.
147.
Four types of error messages are handled by ICMPv6. Illustrate.
148.
Identify the various neighbour discovery messages in ICMPv6.
149.
With a neat diagram, explain autonomous systems.
150.
Routing between and within autonomous systems are possible using protocols. Justify.
151.
Explain Interior Gateway routing.
152.
Distance Vector routing is used for Intradomain routing.Justify .
153.
RIP implements distance vector routing with some considerations. What are they?
154.
Explain RIP message format with a neat diagram.
155.
Define Exterior Gateway routing.
156.
Analyse the need for path vector routing in interdomain routing.
157.
What are the different packets used in BGP?
158.
Autonomous systems are divided into 3 categories. Justify on this statement.
159.
Write briefly on BGP Sessions.
160.
Explain BOOTP.
161.
MOSPF is an extension of OSPF. Evaluate.
162.
What are the various services provided by a transport layer protocol?
163.
Explain the process of encapsulation and decapsulation with a neat diagram
164.
How does multiplexing and demultiplexing happen in TCP?
165.
What are the various services provided by a transport layer protocol?
166.
With a neat diagram explain the user datagram format.
167.
Explain the process of encapsulation and decapsulation in UDP.
168.
There is no relationship between different user datagrams even if they come from the same source. Comment on
this statement
169.
Explain TCP segment format.
170.
Explain the stream delivery service of TCP.
171.
Differentiate byte number, sequence number and acknowledgement number.
172.
TCP needs buffers for storage. Justify this statement.
173.
Explain 3-way handshaking mechanism in detail.
174.
What is SYN flooding attack?
175.
How is a connection terminated in TCP?
176.
How can you reset a connection in TCP?
177.
Explain the syndrome created by receiver in silly window syndrome.
178.
Explain how Nagle's algorithm is applied to solve silly window syndrome.
179.
Explain the syndrome created by sender in silly window syndrome.
180.
Explain the slow start phase in congestion policy.
181.
Differentiate FQDN with PQDN.
182.
Compare and contrast flat name space with hierarchial name space.
183.
In the Internet, DNS is divided into three different sections. Justify this statement.
184.
What is meant by resolution?
185.
What are the various DNS messages?
186.
Explain local login and remote login.
187.
With a diagram explain the concept of NVT.
188.
NVT uses different character sets. Justify this statement.
189.
FTP has two connections. Explain each one of them.
190.
What are the various file types supported by FTP for data connection?
191.
What are the various data structures supported by FTP for file transfer?
192.
FTP supports three transmission modes for file transfer. Exaplain each one of them.
193.
Explain the communication phase of FTP.
194.
Explain the command processing in FTP.
195.
Explain the file transfer phase in FTP.
196.
Write a short note on user agent.
197.
Differentiate between the sending mail and receiving mail processes.
198.
Explain the message transfer phase in SMTP.
199.
Explain the connection termination phase in SMTP.
200.
Explain the connection establishment phase in SMTP.
201.
Explain the 'request message' in HTTP transaction.
202.
Explain the 'response message' in HTTP transaction.
203.
Explain RTP packet format.
204.
Main contributors of RTP are mixing, sequencing and timestamping. Explain each one of them in detail.
205.
What is the difference between sender report, receiver report, and source description messages?
206.
With the help of neat diagram explain encryption and decryption?
207.
Write a short note about Modern cryptography?
208.
What is the relevance of Cryptography in Network Security?
209.
Explain Cryptography?
210.
What is the relationship between cryptography and Modern cryptography?
211.
Identify the different applications of Cryptography?
212.
Explain: a)Confidentiality b)Data Integrity c)Authentication
213.
List the goals of cryptography?
214.
With the help of neat diagram explain public key infrastructure?
215.
How would you summarize Digital Signatures?
216.
With the help of neat diagram explain Digital Signatures?
217.
What is the main idea of public key infrastructure?
218.
Explain various types of wireless technology?
219.
Explain the advantage of wireless networking?
220.
How would you classify the components of wireless network?
221.
Describe the general security issues in wireless network?
222.
How would you classify the components of wireless network?
223.
What is wireless network and list out the general security issues related to wireless network?
Part C
224.
Examine the different layers of TCP/IP protocol suite in detail.
225.
Briefly explain IP protocol.
226.
With the help of a pictorial representation explain IP package.
227.
Explain the concept of fragmentation and the various fields related to it in the IP header.
228.
Briefly explain the different types of options in IP package.
229.
ARP is a form of dynamic mapping method that finds a physical address given a logical address. Judge this
statement
230.
Briefly explain about ICMP query messages.
231.
Describe in detail about ICMP error reporting mechanism with diagram.
232.
Compare and Contrast between IPv4 and IPv6.
233.
Extension headers add functionality to the IPv6 datagram. Evaluate this statement
234.
Explain the various types of messages defined by ICMPv6.
235.
Distinguish between Informational and Neighbourhood messages.
236.
With a neat diagrammatic representation, explain autonomous systems and its related routing protocols.
237.
Briefly explain the various interior gateway routing protocols.
238.
Explain Routing Information Protocol.
239.
What is Path Vector Routing. Explain
240.
What is meant by Exterior Gateway routing.Explain it with a protocol.
241.
Explain BGP in detail.
242.
Explain BOOTP in detail.
243.
What are the various services provided by transport layer protocol?
244.
Explain UDP in detail.
245.
With a neat diagram explain UDP packet format.What are the various services provided by UDP protocol?
246.
What are the various services provided by TCP?
247.
TCP has several features that provides reliability. Justify this statement.
248.
What are the various phases for a connection oriented transmission?
249.
Explain any one flow control mechanism in TCP?
250.
Explain any one error-control mechanism in TCP.
251.
TCP's general policy for handling congestion is based on 3 phases. Explain each one of them.
252.
Explain DNS in detail.
253.
Explain the various types of records in DNS.
254.
Using the concept of NVT, show how Telnet protocol can be used to implement local and remote login.
255.
FTP is the protocol used for transferring files from one computer to another. Explain in detail.
256.
Explain E-mail architecture in detail.
257.
Explain SMTP protocol in detail.
258.
HTTP is used to access data on the world wide web. Justify this statement.
259.
RTP is designed to handle real-time traffic on the Internet. Justify this statement.
260.
Explain the various RTCP messages in detail.
261.
Explain the relevance of Cryptography in Network Security.
262.
How is encryption and decryption related to Cryptography?
263.
What is the relationship between cryptography and Modern cryptography?
264.
Explain cryptography with the help of its goals?
265.
List all the goals of cryptography?
266.
Explain the applications of cryptography?
267.
What is the function of public key infrastructure and explain with the help of a neat diagram?
268.
Distinguish between public key infrastructure and Digital Signatures?
269.
Explain Digital Signatures?
270.
Distinguish between wireless network and wired network.
271.
Identify the general components of a wireless network?
272.
Explain wireless network components?
273.
How can you assess a value wireless network?
274.
Briefly explain the general security issues in a wireless network?
275.
Compare and contrast wired network and wireless network.

Вам также может понравиться