Академический Документы
Профессиональный Документы
Культура Документы
COIMBATORE-642 109
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
CS6551-COMPUTER NETWORKS
Prepared by,
Ms. C. Viji,
Assistant Professor,
ECE Department,
SVS College of Engineering.
SVS College of Engineering
UNIT-1 FUNDAMENTALS & LINK LAYER
6. List out the limitations of unguided transmission medium. MAY /JUNE 2015
Searching and tracking mechanisms increases complexity.
Insecure communication.
Less information propagation.
10. What is the difference between port address, logical address and physical address?
APR/MAY 2014
Logical address is IP address which regularly changes depends upon the network
layer and not fixed.
Physical address is also called as MAC address which is fixed for every system and
it depends upon the network layer.
Port address is used for every process from client to server and it depends on the
transport layer.
Non persistent CSMA is a non aggressive transmission algorithm. When the transmitting
node is ready to transmit the data, it senses the transmission medium for idle or busy. If the
medium is idle, then it transmits immediately or it waits for a random period of time before
repeating the whole logic cycle again. This approach reduces collision. (i.e. with probability=
p-1).
16. What is the similarity between transport layer and data link layer? NOV/DEC 2013
Basically data link layer provides error-free transmission across a single link where as
transport layer ensures the communication between source and destination (Provide end-to-
end delivery).
Thus to ensure the communication, both the layers will provide following services;
1. Flow Control (Which controls the flow of data ensuring no overhead to the destination)
2. Error Detection and Correction
17. What are the features of datagram networks? NOV/DEC 2013, NOV/DEC 2017
In datagram approach, each packet is treated independently from all others. Packets are
referred to as datagram.
Features:
Connectionless network.
Resources are allocated on demand.
A datagram network is a best effort network.
Delivery is not guaranteed.
Reliable delivery must be provided by the end systems (i.e. user's computers) using
additional protocols.
18. Define frame relay and list its characteristics. NOV/DEC 2013
Frame relay is a packet-switching telecommunication service designed for cost-efficient
data transmission for discontinuous traffic between Local Area Networks (LANs) and
endpoints in Wide Area Networks (WANs).
Characteristics:
Simplicity.
Packet switching with virtual circuit service.
“Connection” is associated with the virtual circuit.
No flow control
Frame relay is used to construct Virtual Private Networks (VPNs).
22. What are the two multiplexing strategies used in TL? MAY /JUNE 2012
Definition:
Combining distinct channels into a single lower-level channel is called as multiplexing.
Eg: Separate TCP and UDP channels are multiplexed into a single host-to-host IP channel.
Media access control - Ethernet (802.3) - Wireless LANs – 802.11 – Bluetooth - Switching and
bridging – Basic Internetworking (IP, CIDR, ARP, DHCP, ICMP).
4. Expand ICMP and write the function. MAY/JUNE 2016 , MAY /JUNE 2015
IP is always configured with a companion protocol known as the Internet Control
Message Protocol (ICMP).
It defines a collection of error messages that are sent back to the source host whenever a
router or host is unable to process an IP datagram successfully.
Subnetting
10. What is the average size of an Ethernet frame? APR/MAY 2014, NOV/DEC 2017
The Ethernet IEEE 802.3 standard defined the minimum Ethernet frame size as 64 bytes
The Ethernet IEEE 802.3 standard defined the maximum Ethernet frame size as 1518 bytes.
The maximum was later increased to 1522 bytes to allow for VLAN classification.
Advantages:
Like a router, it partitions the network into logical segments, which provides better
administration, security, and management of multicast traffic.
Virtual LANs
15. Why IPV6 is preferred than IPV4? NOV/DEC 2013, MAY/JUNE 2013 , APRIL/ MAY 2017
IPng or IPV6 were
Support for real-time services.
Security support is more.
Auto configuration (i.e., the ability of hosts to automatically configure themselves
with such information as their own IP address and domain name)
Enhanced routing functionality, including support for mobile hosts
Internet Protocol (also known as IPv4).
Support connectionless service
Support best-effort delivery service of datagram across the internet
Compared with IPv4 and IPv6, IPv6 supports multiple networking features than IPv4.
UNIT-3 ROUTING
Routing (RIP, OSPF, metrics) – Switch basics – Global Internet (Areas, BGP, IPv6),
Multicast – addresses – multicast routing (DVMRP, PIM).
7. Write the keys for understanding the distance vector routing. NOV/DEC 2012
There are three keys for understanding the distance vector routing ,
Knowledge about the whole networks.
Routing only to neighbors.
Information sharing at regular intervals.
8. Differentiate constant bit rate and variable bit rate. MAY/JUNE 2013
Constant Bit Rate (CBR) is a class of service in ATM (Asynchronous Transfer
Mode) that guarantees transmission of data at a constant bit rate.
Eg: Real-time audio or video services.
Variable Bit Rate (VBR) is a class of service in ATM (Asynchronous Transfer
Mode) that guarantees transmission of data at a variable bit rate
Eg: Compressed video.
9. Define Switching.
Switching is a mechanism that allows us to interconnect multiple links to form a large
network to communicate efficiently.
A switched network consists of a series of interlinked node, called switches.
Three types of switching are,
Circuit Switching
Packet Switching
Messaging Switching
15. What are the uses of bridges? APR / MAY 2017, NOV/DEC 2014, APR / MAY 2015
Bridge is a connecting device which is used to connect the multiple networks to form a
large internetworking. A class of switches that are used to forward packets between
shared-media LANs via bridges.
Advantages and Functions:
Message forwarding.
It is used to interconnecting a set of LANs.
Error Detection
Framing
protocols.
17. Differentiate between forward table and routing table. NOV/DEC 2017
Routing table Forward table
Routing table decides how to forward a Routing table are updated periodically is
packet based on the destination address. called as forward table.
A switch in a network uses a routing Forward table contains of both
table. destination address as well as port
number.
18. How does a router differ from a bridge? APR / MAY 2015
Router Bridge
The router uses the routing tables to The bridge does not use any device to transfer
route the data to the destination. the data to the destination.
Router communicates with other The bridges listen to the network traffic and
routers to decide (select) the best then decides the best path to transfer the data
path to transfer the data. depends on MAC addresses of network device.
19. What are the metrics used by routing protocols? APR / MAY 2015
Cost
Bandwidth
Delay
Reliability
Overview of Transport layer - UDP - Reliable byte stream (TCP) - Connection management - Flow
control - Retransmission – TCP Congestion control - Congestion avoidance (DECbit, RED) – QoS –
Application requirements.
1. What do you mean by slow start in TCP congestion? APR/MAY 2014, MAY/JUNE 2016
Slow-start is a part of congestion control strategy used by TCP.
Slow-start increases the congestion window exponentially, rather than linearly.
Initially, the source starts with congestion window with the value of 1 packet. When the
ACK arrives, TCP adds 2 packet to congestion window and the corresponding ACKs
Arrived. TCP increments congestion window by 4. The end result is TCP effectively doubles
the number of packets for every RTT.
5. Differentiate between TCP and UDP. NOV/DEC 2014, NOV/DEC 2012, NOV/DEC 2016
APR/MAY 2017
Persistent HTTP
8. What is the difference between congestion control and flow control? NOV/DEC 2015,
NOV/DEC 2017
Flow Control Congestion Control
Flow Control is a mechanism in which Congestion control is used to describe
the receiver of data throttles the the efforts made by network nodes to
transmission rate of the sender. prevent or respond to overload
conditions.
Flow control prevents senders from Congestion control prevents too much
overrunning the capacity of receivers. of data from being injected
into the network.
Done by server machine Done by router
Deals with end to end issues Deals with hosts and networks issues
It affects more on network
It affects less on network performance
performance
Uses buffering Does not use buffering
9. What do you mean by QoS? NOV/DEC 2014 , NOV/DEC 2012 , NOV/DEC 2015,
NOV/DEC 2017
QoS (Quality of Service) instruct the internet to offer a best-effort delivery service.
In every effort the packet is delivered but not guaranteed.
Network performance measures are
Availability (Uptime)
Bandwidth (Throughput)
Latency (Delay)
Error rate.
Step 2: The server responds with a single segment that both acknowledges the client’s and
sequence number (Flags = SYN +ACK, SequenceNum = y, Ack = x + 1)
Step 3: Finally, the client responds with a third segment that acknowledges
the server’s sequence number (Flags = ACK, Ack = y + 1).
12. What is meant by choke packet? How it is use for congestion control? NOV/DEC 2013
Choke packet is a specialized packet that is used for flow control.
A router detects congestion by measuring the percentage of buffers in use, line utilization
and average queue lengths.
When congestion detected, source sends choke packets across the network and reduce the
traffic.
RTT: Round-trip time. The time it takes for a bit of information to propagate from one end of a
link or channel to the other end and back again. In other words, double the latency of the channel
is called as RTT.
congested, it drops the packets randomly to alert the senders in order to slow down the process of
transmission. RED thresholds on a FIFO queue.
Traditional applications -Electronic Mail (SMTP, POP3, IMAP, MIME) – HTTP – Web Services –
DNS - SNMP
1. Mention the different levels in domain name space.MAY/JUNE 2016, NOV/DEC 2012
Domain name space is divided into three different sections:
Generic domains (It allows three-character labels (or extensions))
Eg:
Label Description
.com Commercial organizations
.edu Educational Institutions
.gov Government Institutions
.int International organization
3. What are the main categories of DNS messages? MAY /JUNE 2015
DNS has two types of messages: query and response.
The query message consists of a header and the question records.
The response message consists of a header, question records, answer records,
authoritative records and additional records.
Synchronization with email server - POP3 protocol does not allow to synchronize the
email client with the server whereas IMAP4 has a provision for synchronization .
Multiple folders - The POP3 protocol does not allow to store emails in different
folders where as the IMAP4 allows to do so.
SMTP MIME
Multipurpose Internet Mail
Simple Mail Transfer Protocol (SMTP) is Extensions(MIME) is used to convert binary
used to exchange electronic mail. data (such as image files) to ASCII text,
which is sent back to email.
SMTP focuses mail delivery system as well It is not a mail protocol it is only an extension
as how it passes the messages across an of SMTP. MIME forms the non-ASCII data
internet from one machine to another. from the sender site.
SMTP have two components
User Agent (UA) It does not have such a type of components
Mail Transfer Agent (MTA)
10. List out the key lengths supported by PGP. NOV/DEC 2014
PGP supported the following key lengths
RSA key length = 3072 bits
DSA key length = 1024 bits
11. State the difference between fully qualified and partially qualified domain name.MAY/JUNE
2013
Fully Qualified Domain Name (FQDN) is also called as absolute domain name that specifies its
exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all the
domain levels including their root-level domain.
Eg:
URL "www.techterms.com" is an FQDN.
It contains a hostname ("www") and a domain ("techterms.com").
Partially Qualified Domain Name (PQDN) is used to specify a portion of a domain name
normally the host portion. It starts with a host name but it may not reach up to the root.
Eg:
URL "www.techterms" is an PQDN.
It contains a hostname ("www") and a domain name has missing portions.
16. How is a symmetric key different from public key? NOV/DEC 2012
In symmetric-key algorithms same cryptographic keys are used for both encryption of
plaintext and decryption of ciphertext.
.
In public key, there are two keysused: a private key and a public key. The private key is kept
by the receiver and the public key is visible to all.
17. State the usage of conditional get in HTTP. APRIL/ MAY 2017,NOV/DEC 2017
Conditional get is used to request the document from the server.
Eg: HTTP 304 responses from server
18. List out the information contained in a DNS resource record. NOV/DEC 2015
Each domain name is associated with the resource record which contains a set of information
such as IP address and type of resource.
DNS resource record contains five tuples to implement name server
<Name, Value, Type, Class, TTL (time to live)>
STATUS LINE
HEADERS
A BLANK LINE
BODY