Sunteți pe pagina 1din 11

TWO MARKS UNIT-1

1. Define network architecture. A network architecture guide the design and implementation of networks. It is used to help deal with this complexity; network designers have developed general blueprints. 2. Draw an example of layered network system.

3. List the layers of OSI architecture. The layers of OSI architecture are, Physical layer, Data link layer, Network layer, Transport layer, Session layer, Presentation layer, Application layer. 4. Differentiate between transport layer and network layer. Transport Layer It is responsible for the end-to-end delivery of the entire message. It provides service point addressing. Network Layer It is responsible for the end-to-end delivery of individual packet. It provides logical addressing.

5. List the categories of network. The categories of network are, Local Area Network (LAN), Metropolitan Area Network (MAN), Wide Area Network (WAN). 6. Define data link layer. Data link layer is the layer of control present in each communicating device that

provides functions such as flow control and error control. 7. What is the use of flow control and error control? Flow control is a technique for assuring that a transmitting entity does not overwhelm a receiving entity with data. Error control allows the sender to know about the damaged or lost frame. 8. Give the frame format of BISYNC. 9. List the types of errors. The types of errors are, Single-bit error, Burst-bit error. 10. What is redundancy? Redundancy is an error detecting mechanism, which means a shorter group of bits or extra bits can be appended at the destination of each unit. Some of the extra bits are added with the original data for error detection. 11. List out the error detection methods. The error detection methods are, Vertical Redundancy Check (VRC), Longitudinal Redundancy Check (LRC), Cyclic Redundancy Check (CRC), Checksum. 12. List the types of error correcting methods. The types of error correcting methods are, Single-bit error correction, Burst error correction. 13. List the categories of flow control. The categories of flow control are, Stop and wait, Sliding window. 14. What is an ARQ? ARQ means Automatic repeat request. If the sender does not receive an ACK for a packet after a certain time period, it assumes that the packet did not arrive (or was delivered with bit errors) and retransmits it. Stop-and-wait and sliding window are two example ARQ protocols. 15. What is bit stuffing? Bit stuffing is a technique used to distinguish control sequences and data on the bit level. Used by the HDLC protocol. 16. What is the use of checksums? Checksums are used to detect errors in a packet and may also be used to verify that the packet has been delivered to the correct host. The term checksum is sometimes used to refer generically to error-detecting codes. 17. Define HDLC. HDLC is a bit-oriented data link protocol designed to support both half-duplex and full-duplex communication over point-to-point and multipoint links.

18. List the types of parity check. The types of parity check are, Simple parity check, Two-dimensional parity check. 19. What is the purpose of hamming code? A hamming code can be designed to correct burst errors of certain length. So the simple strategy used by the hamming code to correct single bit errors must be redesigned to be applicable for multiple bit correction. 20. What is data link flow control? What are the two approaches of link level flow control? Data link flow control is a set of procedures which says the amount of data to be transmitted for a sender. The two approaches of data link flow control are, Feedback based flow control, Rate based flow control.

UNIT-2
1. Define carrier sense protocol. List its versions. Protocols in which stations listen for a carrier and act accordingly are called carrier sense protocol. The versions of carrier sense protocols are, 1_persistent CSMA, Nonpersistent CSMA, P-persistent CSMA. 2. What are the key assumptions of dynamic channel allocation? The key assumptions of dynamic channel allocation are, Station model, Single channel assumption, Collision assumption, Continuous time and slotted time, Carrier sense or no carrier sense. 3. Define Ethernet. An Ethernet is a multiple-access network, meaning that a set of nodes send and receive frames over a shared link. A popular local area network technology that uses CSMA/CD and has a bandwidth of 10 Mbps. An Ethernet itself is just a passive wire; all aspects of Ethernet transmission are completely implemented by the host adaptors. 4. What is CSMA/CD? CSMA/CD means Carrier Sense Multiple Access with Collision Detect. CSMA/CD is a functionality of network hardware. Carrier sense multiple access means that multiple stations can listen to the link and detect when it is in use or idle; collision detect indicates that

if two or more stations are transmitting on the link simultaneously, they will detect the collision of their signals. Ethernet is the best-known technology that uses CSMA/CD. 5. List the types of Ethernet. The types of Ethernet are, Fast Ethernet, Gigabit Ethernet, Switched Ethernet. 6. List the physical properties of Ethernet. The physical properties of Ethernet are, An Ethernet segment is implemented on a coaxial cable of up to 500 m. Hosts connect to an Ethernet segment by tapping into it; taps must be at least 2.5 m apart. A transceivera small device directly attached to the tap. An Ethernet adaptor, which is plugged into the host. Multiple Ethernet segments can be joined together by repeater 7. What is 10Base2? The 10 in 10Base2 means that the network operates at 10 Mbps, Base refers to the fact that the cable is used in a baseband system, and the 2 means that a given segment can be no longer than 200 m. 8. Give the frame format of Ethernet. 9. Write short notes on Ethernet address with an example. Ethernet addresses are typically printed in a form humans can read as a sequence of six numbers separated by colons. Each number corresponds to 1 byte of the 6-byte address and is given by a pair of hexadecimal digits, one for each of the 4-bit nibbles in the byte; leading 0s are dropped. For example, 8:0:2b:e4:b1:2 is the human-readable representation of Ethernet address 00001000 00000000 00101011 11100100 10110001 00000010. 10. What is runt frame? If an adaptor sends only 96 bits then it is called a runt frame. It is possible if the two hosts are close to each other. 11. What is exponential backoff? Once an adaptor has detected a collision and stopped its transmission, it waits a certain amount of time and tries again. Each time it tries to transmit but fails, the adaptor doubles the amount of time it waits before trying again. This strategy of doubling the delay interval between each retransmission attempt is a general technique known as exponential backoff. 12. List the advantages of Ethernet. The advantages of Ethernet are, Ethernet is best under lightly loaded conditions, It is extremely easy to administer and maintain

No switch, Router and configuration table It is easy to add a new Host It is Inexpensive. 13. Define token rings. Token ring is a direct link network. It is also a kind of shared media network. Here the data are transferred in the form of packet, so it is also known as packet switching. 14. Give the frame format of 802.5/token ring. 15. Differentiate between baseband and broadband. Baseband Broadband The word base specifies a digital signal. The word broad specifies an analog signal. Manchester encoding is used here. PSK encoding is used here. 16. What are the types of bridges? The types of bridges are, Simple bridge, Multiport bridge, Transparent bridge. 17. List the two kinds of traffic in FDDI. The two kinds of traffic in FDDI are, Synchronous traffic, Asynchronous traffic. 18. Define THT. THT means Token Holding Time. It gives the amount of time the node is allowed to hold the token. 19. What is MSAU? Several relays are usually packed into a single box, known as a multistation access unit (MSAU). It also makes it very easy to add stations to and remove stations from the network, since they can just be plugged into or unplugged from the nearest MSAU, while the overall wiring of the network can be left unchanged. In practice, MSAUs are almost always used because of the need for robustness and ease of station addition and removal. 20. What are the features of wireless LANs? The features of wireless LANs are, Time Bounded Services, Power Management, Security Management.

UNIT-3

1. Define packet switch. A packet switch is a device with several inputs and outputs leading to and from the

hosts that the switch interconnects. The core job of a switch is to take packets that arrive on an input and forward them to the right output so that they will reach their appropriate destination. 2. Define datagram. Datagram is the basic transmission unit in the Internet architecture. A datagram contains all of the information needed to deliver it to its destination. Datagram networks are connectionless. 3. What are the stages in virtual circuit switching? The stages in virtual circuit switching are, Connection setup, Data transfer. 4. Define virtual circuit identifier. A virtual circuit identifier (VCI) uniquely identifies the connection at this switch and that will be carried inside the header of the packets that belong to this connection 5. Give the frame relay packet format. 6. What is source routing? An approach to switching that uses neither virtual circuits nor conventional datagram is known as source routing. Source routing can be used in both datagram networks and virtual circuit networks. 7. What is a bridge? Bridge is a node in promiscuous mode, accepting all frames transmitted on either of the Ethernets, so it could forward them to the other. 8. List the informations available in configuration messages. The informations available in configuration messages are, The id for the bridge that is sending the message, The id for what the sending bridge believes to be the root bridge, The distance, measured in hops, from the sending bridge to the root bridge. 9. What is ATM? The switching technology that deserves special attention is asynchronous transfer mode (ATM). ATM is a connection-oriented, packet-switched technology. In ATM terminology, the connection setup phase is called signalling. 10. What is LSP? In link state routing, a small packet containing routing information send by a router to all other router by a packet called Link State Packet (LSP). 11. What is segmentation and reassembly? Fragmenting the high-level message into low-level packets at the source, transmit the individual low-level packets over the network, and then reassemble the fragments back together at the destination. This general technique is usually called fragmentation and reassembly. In the

case of ATM, however, it is often called segmentation and reassembly (SAR). 12. Define throughput. Throughput is the observed rate at which data is sent through a channel. The term is often used interchangeably with bandwidth. Throughput = pps (BitsPerPacket) 13. Define internetwork. An internetwork is often referred to as a network of networks because it is made up of lots of smaller networks. An internet is a logical network built out of a collection of physical networks. 14. Give the IPv4 packet format. 15. What is an ARP? ARP means Address Resolution Protocol. It is the protocol of the Internet architecture, used to translate high-level protocol addresses into physical hardware addresses. Commonly used on the Internet to map IP addresses into Ethernet addresses. 16. What is subnetting? The use of a single IP network address to denote multiple physical networks. Routers within the sub network use a subnet mask to discover the physical network to which a packet should be forwarded. Subnetting effectively introduces a third level to the two-level hierarchical IP address. 17. What is reliable flooding? Reliable flooding is the process of making sure that all the nodes participating in the routing protocol get a copy of the link-state information from all the other nodes. As the term flooding suggests, the basic idea is for a node to send its link-state information out on all of its directly connected links, with each node that receives this information forwarding it out on all of its links. This process continues until the information has reached all the nodes in the network. 18. Give the IPv6 packet format. 19. What is multicast? Multicast is a special form of broadcast in which packets are delivered to a specified subgroup of network hosts. 20. Write short note on routers. The nodes that interconnect the networks are called routers. They are also sometimes called gateways. They relay packets among multiple interconnected networks.

UNIT-4
1. Define UDP. UDP means User Datagram Protocol. It is a transport protocol of the Internet architecture that provides a connectionless datagram service to application-level processes. 2. Give the packet format of UDP header. 3. Define TCP. TCP means Transmission Control Protocol. Connection-oriented transport protocol of

the Internet architecture. TCP provides a reliable, byte-stream delivery service. 4. Differentiate between flow control and congestion control. Flow Control Congestion Control Flow control involves preventing senders from overrunning the capacity of receivers. Congestion control involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded 5. What is meant by segment? At the sending and receiving end of the transmission, TCP divides long transmission into smaller data units and packages each into a frame called a segment. 6. Show how TCP manages a byte stream. 7. What is three-way handshake algorithm? The algorithm used by TCP to establish and terminate a connection is called a threeway handshake. We first describe the basic algorithm and then show how it is used by TCP. The three-way handshake involves the exchange of three messages between the client and the server. 8. What is silly window syndrome? Silly window syndrome is a condition occurring in TCP that may arise if each time the receiver opens its receive window a small amount, the sender sends a small segment to fill the window. The result is many small segments and an inefficient use of bandwidth. 9. What is meant by congestion? Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. 10. Define QoS. QoS means Quality of Service. It is a packet delivery guarantees provided by a network architecture. Usually related to performance guarantees, such as bandwidth and delay. The Internet offers a best-effort delivery service, meaning that every effort is made to deliver a packet but delivery is not guaranteed. 11. What is the use of slow start? Slow start is used to increase the congestion window rapidly from a cold start. Slow start effectively increases the congestion window exponentially, rather than linearly. 12. Differentiate between TCP and UDP. TCP UDP It is a connection oriented protocol. It is a connectionless protocol. It provides a reliable delivery.

It provides unreliable service. 13. List the approaches to support QoS. The approaches to support QoS are, Fine-Grained Approaches, which provide QoS to individual applications or flows, Coarse-Grained Approaches, which provide QoS to large classes of data or aggregated traffic. 14. Give the header format of TCP. 15. What are the two things that have to be done in packet classifying and scheduling? The two things that have to be done in packet classifying and scheduling are, Associate each packet with the appropriate reservation so that it can be handled correctly, a process known as classifying packets. Manage the packets in the queues so that they receive the service that has been requested, a process known as packet scheduling. 16. Draw the UDP message queue. 17. List the fields of a pseudo header. The fields of a pseudo header are, Protocol number, Source IP address, Destination IP address, UDP length field. 18. What is sliding window algorithm? Sliding window algorithm is an algorithm that allows the sender to transmit multiple packets before receiving an acknowledgment. As acknowledgments are returned for those packets in the window that were sent first, the window slides and more packets may be sent. The sliding window algorithm combines reliable delivery with a high throughput. 19. Draw the timeline for three-way handshake algorithm. 20. Define RED. RED means Random early detection. It is a queuing discipline for routers in which, when congestion is anticipated, packets are randomly dropped to alert the senders to slow down.

UNIT-5
1. What is World Wide Web? World Wide Web is a hypermedia information service on the Internet. It is a repository or information spread all over the world and linked together. 2. What is Uniform Resource Identifier? Uniform resource identifier is a generalization of the URL. It is used in conjunction with SIP to set up multimedia sessions. 3. What is name resolution? Name resolution is the action of resolving host names (which are easy for humans to read) into their corresponding addresses (which machines can read).

4. What is mean by zone? Zone is a partition of the domain name hierarchy, corresponding to an administrative authority that is responsible for that portion of the hierarchy. Each zone must have at least two name servers to field DNS requests for the zone. 5. What is mean by SNMP? SNMP means Simple Network Management Protocol. It is an Internet protocol that allows the monitoring of hosts, networks, and routers. 6. What is mean by SMTP? SMTP means Simple Mail Transfer Protocol. It is an electronic mail protocol of the Internet. It is a standard protocol for transferring mail between hosts in the TCP/IP suite. 7. What is mean by HTTP? HTTP means Hyper Text Transport Protocol. It is an application-level protocol based on a request/reply paradigm and used in the World Wide Web. HTTP uses TCP connections to transfer data. 8. What is mean by DNS? DNS means Domain name system. It is a client/server application that identifies each host on the internet with an unique user friendly name. 9. What is mean by telnet? Telnet is a Remote terminal protocol of the Internet architecture. Telnet allows you to interact with a remote system as if your terminal is directly connected to that machine. 10. What is mean by FTP? FTP means File Transfer Protocol. It is the standard protocol of the Internet architecture for transferring files between hosts. It is built on top of TCP. 11. What is mean by IMAP? IMAP means Internet Message Access Protocol. It is an application-layer protocol that allows a user to retrieve his or her email from a mail server. 12. What do you meant b PGP? PGP means Pretty Good Privacy. It is a collection of public domain software that provides privacy and authentication capabilities using RSA and that use a mesh of trust for public key distribution. 13. In what way HTTP is similar to SMTP? HTTP is like SMTP because the data transfer between the client and server look like SMTP messages. 14. List some of the security services. Some of the security services are, Authentication, Access control, Data confidentiality, Integrity. 15. List the types of HTTP messages. The types of HTTP messages are, Request message, Response message. 16. What are the functions of User Agent?

The functions of User Agent are, Prepares the message, Creates the envelope, Puts the message in the envelope. 17. What are the functions of a browser? The functions of a browser are, Fetches the page requested, Interprets the text and formatting commands it contain, Displays the page. 18. Define the terms Cryptanalysis and Cryptology. Cryptanalysis : The art of breaking ciphers is called Cryptanalysis. Cryptology : The art of devising ciphers and breaking them collectively is called as Cryptanalysis. 19. Define URL. URL means Uniform resource locator. It is a text string used to identify the location of Internet resources. It is a standard for specifying any kind of information on the internet. 20. What are the types of security attacks? The types of security attacks are, Passive attacks, Active attacks.

S-ar putea să vă placă și