0% found this document useful (0 votes)
51 views2 pages

Ec1121 6 Sem

1. The document is an exam for a Communication Network Protocols course containing 32 multiple choice and descriptive questions covering various networking topics. 2. The exam is divided into 3 parts - Part A contains 20 multiple choice questions to be answered on an OMR sheet within 45 minutes. Part B and C contain descriptive questions to be answered in a booklet. 3. The topics covered include Ethernet, IP addressing, routing protocols like OSPF and BGP, transport layer protocols like TCP and UDP, firewalls, IPv4 vs IPv6, domain name system and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views2 pages

Ec1121 6 Sem

1. The document is an exam for a Communication Network Protocols course containing 32 multiple choice and descriptive questions covering various networking topics. 2. The exam is divided into 3 parts - Part A contains 20 multiple choice questions to be answered on an OMR sheet within 45 minutes. Part B and C contain descriptive questions to be answered in a booklet. 3. The topics covered include Ethernet, IP addressing, routing protocols like OSPF and BGP, transport layer protocols like TCP and UDP, firewalls, IPv4 vs IPv6, domain name system and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Reg. No.

B.Tech. DEGREE EXAMINATION, MAy 2016


Sixth Semester

ECI I2I _ COMMI.JNICATION NETWORK PROTOCOLS


(For the candidates dmitted during the rcadmtic yeo 2013 2014 and 2014 -2015)
-
Note:
(D Part - A should be answered h OMR sheet within first 45 minutes and OMR street should be handed
over to hall invigilator at the end of 456 minute.
(iD Port - B and Part - C should be answercd in answer booklet.

Time: Three Hours Max- Marks: 100

PART-A(20x1=20Marks)
Answer ALL Questions
l. uses cable of four turisted pairs that connect each station to a common hub
(A) l0 base -F (B) l0 base -T
(c) l0 base -5 @) l0base2
A. is a set of rules that governs data comrnunication
(A) Protocol @) Forum
(c) Intemet (D) Hardware

3. Ethemet defines bit addressing scheme


(A) 16 (B) 08
(c) 24 (D) 48
4. Size of IPv4 subnet mask is
(A) 16 (B) 32
(c\ 64 (D) 128
5. _ addressing are reselved for future purposes
(A) Class A @) Class E
(C) Class B @) Class C
6. For_ the default mask in dotteddecimal is 255.0.0.0
(A) Class D (B) Class B
(C) Class A @) Class C
7. Given the network address 17.0.0.0. find the class
(A) Class D @) ClassC
(C) Class B @) ClassA
8. message in ICMP was desiped to be used during the congestion to control flow
(A) Source queuch @) Time exceeded
(c) Parameter problem @) Redirection
9. InlPdatagram field dcftres the priority ofthe datagram
(A) Tos (B) Flag
(C) Precedence (D) Protocol
Pagc I of3 ?TYTACECII2I
10. the datagram is called fragmentation
(A) Dividing @) Multiplying ,?, Find out fte network address for the gven IP address
(c) Adding @) Subnacting (D 23.s6.7.e1
11. protocol is based on link state routing
(ir) 132.6317.85.
(A) RP (B) OSPF 7n Explain in detail about ICMP message O?es.
(c) ARP (D) RARP
25. Discuss in detail about record route option.
12. athibute is one that every BGP router must recogrrize
(A) Optional 26. Write notes on fully qualified and partialty qualified domain name.
@) Transitive
(c) Wellknown @) Nontansifive 11 Explain proxy firewall.

13. function binds a permanent destination to a socket PART-C (5 x 12 -- 60 Merks)


(A) Open @) Close AnswerALL Questions
(C) Send @) Connect
28. a Explain the Ethernet technolory used in LAN.
14. Which ofthe following function is not used in sending data though a socket
(A) Send (oR)
@) Write b. Explain in detail about the internetworking concepts and architectural model.
(C) Send to (D) Read
29. a. Explain in detail about ARP operation and its packet fomrat.
I 5. In _ name space, each name is made up of several parts
(A) Flat @) Hierarchical (oR)
(C) Non-hierarchical @) Address b.i. Discuss about classes and blocks in detail. (8 Marks)

16. A full domain name is a sequeoce of labels separated by ii. Discuss about notations to rq)resent an IP address. (4 Ma*s)
(A) Comma @) Colon
(C) Dot (D) Semicolon 30, a- Explain about IP datagram format.
(oR)
17. A proxy firewall filters at the _ layer b. Explain the border gateway protocol @GP) with its message types.
(A) Application @) Physical
(C) Network (D) Transport 31. a. Discuss in detail about
(i) Distibution of name space
18. System must prevent outsiders from making copies of data as it passes across network is (ii) Domain name space
called
(A) Privacy @) Authentication (oR)
(C) Filtering (D) Policy b. Explain in detail the socket interface to specify a local address, how a server handles
multiple services.
t9. _ protocol in transport layer security is used to sigral an error to other parly
(A) Alert (B) Record 32. a.i. Explain IFv6 feahres and its packet format in detail.
(c) Handshake @) Change cipher spec ii. Compare tPv4 and IPv6.

20. A packet filter firewall filters at the layer (oR)


(A) Application @) Network b. Explain in detail abut transport layer security (TLS).
(C) Physical @) Session

PART-B(5 x4=20 Merks) rtrt***


Answer ANY FM Questions
21. Give short notes on LAN and WAN.
22. Write the properties of internet.
Pegc 2 of3 27MA6ECrr2I Page 3 of3 27MA6ECIr2t

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy