0% found this document useful (0 votes)
12 views5 pages

CN Imp

Imps for cn

Uploaded by

domgiesingh69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views5 pages

CN Imp

Imps for cn

Uploaded by

domgiesingh69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1 “Discuss throughput in the network 03

2 [ Whatis compu 03
3 Illustrate various delays which are occurring in data packet 04
transmission.
4 Explain different network topologies in detail. 07

5 Explain in detail ISO/OSI network model with near sketch. 07

Which of the OSI layers handles each of the following:


6 i) Dividing the message into segments. 03
ii) Determining which route through the subnet to use.
iii) Dividing the transmitted bit stream into frames.
' Differ 3 tocol stack and O \ 04

8 07

9 07

10 Discuss the five layer internet protocol stack along with the 07
functionalities of each layer in detail.
n What is the difference between a host and an end system? List 03
_several different types of end systems.

. """ 04
UNIT -2

= Name of Question Marks


1 What is web? Explain its architecture. 03
2 ‘What is URL? What are its identifiers? Explain them. 03

3 07

4 ‘What is socket? Explain its importance at transport layer protocols. 03

s - )
s
U 07

6 Justify the statement, “HTTP server is stateless™. 03

7 State l‘he port nu1I1:|‘b-er for th‘e following application layer protocols. 04
1) FTP 1i) HTTP ii1) SMTP iv) POP3
For the below mentioned internet applications protocol. mention the
8 underlying transport protocol (TCP or UDP). 07
i) Telnet ii) FTP iii) HTTP
9 ] Don 03
10 ‘Why do HTTP, FTP, SMTP, and POP3 run on top of TCP rather 04
than on UDP? Name one application that uses UDP and why?
s r
4 Marks
1 Explain the wave length division multiplexing in detail. 04

) Describe flow control and error control in TCP. 07

3 What 1s the significance of the following flags in TCP segment? 04


i) URG 1) SYN iii) FIN iv) PSH
4 |Ewl T TR TR 07

5 How end-to-end congestion control is provided by TCP. 07

6 Describe Go Back N and Selective Repeat protocol 07


7 Consider the 7-bit generator, G=10011, and suppose that D has the 07
value1010101010. What is the value of R?
8 C Hference b connection o . 03

9 | Explain RDT 2.0. 07


10 Give difference between flow control verses Congestion Control. 03

1 Explain in brief socket. multiplexing and demultiplexing. 03

2 Explain TCP segment structure and justify the importance of its 07


field values.
04
2 07

3 Explain datagram networks and virtual circuit networks. 04


4 Explain the shortest path routing algorithm. 07

03
3 04
6 | Define the term unicasting, multicasting, and broadcasting 03
7 What is the relevance of Type of Service (ToS) and Time to Live 04
(TTL) field in IPV4 packet?
3 ExplainLink State Routing 07

What are the three most important network-layer functions in a 03


virtual circuit network?
10 Explain Route Summarization or Route Aggregation in network 04
layer.
T What is the purpose of Address Resolution Protocol (ARP) and 03
Network Address Translation (NAT)?
List and briefly describe three types of switching fabrics used in
12 Routers. Which, if any, can send multiple packets across the fabric 04
in parallel?
13 Explain the class-full sub-netting with example. 07
14 Explain distance vector routing algorithm. 07
15 How DHCP protocol works? 04

07

Besides bandwidth and latency, what other parameter(s) is/are


needed to give a good characterization of the quality of service
17 offered by network used for 04
(i) Online financial transaction traffic?
ii) Video streaming traffic?
18 L IP A 1y 04
19 Why are different inter-AS and intra-AS protocols used in the 04
Internet?
UNIT -5

-~ Name of Marks
1 03
2 What is the use of two dimensional parity in error detection? 03

3 Discuss the MAC sub layer Design issues? 03


4 What is medium access control sub layer? 04
5 Describe and discuss the data link layer design issues. 07

6 Explain the UDP checksum mechanism for error detection with 03


example.
7 State the difference between bit rate and baud rate. 04

8 What is the minimum hamming distance? 03

9 07

10 lain the following static channel allocations mechanisms: 04


i) TDMA ii) FDMA
11 Explain p-persistent CSMA protocol in detail. 07
12 Data link protocols almost always put CRC in a trailer rather than in 03
a header. Why?
13 D 1e work 07

14 03

15 03

16 ; 04
17 Describe how a botnet can be created, and how it can be used for a 03
DDoS attack

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy