You are on page 1of 4

Smt.

Chandaben Mohanbhai Patel Institute of Computer Applications CA807 Network Technologies Question Bank

UNIT - I
Classful Internet Address
Sr. No 1 2 3 4 5 6 7 8 9 Question What is a Network Address? Define Network Mask, Loopback Address What is a Subnet Mask? Define Limited Broadcasting & Directed Broadcasting When All 0-s address is used? One of the addresses in a block is 167.199.170.82/27. Find the number of addresses in the network, the first address, and the last address One of the addresses in a block is 17.63.110.114/24. Find the number of addresses, the first address, and the last address in the block. Explain CIDR in brief. Define weaknesses in Intrnet Addressing. Marks 1 1 1 1 1 3 3 2 4

ARP
Sr. No 1 2 3 4 5 6 7 8 9 Question Why Address Mapping is required? How it can be performed? Explain it in detail. How ARP is working? Which are two type of Physical Addresses? Explain format of ARP packet. What is ARP cache time out? Why do we need it? Should ARP update the cache if an old entry already exist for a given IP address? Why or Why not? Is the size of the ARP packet fixed? Explain. Why Proxy ARP is used? Explain. What is RARP? Marks 3 4 2 3 4 3 2 3 2

UNIT - II_III
Classful Internet Address
Sr. No 1 2 3 4 5 Question Which fields of the IPv4header change from route to router? What are different IP datagram options? Describe each one in brief. Write a short note on fragmentation and reassembly of fragments in IP datagram Explain the term Direct & Indirect Delivery of Data forwarding. Explain IP Routing Algorithm. Marks 2 3 4 2 3

ICMP
Sr. No 1 2 3 4 5 6 7 8 9 10 11 12 13 Question When routers generate ICMP messages, to where do they send them? Are ICMP messages delivered reliably? If so, briey explain the mechanism. If not, give a reason why not. Name a circumstance under which an end-host (not a router) will send an ICMP message. Which fields are related to Fragmentation? A packet has arrived with an M bit value of 0. Is this the first fragment, the last fragment, or a middle fragment? Do we know if the packet was fragmented? A packet has arrived with an M bit value of 1 and a fragmentation offset value of zero. Is this the first fragment, the last fragment, or a middle fragment? What is the maximum number of routers that can be recorded if the timestamp option has a flag value of 1? Why? Explain Timestamp Message format in ICMP. What is the function of routing table? How the errors are detected in IP? Why is there a restriction on the generation of an ICMP message in response to a failed ICMP error message? What is the purpose of including the IP header and the first 8 bytes of datagram data in the error reporting ICMP messages? How can we determine if an IP packet is carrying an ICMP packet? Marks 3 3 5 2 1 1 1 3 2 2 2 2 2

TCP
Sr. No 1 2 3 4 5 6 7 8 9 10 11 12 13 Question What is TCP? Explain the three types of addresses in TCP/IP? What is process-to-process communication? What is Multiplexing and De-multiplexing? Explain buffering in TCP. Explain properties of The Relaible Delivery Service. Explain Passive & Active Open. What do you mean by Out of Band Data situation? How it its handled in TCP? What is connection establishment & connection Termination? Explain Silly Window Syndrome. What is the minimum and maximum length of the header in the TCP segment and IP datagram? Write a short note on fragmentation and reassembly of fragments in IP datagram. Explain control field of TCP segment. Marks 2 3 2 2 3 3 2 3 4 3 1 3 2

CIDR
Sr. No 1 2 3 4 Question In which situation Source Quench Mesaage will be generated by router? What is subnet addresing? Which Algorithms are used for Classless Adrress Lookup? Explain how router discovery is performed in network? Marks

UNIT - IV
UDP
Sr. No 1 2 3 4 5 Question What is UDP Pseudoheader & explain why it is required? How congestion control mechanism is handled in UDP? Draw format of UDP Message Format & explain each field. Are both UDP and IP unreliable to the same degree? Why or why not? Answer the following questions: a. What is the minimum size of a UDP datagram? b. What is the maximum size of a UDP datagram? c. What is the minimum size of the process data that can be encapsulated in a UDP datagram? d. What is the maximum size of the process data that can be encapsulated in a UDP datagram? Marks 3 2 3 2 4

Mobile IP
Sr. No 1 2 3 4 5 6 7 8 Question Explain difference between Stationary Host & Mobile Host. Define the following terms: Home Address, care-of-address, foreign agent Is registration required if the mobile host acts as a foreign agent? Explain your answer. Discuss how the ICMP router solicitation message can also be used for agent solicitation. Why are there no extra fields? Which protocol is the carrier of the agent advertisement and solicitation messages? Explain why the registration request and reply are not directly encapsulated in an IP datagram. Why is there a need for the UDP user datagram? Which are inefficiency of Mobile IP? Marks 2 3

2 2 1 2 3

UNIT- V
Bootstrap & Autoconfiguration
Sr. No 1 2 3 4 5 Question Why we need Host Configuration? Which protocols are used for Host Configuration? Explain it in brief. Which fields are filled by DHCP server in Repsonse? Why does a newly added host need to know the IP address of a router and a name server? Why padding field is used in DHCP message? Marks 2 3 3 2 2

Private Network Interconnection


Sr. No 1 2 3 4 5 Question Define : Private Networks & Hybrid Networks How can an organization that uses the Internet to connect its sites keeps its data private? What is IP-to-IP tunneling? Why it is required? What is NAT? Explain complete mechanism of it. How NAT is interacting with ICMP? Marks 2 3 3 4 2

Remote Login (TELNET, Rlogin)


Sr. No 1 2 3 4 5 6 7 8 9 Question Explain Local Login. Explain Remote Login. Explain NVT mechanism. What is Embedding? Explain it with proper example How SSH is differ from TELNET? Explain in brief How server is controlled using Control characters? What is out-of -Band signaling? Which are components of SSH? Explain working of it in brief. Explain port forwarding mechanism used in SSH. Marks 2 2 3 4 4 4 3 4 2

File Transfer and Access ( FTP, TFTP, NFS)


Sr. No 1 2 3 4 Question How conncetions are established to transfer a file using FTP? Explain it in brief. What is the purpose of Control Connection in FTP? Which are the file types in FTP? Explain Transmission modes of FTP? Marks 2 2 3 3

DNS
Sr. No 1 2 3 4 5 6 7 8 Question Define purpose of DNS. Explain Label, Domain Name. Explain FQDN, PQDN. How the name spaces are distributed? Explain Root Server, Primary & Secondary Server. What is name-address resolution in DNS? Which are the different types of resolution used for name - address resolution? Explain each in brief. Why caching is required for resolution purpose? Marks 1 2 2 1 3 2 4 3

UNIT - VI
Electronic Mail - SMTP
Sr. No 1 2 3 4 5 6 7 8 9 Question Which are the phases occur in Mail Transfer phase? Explain each in brief. List the various commands can be used in SMTP. Which services are provided by user agent in SMTP? List the various responses can be used in SMTP. Write a short note on POP3. Write a short note on IMAP4. What is MIME? Explain how it can be used in Email? Write a short note on URL. How SMTP works? Explain with example. Marks 5 2 3 2 2 2 4 3 3

Internet Seurity
Sr. No 1 2 3 4 5 6 Question Explain IPSec Encapsulating Security Payload. What is the use of IPSec- AH protocol?Explain the fields used in it. What do you mean by mutable header fields? How they are handled in IPSec? What are different aspects of protection? Explain each one in brief. What is packet filtering? Explain its working using example. What is ESP? Why do we need it? Draw packet with ESP header and trailer. Marks 4 4 2 2 2 3

You might also like