You are on page 1of 11

B.E/B.Tech.

DEGREE EXAMINATION, MAY/JUNE 2013


CS 2363/CS 65/10144 CS 503- COMPUTER NETWORKS
PART A (10*2=20Marks)
1.Show with an examples how encoding can be done using NRZI technique.
NRZI (Non-Return to Zero Inverted)
One encoded as a transition
zero encoded as the absence of a transition
solves the problem of consecutive ones
no help with a string of zeros

2.What is meant by 1 persistent CSMA?

1-persistent CSMA

when a station has a packet:

it waits until the medium is free to transmit the packet

if a collision occurs, the station waits a random amount of time

first transmission results in a collision if several stations are waiting for the channel

3.What are the uses of internetwork routing?


Routing is the act of moving information across an internetwork from a source to a destination
Routing involves two basic activities:

determining optimal routing paths


transporting packets through an internetwork

4.What is the purpose of subnetting?

Subnetting is basically just a way of splitting a TCP/IP network into smaller, more
manageable pieces. The basic idea is that if you have an excessive amount of traffic flowing across
your network, then that traffic can cause your network to run slowly. When you subnet your network,
you are splitting the network into a separate, but interconnected network.
The main purpose of subnetting is to help relieve network congestion.
5.List any four QoS parameters.

Bandwidth - the rate at which an application's traffic must be carried by the network

Latency - the delay that an application can tolerate in delivering a packet of data

Jitter - the variation in latency

Loss - the percentage of lost data

6.Differentiate flow control from congestion control.


BELOW
7.Define cryptography.
The art of protecting information by transforming it (encrypting it) into an unreadable format,
called cipher text.
Only those who possess a secret key can decipher (or decrypt) the message intoplain text..
8.What is meant by PGP?
Pretty Good Privacy (PGP) is a data encryption and decryption computer program that
provides cryptographic privacy and authentication for data communication. PGP is often used for
signing, encrypting, and decrypting texts, e-mails, files, directories.
9.State the advantages of DNS.
BELOW
10.What are overlay networks?
An overlay network is a computer network, which is built on the top of another network.
Nodes in the overlay can be thought of as being connected by virtual or logical links, each of which
corresponds to a path, perhaps through many physical links, in the underlying network. For example,
distributed systems such as peer-to-peer networks and client-server applications are overlay networks
because their nodes run on top of the Internet.
CS 2363/65/10144/503 COMPUTER NETWORKS Question paper
Part A
NOVEMBER/DECEMBER 2012
1.Give the basic building blocks of network.

Nodes Hosts for users


Switches Forward messages across a LAN
Routers Forward messages across the Internet
Switch and/or Router must for Communication
Special purpose hardware
Links TP/ Fibre/ Coaxial cable/ Wireless(radio, microwave, infrared)
2.What is FDDI?
FDDI (Fiber Distributed Data Interface) is a set of ANSI and ISO standards for data
transmission on fiber optic lines in a local area network (LAN) that can extend in range up to 200 km
(124 miles). TheFDDI protocol is based on the token ring protocol.
3.What is internetworking?
Internetworking is the practice of connecting a computer network with other networks
through the use of gateways that provide a common method of routing information packets between
the networks. The resulting system of interconnected networks is called an internetwork, or simply
an internet
4.What is IPV6?
IPv6 is the Internet's next-generation protocol, designed to replace the current Internet
Protocol, IP Version 4. In order to communicate over the Internet, computers and other devices must
have sender and receiver addresses. These numeric addresses are known as Internet Protocol
addresses.
iPv6 uses a 128-bit address
IPv6 addresses are represented as eight groups of four hexadecimal digits separated by
colons, for example 2001:0db8:85a3:0042:1000:8a2e:0370:7334
5.Give the functions of ARP.
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address
(IP address) to a physical machine address that is recognized in the local network.
6.Define congestion.
Network congestion is defined as the situation in which an increase in data transmissions
results in a proportionately smaller (or even a reduction in) throughput. In other words, when a
network is congested, the more data one tries to send, the less data is actually successfully sent.
7.Define cryptography.
ABOVE
8.What is PGP?
ABOVE
9.What is HTTP?
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed,
collaborative, hypermedia information systems.HTTP is the foundation of data communication for
the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes
containing text.
10.What are overlay networks?
ABOVE
PART A FAQ
1. State the functions of bridge.
A device used to connect two separate Ethernet networks into one extended Ethernet.
Bridges only forward packets between networks that are destined for the other network.
2. Define framing?

Framing: determines start and end of packets (all we see is a string of bits) and their order by
inserting packet headers.

3. Differentiate ARP and RARP


1. ARP stands for Address Resolution Protocol. ARP is used to map 32-bit IP address to a 48bit Ethernet address. This is used to send data over a network. On the other hand RARP stands
for Reserve Address Resolution Protocol
2. ARP will resolve the MAC address of a device for which we know the IP address. RARP
will resolve the IP address of the device for which we know the MAC address.
4. What is the purpose of subnetting?
1. To divide a large network into smaller segments to reduce traffic and speed up the sections
of your network.
2. To connect networks across geographical areas.
3. To connect different topologies such as Ethernet, Token Ring, and FDDI together via
routers.
4. To avoid physical limitations such as maximum cable lengths or exceeding the maximum
number of computers on a segment.
5. Difference between flow control and error control?
Flow control
Set of procedures used to restrict the amount of data that sender can send while waiting for
acknowledgment
Two main Approaches
(1) Stop-and-Wait: sender waits until it receives ACK before sending next frame
(2) Sliding Window: sender can send W frames before waiting for ACKs
Error Control
Error control includes both error detection and error correction.It allows the receiver to
inform the sender if a frame is lost or damaged during transmission and coordinates the
retransmission of those frames by the sender.
Error Control Approaches
(1) Forward Error Correction (FEC)

(2) Error Detection + (ARQ)


6. Define slow start
Slow-start is one of the algorithms that TCP uses to control congestion inside the network. It
is also known as the exponential growth phase.
Slow-start begins initially with a congestion window Size (cwnd) of 1, 2 or 10.
The value of the Congestion Window will be increased with each acknowledgment received,
effectively doubling the window size each round trip time.
If a loss event occurs, TCP assumes that it is due to network congestion and takes steps to
reduce the offered load on the network.
7. What is digital signature?
A digital code (generated and authenticated by public key encryption) which is attached to an
electronically transmitted document to verify its contents and the sender's identity.
8. What is SSH?
Secure Shell, or SSH, is a cryptographic (encrypted) network protocol for initiating textbased shell sessions on remote machines in a secure way.
This allows a user to run commands on a machine's command prompt without them being
physically present near the machine.
It also allows a user to establish a secure channel over an insecure network in a client-server
architecture, connecting an SSH client application with an SSH server.
Common applications include remote command-line login and remote command execution.
9. State advantages of DNS?
DNS is the abbreviated form of Domain Name System or Domain Name Server.
This is an Internet service, which converts domain names in the form of IP addresses.
1.Capable of providing security.
2.Errors are automatically checked.
3.Ease of using.
4.Flexibility of use.
5.Consistent to use.
6.Easy to maintain.
10. How is HTTP related to WWW?
The World Wide Web (www, W3) is an information system of interlinked hypertext documents
that are accessed via the Internet.

HTTP is the underlying protocol used by the World Wide Web. HTTP defines how messages
are formatted and transmitted, and what actions Web servers and browsers should take in response
to various commands.
CS 2363/65/10144/503 COMPUTER NETWORKS Question paper
Part A
MAY/JUNE 2012
1.Define network
Network

Set of devices (often referred to as nodes) connected by communication links.


Group of connected communicating devices such as computers and printers.
Combination of hardware and software that sends data from one location to another.

2.Define Framing
ABOVE
3. What are need for protocols
Protocols are set of rules and conventions used for communication of entities in different systems
Protocols are Building blocks of a network architecture
Each protocol object has two different interfaces
service interface: defines operations on this protocol
peer-to-peer interface: defines messages exchanged with peer
A Network Architecture is a structured set of protocols that implement the exchange
of information between computers
4. What is the use of IP address
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication.
An IP address serves two principal functions:
host or network interface identification
location addressing.
5. What is client process?
The client is a process (program) that sends a message to a server process (program),
requesting that the server perform a task (service). Client programs usually manage the user-interface
portion of the application, validate data entered by the user, dispatch requests to
server programs, and sometimes execute business logic
The client process runs on the client machine and issues HTTP requests one after another for
the server.
Currently, the clients send HTTP requests in the format of
``GET http://server_name:port_number/dummy[filenum].html HTTP/1.0'',
6.What is symmetric key algorithm?
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for
both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be
a simple transformation to go between the two keys.

7.Define HTML
HyperText Markup Language, the authoring language used to create documents on the World Wide
Web
HTML defines the structure and layout of a Web document by using a variety of tags and attributes.
The correct structure for an HTML document starts with <HTML><HEAD>(enter here what
document is about)<BODY> and ends with </BODY></HTML>
8.State Why telnet uses Network virtual Terminal
TELNET (TErminal NETwork) is a general purpose client-server program that lets user
access any application on a remote computer. It establishes a connection to a remote system, such
that the local terminal appears to be a terminal at the remote system. Telnet uses TCP through well
known port 2
The Network Virtual Terminal (NVT) is a representation of a basic terminal and provides a
standard that the computers on either end of a Telnet connection are assumed to follow. It defines
how data and commands are sent across the network. Thus, NVT allows interoperability between
Telnet and a variety of heterogeneous computers and operating systems. It consists of a virtual
keyboard that generates user-specified characters and a printer that displays specific characters.
CS 2363/65/10144/503 COMPUTER NETWORKS Question paper
Part A
MAY/JUNE 2014
1. List the advantages of FDDI?
UNIT 1- two marks
1. What are Advantages and disadvantages of various topology
Mesh Topology
Dedicated point-to-point links to every other device
n (n-1)/2 links an each device will have n-1 I/O ports
Advantages
Dedicated links no traffic problems
Robust
Privacy/Security
Easy fault identification and isolation
Disadvantages
More amount of cabling and I/O ports requirement
Installation and reconnection is difficult
Expensive
Star Topology
Dedicated point-to-point links to central controller (hub)
Controller acts as exchange
Advantages
Less expensive
Robustness

Disadvantages
More cabling requirement than ring and bus topologies
Bus Topology
Multipoint configuration
One cable acts as a backbone to link all devices
Advantages: Ease of installation, less cabling
Disadvantages: Difficult reconnection and fault isolation, a fault/break in the bus cable stops all
transmission
Ring Topology
Dedicated point-to-point configuration to neighbors
Signal is passed from device to device until it reaches destination
Each device functions as a repeater
Advantages: easy to install and reconfigure
Disadvantages: limited ring length and no: of devices; break in a ring can disable entire network
2. List the Categories of Networks
Based on size, ownership, distance covered, and physical architecture
Local Area Network (LAN) smaller geographical area
Metropolitan Area Network (MAN) network extended over an entire city
Wide Area Network (WAN) large geographical area
3. What are Protocols

Set of rules that governs data communications


Defines what is communicated, how it is communicated, and when it is communicated
Key elements

Syntax: Structure/ format of data order in which it is presented


Semantics: meaning of each section of bits- how pattern to be interpreted What action to be
taken
4. Compare OSI and TCP/IP model

OSI
5.

OSI stands for OpenSystem


Interconnection because it allows any
two different systems to communicate

1)It has 7 layers


2)Transport layer gurantees delivery
of packets
3)Horizontal approach
4)Seperate presentation layer
5)Seperate session layer
6)Network layer provides both
connectionless and connection
oriented services
7)It defines the services,interfaces
and protocols very clearly and
makes a clear distinction between
them
8)OSI truly is a general model

TCP/IP
TCP/IP stands for Transmission Control
Protocol/Internet Protocol.

1)Has 4 layers

Simil
aritie
s of
OSI
and

2)Transport layer does not gurantees


delivery of packets
3)Vertical approach
4)No session layer, characteristics are
provided by transport layer
5)No presentation layer, characteristics are
provided by application layer
6)Network layer provides only connection
less services
7)It does not clearly distinguishes between
service interface and protocols
8)TCP/IP can not be used for any other
application

TCP/IP model
They share similar architecture
They share a common application layer
Both models have comparable transport and network layers
Both models assume that packets are switchedBasically this means that individual packets may take differing paths in order to reach the same
destination.
6. Physical Layer Responsibilities
Responsible for transmitting individual bits from one node to the
next
1. Defines the characteristics of interfaces and transmission media
2. Defines the type of transmission media
3. To transmit this stream of bits (0s and 1s), it must be encoded into
signals.
Physical layer only defines the type of representation of bits.
4. Internet Architecture

7.

8.

9.

10.

11.

12.

13.

5. Defines the transmission rate. i.e., number of bits per second.


6. Sender and receiver machine clock must be adjusted in order to have a
same bit rate at both the sender and receiver side.
Data Link Layer Responsibilities
Responsible for transmitting frames from one to the next
Framing
Physical addressing
Flow control
Error control
Access control
Network Layer Responsibilities
Source-to-destination delivery, possibly across multiple networks
Logical addressing
Routing
Forwarding
Transport Layer Responsibilities
Delivery of message from one process (running programs) to
another
Process-to-process delivery of entire message
Port addressing
Segmentation and reassembly
Connection control
End-to-end flow control
End-to-end error control
Session Layer Responsiblities
Establishes terminates and maintains user connections
Dialogue discipline
Recovery
Grouping
Presentation Layer Responsiblities
Allows application and host to perform common data formatting
Data Compression :
Encryption:
Data translation:
.
Decryption:
Application Layer Responsibilities
Provides interface between software application and network for
interpreting application requests
1. Enables user access to the network
2. User interfaces and support for services such as
i. E-Mail services forwarding and storage.
ii. File transfer and accesses to and from the remote host.
iii. Remote log-in: User can enter into a remote system and have
the resources.
iv. WWW Services.
Define bandwidth?
Bandwidth is the amount of data that passes through a network
connection over time (in a certain period of time) as measured in bps (bits
per second).

Throughput = Transfer Size / Transfer Time


14. Define data transmission rate
Data transmission measured in bits per second (bps) is called the baud rate
or bit rate - it is the measure of bandwidth. It is commonly measured in thousands
of bits per second or kilobits per second.
The abbreviation for kilobits per second is kbps or simply k.
One kilobit equals about 1,000 bits.If a computer can receive 5KB in a
second, it would take 4 seconds for it to receive a file 20K in length.
15. If a computer uses 56kbps dial up modem how much time does it take for downloading
20k image file
If a computer connects to the Internet using a 56 kbps dialup modem, in
theory, it means that the computer could receive 56,000 bits per second (56
kbps).
That would mean that the computer could receive about 7,000 bytes per
second. Remember that a byte equals 8 bits, so 56,000 bps/ 8 bits = 7,000 bytes.
So, to receive the 20K image file, the 56 kbps dialup connection would
require slightly less than 3 seconds to receive the file (20K/7,000 bytes=2.85
seconds).
Transfer Time= Transfer Size / Throughput
16. What Is Network Latency (also called as delay)
The term latency refers to any of several kinds of delays typically incurred
in processing of network data.
Latency = Propagation+Transmit+Queue
Propagation = Distance / Speed of Light
Transmit = Size / Bandwidth
17. What is encoding and decoding
Encoding is the process of putting a sequence of characters (letters,
numbers, punctuation, and certain symbols) into a specialized digital format for
efficient transmission or transfer. Decoding is the opposite process -- the conversion
of a digital signal into a sequence of characters.
18.What are encoding methods available for data transmission
Non Return to zero (NRZ)
Non Return to zero Inverted(NRZI)
Manchester
4B/5B encoding

You might also like