You are on page 1of 3

Question Bank – Computer Networks [RCS-601]

Unit-III & IV

1. Why does UDP exist? When will UDP be used instead of TCP?
2. What is UDP? What is the maximum and minimum size of a UDP datagram? Also discuss the use of UDP.
3. Would it not have been enough to just let user processes send raw IP packets? Give reason in support to your answer.
4. What are two army problem and a three way handshake? State the elements of transport protocol.
5. How does transport layer perform duplication control?
6. How does the transport layer ensure that the complete message arrives at the destination and in the proper order.
7. A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 1 Mbps. It is
initially filled at a rate of 1 Mbps. It is initially filled to a capacity with 8 megabyte. How long can the computer
transmit at the full 6 Mbps? [Unit III]
8. Describe the choke packet method of congestion control. You are also required to explain the variation in the above
mentioned algorithm. [Unit III]
9. Describe Transmission Control Protocol’s (TCP) transmission policy.
10. Explain the Remote Procedure Call with suitable diagram. You are also required to explain the use of RPC in
transport layer.
11. Imagine that a two-way handshake rather than a three-way handshake were used to set up connections. In other words,
third message was not required. Are deadlocks now possible? Give an example or show that none exist.
12. Explain about the TCP header and working of TCP protocol. Also differentiate between TCP and UDP with frame
format.
13. How is TCP connection managed and transmission established?
14. Explain the three way handshaking protocol to establish the transport level connection
15. A TCP connection is using a window size of 1000B and the previous acknowledgement number 2 as 22001. It
receives a segment with acknowledgement number of 24001. Draw a diagram to show the situation of the window
after and before the acknowledgement is received. If the window size is changed to 11000B and 9000B separately
then what will be the situation?
16. Explain how window management takes place in TCP.
17. A host sends to a network via a token bucket. The token bucket has a capacity of 15 M bits and is filled with tokens at
the rate of 5 M bits/sec. Data is buffered if it arrives at the token bucket when there are no tokens. How long does it
take for 30 M bits to enter the network assuming that the host sends at a peak rate 20 M bits/sec and the token bucket
is initially full? [Unit III]
18. Provide few reasons for congestion in a network. [Unit III]
19. What is congestion? Name the techniques that prevent congestion. Discuss any two techniques in brief. [Unit III]
20. A TCP connection used the standard congestion control mechanism to transfer a file of 100K bytes using maximum
segment size of 2K bytes. The receive window size is always 20K bytes. The threshold is initially 16K bytes. The
round trip time estimate is initially 100 m sec. No losses occur during the file transfer. The measured round trip time
is always 60 m sec. How much time does it take to transfer the file? What is the round trip time estimate after the last
transmission? Assume α for round trip time calculated equal to ½.
21. What is congestion? What are the methods to control congestion? Explain them. [Unit III]
22. What is congestion? Why congestion occurs? For which layers of TCP/IP model congestion control policies have
been developed?
23. What are the two basic mechanisms of congestion control? [Unit III]
24. How congestion control is performed by leaky bucket algorithm? [Unit III]
25. In what way token bucket algorithm is superior to leaky bucket algorithm? [Unit III]
26. Briefly describe any two session related services.
27. Explain how a session layer establishes, maintains and synchronizes the interaction between two communicating
hosts.
28. What is TCP? Connection termination in TCP is symmetric, whereas connection establishment is not. Why?
29. Distinguish between TCP and UDP?
30. Compare the TCP header with UDP header.
31. What is the main function of UDP protocol?
32. Why pseudo-header is added in a UDP datagram?
33. What protocol is used by TCP for flow control? What ARQ protocol is used in TCP? Explain.
34. How TCP establishes and terminates connection?
35. What is congestion? Give the token bucket algorithm for shaping traffic in a network. [Unit III]
36. Explain TCP Connection Management in detail.
37. How congestion control can be achieved in Internet and how it relates to quality of service. Mention the policies
involved and issues concerned. [Unit III]
38. Explain the UDP data format giving the meaning of each field.
39. Discuss the concept of sending and receiving buffers in TCP. How sequence numbers are generated for frames?
40. Discuss the token bucket algorithm for congestion control. Also derive a formula for burst time for the algorithm
(given bucket capacity, token arrival rate and maximum output produced). [Unit III]
41. Why the leaky bucket algorithm allow just one packet per tick, irrespective of packet size? [Unit III]
42. Why the reassembly of packets is done at destination instead of intermediate system in Internet?
43. Explain:
a. Acknowledgement policy in TCP b. Windowing policy in TCP
44. What are the different timers used by TCP? Explain
45. What do you understand by out-of-band data in TCP? Also discuss the push operation.
46. Explain TCP congestion control. What assumption TCP takes for congestion?
47. Differentiate between Fast retransmit and fast recovery in TCP congestion control.
48. Discuss the TCP segment format.
49. TCP uses 32-bit sequence number and 16-bit window size. Why? Comment.
50. What are the traffic shaping techniques? [Unit III]
51. Discuss open-loop congestion control. [Unit III]
52. Explain retransmission time-out mechanism in TCP? What algorithm is used to maintain an adaptive timer? Is their
any improved strategy available for timer maintenance?
53. What is silly window syndrome? Suggest strategies for its removal.
54. Explain queuing policies used by routers in Internet. [Unit III]
55. Explain the effect of congestion on performance of a network to be measured by the parameters load and throughput.
[Unit III]
56. The following is the dump of a TCP header in hexadecimal format:
05320017 00000001 00000000 500207FF 00000000
a. What is the sequence number?
b. What is the destination port number?
c. What is the acknowledgment number?
d. What is the window size?
57. Draw the diagram of TCP header and explain the use of the following:
a. Source and destination port addresses
b. Sequence and acknowledgement numbers
c. Code bits
d. Window size
e. Urgent pointer
Describe the role of checksum field and option pad bytes.
58. Explain the following TCP congestion control algorithms:
a. Slow start
b. Congestion avoidance
59. Discuss the RPC design and implementation issues.
60. A typical socket-server application responds user requests using TCP over a specified port. What is the typical
sequence in terms of socket functions on server side?
61. Write and explain at least four Socket Primitives that are used in network programming.
62. List.some of the major security problems that exist on the Internet.
63. What are the four services required for secured communication?
64. What do you mean by encryption and decryption?
65. Mention the various security aspects in a network.
66. Define cryptography with the help of block diagram of Symmetric and Asymmetric key cryptography. ,
67. What are the two approaches of encryption/decryption technique?
68. Describe the encryption and decryption process used in a cipher of your choice.
69. For n number of users, how many keys are needed if we use private and public key cryptography schemes?
70. How triple DES enhances performance compared to the original DES?
71. One secret key encryption method involves the permutation of bits. For example an 8-bit plain text is permuted, bit 8
becomes bit 3, bit 1 becomes bit 2 and so on. Draw a diagram to show the mapping of each bit to its new designation.
Scramble the bits as you please. What is encryption and decryption algorithm?
72. How MPEG file format is different from JPEG file format? Encode the following message using Huffman coding:
“INDIAN INNING”
73. What is public key cryptography? List its advantages and disadvantages. Explain how RSA works.
74. Using RSA algorithm encrypt and decrypt the message ‘BE’ with key pairs (3, 15) and (5, 15).
75. When would you use JPEG, MPEG and GIF image formats? What is MP3?
76. Use the following encryption algorithm to encrypt message “GOOD DAY”.
a. Replace each character with its ASCII code.
b. Add a ‘0’ bit to the left to make each character 8 bits long.
c. Swap the first 4 bits with the last bits.
d. Replace every 4 bits with its hexadecimal equivalent. What is the key in this method?
77. Explain how public key cryptography is different from secret key cryptography. Give the RSA algorithm for
encryption/decryption.
78. Explain the message authentication operation used in RSA technique.
79. Generate the public key and secret key for the following prime numbers using RSA algorithm: P=3, Q=11 take E=5.
80. Differentiate between block cipher and transposition cipher.
81. Explain Data Encryption Standard algorithm in detail.
82. Encrypt the following message using monoalphabetic substitution with the key = 4. MONDAY COMES AFTER
SUNDAY
83. Write an algorithm for RSA encryption
84. Differentiate between asymmetric and symmetric key cryptography.
85. Write algorithm for RSA encryption. Using RSA public key cryptosystem, with a = 1, b = 2, etc. and p = 5, q = 11, d
= 27, find e.
86. Using the RSA public key cryptosystem with a =1, b =2, etc.
a. If p = 7 and q = 11, list five legal values for d
b. If p = 13 and q = 31 and d = 7, find e.
87. What is the need of data compression? Give the steps in JPEG compression.
88. Write short notes on JPEG and MPEG.
89. Differentiate between lossless and lossy compression techniques. Use examples to illustrate.
90. Write short notes on :
a. Digital audio
b. Audio compression
c. Streaming audio

You might also like