Professional Documents
Culture Documents
8. What is the different between layer 2 and layer 3 switches? (AU MAY/JUNE 2008)
A layer 2 switch operates utilizing Mac addresses in it's caching table to quickly pass
information from port to port. A layer 3 switch utilizes IP addresses to do the same.
9. Given the IP address is 18.250.31.14 and the subnet mask is 250.240.0.0, what is
the subnet address? (AU MAY/JUNE 2008)
Subnet id - 18.240.0.0
15. What are the contents of socket address? (AU MAY/JUNE 2008)
Socket address is a combination of IP Address + Port Address
17. What is NVT Data Character Set? (AU MAY/JUNE 2008), (AU cbe MAY/JUNE 2010)
-NVT uses NVT ASCII - 8 bit char. set
-several lowest order bit are same & higer ordr bit is 0
-fig
-it is also possible to send an 8-bit ASCII with highest order
bit set to 0001
a)Data Character:
-NVT uses NVT ASCII - 8 bit char. set
-several lowest order bit are same & higer ordr bit is 0
-fig
-it is also possible to send an 8-bit ASCII with highest order
bit set to 0001
b)Control Character:
-NVT uses 8-bit char set - higher order bit is set
-fig
-table lists some of ctrl char & their description
46. What is Standards? What are the organizations involved in standard creation
committee?
Standards are necessary to ensure that products from different manufacturers can work
together as expected. The ISO, ITU-T, ANSI, IEEE, and EIA are some of the
organizations involved in standards creation.
52. Differentiate Static and Dynamic Routing tables? (AU cbe MAY/JUNE 2010)
A static routing table’s entries are updated manually by an administrator. A dynamic
routing table’s entries are updated automatically by a routing protocol.
55. How messages are transferred in a LAN using token ring? (AU cbe MAY/JUNE 2010)
A Token Ring network is a local area network (LAN) in which all computers are
connected in a ring or star topology and a bit-or token-passing scheme is used in order to
prevent the collision of data between two computers that want to send messages at the
same time.
57. What are the layers of TCP/IP model? (AU cbe MAY/JUNE 2010)
Application Layer
Transport Layer
Internet Layer
Network Access Layer
Physical Layer
58. Draw the generic format of ARP response packet. (AU cbe MAY/JUNE 2010)
59. Mention the use of MTU table. (AU cbe MAY/JUNE 2010)
The Maximum Transmission Unit (MTU) is a parameter that determines the longest
datagram can be transmitted by an IP Interface without needing to be fragmented into
smaller units. The MTU should be larger than the largest datagram youwant to convey
without being fragmented.( The MTU defines the Maximum size (in Bytes) of packets
can be transmitted at once.)
76. What is simple mail transfer protocol [SMTP]? (AU MAY/JUNE 2008)
The TCP/IP protocol that supports electronic mail on the internet is called Simple Mail
Transfer Protocol (SMTP). It is a system for sending messages to other computer users
based on email addresses.
87. What are the services used by SNMP for other protocols?
SMI –Structure of Management Information and MIB – Management Information Base.
94. List any two advantages of UDP. (AU cbe MAY/JUNE 2010)
• It doesn't restrict you to a connection based communication model, so
startup latency in distributed applications is much lower, as is operating
system overhead.
• All flow control, acking, transaction logging, etc is up to user programs; a
broken os implementation is not going to get in your way. additionally,
you only need to implement and use the features you need.
• The recipient of udp packets gets them unmangled, including block
boundaries.
• Broadcast and multicast transmission are available with udp.
95. What are the services offered by TCP? (AU cbe MAY/JUNE 2010)
Stream Data Transfer Service
Full-Duplex Service
Reliable Service
96. Which method is called three way handshaking? Why? (AU cbe MAY/JUNE 2010)
The 3-way handshake method is used by the TCP protocol to establish a
connection between a client and the server. It involves three steps:
1. In the first step of the three-way handshake method, SYN message is sent from a
client to the server.
2. In the second step of the three-way handshake method SYN/ACK is sent from the
server to the client.
3. In the third step of the three-way handshake method ACK (usually called SYN-
ACK-ACK) is sent from the client to the server. At this point, both the client and
server have received an acknowledgement of the TCP connection.
97. Write down the transition states in DHCP. (AU cbe MAY/JUNE 2010)
DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK
DHCPRELEASE
98. Which Protocol uses aliases? Why? (AU cbe MAY/JUNE 2010)
File Transfer Protocol uses Aliases for Network Services
99. Compare and contrast HTTP and SMTP. (AU cbe MAY/JUNE 2010)
There are three main differences between HTTP and SMTP:
2) SMTP requires each message, including the body of each message, to be in seven-bit
ASCII format. If the message contains binary data, then the message has to be encoded
into seven-bit ASCII format. HTTP does not have this restriction.
3) HTTP encapsulates each object of message in its own response message while SMTP
places all of the message's objects into one message.
112. What are the difference fields in Routing table? (AU MAY/JUNE 2008)
The routing table can consist of seven fields: a mask, a destination address, a next-hop
address, flags, a reference count, a use, and an interface.
119. What is the difference between Partially Qualified Domain Name and Fully
Qualified Domain name? (AU cbe MAY/JUNE 2010)
If a label is not terminated by a null string, it is called a partially qualified domain
name (PQDN). A PQDN starts from a node, but it does not reach the root. It is used when
the name to be resolved belongs to the same site as the client.
If a Label is terminated by a null string, it is called a fully qualified domain name
(FQDN). An FQDN is a domain name that contains the full name of a host. It contains all
labels, from the most specific to the most general, that uniquely defines the name of the
host
120. Under what situation does SMTP uses NOOP and REST commands? (AU cbe
MAY/JUNE 2010)
NOOP (NOOP) Specifies no action other than that the receiver sent an OK reply.
RESET (RSET) Aborts the current mail transaction. Any stored sender, recipients, and
mail data must be discarded, and all buffers and state tables must be cleared. The receiver
must send an OK reply.
121. Categorize the list of commands in FTI. (AU cbe MAY/JUNE 2010)
LIST
STATUS
FIXUP
ENABLE
DISABLE
122. Can we call HTTP as a stateless protocol? Why? (AU cbe MAY/JUNE 2010)
As we know that the Http protocol is a stateless protocol, that means that it can't
persist the data. Http treats each Http GET requests when the client clicks on the links
embedded with a page.
123. How are OSI and ISO related to each other? (AU cbe JUNE 2009)
ISO is the International Standards Organization, part of the United Nations.
OSI (Open System Interface) is a networking standard, developed by ISO.
125. Write the concept of token ring. (AU cbe JUNE 2009)
A Token Ring network is a local area network (LAN) in which all computers are
connected in a ring or star topology and a bit-or token-passing scheme is used in order to
prevent the collision of data between two computers that want to send messages at the
same time.
126. Write the use of ARP and RARP. (AU cbe JUNE 2009)
The ARP protocol plays a key role among Internet Layer protocols relating to TCP/IP,
Since it enables the physical address of a network interface card corresponding to an IP
address to be known. That is why it is called Address Resolution Protocol.
128. Why UDP is called stateless protocol? (AU cbe JUNE 2009)
UDP (User Datagram Protocol) is Stateless. This means it has no expectations. Here are
some of the characteristics of the expectationless UDP:
- I don't care if what I send is received
- I don't care if one of my packets was lost in transit
- I don't care if you acknowledge my existence
- I don't care if you like me or simply discard me
131. Differentiate telnet login with remote login. (AU cbe JUNE 2009)
16. Explain briefly the Domain Name System with their various services.
Domain Name Space
1. Distribution of Name Space – Hierarchy of name server, Zone, root, primary and
Secondary server
2. DNS in the Internet – Generic domain, country domain, inverse domain
23. Explain ARP and RARP operations and the use of ARP cache.
24. Explain the function of DHCP protocol with respect to DHCP server and DHCP
enabled client communication.
25. List down the SNMP services and explain the server support for each.
i
Department of Computer Applications, Erode Sengunthar Engineering College, Thudupathi – 638 057.