SlideShare a Scribd company logo
1 of 5
Download to read offline
UNIT I :PACKETING NETWORKS I

    1. What are datagram and virtual circuits? Distinguish between them.
    2. Explain and derive delays in datagram packet switching
    3. Why is packet switching more suitable than message switching for interactive applications?
       Compare the delays in datagram packet switching and message switching.
    4. Compare the Bellman ford algorithm and dijkstra’s algorithm for finding the shortest paths from
       a source node to all other nodes in a network.
           a. Suppose that 64kbps PCM coded speech is packetized into a constant bit rate ATM cell
                stream What is the interval between production of full cells?
           b. How long does it take to transmit the cell at 155 Mbps?
           c. How many cells could be transmitted in this system between consecutive voice cells?
    5.
    6. Explain the working mechanism of following devices used to connect LANs.
           a. Bridge            b. Router
    7. Explain the working of a LAN bridge. Clearly explain how a transparent bridges sets-up ‘its’ table
       entries.
    8. Explain the “store and forward” packet switching used to send a packet from the source to the
       destination.

UNIT II PACKETING NETWORKS II AND TCP/IP
   1. With a neat diagram explain leaky bucket policy
   2. Explain the following fields in the IP packet header
             a. Time to live
             b. Fragment offset
             c. Header checksum
   3. A large number of consecutive IP addresses are available starting at 200.40.160.0. Suppose that
         3 organizations A,B & C request 4000, 2000 and 1000 addresses respectively and in that order.
         For each of these, give the first IP address assigned, the last IP address assigned and the mark in
         the w.x.y.z/s notation.
   4. Explain the three way handshake for establishing a TCP connection
   5. Explain the FIFO and priority queue scheduling for managing traffic at packet level
   6. Explain the leaky bucket algorithm for policing the traffic at flow level
   7. Consider a packet-by-packet fair queuing system with three logical buffers and with a service
         rate of one unit/second. Show the sequence of transmissions for this system for the following
         packet arrival pattern:
             a. Buffer1: arrival at time t=0, length=2, arrival at t=4, length=1
             b. Buffer2: arrival at time t=2, length=3, arrival at t=2, length=1
             c. Buffer3: arrival at time t=3, length=5
   8. An university has 150 LANs with 100 hosts in each LAN
             a. Suppose the university has one class B address. Design an appropriate subnet
                 addressing scheme.
             b. Design an appropriate CIDR addressing scheme.
   9. Explain the implementation of connection – oriented service through an example (on a subnet)
   10. Compare connection-less and connection oriented service with respect to the following
         metrices.
             a. Circuit setup
             b. Addressing
c. Maintaining state information and
              d. Routing and router failures
   11.   Explain any four properties desirable in a routing algorithm
   12.   Explain how folding can be used as a routing algorithm. What are the problems associated with
         it? How can they be prevented?
   13.   Explain the salient features of the TCP header fields.
   14.   Write short notes on any four.
              a. Need for ATM
              b. IP over ATM
              c. The leaky bucket algorithm
              d. IP addressing
              e. Subnetting.
   15.   Explain the leaky bucket technique for policing, with an appropriate diagram.


UNIT III TCP/IP 2
   1. Explain the IP address classification. Identify the following IP addresses and their address class:
          a. 200.50.20.165
          b. 128.167.23.20
          c. 16.196.128.50
          d. 150.156.10.10
   2. Give the format of IPV6 basic header. Explain the importance

   3     Explain in detail, the operation of OSPF.
   4     Explain identification, flags and fragment offset field in the IP version 4 header.
   5     What is the need to change from IPV4 to IPV6? Write the IPV6 basic header and describe its
         fields.
   6     Describe how TCP establishes the connection using a three way handshake procedure.
   7     What is routing information protocol(RIP)? What is the maximum width of a RIP network?

UNIT IV ATM NETWORKS
   1.    With a neat diagram explain the ATM cell header format
   2.    write a short note on AALI
   3.    explain the PNNI signaling with example.
   4.    Give the structure of ATM cell header and details of QOS parameters
   5.    What are the six QOS performance parameters in ATM?
   6.    What is ATM adaptation layer type 1(AAL1)? Describe the generic AAL1 process.
   7.    Describe PNNI signaling with an example.
   8.    What are the design goals of ATM? Briefly describe ATM layers
   9.    Write short notes on:
             a. Management information base
             b. Cipher feedback concept
             c. Leaky bucket vs. Token bucket algorithm
             d. SNMP
UNIT V NETWORK MANAGEMENT, SECURITY
  1. Apply RSA and do the following
          a. Encrypt a=3 b=11, x=3 and m=9
          b. Find the corresponding y
          c. Decrypt the cipher text
  2. Explain in detail, any two major categories of threat to network security
  3. Which are the different data types used in the structure of management information?
  4. Give the comparison between public key and secret key crypto graphic systems
  5. What are the functions performed by a network management system?
  6. What are SNMP, SMI and MIB?
  7. Explain the RSA algorithm. Using it, encrypt the following:
          a. P=5, q=11, e=7, p=18
  8. Why is digital signature used and what are the properties of digital signature?
  9. Describe briefly DES algorithm used for encryption
  10. Write short notes on: 1) fire walls.      2) SSL
  11. Explain Diffie Hellman key exchange algorithm with example.
  12. Describe authentication using Kerberos
  13. Justify how PGP is efficient in achieving E-mail security.
  14. What are the components of network management and list their functions.
  15. What are the desirable properties to secure communication? Explain briefly.
  16. Write a note on DES
  17. Define the terms and explain the following:
          a. Authentication
          b. Digital Signature
          c. RSA algorithm
          d. Fire wall
  18. Explain security and administration of SNMPV3.
  19. Write short notes on:
          a. IMAP
          b. RTP
  20. What is DES? How does it work? Explain.
  21. Briefly describe the encryption model for a symmetric key cipher.
  22. Write short notes on:
          a. SNMP protocol
          b. Management information base.
          c. H.323 architecture for internet telephony
          d. Firewalls.
  23. Define the following terms:
          a. Confidentiality
          b. Authenticity
          c. Integrity
          d. Non repudiations
          e. Cryptanalysis and
          f. Intruder
24. Name and explain the different steps of a public key cryptographic system that can be used to
      encrypt and decrypt symmetric keys?
  25. Consider a group of ten people where every person in the group needs to communicate with
      every person in the group needs to communicate with every other person in another group of
      ten people.
          a. How many secret keys are needed considering?
                    i. Symmetric key cryptography?
                   ii. Asymmetric key cryptography?
          b. What are the values for the above cases, if every person in a group of ten people needs
              to communicate with every other person in the group?
  26. Explain with an appropriate example, an asymmetric key cryptographic system that can provide
      one time session key to the end users and discuss about its demerits?
  27. Name the different servers used in Kerberos protocol. Bring out role of each server and their
      functions in achieving authentication?
  28. Consider Diffie and Hellman key exchange protocol where n and g are two public random
      numbers. Given : n=23 and g=7, what is the value of the symmetric key if x=3 and y=7?
  29. Explain the JPEG technique for compressing continuous tone still pictures.

  30. Explain the desirable properties of secure communication

  31. Using RSA, choosing P=3, q=11 and d=7, encode the phrase “HELLO”. Apply the decryption
      algorithm to the encryption version to recover the original plain text message.

  32. Assume a=1, b-2, ------ z=26.

  33. What is denial of service attack? Explain, with an example.

  34. Explain with a neat diagram, the principal components of a network management architecture.

  35. Explain the importance features of RTP protocol and RTP packet header.

  36. Write short notes on:

           1) Firewall

           2) HTTP

           3) Real Time streaming protocol

           4) Data encryption standard.

UNIT VI QoS, Resource Allocation, VPNs, Tunneling, Overlay Networks
  1. write a short note on SNMP
  2. Explain the operation of fair queuing scheduler in context with packet scheduling of integrated
     service.
  3. Explain the various types of resource allocation schemes.
  4. Discuss the concept of tunnel and point to point protocol in context with UPN.
  5. Explain VPN and its types based on tunneling
  6. Explain the need for overlay networks and P2P connection
7. Discuss the classification of resource allocation schemes.
  8. What is a virtual private network (VPN)? Mention the different types of VPN and benefits of
      deploying a VPN.
  9. What is an MPLS network? Explain MPLS operation
  10. Explain the importance features of SSL. Explain the working of SSL, in detail.
  11. Explain in detail, the working of IP security protocol.




UNIT VII COMPRESSION OF DIGITAL VOICE AND VIDEO, VOIP, MULTIMEDIA
NETWORKING
  1. Design a Huffman encoder for a source generating (a1,a2,a3,a4,a5,a6,a7} and with probabilities
      {0.05,0.1,0.1,0.15,0.25,0.3}
  2. Explain in brief SIP
  3. Explain in brief the structure of a SCTP packet
  4. Explain the JPEG compression method and still image processing
  5. Explain the session initiation protocol
  6. Explain the typical JPEG process for production and compression of still images.
  7. Design a Huffman encoder for a source generating {a0,a1,a2,a3,a4,a5,a6} corresponding
      probabilities {0.55, 0.10, 0.05, 0.14, 0.06, 0.08, 0.02}
  8. What is RTSP? How is it used in multimedia network applications?
  9. Explain the three broad classes of multimedia applications
  10. What are the hurdles for multimedia?
  11. Explain the types of redundancy in video compression
  12. What are the differences between H.261 and H.263
  13. Explain the three limitations of the best effort service
  14. With suitable example explain RTSP messages exchanged between media player and server
  15. Explain multimedia file format
  16. Explain the JPEG technique for compressing continuous tone still pictures.

UNIT VIII MOBILE AD-HOC NETWORKS, WIRELESS SENSOR NETWORKS:
  1. Explain the following
          a. CGSR of Ad-hoc networks
          b. Types of attack in Ad-hoc networks.
  2. Briefly explain direct and multi hop routing of intracluster routing protocol with the help of
     relevant diagram.
  3. Write a short note on Zigbee technology.
  4. With an example, explain the dynamic source routing protocol.
  5. List the security issues in ad-hoc networks. Explain types of attacks.
  6. What are Ad-hoc networks? Mention their application types and unique features
  7. Explain the structure of a typical sensor node.
  8. What are the advantages of the DEEP clustering protocol?

More Related Content

What's hot

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
Dcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkDcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkIJCNCJournal
 
Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiveriaemedu
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vSURESHA V
 
Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetIAEME Publication
 
IEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer SimulationIEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer SimulationMichail Grigoropoulos
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERINGMULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERINGvtunotesbysree
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batchJaimin Jani
 

What's hot (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
Dcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkDcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless network
 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
 
Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiver
 
Data link layer
Data link layerData link layer
Data link layer
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha v
 
Ch22
Ch22Ch22
Ch22
 
Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernet
 
IEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer SimulationIEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer Simulation
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Data link layer
Data link layerData link layer
Data link layer
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Multicast address
Multicast addressMulticast address
Multicast address
 
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERINGMULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
Introduction to Network Coding
Introduction to Network CodingIntroduction to Network Coding
Introduction to Network Coding
 

Viewers also liked (14)

BITS QUESTIONS PAPERS
BITS QUESTIONS PAPERSBITS QUESTIONS PAPERS
BITS QUESTIONS PAPERS
 
1st and 2nd Semester M Tech: VLSI Design and Embedded System (Dec-2015; Jan-2...
1st and 2nd Semester M Tech: VLSI Design and Embedded System (Dec-2015; Jan-2...1st and 2nd Semester M Tech: VLSI Design and Embedded System (Dec-2015; Jan-2...
1st and 2nd Semester M Tech: VLSI Design and Embedded System (Dec-2015; Jan-2...
 
Calculus’ problem soulution
Calculus’ problem soulutionCalculus’ problem soulution
Calculus’ problem soulution
 
6th Semester (June; July-2015) Computer Science and Information Science Engin...
6th Semester (June; July-2015) Computer Science and Information Science Engin...6th Semester (June; July-2015) Computer Science and Information Science Engin...
6th Semester (June; July-2015) Computer Science and Information Science Engin...
 
CEED Solved Paper
CEED  Solved PaperCEED  Solved Paper
CEED Solved Paper
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 1
Unit 1Unit 1
Unit 1
 
6th semester Computer Science and Information Science Engg (2013 December) Qu...
6th semester Computer Science and Information Science Engg (2013 December) Qu...6th semester Computer Science and Information Science Engg (2013 December) Qu...
6th semester Computer Science and Information Science Engg (2013 December) Qu...
 
Fiitjee Paper 2
Fiitjee Paper 2Fiitjee Paper 2
Fiitjee Paper 2
 
Resonance JEE Advanced Paper 2-solutions
Resonance JEE Advanced Paper 2-solutionsResonance JEE Advanced Paper 2-solutions
Resonance JEE Advanced Paper 2-solutions
 
Chapter 4 Integration
Chapter 4  IntegrationChapter 4  Integration
Chapter 4 Integration
 
6th Semester CS / IS (2013-June) Question Papers
6th Semester CS / IS (2013-June) Question Papers6th Semester CS / IS (2013-June) Question Papers
6th Semester CS / IS (2013-June) Question Papers
 
Computer Network Notes UNIT II
Computer Network Notes UNIT IIComputer Network Notes UNIT II
Computer Network Notes UNIT II
 
Total Quality Management (TQM)
Total Quality Management (TQM)Total Quality Management (TQM)
Total Quality Management (TQM)
 

Similar to Question bank cn2

III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...Selva Kumar
 
Connecting network
Connecting networkConnecting network
Connecting networkimacomobio
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptximacomobio
 
Connecting Network
Connecting NetworkConnecting Network
Connecting Networkimacomobio
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 
Connecting Networks
Connecting NetworksConnecting Networks
Connecting Networksimacomobio
 
III EEE-CS2363-Computer-Networks-model-question-paper-set-2-for-may-june-2014
III EEE-CS2363-Computer-Networks-model-question-paper-set-2-for-may-june-2014III EEE-CS2363-Computer-Networks-model-question-paper-set-2-for-may-june-2014
III EEE-CS2363-Computer-Networks-model-question-paper-set-2-for-may-june-2014Selva Kumar
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014
III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014
III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014Selva Kumar
 

Similar to Question bank cn2 (20)

Unit 1 qb
Unit 1 qbUnit 1 qb
Unit 1 qb
 
Computer network suggestion
Computer network suggestionComputer network suggestion
Computer network suggestion
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
 
Connecting network
Connecting networkConnecting network
Connecting network
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptx
 
Cn v-sem
Cn v-semCn v-sem
Cn v-sem
 
Cn question bank
Cn question bankCn question bank
Cn question bank
 
Connecting Network
Connecting NetworkConnecting Network
Connecting Network
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 
Cs 68
Cs 68Cs 68
Cs 68
 
Cs 69
Cs 69Cs 69
Cs 69
 
Connecting Networks
Connecting NetworksConnecting Networks
Connecting Networks
 
Bcs 061
Bcs 061Bcs 061
Bcs 061
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
CCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick NotesCCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick Notes
 
III EEE-CS2363-Computer-Networks-model-question-paper-set-2-for-may-june-2014
III EEE-CS2363-Computer-Networks-model-question-paper-set-2-for-may-june-2014III EEE-CS2363-Computer-Networks-model-question-paper-set-2-for-may-june-2014
III EEE-CS2363-Computer-Networks-model-question-paper-set-2-for-may-june-2014
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014
III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014
III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014
 
8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers
 

More from sangusajjan

Unit iv atm networks
Unit iv atm networksUnit iv atm networks
Unit iv atm networkssangusajjan
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
Network management
Network managementNetwork management
Network managementsangusajjan
 
Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and videosangusajjan
 
Computer network lesson plan
Computer network lesson planComputer network lesson plan
Computer network lesson plansangusajjan
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introductionsangusajjan
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission controlsangusajjan
 
Unit VI Overlays
Unit VI OverlaysUnit VI Overlays
Unit VI Overlayssangusajjan
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and securitysangusajjan
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDPsangusajjan
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networkssangusajjan
 

More from sangusajjan (19)

Unit iv atm networks
Unit iv atm networksUnit iv atm networks
Unit iv atm networks
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
TCPIP
TCPIPTCPIP
TCPIP
 
Network management
Network managementNetwork management
Network management
 
Vp ns
Vp nsVp ns
Vp ns
 
Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and video
 
ATM Network
ATM NetworkATM Network
ATM Network
 
Computer network lesson plan
Computer network lesson planComputer network lesson plan
Computer network lesson plan
 
Profile
ProfileProfile
Profile
 
VII VoIP
VII VoIPVII VoIP
VII VoIP
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introduction
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission control
 
Unit VI Overlays
Unit VI OverlaysUnit VI Overlays
Unit VI Overlays
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDP
 
Vivpn pp tfinal
Vivpn pp tfinalVivpn pp tfinal
Vivpn pp tfinal
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networks
 

Question bank cn2

  • 1. UNIT I :PACKETING NETWORKS I 1. What are datagram and virtual circuits? Distinguish between them. 2. Explain and derive delays in datagram packet switching 3. Why is packet switching more suitable than message switching for interactive applications? Compare the delays in datagram packet switching and message switching. 4. Compare the Bellman ford algorithm and dijkstra’s algorithm for finding the shortest paths from a source node to all other nodes in a network. a. Suppose that 64kbps PCM coded speech is packetized into a constant bit rate ATM cell stream What is the interval between production of full cells? b. How long does it take to transmit the cell at 155 Mbps? c. How many cells could be transmitted in this system between consecutive voice cells? 5. 6. Explain the working mechanism of following devices used to connect LANs. a. Bridge b. Router 7. Explain the working of a LAN bridge. Clearly explain how a transparent bridges sets-up ‘its’ table entries. 8. Explain the “store and forward” packet switching used to send a packet from the source to the destination. UNIT II PACKETING NETWORKS II AND TCP/IP 1. With a neat diagram explain leaky bucket policy 2. Explain the following fields in the IP packet header a. Time to live b. Fragment offset c. Header checksum 3. A large number of consecutive IP addresses are available starting at 200.40.160.0. Suppose that 3 organizations A,B & C request 4000, 2000 and 1000 addresses respectively and in that order. For each of these, give the first IP address assigned, the last IP address assigned and the mark in the w.x.y.z/s notation. 4. Explain the three way handshake for establishing a TCP connection 5. Explain the FIFO and priority queue scheduling for managing traffic at packet level 6. Explain the leaky bucket algorithm for policing the traffic at flow level 7. Consider a packet-by-packet fair queuing system with three logical buffers and with a service rate of one unit/second. Show the sequence of transmissions for this system for the following packet arrival pattern: a. Buffer1: arrival at time t=0, length=2, arrival at t=4, length=1 b. Buffer2: arrival at time t=2, length=3, arrival at t=2, length=1 c. Buffer3: arrival at time t=3, length=5 8. An university has 150 LANs with 100 hosts in each LAN a. Suppose the university has one class B address. Design an appropriate subnet addressing scheme. b. Design an appropriate CIDR addressing scheme. 9. Explain the implementation of connection – oriented service through an example (on a subnet) 10. Compare connection-less and connection oriented service with respect to the following metrices. a. Circuit setup b. Addressing
  • 2. c. Maintaining state information and d. Routing and router failures 11. Explain any four properties desirable in a routing algorithm 12. Explain how folding can be used as a routing algorithm. What are the problems associated with it? How can they be prevented? 13. Explain the salient features of the TCP header fields. 14. Write short notes on any four. a. Need for ATM b. IP over ATM c. The leaky bucket algorithm d. IP addressing e. Subnetting. 15. Explain the leaky bucket technique for policing, with an appropriate diagram. UNIT III TCP/IP 2 1. Explain the IP address classification. Identify the following IP addresses and their address class: a. 200.50.20.165 b. 128.167.23.20 c. 16.196.128.50 d. 150.156.10.10 2. Give the format of IPV6 basic header. Explain the importance 3 Explain in detail, the operation of OSPF. 4 Explain identification, flags and fragment offset field in the IP version 4 header. 5 What is the need to change from IPV4 to IPV6? Write the IPV6 basic header and describe its fields. 6 Describe how TCP establishes the connection using a three way handshake procedure. 7 What is routing information protocol(RIP)? What is the maximum width of a RIP network? UNIT IV ATM NETWORKS 1. With a neat diagram explain the ATM cell header format 2. write a short note on AALI 3. explain the PNNI signaling with example. 4. Give the structure of ATM cell header and details of QOS parameters 5. What are the six QOS performance parameters in ATM? 6. What is ATM adaptation layer type 1(AAL1)? Describe the generic AAL1 process. 7. Describe PNNI signaling with an example. 8. What are the design goals of ATM? Briefly describe ATM layers 9. Write short notes on: a. Management information base b. Cipher feedback concept c. Leaky bucket vs. Token bucket algorithm d. SNMP
  • 3. UNIT V NETWORK MANAGEMENT, SECURITY 1. Apply RSA and do the following a. Encrypt a=3 b=11, x=3 and m=9 b. Find the corresponding y c. Decrypt the cipher text 2. Explain in detail, any two major categories of threat to network security 3. Which are the different data types used in the structure of management information? 4. Give the comparison between public key and secret key crypto graphic systems 5. What are the functions performed by a network management system? 6. What are SNMP, SMI and MIB? 7. Explain the RSA algorithm. Using it, encrypt the following: a. P=5, q=11, e=7, p=18 8. Why is digital signature used and what are the properties of digital signature? 9. Describe briefly DES algorithm used for encryption 10. Write short notes on: 1) fire walls. 2) SSL 11. Explain Diffie Hellman key exchange algorithm with example. 12. Describe authentication using Kerberos 13. Justify how PGP is efficient in achieving E-mail security. 14. What are the components of network management and list their functions. 15. What are the desirable properties to secure communication? Explain briefly. 16. Write a note on DES 17. Define the terms and explain the following: a. Authentication b. Digital Signature c. RSA algorithm d. Fire wall 18. Explain security and administration of SNMPV3. 19. Write short notes on: a. IMAP b. RTP 20. What is DES? How does it work? Explain. 21. Briefly describe the encryption model for a symmetric key cipher. 22. Write short notes on: a. SNMP protocol b. Management information base. c. H.323 architecture for internet telephony d. Firewalls. 23. Define the following terms: a. Confidentiality b. Authenticity c. Integrity d. Non repudiations e. Cryptanalysis and f. Intruder
  • 4. 24. Name and explain the different steps of a public key cryptographic system that can be used to encrypt and decrypt symmetric keys? 25. Consider a group of ten people where every person in the group needs to communicate with every person in the group needs to communicate with every other person in another group of ten people. a. How many secret keys are needed considering? i. Symmetric key cryptography? ii. Asymmetric key cryptography? b. What are the values for the above cases, if every person in a group of ten people needs to communicate with every other person in the group? 26. Explain with an appropriate example, an asymmetric key cryptographic system that can provide one time session key to the end users and discuss about its demerits? 27. Name the different servers used in Kerberos protocol. Bring out role of each server and their functions in achieving authentication? 28. Consider Diffie and Hellman key exchange protocol where n and g are two public random numbers. Given : n=23 and g=7, what is the value of the symmetric key if x=3 and y=7? 29. Explain the JPEG technique for compressing continuous tone still pictures. 30. Explain the desirable properties of secure communication 31. Using RSA, choosing P=3, q=11 and d=7, encode the phrase “HELLO”. Apply the decryption algorithm to the encryption version to recover the original plain text message. 32. Assume a=1, b-2, ------ z=26. 33. What is denial of service attack? Explain, with an example. 34. Explain with a neat diagram, the principal components of a network management architecture. 35. Explain the importance features of RTP protocol and RTP packet header. 36. Write short notes on: 1) Firewall 2) HTTP 3) Real Time streaming protocol 4) Data encryption standard. UNIT VI QoS, Resource Allocation, VPNs, Tunneling, Overlay Networks 1. write a short note on SNMP 2. Explain the operation of fair queuing scheduler in context with packet scheduling of integrated service. 3. Explain the various types of resource allocation schemes. 4. Discuss the concept of tunnel and point to point protocol in context with UPN. 5. Explain VPN and its types based on tunneling 6. Explain the need for overlay networks and P2P connection
  • 5. 7. Discuss the classification of resource allocation schemes. 8. What is a virtual private network (VPN)? Mention the different types of VPN and benefits of deploying a VPN. 9. What is an MPLS network? Explain MPLS operation 10. Explain the importance features of SSL. Explain the working of SSL, in detail. 11. Explain in detail, the working of IP security protocol. UNIT VII COMPRESSION OF DIGITAL VOICE AND VIDEO, VOIP, MULTIMEDIA NETWORKING 1. Design a Huffman encoder for a source generating (a1,a2,a3,a4,a5,a6,a7} and with probabilities {0.05,0.1,0.1,0.15,0.25,0.3} 2. Explain in brief SIP 3. Explain in brief the structure of a SCTP packet 4. Explain the JPEG compression method and still image processing 5. Explain the session initiation protocol 6. Explain the typical JPEG process for production and compression of still images. 7. Design a Huffman encoder for a source generating {a0,a1,a2,a3,a4,a5,a6} corresponding probabilities {0.55, 0.10, 0.05, 0.14, 0.06, 0.08, 0.02} 8. What is RTSP? How is it used in multimedia network applications? 9. Explain the three broad classes of multimedia applications 10. What are the hurdles for multimedia? 11. Explain the types of redundancy in video compression 12. What are the differences between H.261 and H.263 13. Explain the three limitations of the best effort service 14. With suitable example explain RTSP messages exchanged between media player and server 15. Explain multimedia file format 16. Explain the JPEG technique for compressing continuous tone still pictures. UNIT VIII MOBILE AD-HOC NETWORKS, WIRELESS SENSOR NETWORKS: 1. Explain the following a. CGSR of Ad-hoc networks b. Types of attack in Ad-hoc networks. 2. Briefly explain direct and multi hop routing of intracluster routing protocol with the help of relevant diagram. 3. Write a short note on Zigbee technology. 4. With an example, explain the dynamic source routing protocol. 5. List the security issues in ad-hoc networks. Explain types of attacks. 6. What are Ad-hoc networks? Mention their application types and unique features 7. Explain the structure of a typical sensor node. 8. What are the advantages of the DEEP clustering protocol?