Sie sind auf Seite 1von 5

CS2302 COMPUTER NETWORKS QUESTION BANK ANNAUNIVERSITY 2010 PART V

UNIT-V PART-A 1. Define authentication and name any two authentication protocols 2. List any two types of DNS messages. 3. What is FDDI? 4. State why telnet uses network virtual terminal? 5. How does the user get E-mail from the message transfer agent? 6. What is the importance of cookies? 7. State the goals behind ISDN? 8. What is telnet used for? Discuss. 9. Define security in networking. 10. State Why telnet uses network virtual terminal? 11. What are the elements of WWW? 12. What is the function provided by FTP? 13. Define SMTP? 14. What is the use of DNS? 15. Give example for hierarchy in DNS? 16. Compare plain text and cipher text? 17. What is symmetry key algorithm? 18. What are all the services provided my E-mail? 19. Define HTML? 1. Define Fire walls? 2. Define a network security. 3. What are the potential security threats? 4. What is cryptography? 5. Explain different types of cryptography in detail. 6. Explain the different types of encryption method. 7. Write a short note on i) RSA algorithm ii) Digital signature 8. Explain the desirable properties of secure communication. 9. What is a policy and mechanism? 10. Discuss the communication security goals. 11. What is a passive attack? 12. What is a active attack? 13. Explain the different substitution techniques. 14. Discuss the different cipher modes. 15. What is a cryptanalysis? 16. Explain the different cryptanalytic attacks. 17. List the different types of authentication protocol in detail. 18. What is the secret key signature? 19. What is the key management concept? 20. How the certificates are verified? 21. Compare the symmetric and asymmetric key cryptography.

22. 23. 24. 25. 26. 27.

What are the benefits of IP security? Explain the AH header format. Explain the ESP header format. List the features of SSL. Write note on wireless security. List the various risk faced by messages that are transmitted over the internet.

PART-B 1. i) Explain in detail about the file transfer protocol. ii) Describe the architecture of ISDN. 2. i) Explain in detail about electronic mail. ii) Explain in detail any one ISDN protocol. 3. i) What is HTTP protocol used for? ii) What is the default port number of HTTP protocol? iii) Discuss the features of HTTP and also discuss how HTTP works. 4. Explain the importance of firewalls. 5. Explain in detail the following i) Fault management. ii) Security management.

CS2302 COMPUTER NETWORKS QUESTION BANK ANNAUNIVERSITY 2010 PART IV


UNIT-IV PART-A ( 2 Marks) 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. What is the maximum case of UDP datagram? What is the use of sequence numbers? What is the source post numbers? What is client process? Name the policies that can precast congestion? How are congestions control and quality of source hexapod? What is the definition of burst data? What is traffic shaping? Name two methods of shape traffic? What determine the sender Window size in TCP How is Resource Reservation Protocol related to integrated services What is Traffic descriptor? What is Access rate ? What is the methods to improve Qos? What is necessity of flow control What is multicast? What is the difference between unicast and multicast? what are the two multiplexing strategies used in transport layer?

17. Why transport layer extends host to delivery to process 18. State why telnet uses network virtual terminal? 19. What is the service provided by TCP? 20. Difference between UDP and TCP. 21.What is meant by well known port in TCP ? 22.Give the steps to establish a TCP connection.

PART-B 1. List and discuss the states used in TCP connection management finite state machine. i.Discuss how multiplexing and demultiplexing is done in the transport layer ii. Explain in detail the mechanism in transport layer for controlling congestion. 2. i) Explain choke packets methods of congestion control. 3. i) Explain the connection release process applied at transport layer. ii) Explain window management in TCP. 4. i) Discuss about quality of services. ii) Write short notes on integrated services. Explain about TCP Congestion control technique in detail. Write short notes on queuing disciplines. Explain Four- way handshaking method to terminate a connection in TCP. Explain in detail about any one of the congestion avoidance mechanisms. Explain in detail about source-based congestion avoidance.

5. 6. 7. 8. 9.

CS2302 COMPUTER NETWORKS QUESTION BANK ANNAUNIVERSITY 2010 PART III


UNIT-III PART-A ( 2 Marks) 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. What is subnetting? What is the use of IP address? State the difference between classless and classful addressing. What is the difference between direct and indirect delivery. What is the purpose of RIP. What is the use of BGP. What is the use of routing table. Define Datagram. Define Internet works? What are the different type switching. What is use the of Router? What is the use of network layer? What is MTU?

14. Define Fragmentation offset 15. Write the difference between bridge routers. 16. Find the error if any the following IP address. a. 111.56.045.78 b. 7 5 . 4 5 . 3 0 1 . 1 4 17. Where the routing table is maintained also state the purpose of maintaining a routing table. 18. What is datagram socket? 19. Write any four routing algorithm. 20. What is an IP address? 21. Explain broadcast routing. 22. Explain flooding and selecting flooding. 23. Explain internetworking. Why it is needed 24. Under what conditions adaptive routing is preferred ? 25. What is significance of internetworking

PART-B What are the limitations of distance vector routing. How are they addressed in link state routing? Explain routing of mobile hosting. Discuss how these routing and link state routing techniques work. State the major difference between Vector Routing and link state routing. What is fragmentation ? Explain how it is supported in IP4 and IP6. What is virtual circuit ? Explain with suitable example subnet and tables for virtual circuit. How virtual circuit changes as a packet sequence ? 8. Explain how mobile IP provides users the freedom to room beyond their home subnet while consistency maintaining their home IP address. 1. 2. 3. 4. 5. 6. 7.

CS2302 COMPUTER NETWORKS QUESTION BANK ANNAUNIVERSITY 2010 PART II


UNIT-II PART-A (2 Marks) 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Define block coding and give its purpose? What is byte stuffing? Write the importance of CRC in the network. Sketch the Manchester encoding for the bit steam 0001110101. Name the protocols used for CSMA. Wireless network and mobile networks are not identical explain What is importance of hamming distance? What is Manchester Encoding? What is mean by count to infinity problem? What is Manchester Encoding? What is the importance of variable sized sliding window in TCP? Explain Aloha protocol.

12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22.

Give the significance of termination. What is IEEE 802.4 Standard? Define Syndrome? What are the various ARQ Retransmission strategies? What is media sharing? State types of media sharing State different IEEE 802 protocol. Define throughput. Define collision? What is cyclic Redundancy check? What is FDDI? What is a datagram?

1. 2. 3. 4. 5. 6.

PART-B Explain the frame format for token ring and token bus. Explain the frame format IEEE 803.2 and IEEE 803.5. What is CSMA/CD? Explain. Write short notes on Virtual Circuit Switching. Explain in detail about Spanning Tree Algorithm with an example. Explain in detail about Cell Switching.

Das könnte Ihnen auch gefallen