Beruflich Dokumente
Kultur Dokumente
2) Define a network
3) What is FDDI
Fiber distributed data interface
FDDI is a fiber optic based counter rotating token ring architecture
Features :
Number of stations : up to 1000 connections are allowed
Total fiber path : up to 200 km of total fiber leanth is allowed
Data transmission media : FFDI specifics multi mode optical fiber
4) Give the basic building blocks of network
5) Define Framing
6) What is meant by 1 persistent CSMA
7) What is a Bridge
UNIT - II
1) Differentiate ARP and RARP AM 2011
ARP
It operates at high level
It do not require direct
address to the the network which
makes it difficult for an application
programmer to build a server
It fully utilises the capability
of a network
RARP
It operates at low level
It require direct address to the the
network which makes it difficult for an
application programmer to build a
server
It does not fully utilises the
capability of a network
SYSTEM
IS
CALLED
INTERDOMAIN ROUTING
8) What is the purpose of subnetting AM 2013.
To allow a single network address to span multiple physical networks is called
SUBNETTING or SUBNET ADDRESSING or SUBNET ROUTING.
It is a required part of IP addressing.
If each router on internet needed to know about each existing physical
network, routing tables would be impossibly huge. This is physical overhead
on the router. To solve this type of problem, the subnet addressing method is
used.
UNIT- III
1) Draw the datagram format of UDP?(AM 2011)
UDP is a simple, connectionless protocol. It provides no reliability; it simply
sends data to the IP layer,to use UDP, an application associates itself with a
"transport address"
a. for UDP, a transport address is a combination of an IP address and a
port number
b. a port number is a 16-bit number that uniquely identifies the
application using UDP.
known
as
flow
control
statements.
Branching
statements, such as if then are also part of a programming language flow control
mechanism.
3) What is queuing?( ND 2011)
Queuing is the process of
In
the buffer from which UDP can get the data to make the datagram. Then the
client recvfrom function call that block until the reply arrives from the server.
6) What are the 2 Multiplexing Strategies used in Transport Layer?(AM 2012)
Upward multiplexing
Downward multiplexing
\
7) Give the functions of ARP?(ND 2012)
Address Resolution protocol , a network layer protocol used to convert
an IP address into a physical address (called a DLC address), such as
an Ethernet address.
A host wishing to obtain a physical address broadcasts an ARP request
onto the TCP/IP network. The host on the network that has the IP
address in the request then replies with its physical hardware address
CONGESTION CONTROL
more
data
than
the
network
is
capable
of
transmitting.
Slow-start algorithm works by increasing the TCP Window by one segment for
each acknowledged segment. This behavior effectively doubles the TCP
Window
size
each
round
trip
of
the
network.
UNIT - IV
1) What is cipher text AM 2011
In cryptography, cipher
text (or cyphertext)
is
the
result
is
often
used
for
signing,
data
encrypting,
and decrypting texts, e-mails, files, directories, and whole disk partitions and
to increase the security of e-mail communications. PGP encryption uses a
serial
combination
of hashing, data
compression, symmetric-key
prevent
and
misuse,
digital
video compression standards and file formats developed by the group. MPEG
generally produces better-quality video than competing formats, such
as Video for Windows, Indeo and QuickTime. MPEG files previously on PCs
needed hardware decoders (codecs) for MPEG processing. Today, however,
PCs can use software-only codecs including products from Real Networks,
QuickTime or Windows Media Player.
Unit V
1.What is DNS (AM 2011, AM 2013)
The DNS translates Internet domain and host names to IP addresses. DNS
automatically converts the names we type in our Web browser address bar to the IP
addresses of Web servers hosting those sites.DNS implements a distributed database
to store this name and address information for all public hosts on the Internet. DNS
assumes IP addresses do not change (are statically assigned rather than dynamically
assigned).
2.How is HTTP related to WWW AM 2011
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed,
collaborative, hypermedia information systems.[1] HTTP is the foundation of data
communication for the World Wide Web.Hypertext is structured text that uses
logical links (hyperlinks) between nodes containing text. HTTP is the protocol to
exchange or transfer hypertext.
The
protocol
that
software
must
implement.
HTTP is an application layer network protocol built on top of TCP. HTTP clients
(such as Web browsers) and servers communicate via HTTP request and response
messages. The three main HTTP message types are GET, POST, and HEAD.HTTP
utilizes TCP port 80 by default, though other ports such as 8080 can alternatively be
used.
4.List multimedia applications ND 2011
Multimedia uses computers to present text, audio, video, animation, interactive
features, and still images in various ways and combinations made possible through
the advancement of technology. By combining media and content, those interested in
multimedia can take on and work with a variety of media forms to get their content
across. This is an exciting new field for those interested in computers, technology,
and creative career options. Multimedia can be accessed through computers or
electronic devices and integrates the various forms together. One example of
multimedia would be combining a website with video, audio, or text images.
5.Define HTML AM 2012
HTML is made up of elements (often called tags) that build the contents of a web
page. The differences between HTML and other programming languages
include:HTML is not compiled. It is written and used without any changes being
done to it. I starts out a text file, and is still a text file when a browser or user agent
interprets it.HTML is human readable. While some other programing languages can
be read by people (and not just machines), many times you have to learn the
language to really understand it. In comparison, most HTML beginners can at least
guess what an <img> tag does, for example.
6.What are OVerlay networks ND 2012, AM 2013
Distributed hash tables (DHTs), such as KAD and other protocols based on the
Kademlia
algorithm,
for
example.JXTA
instead
of
by
an
IP
Address
Many peer-to-peer protocols including Gnutella, Gnutella2, Freenet, I2P and Tor.
(Examples:
Limewire,
Shareaza,
Torrent,
Tribler,
etc.)
PUCC
Solipsis:
HyParView:
Overlay
France
a
Tlcom
highly
network
robust
system
for
massively
unstructured
protocols
shared
overlay
based
for
on
virtual
gossip
UDP/IP
world
broadcast
include:
transparency
without
losing
scalability.
It is transparent because the clients are obliged to use the addresses provided by the
authoritative DNS server, and cannot establish whether these addresses belong to the
home
machine
of
the
service
or
to
any
of
its
replicas.
redirect clients is that it is a natural way of informing the clients about the service
addresses. It is used by many existing network services, and is very likely to be used
by those to come as well.
8.State tell why TELNET uses network virtual terminal AM 2012
Telnet uses an approach similar to the analogy described above
for dealing with its problem of hardware and software compatibility. Rather than
having terminals and hosts communicate using their various native languages, all
Telnet clients and servers agree to send data and commands that adhere to a
fictional, virtual terminal type call the Network Virtual Terminal (NVT). The NVT
defines a set of rules for how information is formatted and sent, such as character set,
line termination, and how information about the Telnet session itself is sent.
Each Telnet client running on a terminal understands both its native language and
NVT. When information is entered by the user on his or her local terminal, it is
converted to NVT for transmission over the network in NVT form. When the Telnet
server receives this information, it translates it from NVT to the format that the
remote host expects to receive it. The identical process is performed for
transmissions from the server to the client, in reverse.