Beruflich Dokumente
Kultur Dokumente
QUESTION BANK
Unit I Introduction
Part A
http://csetube.weebly.com/
10. What is indirect delivery ?
The delivery of a packet is called indirect if the deliverer (host or router) and the
destination are on different networks
b e
applies the mask, row by row, to the received destination address until a match is
found. Classless addressing requires hierarchical and geographical routing to
prevent immense routing tables.
t u
14. What is the maximum length of a datagram?
s e
c
The maximum length of a datagram is 65,535 bytes.
/
: /
15. What is Maximum Transfer Unit ?
The MTU is the maximum number of bytes that a data link protocol can encapsulate.
p
MTUs vary from protocol to protocol.
t
h t
16. What is Fragmentation?
Fragmentation is the division of a datagram into smaller units to accommodate the
MTU of adata link protocol. The fields in the IP header that relate to fragmentation
are the identification number, the fragmentation flags, and the fragmentation offset.
The IP datagram header consists of a fixed, 20-byte section and a variable options
section with a maximum of 40 bytes.
|
+ Destination Address
|
+ t u
| |
s e
c
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/
: /
21. What is the necessity for having ttl field.
ttl refers to time to live and this field will say the validity / lifetime for a IP
datagram.
t p
h t
22. What is the importance of ICMP?
Internet Control Message Protocol used to report the errors that had occurred
while forwarding the IP datagram to the original sender of the datagram.
Eg: Destination unreachable, Redirection etc.
Unit II TCP
Part A
1. List out various TCP services?
* Connection Oriented
* Reliable
* 8 bit byte stream.
http://csetube.weebly.com/
2. Draw the TCP header format?
Bit
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
offs
01234 5 6 789 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
et
0 Source port Destination port
32 Sequence number
64 Acknowledgment number (if ACK set)
E
C
N U A P R S F
Data Reser W
96 C R C S S Y I Window Size
offset ved
S G K H T N N
R
E
128 Checksum Urgent pointer (if URG set)
160 Options (if Data Offset > 5)
... ...
k / padding
.
3. Describe the protocol used for connection establishment. t
b e
Three way handshaking protocol is used for connection establishment:
a. SYN: The active open is performed by the client sending a SYN to the server.
t u
It sets the segment's sequence number to a random value A.
b. SYN-ACK: In response, the server replies with a SYN-ACK. The
s e
acknowledgment number is set to one more than the received sequence
/ c
number (A + 1), and the sequence number that the server chooses for the
packet is another random number, B.
: /
c. ACK: Finally, the client sends an ACK back to the server. The sequence
number is set to the received acknowledgement value i.e. A + 1, and the
p
acknowledgement number is set to one more than the received sequence
t
t
number i.e. B + 1.
h
4. Define interactive data flow and bulk data flow.
On a byte-count basis the ratio is around 90% bulk data and 10% interactive,
since bulk data segments tend to be full sized (normally 512 bytes of user data),
while interactive data tends to be much smaller. (The above-mentioned study found
that 90% of Telnet and Rlogin packets carry less than 10 bytes of user data.).
http://csetube.weebly.com/
sockets), and determine whether the connection is still up and running or if it has
broken.
http://csetube.weebly.com/
Unit III IP Implementation
Part A
1. Describe about ipproc.c
ipproc.c IP process, which is responsible to extract a datagram from a
queue and to process it ie., to forward towards destination.
/ c
Ipaddr rt_gw next hop address
U_short rt_metri distance metric
/
U_short rt_ifnum Interface number
:
p
Short rt_ttl time to live in seconds.
t
h t
5. What is purpose the dont fragment and most fragment bit?
DF ( dont fragment) indicates whether fragmentation can be done or not. If
it is set, then the datagram should not be fragmented else fragmentation can be
done if needed.
MF ( more fragment) indicates whether it is the last or some are fragments
are there. If set, then there are some more fragments yet to be received else, it is the
last fragment of the datagram.
http://csetube.weebly.com/
datagram fragmentation the MF bit is assigned 0 only for the final fragment, but for
the fragment fragmentation the MF bit is assigned 0 only for the last fragment of
the final fragment.
9. Define ip_anyaddr
It is a address whose all 32 bits are 0s. It will be filled as source address if
the gateway is unable to find the source address.
14. What do you mean by configuring the network hardware for a multicast
address?
Configuring the network interface means that making the hardware to
accommodate multicast transmission and reception.
Part A
http://csetube.weebly.com/
2. How TCP software is implemented.
TCP implementation contains three process.
One process to handle incoming segments
One process to manage outgoing segments
A timer process that manages delayed event and retransmission
timeouts.
h t
The Tcp code must choose a unique starting sequence number each time an
application attempts to create a new connection. And this initial sequence number is
generated by using the current time-of-day clock.
Part A
http://csetube.weebly.com/
Each entry has two fields one is the relative time (indicating when event
should occur) and one field to point the next entry
3. Describe tcpkilltimer
It is procedure used to delete all the pending events associated with the TCB.
It will be called when TCB has to deleted.
4. List down the possible ways by which TCP adaptive retransmission can be tuned.
Retransmission timer & backoff, window based flow control, MSS
computation, congestion avoidance & control, round trip estimation.
http://csetube.weebly.com/
PART B QUESTION BANK
UNIT I - INTRODUCTION
1. Explain in detail about the ARP and RARP protocols with neat sketch. (16)
2. Explain In detail about classfull and classless addressing techniques. (16)
3. Explain about subnetting and supernetting in detail. (16)
4. Explain about ICMP. (12)
5. Discuss in detail about IP Routing. (16)
UNIT II - TCP
b
Unit III IP Implementation
e
1. t u
Describe about IP global software in detail. (16)
2. Explain about IP Routing in detail.
s e (16)
3.
4. Describe about IGMP
/ c
Explain about fragmentation and reassembly in detail. (16)
(16)
5. /
Describe about ICMP error processing.
:
(16)
p
UNIT IV - TCP IMPLEMENTATION I
h tt
1. Explain with sketch about finite state machine implementation of input
processing. (16)
2. Explain about Output processing. (12)
3. Write in detail about process tcphowmuch. (12)
4. Explain about data structures used for input processing (10)
1. Explain about the timer.h process. How a timer event can be inserted and
deleted. (16)
2. Explain in detail about flow control and adaptive retransmission in TCP. (16)
3. Explain about Congestion control and avoidance in TCP. (16)
4. Describe about how to process a urgent data in TCP. (16)
5. Write the codings for implementation of push function. (16)
http://csetube.weebly.com/