10CS64: COMPUTER NETWORKS - II



Similar documents
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Transport and Network Layer

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

PART-A Questions. 9. What are the two parts of message inside the envelope?

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Indepth Voice over IP and SIP Networking Course

Computer Networks CS321

6LoWPAN Technical Overview

Review: Lecture 1 - Internet History

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

ICTTEN8195B Evaluate and apply network security

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

Introduction to LAN/WAN. Network Layer (part II)

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Communications and Computer Networks

IT4405 Computer Networks (Compulsory)

Answers to Sample Questions on Network Layer

SSVVP SIP School VVoIP Professional Certification

Routing in packet-switching networks

Protocol Architecture

The Internet. Internet Technologies and Applications

Chapter 9. IP Secure

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Analysis of IP Network for different Quality of Service

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

Networking Technology Online Course Outline

CS335 Sample Questions for Exam #2

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Distributed Systems 3. Network Quality of Service (QoS)

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.

Designing and Developing Scalable IP Networks

Final for ECE374 05/06/13 Solution!!

Software Defined Networking (SDN) - Open Flow

Real-time apps and Quality of Service

Post-Class Quiz: Telecommunication & Network Security Domain

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

Chapter 6. The Network Layer

Introduction to IP v6

Architecture and Performance of the Internet

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Advanced Internetworking

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Networking 4 Voice and Video over IP (VVoIP)

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

Networked AV Systems Pretest

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

Multimedia Requirements. Multimedia and Networks. Quality of Service

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

User Datagram Protocol - Wikipedia, the free encyclopedia

Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71

The Network Layer Functions: Congestion Control

Technology Training Limited Module Portfolio for Customised Courses

CSE 3214: Computer Network Protocols and Applications

Address Resolution Protocol (ARP)

Network System Design Lesson Objectives

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Protocols and Architecture. Protocol Architecture.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

VOICE OVER IP AND NETWORK CONVERGENCE

Network management and QoS provisioning - QoS in the Internet

Internet Peering, IPv6, and NATs. Mike Freedman V Networks

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Wireless Encryption Protection

Application Note How To Determine Bandwidth Requirements

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Network layer: Overview. Network layer functions IP Routing and forwarding

Communication Systems Internetworking (Bridges & Co)

CS 348: Computer Networks. - IP addressing; 21 st Aug Instructor: Sridhar Iyer IIT Bombay

Networking Test 4 Study Guide

Network Layer: Network Layer and IP Protocol

Motivation. QoS Guarantees. Internet service classes. Certain applications require minimum level of network performance:

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

ITEC310 Computer Networks II

Internetworking and IP Address

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

Quality of Service (QoS)) in IP networks

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Cisco Integrated Services Routers Performance Overview

Ethernet. Ethernet. Network Devices

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Transcription:

QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference between datagrams and virtual circuits. 3. Define NAT 4. Differentiate between intra domains and inter domain networks. 5. Explain NAP with an example. 6. Explain connectionless packet switching. show how the minimum delay incurred when a message transmitted is 3τ+3T 7. Explain virtual circuit packet switching. 8. Compare the operations of the layer 3 entities in the end systems and in the routers inside the network. 9. Explain why the distance in hops from your ISP to a NAP is very important. What happens if a NAP becomes congested? 10. Explain 8x8 banyan switching. 11. Mention the goals of routing algorithms. 12. Explain Hierarchical Routing. 13. Explain Bellman-Ford Algorithm. 14. Differentiate between Link-State Routing and Distance Vector Routing. 15. Explain briefly different types of routing algorithms. 16. What is Flooding? 17. Explain Dijkstra s Algorithm. 18. How to provide QoS to ATM Networks? 19. Explain the difference between the leaky bucket traffic shaper and the token bucket traffic shaper. 20. Which are the parameters in the upper bound for the peer to peer delay are controllable by the application. 21. What happens as the bit rate of the transmission links becomes very large 22. Consider network in the figure below i) Use the Dijkstra Algorithm to find the shortest path from node 4 to other node. ii) Find the set of associated routing table entries.

. Unit 3 & Unit 4 TCP/IP-1 and TCP/IP-2 1. Explain TCP/IP architecture with a neat diagram. 2. Explain IP packet header 3. Explain different IP addressing schemes. 4. What is CIDR? 5. Explain ARP and RARP. 6. Differentiate between ARP and RARP. 7. What is the purpose of ICMP 8. Explain IPv6 header format with neat diagram 9. What isi) Unicast Addressing ii) Multicast Addressing iii) Anycast Addressing 10. Differentiate between TCP and UDP 11. Explain three-way handshaking. 12. Explain the concept of congestion window in TCP congestion control. 13. Different categories of autonomous systems. 14. What is RIP? 15. Differentiate between BGP and UGP. 16. Explain i) DHCP ii) NAT iii) Mobile IP PART B

Unit 5 Applications, Network Management, Network Security 1. What are the responsibilities of network administrator? 2. What is the necessity of network management? 3. Describe the network management model by ISO. 4. What is the goal of security management? 5. Explain and justify the architecture of network management system with an analogy. 6. Explain the role played by MIB. 7. List the roles played by the network management protocol. 8. Compare and contrast simple network management and Internet Management. 9. Explain SMI. 10. Explain the hierarchy of Object Identifier tree. 11. Describe SNMP in request-response mode. 12. Explain SNMP PDU format. 13. Justify the suitability of SNMP over UDP. 14. List and explain different types of PDUs. 15. Why do we need a command generator in SNMP applications? 16. Explain the matured architecture of SNMP. 17. Explain the generation and processing of SNMP PDUs 18. Explain the support of SNMP towards security. 19. Is a network manager benefit from network management tools? Describe 5 scenarios. 20. What are the 5 areas of network management defined by ISO? 21. What is the difference between network management and service management? 22. Define the following. 23. a. Managing Entity. b. Managed device 24. c. Management Agent d. Management Protocol 25. Explain trap message in SNMP. 26. What is meant by SNMP engine? 27. Write the application of cryptography to security. 28. What is secret key cryptography? 29. Explain IPSec 30. Give the format of Authentication Header. 31. Explain DES Algorithm 32. Explain RSA Algorithm. Unit 6 QoS, VPNs, Tunneling, Overlay Networks

1. Give the overview of QoS methods in integrated services. 2. Explain the leaky bucket traffic shaping algorithm with state diagram and algorithm. 3. Explain Token Bucket Traffic Shaping 4. Differentiate between leaky bucket and token bucket traffic shaping. 5. What is RSVP? 6. Give the overview of a packet scheduler. 7. What are the different types of scheduler? Explain. 8. Give the overview of Differentiated Services QoS in detail. 9. Distinguish betweeni) Fixed versus Adaptive ii) Window Based versus Rate Based iii) Router Based versus Host Based 10. Explain cell scheduling and QoS 11. Suppose that four flows are processed in a router that accepts only equal-size packets. Packets in these flows arrive at the following virtual clock times: Flow 1: 4, 5, 6, 7, 9 Flow 2: 1, 6, 9, 12, 14 Flow 3: 1, 4, 8, 10, 12 Flow 4: 2, 4, 5, 6, 12 a. For each packet, give the virtual clock count at which it is transmitted, using fair queuing. If the arrival times of two packets are the same, the smaller flow number is selected. b. Now consider weighted fair queuing, whereby flows 1, 2, 3, and 4 are given 10 percent, 20 percent, 30 percent, and 40 percent of the output capacity, respectively. For each packet, give the virtual clock count at which it is transmitted. 12. Each output port processor unit of a router has four inputs designated to four different flows. The unit receives the packets in the following order during a period in which the output port is busy but all queues are empty. Give the order in which the packets are transmitted. Flow:1, 1, 1, 1, 1, 1, 2, 2, 3, 3, 3, 4 Packet: 1, 2, 3, 4, 5, 6, 7,8, 9, 10, 11, 12 Packet size: 110, 110, 110, 100, 100, 100, 100, 200, 200, 240, 240, 240 a. Assume a fair queuing scheduler. b. Assume a weighted fair-queuing scheduler with flow i {1, 2, 3, 4} having weights ω i {10%, 20%, 30%, 40%} of the output capacity, respectively Unit 7 Multimedia Networking

1. What is data compression? 2. What is signal sampling? 3. Explain the JPEG compression method and still image processing 4. Explain the session initiation protocol 5. Explain in brief SIP. 6. State and explain quantization and encoding. 7. What is motion image? Explain in detail MPEG compression 8. Write in detail i) Limits of compression with loss. ii) Compression methods without loss. 9. What are the different files in Raw Image Sampling and DCT? 10. Give the limits of compression with loss. 11. What is Huffman Encoding? 12. Explain the different types of encoding in Compression Methods Without Loss. 13. Explain in brief the structure of a SCTP packet. 14. What is Fax Process Algorithm? 15. Short note on VOIP signaling protocols. 16. What are the factors that affect QOS of VOIP. 17. Design a Lempel-Ziv encoder for the following source sequence: 111110001010101011101111100010101010001111010100001 Unit-8 Mobile Adoch Networks and Wireless Sensor Networks 1. With an example, Explain the dynamic source routing protocol 2. List the security issues in Adhoc networks. Explain the types of attacks 3. What are Adhoc networks? Mention their applications types and unique features. 4. Explain the structure of a typical sensor node. 5. What are the advantages of the DEEP clustering protocol? 6. Explain the following i) CGSR of AD-hoc networks ii) Types of attack in Ad-hoc Networks. 7. Write a short note on Zigbee technology. 8. Briefly explain direct and multi hop routing of intra cluster routing protocol with the help of relevant diagram. 9. State and explain the classification of routing protocols used in Adhoc network. 10. Explain table driven protocol DSDV. 11. Short notes on the following a) WRP b)dsr 12. What are the three rules; packets used by TORA and explain the concept of TORA. 13. Distinguish between AODV and ABR protocols. 14. Explain security of adhoc networks and various types of attacks. 15. What are properties to be possessed by routing protocol to prevent attacks and vulnerability. 16. What is sensor network? Explain clustering in Sensor networks. 17. State and explain the block diagram of a typical wireless sensor node. 18. Explain communication energy model. 19. What do clustering protocols specify? Explain any one clustering protocol in detail. 20. Write Algorithm for Deep clustering.

21. Distinguish between centralized routing and distributed routing. 22. Distinguish and explain intra and inter routing protocols. 23. What is a) Stateless mode b) Soft-state mode? 24. List the disadvantages of DSR routing? 25. What is LEACH routing algorithm? 26. List the functions of IEEE 802.15.4 physical layer.