NETWORKS AND SECURITY IMPORTANT QUESTIONS
NETWORKS AND SECURITY IMPORTANT QUESTIONS
UNIT - I
PART A
1) How are the subgroups of OSI model layers segregated by their functions ?
2) List out the functions of the Data Link Layer.
3) Find the Hamming distance between two pair of code words : A = 01011 B =
11110
4) What is transmission media? Give example.
5) Distinguish between a point-to-point link and a broadcast link.
6) Outline the use of cyclic redundancy Check.
7) Define flow control.
8) Write the parameters used to measure network performance.
9) Define hidden node problem.
10) What is Bluetooth?
11) What is meant by bit stuffing? Give an example.
12) State the functions of bridges.
13) Write down the requirements to build a computer network.
14) List the metrics that influence the performance of computer networks.
15) Define 802.11.
16) How number of duplex mode link is calculated for mesh topology?
17) Draw the frame format of Ethernet.
18) Define the terms: Bandwidth and Latency.
19) Compare byte -oriented versus bit-oriented protocol.
20) Which layer implements the node-to-node channel connection in OSI layered
architecture?
21) Suppose the following sequence of bits arrives over a link:
22) 1101011111010111110010111110110. Show the resulting frame after any
stuffed bits have been removed. Indicate any errors that might have been
introduced into the frame.
23) Suppose you are designing a sliding window protocol for a 1.5Mbps point-to-
point link, which has one way latency of 1.5 seconds. Assuming each frame
carries 10 KB of data, what is the minimum number of bits required for the
sequence number if SWS=RWS?
PART B
1) Write a neat sketch , explain the architecture of an OSI seven layer model.
2) Discuss the approaches used for error detection in networking.
3) Explain the functions of Wi-Fi and Bluetooth in detail.
4) Explain the architecture of IEEE 802.11Wireless LAN
5) Discuss the different ways to address the framing problem
6) Show and Explain the Ethernet Frame format
7) Explain the challenges faced in building a network.
8) Obtain the 4-bit CRC code, bit stream 10011011100 using the polynomial
(X)4+x2+1.
9) Discuss the working of IEEE802.3
10) With a protocol graph, the architecture of internet.
11) Consider a bus LAN with a number of equally spaced stations with a data
rate of 9Mbps and a bus length of 1km. What is the mean time to send a
frame of 500 bits to another station, measured from the beginning of
transmission to the end of reception? Assume a propagation speed of 150
m/s. If two station begin to monitor and transmit at the same time, how long
does it need to wait before an interference is noticed?
12) Discuss the working of CSMA/CD Protocol.
13) Explain the functions of MAC layer present in IEEE802.11 with necessary
diagrams.
14) Discuss the different ways to address the framing problem.
15) Highlight the characteristics of connectionless networks.
16) Discuss your understanding of Bit Oriented protocol namely HDLC.
17) Explain with relevant diagram the functions of physical and datalink layer.
18) Outline the working principle of Bluetooth technology.
19) A message that is to be transmitted is represented by the polynomial
M(X)=X^5+X^4+X with a generating prime polynomial G(X)=X^3+X^2+1.
Generate a 3 bit CRC code, C(X) which is to be appended to M(X).
20) How is a hub related to a repeater?
21) Explain any two error detection mechanism in detail.
22) Explain in detail about:
HDLC
PPP
24)Give the comparison between different wireless technologies? Enumerate
802.11 protocol stack in detail.
25) Suppose a 128 kpbs point to point link is set up between the earth and a rover
on mars. The distance from the earth to mars (when they are closest together)is
approximately 55 Giga meters, an data travels over the link at the speed of light
at 3x10^8 m/s.
1) calculate the minimum RTT for the link
2) calculate the delay-bandwidth product for the link
3) A camera on the rover takes pictures of its taken and it reach mission control
on earth? Assume that each image is 5Mb in size.
4) Two hosts are in a CSMA/CD network and the medium has a data transfer capacity of
1Gbps. The minimum frame length is fixed to 1,000 bits and the propagation speed is 2
×108 m/s.
i) What will be the distance between the hosts ?
ii) If it is an Ethernet network, what is the efficiency when the hosts have a maximum
distance between them ? If the distance is reduced to 1 m, does it impact the
efficiency ? (8)
UNIT – II
PART – A
180.75.65.128/22525
M0 180.70.65.135/25
M1
201.4.16.0/22 201.4.22.0/24
201.4.16.2/22 R1 201.4.22.3/24
M2 180.70.66.194/26
180.70.65.192/26
180.75.65.200/26
Rate of Interest
PART - B
1) Explain in detail about the error and flow control mechanisms employed at data
link layer.
2) What are the different routing algorithms? List out their pros and cons.
3) An ISP is given a block of addresses beginning with 190.100.0.0/16. The ISP needs
to distribute these addresses to 3 groups of customers as follows : a) Group 1 has
64 customers each needs 256 addresses. (3) b) Group 2 has 128 customers each
needs 128 addresses. (3) c) Group 3 has 128 customers each needs 64 addresses.
(3) Design the sub-blocks and give the slash notation for each sub-block. how
many addresses are still available after these allocations ?
4) Write a short on:
A) DHCP
B) ICMP
5) With a neat diagram explain Distance vector routing protocol.
6) Explain about IPv6? Compare IPv4 and IPv6.
7) Consider sending a 3500 byte datagram that has arrived at a router R1 that
needs to be sent over a link that has an MTU size of 1000 bytes to R2. Then it
has to traverse a link with an MTU of 600 bytes. Let the identification number of
the original datagram be 465. How many fragments are delivered at the
destination? Show the parameters associated with each of these fragments.
8) Explain the working of DHCP protocol with its header format.
9) Explain in detail the operation of OSPF protocol by considering a suitable
network.
10) Explain the working of protocol independent multicast (PIM) in detail.
11) Explain the function of Routing Information Protocol(RIP) in detail.
12) Write an algorithm for datagram forwarding in IP.
13) Draw the IPv6 packet header format
14) Explain the operation of protocol independent multicast(PIM)
15) Outline the need of Distance Vector Multicast Routing protocol(DVMRP).
16) With an example network scenario explain the mechanism of routing information
protocol and specify the routing table contents.
17) Discuss the fundamentals and advantages of open shortest path first protocol.
18) With an example, explain the function of link state routing protocol.
19) Elaborate on multicast routing protocols.
20) Show and explain the ARP packet format for mapping IP addresses into Ethernet
addresses.
21) Consider sending a 2400 byte datagram into a link that has an MTU of 700 bytes.
Suppose the original datagram is stamped with the identification number 422.
Hoe many fragments are generated ? what are the values in the various fields in
the IP datagram(s) generated related to fragmentation.
22) Explain the error reporting using ICMP protocol. How does Traceroute program
makes use of ICMP to determine the name and addresses of the routers between
source and destination?
23) Suppose all of the interfaces in each of three subnets are required to have the
prefix 223.1.17,24. Also suppose that subnet 1 is required to support at least 60
interfaces, subnet 2 is to support at least 90 interfaces, and subnet 3 is to
support at least 12 interfaces. Provide three network addresses that satisfy these
constraints.
24) Explain link state algorithm in detail.
25) Explain the algorithm used for reliable transmission and flow control.
26) Consider the network shown in fig 1. Compute the shortest path from C to all
other nodes using link state algorithm. Also update the forwarding table of node
C. (diagram in
20371)
27) Briefly explain the Border Gateway Protocol used for Inter domain routing in
internetwork.
28) Explain the multicast routing protocol DVMRP.
UNIT - III
PART A
PART B
1) Explain three ways of connection termination in TCP using state transition
diagram.
2) Suppose you are hired to design a reliable byte stream protocol that uses a
sliding window (like TCP). This protocol will run over a 50 Mbps network. The RTT
of the network is 80 ms, and the maximum segment lifetime is 60 seconds. How
many bits would you include in the Advertised Window and Sequence Num fields
of your protocol header?
3) Explain the original, karn/ patridge and Jacobson/ karel’s algorithms of adaptive
retransmission in TCP.
4) Consider a RED gateway with MaxP=0.02, and with an average queue length
halfway between the two thresholds. Find the drop probability Pcount for
count =1 and count = 50. Also calculate the probability that none of the first 75
packets is dropped.
5) a) What are the two broad categories of Congestion Control mechanisms ? Briefly
explain all the techniques. (13)
6) Furnish the packet format of Stream Control Transmission Protocol with its fields. How
are the data transferred with four way handshaking ? (13)
7) What is the format of an email ? Explain the architecture of a mailing system. (13)
8) Does the SSL protocol need the services of a certificate authority ? Explain your answer.
9) Define UDP. Discuss the operations of UDP. Explain UDP checksum with one example
10) Explain in details various TCP congestion control mechanisms.
11) Describe how STMP protocol used in E-mail application
12) Explain HTTP with example.
13) Explain detail about Web service architecture.
14) Explain adaptive flow control and retransmission techniques used in TCP.
15) With TCP ‘s slow start and AIMD for congestion control, show how the window size will
vary for a transmission where every 5th packet is lost. Assume an advertised window size
of 50MSS.
16) Explain congestion avoidance using random early detection in transport layer with an
example.
17) Explain the differentiate services operation of QoS in details.
18) Describe how SMTP transfers message from one host to another with suitable
illustration.
19) Explain IMAP with its state transition diagram.
20) List the elements of network management and explain operation of SNMP
protocol in details.
21) Discuss the functions performed by DNS. Give example