You are on page 1of 18

CS1302 COMPUTER NETWORKS UNIT I DATA COMMUNICATION 1. What is mean b !

!ata "#mm$ni"ati#n% Data communication is the exchange of data (in the form of 1s and 0s) between two devices via some form of transmission medium (such as a wire cable). 2. What a&e the th&ee "&ite&ia ne"essa& '#& an e''e"ti(e an! e''i"ient net)#&*% The most important criteria are performance, reliability and security. Pe&'#&man"e of the networ depends on number of users, type of transmission medium, the capabilities of the connected h!w and the efficiency of the s!w. Re+iabi+it is measured by fre"uency of failure, the time it ta es a lin to recover from the failure and the networ #s robustness in a catastrophe. Se"$&it issues include protecting data from unauthori$ed access and viruses. 3. What a&e the th&ee '$n!amenta+ "ha&a"te&isti"s !ete&mine the e''e"ti(eness #' the !ata "#mm$ni"ati#n s stem% The effectiveness of the data communication system depends on three fundamental characteristics% De+i(e& , The system must deliver data to the correct destination. A""$&a" , The system must deliver data accurately. Time+iness, The system must deliver data in a timely manner. -. What a&e the a!(anta.es #' !ist&ib$te! /&#"essin.% &dvantages of distributed processing include security!encapsulation, distributed databases, faster problem solving, security through redundancy and collaborative processing. 0. Wh a&e /&#t#"#+s nee!e!% 'n networ s, communication occurs between the entities in different systems. Two entities cannot (ust send bit streams to each other and expect to be understood. )or communication, the entities must agree on a protocol. & protocol is a set of rules that govern data communication. 1. Wh a&e stan!a&!s nee!e!% *o+ordination across the nodes of a networ is necessary for an efficient communication. 'f there are no standards, difficulties arise. & standard provides a model or basis for development to which everyone has agreed.

2. 3#& n !e(i"es in a net)#&*4 )hat is the n$mbe& #' "ab+e +in*s &e5$i&e! '#& a mesh an! &in. t#/#+#. % ,esh topology - n (n+1)!. /ing topology - n 6. What is the !i''e&en"e bet)een a /assi(e an! an a"ti(e h$b% &n active hub contains a repeater that regenerates the received bit patterns before sending them out. & passive hub provides a simple physical connection between the attached devices. 7. Distin.$ish bet)een /ee&8t#8/ee& &e+ati#nshi/ an! a /&ima& 8 se"#n!a& &e+ati#nshi/. Pee&8t#8/ee& &e+ati#nshi/, &ll the devices share the lin e"ually. P&ima& 8se"#n!a& &e+ati#nshi/, 0ne device controls traffic and the others must transmit through it. 10. Ass$me 1 !e(i"es a&e a&&an.e! in a mesh t#/#+#. . 9#) man "ab+es a&e nee!e!% 9#) man /#&ts a&e nee!e! '#& ea"h !e(i"e% 1umber of cables2n (n+1)!.23(3+1)!.214 1umber of ports per device2n+123+124 11. :&#$/ the OSI +a e&s b '$n"ti#n. The seven layers of the 05' model belonging to three subgroups. 6hysical, data lin and networ layers are the networ support layers7 they deal with the physical aspects of moving data from one device to another. 5ession, presentation and application layers are the user support layers7 they allow interoperability among unrelated software systems. The transport layer ensures end+to+end reliable data transmission. 12. What a&e hea!e& an! t&ai+e&s an! h#) !# the .et a!!e! an! &em#(e!% 8ach layer in the sending machine adds its own information to the message it receives from the layer (ust above it and passes the whole pac age to the layer (ust below it. This information is added in the form of headers or trailers. 9eaders are added to the message at the layers 3,4,:,;, and .. & trailer is added at layer.. &t the receiving machine, the headers or trailers attached to the data unit at the

corresponding sending layers are removed, and actions appropriate to that layer are ta en. 13. The t&ans/#&t +a e& "&eates a "#mm$ni"ati#n bet)een the s#$&"e an! !estinati#n. What a&e the th&ee e(ents in(#+(e! in a "#nne"ti#n% *reating a connection involves three steps% connection establishment, data transfer and connection release. 1-. What is the DC "#m/#nent% Direct current is a $ero+fre"uency signal with constant amplitude. 10. 9#) !#es NR;8< !i''e& '&#m NR;8I% 'n the 1/<+= se"uence, positive and negative voltages have specific meanings% positive for 0 and negative for 1. in the 1/<+' se"uence, the voltages are meaningless. 'nstead, the receiver loo s for changes from one level to another as its basis for recognition of 1s. 11. What a&e the '$n"ti#ns #' a DTE% What a&e the '$n"ti#ns #' a DCE% Data terminal e"uipment is a device that is an information source or an information sin . 't is connected to a networ through a D*8. Data circuit+terminating e"uipment is a device used as an interface between a DT8 and a networ . 12. What !#es the e+e"t&i"a+ s/e"i'i"ati#n #' EIA8232 !es"&ibe% The electrical specification of 8'&+.;. defines that signals other than data must be sent using 0)) as less than +; volts and 01 as greater than >; volts. The data must be transmitted using 1/<+= encoding. 16. Dis"$ss the m#!e '#& /&#/a.atin. +i.ht a+#n. #/ti"a+ "hanne+s. There are two modes for propagating light along optical channels, multimode and single mode. M$+tim#!e, ,ultiple beams from a light source move through the core in different paths. Sin.+e m#!e, )iber with extremely small diameter that limits beams to a few angles, resulting in an almost hori$ontal beam. 17. What is &e'&a"ti#n% The phenomenon related to the bending of light when it passes from one medium to another.

20.9#) a&e the .$i!e! me!ia !i''e&in. '&#m $n.$i!e! t&ansmissi#n me!ia% :$i!e! t&ansmissi#n me!ia Un.$i!e! t&ansmissi#n me!ia 1.?uided indicate, medium is contained 1.@nguided medium does not have any within physical boundary 6hysical boundary 2.Transmission ta es place through wire. 2.'t is a wireless transmission. 22. What a&e the !isa!(anta.es #' #/ti"a+ 'ibe& as a t&ansmissi#n me!i$m% The disadvantages of optical fiber are Aery expensive. 'nstallation and maintenance is difficult. )ragility. 23. What a&e the "&ite&ia $se! t# e(a+$ate t&ansmissi#n me!i$m% The criteria used to evaluate transmission medium are Throughput 6ropagation speed 6ropagation time Bavelength 2-. :i(e the &e+ati#nshi/ bet)een /&#/a.ati#n s/ee! an! /&#/a.ati#n time% 6ropagation time 2 distance ! propagation speed The time re"uired for a signal or a bit to travel from one point to another is called P&#/a.ati#n time. P&#/a.ati#n s/ee! is the distance, a signal or a bit travel through a medium in one second. 20.E=/+ain "&#ss ta+* an! )hat is nee!e! t# &e!$"e it% 8ffect of one wire on another is called as cross tal . 0ne wire will be the sending antenna and the other wire will be the receiving antenna. Be can use the shielded twisted pair cable or coaxial cable for transmission, which contains metal foil to reduce cross tal . UNIT8II DATA <INK <A>ER 1.What a&e the &es/#nsibi+ities #' !ata +in* +a e&% 5pecific responsibilities of data lin layer include the following. a) )raming b) 6hysical addressing c) )low control d) 8rror control e) &ccess control 2. Menti#n the t /es #' e&&#&s.

There are . types of errors a) 5ingle+bit error. b) Curst+bit error. 3. De'ine the '#++#)in. te&ms. 5ingle bit error% The term single bit error means that only one bit of a given data unit (such as byte character!data unit or pac et) is changed from 1 to 0 or from 0 to 1. Curst error% ,eans that . or more bits in the data unit have changed from 1 to 0 from 0 to 1. -. What is &e!$n!an" % 't is the error detecting mechanism, which means a shorter group of bits or extra bits may be appended at the destination of each unit. 0. <ist #$t the a(ai+ab+e !ete"ti#n meth#!s. There are : types of redundancy chec s are used in data communication. a) Aertical redundancy chec s (A/*). b) =ongitudinal redundancy chec s (=/*). c) *yclic redundancy chec s (*/*). d) *hec sum. 1. W&ite sh#&t n#tes #n ?RC. The most common and least expensive mechanism for error detection is the vertical redundancy chec (A/*) often called a parity chec . 'n this techni"ue a redundant bit called a parity bit, is appended to every data unit so, that the total number of 0#s in the unit (including the parity bit) becomes even. 2. W&ite sh#&t n#tes #n <RC. 'n longitudinal redundancy chec (=/*), a bloc of bits is divided into rows and a redundant row of bits is added to the whole bloc . 6. W&ite sh#&t n#tes #n CRC. The third and most powerful of the redundancy chec ing techni"ues is the cyclic redundancy chec s (*/*) */* is based on binary division. 9ere a se"uence of redundant bits, called the */* remainder is appended to the end of data unit. 7. W&ite sh#&t n#tes #n CRC .ene&at#&. & */* generator uses a modulo+. division. 'n the first step, the :+bit divisor is subtracted from the first : bit of the dividend. 8ach bit of the divisor is subtracted from the corresponding bit of the

dividend without disturbing the next higher bit. 10. W&ite sh#&t n#tes #n CRC "he"*e&. & */* chec er functions exactly li e a generator. &fter receiving the data appended with the */* it does the same modulo+. division. 'f the remainder is all 0#s the */* is dropped and the data accepted. 0therwise, the received stream of bits is discarded and the dates are resent. 11. :i(e the essentia+ /&#/e&ties '#& /#+ n#mia+. & polynomial should be selected to have at least the following properties. a) 't should not be b) 't should be divisible by(x>1). 12. De'ine "he"*s$m. The error detection method used by the higher layer protocol is called chec sum. *hec sum is based on the concept of redundancy. 13. What a&e the ste/s '#++#)e! in "he"*s$m .ene&at#&% The sender follows these steps a) The units are divided into sections each of n bits. b) &ll sections are added together using .#s complement to get the sum. c) The sum is complemented and become the chec sum. d) The chec sum is sent with the data. 1-. <ist #$t the ste/s '#++#)e! is "he"*s$m "he"*e& si!e. The receiver must follow these steps a) The unit is divided into section each of n bits. b) &ll sections are added together using 1#s complement to get the sum. c) The sum is complemented. d) 'f the result is $ero. 10. W&ite sh#&t n#tes #n e&&#& "#&&e"ti#n. 't is the mechanism to correct the errors and it can be handled in . ways. a) Bhen an error is discovered, the receiver can have the sender retransmit the entire data unit. b) & receiver can use an error correcting coder, which automatically corrects certain errors. 11. Menti#n the t /es #' e&&#& "#&&e"tin. meth#!s. There are . error+correcting methods. a) 5ingle bit error correction b) Curst error correction. 12. What is the /$&/#se #' hammin. "#!e% & hamming code can be designed to correct burst errors of certain lengths. 5o the simple strategy used by the hamming code to correct single bit errors must be redesigned to be applicable for multiple bit correction. 16. De'ine '+#) "#nt&#+.

)low control refers to a set of procedures used to restrict the amount of data. The sender can send before waiting for ac nowledgment. 17. What is a b$''e&% 8ach receiving device has a bloc of memory called a buffer, reserved for storing incoming data until they are processed. 20. Menti#n the "ate.#&ies #' '+#) "#nt&#+. There are . methods have been developed to control flow of data across communication lin s. a) 5top and wait+ send one from at a time. b) 5liding window+ send several frames at a time. 21. What is the '$n"ti#n #' st#/ an! )ait '+#) "#nt&#+% 'n this method, the sender sends one frame and waits for an ac nowledgement before sending. 22. Menti#n the a!(anta.e an! !isa!(anta.e #' st#/ an! )ait '+#) "#nt&#+. &dvantage% simplicity Disadvantage% inefficiency. 23. De'ine AR@. 8rror control in the data lin layer is based on &utomatic repeat re"uest (&/D), which means retransmission of data in ; cases. a) Damaged frame b) =ost frame c) =ost ac nowledgment. 2-. Menti#n the '$n"ti#n #' .#8ba"* N8AR@. 't is the popular mechanism for continuous transmission error control. 'n the method, if our frame is lost or damaged, all frames sent since the last frame ac nowledged are retransmitted. 20. What is se+e"ti(e &eAe"t AR@% 'n selective re(ect &/D only the specific damaged or lost frame is retransmitted. 'f a frame is corrupted in transit, a 1&E is returned and the frame is resent out of se"uence. 21. De'ine 9D<C. 't is a bit+oriented data lin protocol designed to support both half+duplex and full duplex communication over point to point and midpoint lin s. 22. <ist the t /es #' stati#ns is 9D<C. 9D=* differentiates between ; types of stations. a) 6rimary b) 5econdary c) *ombined

26. De'ine "#n'i.$&ati#n. The bond configuration refers to the relationship of hardware devices on a lin . 27. <ist the (a&i#$s )a s #' stati#n "#n'i.$&ati#n. The stations are configured in ; ways a) @nbalanced configuration b) 5ymmetrical configuration c) Calanced configuration 30. What a&e the !i''e&ent "#mm$ni"ati#n m#!es in 9D<C% 9D=* supports ; modes of communication between stations. a) 1ormal response mode (1/,) b) &synchronous response mode (&/,) c) &synchronous balanced mode (&C,) 31. Menti#n the t /es #' '&ames in 9D<C. There are ; types of 9D=* frames. a) 'nformation frames ('+frames) b) 5upervisory frames (5+frames) c) @nnumbered frames (@+frames) 32. :i(e the $sa.e #' I4 S4 U '&ames. ' frames - used to transport user data and control information relating to user data. 5 frames - used only to transport control information, primarily data lin layer and error controls. @ frames - reserved for systems management. 33. W&ite the t /es #' '&ame 'ie+!s "#ntaine! in 9D<C. 8ach frame in 9D=* may contain up to 3 fields. a) Ceginning flag field b) &n address field c) & control field d) &n information field e) & frame chec se"uence ()*5) field f) &n ending flag field. 3-. What is meant b bit st$''in.% Cit stuffing is the process of adding one extra 0 whenever there are 4 consecutive in the data so that the receiver doesn#t mista e the data for a flag. 30. De'ine <AN. & =ocal &rea 1etwor (=&1) is a data communication system that allows a number of independent devices to communicate directly with each other in a limited geographic area. 31. Menti#n the (a&i#$s a&"hite"t$&e in a <AN. =&1 is dominated by : architectures. a) 8thernet b) To en bus

c) To en ring d) )iber distributed data interface ()DD') 32. De'ine a stan!a&! 602.3 '888 F0..; supports a =&1 standard originally developed by Gerox and later extended by a (oint venture between digital e"uipment corporations. 'ntel *orporation and Gerox. This was called H8thernet#. 36. <ist the m#st "#mman! *in!s #' Base ban! 602.3 <AN. a) 10 Case 4 b) 10 Case . c) 10 Case T d) 1 Case 4 e) 100 Case T 37. Menti#n the !i''e&ent *in!s #' Ethe&net net)#&*s. a) 5witched 8thernet b) )ast 8thernet c) ?igabit 8thernet -0. W&ite sh#&t n#tes #n 3DDI. )iber distributed data interface is a local areas. 1etwor protocol standardi$ed by &15' and 'T@+I. 't supports data rates of 100 ,bps and provides a high+ speed alternative to 8thernet and to en ring access method used here is to en passing. -1. Des"&ibe the th&ee 9D<C stati#n t /es% The three 9D=* station types are% P&ima& stati#n% The primary station has the complete control of the lin . The 6rimary station sends commands to the secondary station. Se"#n!a& stati#n% The secondary station sends responses. C#mbine! stati#n% The combined station is one, which acts either as a primary or a 5econdary, depending upon the nature and direction of the transmission. *ombined station sends both commands and responses. -2. What is /i.. ba"*in.% 6iggybac ing means combining data to sent and ac nowledgement of the frame received in one single frame. 6iggy bac ing can save bandwidth because the overhead from a data frame and an &*E frame can be combined into (ust one frame -3. Name the '#$& t /es #' S8'&ames% The four types of 5+frames are /eceive ready (//). The value of the code sub field is 00 /eceive not ready (/1/). The value of the code sub field is 10 /e(ect (/8J). The value of the code sub field is 01

5elective re(ect (5/8J). The value of the code sub field is 11 --. Name the 'i(e "ate.#&ies #' U8'&ames% The five categories of @+frames are K ,ode setting K @nnumbered exchange K Disconnection. K 'nitiali$ation mode. K ,iscellaneous mode UNIT III NETWORK <A>ER 1. What a&e the net)#&* s$//#&t +a e&s an! the $se& s$//#&t +a e&s% Net)#&* s$//#&t +a e&s, The networ support layers are 6hysical layer, Data lin layer and 1etwor layer. These deals with electrical specifications, physical connection, transport timing and reliability. Use& s$//#&t +a e&s, The user support layers are% 5ession layer, 6resentation layer, &pplication layer. These allow interoperability among unrelated software system. 2. What a&e the '$n"ti#ns #' <<C% The '888 pro(ect F0. models ta es the structure of an 9D=* frame and divides it into . sets of functions. 0ne set contains the end user portion of the 9D=* frame + the logical address, control information, and data. These functions are handled by the '888 F0... logical lin control (==*) protocol. 3. What a&e the '$n"ti#ns #' MAC% ,&* sub layer resolves the contention for the shared media. 't contains synchroni$ation, flag, flow and error control specifications necessary to move information from one place to another, as well as the physical address of the next station to receive and route a pac et. -. What is /&#t#"#+ !ata $nit% The data unit in the ==* level is called 6rotocol Data @nit (6D@). 't contains four fields. Destination 5ervice 6oint &ddress (D5&6) 5ource 5ervice &ccess 6oint *ontrol field 'nformation field 0. What a&e hea!e&s an! t&ai+e&s an! h#) !# the .et a!!e! an! &em#(e!%

The control data added to the beginning of a data is called headers. The control data added to the end of a data is called trailers. &t the sending machine, when the message passes through the layers each layer adds the headers or trailers. &t the receiving machine, each layer removes the data meant for it and passes the rest to the next layer. 1. What a&e the &es/#nsibi+ities #' net)#&* +a e&% The networ layer is responsible for the source+to+destination delivery of pac et across multiple networ lin s. The specific responsibilities of networ layer include the following% =ogical addressing. /outing. 6. What is a (i&t$a+ "i&"$it% & logical circuit made between the sending and receiving computers. The connection is made after both computers do handsha ing. &fter the connection, all pac ets follow the same route and arrive in se"uence. 7. What a&e !ata .&ams% 'n datagram approach, each pac et is treated independently from all others. 8ven when one pac et represents (ust a place of a multipac et transmission, the networ treats it although it existed alone. 6ac ets in this technology are referred to as datagram. 10. What a&e the t)# t /es #' im/+ementati#n '#&mats in (i&t$a+ "i&"$its% Airtual circuit transmission is implemented in . formats. 5witched virtual circuit 6ermanent virtual circuit. 11. What is meant b s)it"he! (i&t$a+ "i&"$it% 5witched virtual circuit format is comparable conceptually to dial+up line in circuit switching. 'n this method, a virtual circuit is created whenever it is needed and exits only for the duration of specific exchange. 12. What is meant b Pe&manent (i&t$a+ "i&"$it% 6ermanent virtual circuits are comparable to leased lines in circuit switching. 'n this method, the same virtual circuit is provided between two uses on a continuous basis. The circuit is dedicated to the specific uses. 13. De'ine R#$te&s. /outers relay pac ets among multiple interconnected networ s. They /oute

pac ets from one networ to any of a number of potential destination networ s on 'nternet routers operate in the physical, data lin and networ layer of 05' model. 1:. What is meant b h#/ "#$nt% The pathway re"uiring the smallest number of relays, it is called hop+count routing, in which every lin is considered to be of e"ual length and given the value one. 10. 9#) "an the &#$tin. be "+assi'ie!% The routing can be classified as, &daptive routing 1on+adaptive routing. 13. What is time8t#8+i(e #& /a"*et +i'etime% &s the time+to+live field is generated, each pac et is mar ed with a lifetime, usually the number of hops that are allowed before a pac et is considered lost and accordingly, destroyed. The time+to+live determines the lifetime of a pac et. 1I. What is meant b b&#$te&% & brouter is a single protocol or multiprotocol router that sometimes act as a router and sometimes act as a bridge. 16. W&ite the *e s '#& $n!e&stan!in. the !istan"e (e"t#& &#$tin.. The three eys for understanding the algorithm are Enowledge about the whole networ s /outing only to neighbors 'nformation sharing at regular intervals 17. W&ite the *e s '#& $n!e&stan!in. the +in* state &#$tin.. The three eys for understanding the algorithm are Enowledge about the neighborhood. /outing to all neighbors. 'nformation sharing when there is a range. 20. 9#) the /a"*et "#st &e'e&&e! in !istan"e (e"t#& an! +in* state &#$tin.% 'n distance vector routing, cost refer to hop count while in case of lin state routing, cost is a weighted value based on a variety of factors such as security levels, traffic or the state of the lin . 21. 9#) the &#$te&s .et the in'#&mati#n ab#$t nei.hb#&% & router gets its information about its neighbors by periodically sending them a short greeting pac ets. 'f the neighborhood responds to the greeting as expected, it is assumed to be alive and functioning. 'f it dose not, a change is assumed to have occurred and the sending router then alerts the rest of the networ in its next =56. 22. What a&e the '#$& inte&net)#&*in. !e(i"es%

The four internetwor ing devices are, /epeaters Cridges /outers ?ateway 23. De'ine IP a!!&ess. '6 address is the ;+bit number for representing a host or system in the networ . 0ne portion of the '6 address indicates a networ ing and the other represents the host in a networ . 2-. What is T#*en B$s% To en Cus is a physical bus that operates as a logical ring using to ens. 9ere stations are logically organi$ed into a ring. & to en is passed among stations. 'f a station wants to send data, it must wait and capture the to en. =i e 8thernet, station communicates via a common bus. 20. What is t#*en /assin.% 5tations may attempt to send data multiple times before a transmission ma es it onto a lin . This redundancy may create delays of indeterminable length if the traffic is heavy. To en ring resolves this uncertainty by re"uiring that stations ta e turns sending data. 8ach station may transmit only during its turn and may send only one frame during each turn. The mechanism that coordinates this rotation is called to en passing. 21. De'ine Mas*in.% ,as ing is the process that extracts the address of the physical networ from an '6 address. 22. What a&e the &$+es #' b#$n!a& 8+e(e+ mas*in.% The rules of boundary+level mas ing The bytes in the '6 address that corresponds to .44 in the mas will be repeated in the subnetwor address The bytes in the '6 address that corresponds to 0 in the mas will change to 0 in the subnetwor address 26. What a&e the &$+es #' n#nb#$n!a& 8+e(e+ mas*in.% The bytes in the '6 address that corresponds to .44 in the mas will be repeated in the subnetwor address The bytes in the '6 address that corresponds to 0 in the mas will change to 0 in the subnetwor address )or other bytes, use the bit+wise &1D operator

27. De'ine :ate)a . & device used to connect two separate networ s that use different communication protocols. ;0. What is <SP% 'n lin state routing, a small pac et containing routing information sent by a router to all other router by a pac et called lin state pac et. UNIT I? TRANSPORT <A>ER 1. What is '$n"ti#n #' t&ans/#&t +a e&% The protocol in the transport layer ta es care in the delivery of data from one application program on one device to an application program on another device. They act as a lin between the upper layer protocols and the services provided by the lower layer. 2. What a&e the !$ties #' the t&ans/#&t +a e&% The services provided by the transport layer 8nd+to+ end delivery &ddressing /eliable delivery )low control ,ultiplexing -. What a&e the '#$& as/e"ts &e+ate! t# the &e+iab+e !e+i(e& #' !ata% The four aspects are, 8rror control 5e"uence control =oss control Duplication control 0. What is meant b se.ment% &t the sending and receiving end of the transmission, T*6 divides long transmissions into smaller data units and pac ages each into a frame called a segment. 1. What is meant b se.mentati#n% Bhen the si$e of the data unit received from the upper layer is too long for the networ layer datagram or data lin layer frame to handle, the transport protocol divides it into smaller usable bloc s. The dividing process is called segmentation. I. What is meant b C#n"atenati#n% The si$e of the data unit belonging to single sessions are so small that several can fit together into a single datagram or frame, the transport protocol combines them into a single data unit. The combining process is called concatenation. 6. What a&e the t /es #' m$+ti/+e=in.%

The types of multiplexing are, @pward multiplexing Downward multiplexing 7. What a&e the t)# /#ssib+e t&ans/#&t se&(i"es% Two basic types of transport services are, *onnection service *onnectionless services 10. The t&ans/#&t +a e& "&eates the "#nne"ti#n bet)een s#$&"e an! !estinati#n. What a&e the th&ee e(ents in(#+(e! in the "#nne"ti#n% )or security, the transport layer may create a connection between the two end ports. & connection is a single logical path between the source and destination that is associated with all pac ets in a message. *reating a connection involves three steps% *onnection establishment Data transfer L *onnection release. 11. What is meant b "#n.esti#n% *ongestion in a networ occurs if user sends data into the networ at a rate greater than that allowed by networ resources. 12. Wh the "#n.esti#n #""$&s in net)#&*% *ongestion occurs because the switches in a networ have a limited buffer si$e to store arrived pac ets. 1;. What is meant b 5$a+it #' se&(i"e% The "uality of service defines a set of attributes related to the performance of the connection. )or each connection, the user can re"uest a particular attribute each service class is associated with a set of attributes. 1-. What a&e the t)# "ate.#&ies #' @#S att&ib$tes% The two main categories are @ser 0riented 1etwor 0riented 10. <ist #$t the $se& &e+ate! att&ib$tes% @ser related attributes are 5*/ - 5ustainable *ell /ate 6*/ - 6ea *ell /ate ,*/+ ,inimum *ell /ate *ADT - *ell Aariation Delay Tolerance 11. What a&e the net)#&*s &e+ate! att&ib$tes% The networ related attributes are, *ell loss ratio (*=/) *ell transfer delay (*TD) *ell delay variation (*DA) *ell error ratio (*8/)

UNIT ? APP<ICATION <A>ER 1. What is the /$&/#se #' D#main Name S stem% Domain 1ame 5ystem can map a name to an address and conversely an address to name. 2. Dis"$ss the th&ee main !i(isi#n #' the !#main name s/a"e. Domain name space is divided into three different sections% generic domains, country domains L inverse domain. :ene&i" !#main, Define registered hosts according to their generic behavior, uses generic suffixes. C#$nt& !#main, @ses two characters to identify a country as the last suffix. In(e&se !#main, )inds the domain name given the '6 address. 3. Dis"$ss the TCP "#nne"ti#ns nee!e! in 3TP. )T6 establishes two connections between the hosts. 0ne connection is used for data transfer, the other for control information. The control connection uses very simple rules of communication. The data connection needs more complex rules due to the variety of data types transferred. -. Dis"$ss the basi" m#!e+ #' 3TP. The client has three components% the user interface, the client control process, and the client data transfer process. The server has two components% the server control process and the server data transfer process. The control connection is made between the control processes. The data connection is made between the data transfer processes. 0. What is the '$n"ti#n #' SMTP% ,',8 is a supplementary protocol that allows non+&5*'' data to be sent through 5,T6. ,',8 transforms non+&5*'' data at the sender site to 1AT &5*'' data and deliverers it to the client 5,T6 to be sent through the 'nternet. The server 5,T6 at the receiving side receives the 1AT &5*'' data and delivers it to ,',8 to be transformed bac to the original data. 6. Wh is an a//+i"ati#n s$"h as POP nee!e! '#& e+e"t&#ni" messa.in.% Bor stations interact with the 5,T6 host, which receives the mail on behalf of every host in the organi$ation, to retrieve messages by using a client+ server

protocol such as 6ost 0ffice 6rotocol, version ;(606;). &lthough 606; is used to download messages from the server, the 5,T6 client still needed on the des top to forward messages from the wor station user to its 5,T6 mail server. 11. W&ite !#)n the th&ee t /es #' WWW !#"$ments. The documents in the BBB can be grouped into three broad categories% static, dynamic and active. Stati", )ixed+content documents that are created and stored in a server. D nami", *reated by web server whenever a browser re"uests the document. A"ti(e, & program to be run at the client side. 12. What is the /$&/#se #' 9TM<% 9T,= is a computer language for specifying the contents and format of a web document. 't allows additional text to include codes that define fonts, layouts, embedded graphics and hypertext lin s. 1;. De'ine C:I. *?' is a standard for communication between 9TT6 servers and executable programs. 't is used in crating dynamic documents. 1-. Name '#$& 'a"t#&s nee!e! '#& a se"$&e net)#&*. P&i(a" , The sender and the receiver expect confidentiality. A$thenti"ati#n, The receiver is sure of the sender#s identity and that an imposter has not sent the message. Inte.&it , The data must arrive at the receiver exactly as it was sent. N#n8Re/$tati#n, The receiver must able to prove that a received message came from a specific sender. 10. 9#) is a se"&et *e !i''e&ent '&#m /$b+i" *e % 'n secret ey, the same ey is used by both parties. The sender uses this ey and an encryption algorithm to encrypt data7 the receiver uses the same ey and the corresponding decryption algorithm to decrypt the data. 'n public ey, there are two eys% a private ey and a public ey. The private ey is ept by the receiver. The public ey is announced to the public. 11. What is a !i.ita+ si.nat$&e% Digital signature is a method to authenticate the sender of a message. 't is similar to that of signing transactions documents when you do business with a ban . 'n networ transactions, you can create an e"uivalent of an electronic or digital signature by the way you send data. 12. What a&e the a!(anta.es C !isa!(anta.es #' /$b+i" *e en"& /ti#n% A!(anta.es,

a) /emove the restriction of a shared secret ey between two entities. 9ere each entity can create a pair of eys, eep the private one, and publicly distribute the other one. b) The no. of eys needed is reduced tremendously. )or one million users to communicate, only two million eys are needed. Disa!(anta.e, 'f you use large numbers the method to be effective. *alculating the cipher text using the long eys ta es a lot of time. 5o it is not recommended for large amounts of text. 16. What a&e the a!(anta.es C !isa!(anta.es #' se"&et *e en"& /ti#n% A!(anta.e, 5ecret Eey algorithms are efficient% it ta es less time to encrypt a message. The reason is that the ey is usually smaller. 5o it is used to encrypt or decrypt long messages. Disa!(anta.es, a) 8ach pair of users must have a secret ey. 'f 1 people in world want to use this method, there needs to be 1 (1+1)!. secret eys. )or one million people to communicate, a half+billion secret eys are needed. b) The distribution of the eys between two parties can be difficult. 1M. De'ine /e&m$tati#n. 6ermutation is transposition in bit level. St&ai.ht /e&m$tati#n, The no. of bits in the input and output are preserved. C#m/&esse! /e&m$tati#n, The no. of bits is reduced (some of the bits are dropped). E=/an!e! /e&m$tati#n, The no. of bits is increased (some bits are repeated). .0. De'ine s$bstit$ti#na+ C t&ans/#siti#na+ en"& /ti#n. S$bstit$ti#na+, & character level encryption in which each character is replaced by another character in the set. T&ans/#siti#na+, & *haracter level encryption in which the characters retain their plaintext but the position of the character changes.

You might also like