question bank cn2

5
UNIT I :PACKETING NETWORKS I 1. What are datagram and virtual circuits? Distinguish between them. 2. Explain and derive delays in datagram packet switching 3. Why is packet switching more suitable than message switching for interactive applications? Compare the delays in datagram packet switching and message switching. 4. Compare the Bellman ford algorithm and dijkstra’s algorithm for finding the shortest paths from a source node to all other nodes in a network. a. Suppose that 64kbps PCM coded speech is packetized into a constant bit rate ATM cell stream What is the interval between production of full cells? b. How long does it take to transmit the cell at 155 Mbps? c. How many cells could be transmitted in this system between consecutive voice cells? 5. 6. Explain the working mechanism of following devices used to connect LANs. a. Bridge b. Router 7. Explain the working of a LAN bridge. Clearly explain how a transparent bridges sets-up ‘its’ table entries. 8. Explain the “store and forward” packet switching used to send a packet from the source to the destination. UNIT II PACKETING NETWORKS II AND TCP/IP 1. With a neat diagram explain leaky bucket policy 2. Explain the following fields in the IP packet header a. Time to live b. Fragment offset c. Header checksum 3. A large number of consecutive IP addresses are available starting at 200.40.160.0. Suppose that 3 organizations A,B & C request 4000, 2000 and 1000 addresses respectively and in that order. For each of these, give the first IP address assigned, the last IP address assigned and the mark in the w.x.y.z/s notation. 4. Explain the three way handshake for establishing a TCP connection 5. Explain the FIFO and priority queue scheduling for managing traffic at packet level 6. Explain the leaky bucket algorithm for policing the traffic at flow level 7. Consider a packet-by-packet fair queuing system with three logical buffers and with a service rate of one unit/second. Show the sequence of transmissions for this system for the following packet arrival pattern: a. Buffer1: arrival at time t=0, length=2, arrival at t=4, length=1 b. Buffer2: arrival at time t=2, length=3, arrival at t=2, length=1 c. Buffer3: arrival at time t=3, length=5 8. An university has 150 LANs with 100 hosts in each LAN a. Suppose the university has one class B address. Design an appropriate subnet addressing scheme. b. Design an appropriate CIDR addressing scheme. 9. Explain the implementation of connection – oriented service through an example (on a subnet) 10. Compare connection-less and connection oriented service with respect to the following metrices. a. Circuit setup b. Addressing

Upload: sangusajjan

Post on 14-May-2015

4.650 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Question bank cn2

UNIT I :PACKETING NETWORKS I

1. What are datagram and virtual circuits? Distinguish between them.2. Explain and derive delays in datagram packet switching3. Why is packet switching more suitable than message switching for interactive applications?

Compare the delays in datagram packet switching and message switching.4. Compare the Bellman ford algorithm and dijkstra’s algorithm for finding the shortest paths from

a source node to all other nodes in a network.a. Suppose that 64kbps PCM coded speech is packetized into a constant bit rate ATM cell

stream What is the interval between production of full cells?b. How long does it take to transmit the cell at 155 Mbps?c. How many cells could be transmitted in this system between consecutive voice cells?

5.6. Explain the working mechanism of following devices used to connect LANs.

a. Bridge b. Router7. Explain the working of a LAN bridge. Clearly explain how a transparent bridges sets-up ‘its’ table

entries.8. Explain the “store and forward” packet switching used to send a packet from the source to the

destination.

UNIT II PACKETING NETWORKS II AND TCP/IP1. With a neat diagram explain leaky bucket policy2. Explain the following fields in the IP packet header

a. Time to liveb. Fragment offsetc. Header checksum

3. A large number of consecutive IP addresses are available starting at 200.40.160.0. Suppose that 3 organizations A,B & C request 4000, 2000 and 1000 addresses respectively and in that order. For each of these, give the first IP address assigned, the last IP address assigned and the mark in the w.x.y.z/s notation.

4. Explain the three way handshake for establishing a TCP connection5. Explain the FIFO and priority queue scheduling for managing traffic at packet level6. Explain the leaky bucket algorithm for policing the traffic at flow level7. Consider a packet-by-packet fair queuing system with three logical buffers and with a service

rate of one unit/second. Show the sequence of transmissions for this system for the following packet arrival pattern:

a. Buffer1: arrival at time t=0, length=2, arrival at t=4, length=1b. Buffer2: arrival at time t=2, length=3, arrival at t=2, length=1c. Buffer3: arrival at time t=3, length=5

8. An university has 150 LANs with 100 hosts in each LANa. Suppose the university has one class B address. Design an appropriate subnet

addressing scheme.b. Design an appropriate CIDR addressing scheme.

9. Explain the implementation of connection – oriented service through an example (on a subnet)10. Compare connection-less and connection oriented service with respect to the following

metrices.a. Circuit setupb. Addressing

Page 2: Question bank cn2

c. Maintaining state information andd. Routing and router failures

11. Explain any four properties desirable in a routing algorithm12. Explain how folding can be used as a routing algorithm. What are the problems associated with

it? How can they be prevented?13. Explain the salient features of the TCP header fields.14. Write short notes on any four.

a. Need for ATMb. IP over ATMc. The leaky bucket algorithmd. IP addressinge. Subnetting.

15. Explain the leaky bucket technique for policing, with an appropriate diagram.

UNIT III TCP/IP 21. Explain the IP address classification. Identify the following IP addresses and their address class:

a. 200.50.20.165b. 128.167.23.20c. 16.196.128.50d. 150.156.10.10

2. Give the format of IPV6 basic header. Explain the importance

3 Explain in detail, the operation of OSPF.4 Explain identification, flags and fragment offset field in the IP version 4 header.5 What is the need to change from IPV4 to IPV6? Write the IPV6 basic header and describe its

fields.6 Describe how TCP establishes the connection using a three way handshake procedure.7 What is routing information protocol(RIP)? What is the maximum width of a RIP network?

UNIT IV ATM NETWORKS1. With a neat diagram explain the ATM cell header format2. write a short note on AALI3. explain the PNNI signaling with example.4. Give the structure of ATM cell header and details of QOS parameters5. What are the six QOS performance parameters in ATM?6. What is ATM adaptation layer type 1(AAL1)? Describe the generic AAL1 process.7. Describe PNNI signaling with an example.8. What are the design goals of ATM? Briefly describe ATM layers9. Write short notes on:

a. Management information baseb. Cipher feedback conceptc. Leaky bucket vs. Token bucket algorithmd. SNMP

Page 3: Question bank cn2

UNIT V NETWORK MANAGEMENT, SECURITY

1. Apply RSA and do the followinga. Encrypt a=3 b=11, x=3 and m=9b. Find the corresponding yc. Decrypt the cipher text

2. Explain in detail, any two major categories of threat to network security3. Which are the different data types used in the structure of management information?4. Give the comparison between public key and secret key crypto graphic systems5. What are the functions performed by a network management system?6. What are SNMP, SMI and MIB?7. Explain the RSA algorithm. Using it, encrypt the following:

a. P=5, q=11, e=7, p=188. Why is digital signature used and what are the properties of digital signature?9. Describe briefly DES algorithm used for encryption10. Write short notes on: 1) fire walls. 2) SSL11. Explain Diffie Hellman key exchange algorithm with example.12. Describe authentication using Kerberos13. Justify how PGP is efficient in achieving E-mail security.14. What are the components of network management and list their functions.15. What are the desirable properties to secure communication? Explain briefly.16. Write a note on DES17. Define the terms and explain the following:

a. Authenticationb. Digital Signaturec. RSA algorithmd. Fire wall

18. Explain security and administration of SNMPV3.19. Write short notes on:

a. IMAPb. RTP

20. What is DES? How does it work? Explain.21. Briefly describe the encryption model for a symmetric key cipher.22. Write short notes on:

a. SNMP protocolb. Management information base.c. H.323 architecture for internet telephonyd. Firewalls.

23. Define the following terms:a. Confidentialityb. Authenticityc. Integrityd. Non repudiationse. Cryptanalysis andf. Intruder

Page 4: Question bank cn2

24. Name and explain the different steps of a public key cryptographic system that can be used to encrypt and decrypt symmetric keys?

25. Consider a group of ten people where every person in the group needs to communicate with every person in the group needs to communicate with every other person in another group of ten people.

a. How many secret keys are needed considering?i. Symmetric key cryptography?

ii. Asymmetric key cryptography?b. What are the values for the above cases, if every person in a group of ten people needs

to communicate with every other person in the group?26. Explain with an appropriate example, an asymmetric key cryptographic system that can provide

one time session key to the end users and discuss about its demerits?27. Name the different servers used in Kerberos protocol. Bring out role of each server and their

functions in achieving authentication?28. Consider Diffie and Hellman key exchange protocol where n and g are two public random

numbers. Given : n=23 and g=7, what is the value of the symmetric key if x=3 and y=7?29. Explain the JPEG technique for compressing continuous tone still pictures.

30. Explain the desirable properties of secure communication

31. Using RSA, choosing P=3, q=11 and d=7, encode the phrase “HELLO”. Apply the decryption algorithm to the encryption version to recover the original plain text message.

32. Assume a=1, b-2, ------ z=26.

33. What is denial of service attack? Explain, with an example.

34. Explain with a neat diagram, the principal components of a network management architecture.

35. Explain the importance features of RTP protocol and RTP packet header.

36. Write short notes on:

1) Firewall

2) HTTP

3) Real Time streaming protocol

4) Data encryption standard.

UNIT VI QoS, Resource Allocation, VPNs, Tunneling, Overlay Networks1. write a short note on SNMP2. Explain the operation of fair queuing scheduler in context with packet scheduling of integrated

service.3. Explain the various types of resource allocation schemes.4. Discuss the concept of tunnel and point to point protocol in context with UPN.5. Explain VPN and its types based on tunneling6. Explain the need for overlay networks and P2P connection

Page 5: Question bank cn2

7. Discuss the classification of resource allocation schemes.8. What is a virtual private network (VPN)? Mention the different types of VPN and benefits of

deploying a VPN.9. What is an MPLS network? Explain MPLS operation10. Explain the importance features of SSL. Explain the working of SSL, in detail.11. Explain in detail, the working of IP security protocol.

UNIT VII COMPRESSION OF DIGITAL VOICE AND VIDEO, VOIP, MULTIMEDIA NETWORKING

1. Design a Huffman encoder for a source generating (a1,a2,a3,a4,a5,a6,a7} and with probabilities {0.05,0.1,0.1,0.15,0.25,0.3}

2. Explain in brief SIP3. Explain in brief the structure of a SCTP packet4. Explain the JPEG compression method and still image processing5. Explain the session initiation protocol6. Explain the typical JPEG process for production and compression of still images.7. Design a Huffman encoder for a source generating {a0,a1,a2,a3,a4,a5,a6} corresponding

probabilities {0.55, 0.10, 0.05, 0.14, 0.06, 0.08, 0.02}8. What is RTSP? How is it used in multimedia network applications?9. Explain the three broad classes of multimedia applications10. What are the hurdles for multimedia?11. Explain the types of redundancy in video compression12. What are the differences between H.261 and H.26313. Explain the three limitations of the best effort service14. With suitable example explain RTSP messages exchanged between media player and server15. Explain multimedia file format16. Explain the JPEG technique for compressing continuous tone still pictures.

UNIT VIII MOBILE AD-HOC NETWORKS, WIRELESS SENSOR NETWORKS:1. Explain the following

a. CGSR of Ad-hoc networksb. Types of attack in Ad-hoc networks.

2. Briefly explain direct and multi hop routing of intracluster routing protocol with the help of relevant diagram.

3. Write a short note on Zigbee technology.4. With an example, explain the dynamic source routing protocol.5. List the security issues in ad-hoc networks. Explain types of attacks.6. What are Ad-hoc networks? Mention their application types and unique features7. Explain the structure of a typical sensor node.8. What are the advantages of the DEEP clustering protocol?