TYBSC Computer Science Computer Networks II Question Bank Chapter 1 One Mark Questions 1. 2. 3. 4. 5. 6. 7. 8. 9.

What is BSS? What is ESS? What is the difference between BSS & ESS? What is Bluetooth? What is Piconet? What is Scatternet? What is the difference between piconet & Scatternet? How many secondary can a single primary support in Bluetooth? What are the types of stations defined by IEEE 802.11?

Five Mark Questions 1. 2. 3. 4.

What are the advantages of using wireless technologies over wired technologies? Explain IEEE 802.11 architecture. What is Bluetooth? Explain its architecture. State the differences between: a. BSS & ESS b. Piconet & Scatternet 5. Compare Wireless LAN & Bluetooth. 6. Explain the IEE 802.11 station types. Chapter 2 One Mark Questions 1. What are the functions of the network layer? 2. What are the two types of switching mechanisms used in the network layer? 3. What is the size of an IPV4 address and address space? 4. Which notations are used to express an IPV4 address? 5. Write the syntax of the dotted decimal format. 6. How many classes are IP Addresses divided into? 7. Write the default address mask for class A,B &C. 8. What does the /n Notation Stand for? 9. State the purpose of NATting? 10. State the purpose of the TTL and Total Length Fields. 11. Name the fields related to fragmentation. 12. List the options in IP datagram.

13. List the desirable characteristics of routing algorithm. 14. What are the two types of routing algorithms? 15. What is Congestion? 16. What are the two congestion control mechanisms? Five Mark Question 1. Explain the design issues of the network layer. 2. Write a note on packet switching. 3. Differentiate between virtual circuit & datagram switching. 4. What are the services provided by network layer to transport layer? 5. Write a note on classful addressing. 6. Explain how class can be identified from the IP address. 7. Write a note on Subnetting. 8. Explain how subnetting & supernetting is achieved. 9. Explain the IP address structure when subnetting is used. 10. Write a note on classless addressing. 11. Write a note on network address translation. 12. Draw a structure of IPV4 datagram and explain its fields. 13. Explain how fragmentation of an IP datagram takes place. 14. Explain the desirable characteristics of routing algorithm. 15. Compare adaptive and Non-adaptive routing. 16. Explain the causes of congestion. 17. Explain the Open and closed loop congetion control mechanisms. 18. Explain the congestion prevention policies used in data link layer. 19. Explain the congestion prevention policies used in network layer. 20. Explain the congestion prevention policies used in transport layer

Chapter 3 One Mark Questions 1. 2. 3. 4. 5. 6. 7.

What is the difference between logical and physical address? What are the two ways to map logical and physical addresses? What are the difference between static and static and dynamic mapping? What is purpose of ARP? What is purpose of RARP? What is ARP cache used for? What is the role of ARP Proxy?

Five Mark Questions 1. Explain static and dynamic mapping for mapping logical and physical addresses. 2. Write a note on ARP. 3. Explain ARP packet format.

4. 5. 6. 7. 8. 9.

Write a note on proxy ARP. Explain the four cases of using ARP. What are the advantages & disadvantages of proxy ARP? Write a note on RARP. Explain the need of RARP with an example. What the advantages and disadvantages of RARP?

Chapter 4 One Mark Questions 1. What is meant by Process-to-Process Delivery? 2. What are the port number ranges? 3. Which applications use UDP? 4. What are the sections used to calculate checksum in UDP? 5. What are the applications of TCP? 6. TCP is a datagram oriented protocol. True/False. 7. What are the numbers used by TCP? 8. List the TCP flags. 9. What are the ephemeral port numbers? 10. Which are the well Known port numbers? 11. What is the maximum and minimum size of UDP datagram? 12. What is the maximum size of TCP header? Five Mark Question 1. Explain the need of Transport Layer? 2. Explain the features of Transport Layer. 3. Write a note on process to process delivery. 4. Explain the concept of port numbers. 5. Write a note on client/server paradigm and the use of port numbers. 6. Differentiate between connectionless & connection Oriented service. 7. Differentiate between reliable and unreliable service. 8. Write a note on UDP. 9. Explain how checksum calculation is done in UDP. 10. Explain the UDP datagram format. 11. Explain UDP operation in brief. 12. Explain TCP services. 13. Explain the features of TCP. 14. Explain the TCP segment format. 15. Explain the role of buffers in TCP. 16. Explain the numbering system used by TCP. 17. Explain the various flags used in TCP. 18. Differentiate the TCP & UDP Protocols.

Chapter 5 One Mark Questions 1. 2. 3. 4. 5. 6. 7. 8. 9.

What is DNS? What is the difference between flat and hierarchical name space? What is a label & Domain? What is FQDN & PQDN? What is a zone? What is the difference between primary & Secondary Server? Name the three sections of DNS tree. “Catching increases the efficiency of name resolution”. True/False & Justify. Determine which of the following is FQDN & which is PQDN. a. Edu b. Comp.edu. c. dept.college.univ.edu. d. dept.college 10. What are the components of an email address? 11. Why do we need POP3 And IMAP4? 12. SMTP is a push protocol.True/False. 13. List the task performed by User Agent. 14. List any four commands of SMTP. 15. What are the types of User Agent? 16. What is the purpose of FTP? 17. What are the two types of Connections and their ports used in FTP? 18. What is the purpose of Control & Data Connection? 19. What is the difference between FTP Control and Date Connection? 20. What are the file types supported by FTP? 21. What are the data structures supported by FTP? 22. What are the transmission modes supported by FTP? 23. What is anonymous FTP? 24. What is the structure of WWW? 25. What are the three components of a browser? 26. What type of documents are supported by WWW? 27. What is the advantage of using proxy server? 28. What is the structure of a request & response messages in HTTP? 29. What is the difference between persistent & non persistent connection in HTTP? 30. What are the components of a URL?

Five Mark Questions: 1. Explain flat & hierarchical name space with advantages & disadvantages. 2. Explain the Domain name space & its entities.

3. Explain the difference between FQDN & PQDN. 4. Write a note on DNS in the internet. 5. Explain generic, country & inverse domains. 6. Explain how name-address mapping is done in DNS. 7. Explain the different mechanisms used for name address resolution. 8. Differentiate between recursive & iterative resolutions. 9. Explain the different scenarios in the email process. 10. Explain the services provided by the user agent. 11. Explain the role of Mail Transfer Agent. 12. Write a note on POP3 & IMAP4. 13. Write a note on SMTP. 14. Explain how FTP Works. 15. Write a note on FTP Control & data Connection. 16. Explain how data transfer takes place in FTP using the data transfer connection. 17. Explain the architecture of WWW. 18. Explain the components of Browser. 19. Write a note on web documents. 20. Explain HTTP request & response messages. Chapter 6 One Mark Question 1. List the connectivity devices according to the layers which they operate. 2. What is the role of a repeater? 3. What is the role of hub? 4. How does a hub differ from a repeater? 5. List the types of bridges? 6. What are the criteria transparent bridges must meet? 7. What is the role of a bridge? 8. What is the function of a router? 9. What are the topologies used in backbone networks? 10. What is the function of a backbone network? 11. What is a VLAN? 12. List the various attributes to assign VLAN membership? 13. List the three ways to configure a VLAN. 14. List the three methods for inters witch communication. Five Mark Question 1. Explain why connectivity devices are needed in network? 2. Explain the function of a repeater. 3. Explain the function of a bridge. 4. Compare between a repeater & bridge. 5. How does a hub work? 6. What is a bridge? What are its types? Explain any one. 7. Explain the operation of a transparent bridge.

8. Explain spanning tree bridge. 9. Write a note on remote bridge. 10. List the applications of bridges. 11. What is the looping problem in bridges? How is it avoided? 12. Explain the criteria that transparent bridges must meet. 13. Explain the operation of a router. 14. Compare & Contrast bridge and router. 15. List the advantages of bridges over routers. 16. What is the gateway? 17. Explain the types of backbone network. 18. Explain how remote LANs can be connected. 19. Write a note on VLAN. 20. Explain the criteria used to assign membership to VLAN. 21. Write a note on VLAN Configuration. 22. Explain the methods used for communication between switches. 23. Explain the advantages of VLAN. Chapter 7 One Mark Questions: 1. What do the following terms mean: a. Cryptography b. Cryptology c. Cryptanalyst 2. List the important elements of a cryptographic process. 3. What are the basic types of Cryptography? 4. What is substitution cipher? 5. What is a transposition cipher? 6. What are the two fundamental cryptographic principles? 7. How is freshness ensured? 8. What is meant by DNS spoofing? 9. What is the poisoned cache? 10. What are RRSets? 11. State the type of records introduced by DNSSec. 12. What is an anonymous remailer? 13. What is a steganography? 14. What is the syntax of a self-certifying URL? 15. What are the mechanisms of preventing DNS Spoofing? Five Mark Questions: 1. Explain substitution cipher with the help of an example. 2. Explain transposition cipher. 3. Explain the basic elements of cryptography with the help of an diagram. 4. What are the advantages & disadvantages of substitution cipher?

5. What are the advantages & disadvantages of transposition cipher? 6. Compare substitution & transposition cipher. 7. Explain the two fundamental cryptographic principles. 8. Write a note on firewalls. 9. Explain the components of a firewall. 10. Explain the threats to web security. 11. Explain the concept of DNS Spoofing. How it is done? 12. Explain the strategies to prevent DNS Spoofing. 13. Write a note on secure DNS. 14. Write a note on Resource Record Sets. 15. Write a note on self certifying URL’s. 16. Explain how mobile code security is achieved for java applets & ActiveX controls. 17. What is the difference between java applet & ActiveX control security? 18. Write a note on anonymous remailers? 19. Which social issues are important in network security? Explain any One. 20. Write a note on steganography. 21. Using Caesar Cipher, encrypt the message “Attack tomorrow after lunch”. 22. Apply modified Caesar Cipher with key 123 to the message “Attack tomorrow after lunch”. 23. Using key “PRIVATE “apply transposition cipher to the message “Attack tomorrow after lunch”.

MIT TYBSC Computer Science Computer Networks II.pdf ...

الزاوية BÔAتسمى الزاوية المركزية. حدد زوايا مركزية أخرى في هذا الشكل . o. C. A. D. B. O. التي تحصر القوس AB. #. Whoops! There was a problem loading this page. Retrying... Whoops! There was a problem loading this page. Retrying... Main menu. Displaying MIT TYBSC Computer Science Computer Networks II.pdf. Page 1 of ...

84KB Sizes 4 Downloads 232 Views

Recommend Documents

MIT TYBSC Computer Science Sem 1 Theoretical Computer ...
MIT TYBSC Computer Science Sem 1 Theoretical Computer Science & Computer Construction.pdf. MIT TYBSC Computer Science Sem 1 Theoretical Computer ...

pdf-1466\communication-networks-computer-science-computer ...
... of the apps below to open or edit this item. pdf-1466\communication-networks-computer-science-computer-networking-by-cram101-textbook-reviews.pdf.

MIT BSC Computer Science FOFD.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.

MIT B.SC Comp. Sci. Computer Networks I.pdf
13.Explain ISDN system architecture for large business. 14.Computer networks are always packet switched, sometimes circuit switched,. but never message switched. Comment. 15.Explain ISDN system architecture for home use. Page 3 of 7. Main menu. Displ

Computer Networks
Abstract—The purpose of this paper is to show how computer networking is .... a variety of network hardware devices: switches, hubs, and routers; and they all.

MIT F.Y.B.Sc Computer Science Digital Electronics.pdf
There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. MIT F.Y.B.Sc Computer Science Digital Electronic

Computer Networks
Bluetooth) or thousands of kilometers (e.g. via the Internet). Over the past two decades ... Address or a Data-Link Control Address. When someone examines a ...

MIT Electrical Engineering and Computer Science
Computer Programs, 2nd Edition (MIT Electrical. Engineering and Computer Science) { ... The Art of Computer Programming, Volumes 1-4A Boxed Set (Box Set)

Computer Networks
Computer Networks. Dr. Miguel Sánchez. Department of Computer Engineering [email protected]. Page 2. 2. Outline. Subject Presentation. Subject Assessment. Today's lecture ... 4. Computer Networks. ○ Yearly subject. ○ Textbook. ○ Topdown appro

computer / information technology / computer science & engineering
GUJARAT TECHNOLOGICAL UNIVERSITY. B.E Semester: 4. Computer Engineering/ Computer Science & Engineering/. Information Technology. Subject Name ...

computer / information technology / computer science & engineering
Object-oriented programming in Turbo C++ By Robert Lafore, Galgotia Publication. 3. Object-oriented programming with C++ By E.Balagurusamy, 2 nd. Edition ...

PDF Computer Networks
places the student at the center of the learning experience. Forouzan's Computer ... fun as well. The appealing visual layout combines with numerous figures and examples to provide multiple routes to ... Data Communications and Networking.

Computer Networks -II.pdf
Computer Networks -II.pdf. Computer Networks -II.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Computer Networks -II.pdf.

MIT Computer Fundamentals & Office Automation.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.

The Future of Computer Science - Cornell Computer Science
(Cornell University, Ithaca NY 14853, USA). Abstract ... Where should I go to college? ... search engine will provide a list of automobiles ranked according to the preferences, .... Rather, members of a community, such as a computer science.

Mean Field Networks - University of Toronto Computer Science
where the energy function E(x; θ) is a sum of unary (fs) ... fs. Figure 1. Illustration of one unit in Mean Field Networks. 0. 1. 2. 3. 0. 1. 2. 3. (a). (b). Figure 2. 2-layer MFNs for a chain model 0 - 1 - 2 - 3 with (a) sequential update schedule,

Global Clock Synchronization in Sensor Networks - Computer Science
Dartmouth College. Hanover, NH 03755. Email: [email protected] .... The solution targets an ad hoc network in which two nodes may be out of range and ...

COMPUTER NETWORKS -II.pdf
Page 1 of 2. MS – 641. VI Semester B.C.A. Degree Examination, May/June 2014. (Old Scheme). Computer Science. 6BCA – 1 : COMPUTER NETWORKS – II.

Global Clock Synchronization in Sensor Networks - Computer Science
... in a distributed system. Papers on synchronization in sensor networks include [6], [5], ... of our diffusion-based algorithm is to use local operations to achieve global ..... In a zone scheme, we can use the same method as Alg. 1 to first design

Computer Science E-259 Lectures - Computer Science E-259: XML ...
Sep 17, 2007 - most important new technology development of the last two years." Michael Vizard ... applications: what are the tools and technologies necessary to put ... XML. When. ▫ The World Wide Web Consortium (W3C) formed an XML.