Skip to main content

Computer Networks (3150710) - Information Technology

 Computer Networks (3150710) - Information Technology

  1. Explain Route Summarization or Route Aggregation in network layer.
  2. State the port number for the following application layer protocols.i) FTP ii) HTTP iii) SMTP iv) POP3
  3. Justify the statement, “HTTP server is stateless”.
  4. Besides bandwidth and latency, what other parameter(s) is/are needed to give a good characterization of the quality of service offered by network used for (i) Online financial transaction traffic? (ii) Video streaming traffic?
  5. Which of the OSI layers handles each of the following:i) Dividing the message into segments.ii) Determining which route through the subnet to use.iii) Dividing the transmitted bit stream into frames.
  6. For the below mentioned internet applications protocol, mention the underlying transport protocol (TCP or UDP). i) Telnet ii) FTP iii) HTTP
  7. Explain User Datagram Protocol (UDP) in detail and discuss how it differs from Transmission Control Protocol (TCP).
  8. Discuss the five layer internet protocol stack along with the functionalities of each layer in detail.
  9. Discuss the circuit switching versus packet switching approaches for moving data through a network of links and switches.
  10. What is the significance of the following flags in TCP segment? i) URG ii) SYN iii) FIN iv) PSH
  11. Define the term unicasting, multicasting, and broadcasting.
  12. Explain the class-full sub-netting with example.
  13. Discuss the count-to-infinity problem in distance vector routing algorithm with example.
  14. Difference between bit rate and baud rate.
  15. Differentiate between TCP vs. UDP
  16. Differentiate between Circuit Switching vs. Packet Switching
  17. Explain the UDP checksum mechanism for error detection with example.
  18. Demonstrate the various error detection techniques at data link layer with example.
  19. What are the three most important network-layer functions in a virtual-circuit network?
  20. Discuss the working of slotted aloha along with its efficiency in terms of channel utilization.
  21. Data link protocols almost always put CRC in a trailer rather than in a header. Why?
  22. Explain p-persistent CSMA protocol in detail.
  23. Explain the following static channel allocations mechanisms: i) TDMA ii) FDMA
  24. Explain functionality of Repeater, Hub, Bridge, Switch, Router and Gateway.
  25. Write short note on Domain Name System (DNS).
  26. Explain various delay which are occur in data packet transmission.
  27. What is topology? Explain star topology in brief.
  28. What is HTTP? Differentiate its persistent and non-persistent types with request-response behavior of HTTP.
  29. Explain Physical Address, IP address, Port Address in brief.
  30. Explain Distance Vector Routing Algorithm.
  31. Explain DHCP and Email in detail.
  32. Compare IPv4 and IPv6.
  33. Give difference between connection oriented and connectionless services.
  34. Differentiate its persistent and non-persistent types with request-response behavior of HTTP.
  35. Give differences between TCP and UDP.
  36. Discuss the principles of Reliable Data Transfer.
  37. What do you mean by congestion and overflow? Explain the slow-start component of the TCP congestion-control algorithm.
  38. Explain packet fragmentation with example.
  39. Write a short note on broadcast and multicast routing.
  40. What is IP address? Explain sub netting with example.
  41. What is socket? Explain its importance at transport layer protocols.
  42. Discuss transport layer multiplexing and demultiplexing concepts.
  43. Discuss CSMA/CD Protocol.
  44. Explain CRC code generation with example.
  45. Explain the hierarchical DNS system
  46. What do you mean by stream and datagram sockets?
  47. How the Jitter is different from the delay in streaming applications?
  48. Explain leaky bucket algorithm for the network traffic shaping.
  49. Explain flow and error control in TCP.
  50. Discriminate fully qualified domain name from partially qualified domain name.
  51. What do you mean by random access protocols? Explain slotted ALOHA in brief.

Popular Posts

Current Affairs 9 September 2025 | Nepal Protests, France PM Resigns, Windows 11 Update

Current Affairs – 09 September 2025 Major Highlights 1. Nepal Gen Z Protests Massive anti-government protests led by youth (Gen Z). PM K. P. Sharma Oli & ministers resigned and fled the country. Protesters burned Parliament & govt. buildings. Army deployed at airport & key locations. Trigger: Corruption charges & social media ban. 2. France Political Crisis PM François Bayrou resigned after losing confidence vote. President Macron now forced to appoint 3rd PM in just a year. Protests under slogan “Block Everything” intensify. 80,000+ police deployed across France to prevent unrest. 3. Windows 11 September 2025 Update Microsoft released Security & Feature Update. 9 key changes: Redesigned Recall app homepage. Seconds display in Notification Center. Grid view in Windows Search photos. Improved Widgets & Lock screen dashboard. AI agent in Settings app. Updated Windows Hello visuals. Modern Task Manager interface. Revamped File Explorer design. Windows Backup organi...

What are key featuers of python?.

Python for Data Compression: Key Features Readability and Simplicity Clear syntax, making code easy to write and understand. Reduced development time compared to other languages. Extensive Libraries `zlib`, `gzip`, `bz2`, for common compression algorithms. `lzma` for advanced LZMA compression. `zipfile` for managing compressed archives. Cross-Platform Compatibility Runs smoothly on various operating systems (Windows, macOS, Linux). Facilitates easy deployment of data compression solutions. Community Support and Resources Abundant online tutorials, documentation, and community forums. Easier troubleshooting and faster problem-solving. Integration with other tools Seamlessly integrates with other data science tools (NumPy, Pandas). Simplifies data preprocessing and post-processing steps.

Discuss basics of the motion field of rigid objects with necessary equations.

Understanding Rigid Object Motion in Computer Vision Defining the Motion Field The motion field describes the apparent movement of pixels in an image sequence. It's a 2D vector field, where each vector represents the velocity of a corresponding pixel. For rigid objects, all points move coherently, unlike non-rigid objects with independent movements. Motion of a Rigid Object: Translation Pure translation involves only a change in position. Let `(x, y)` be the pixel coordinates and `(u, v)` be the displacement vector. Then, `u = t_x` and `v = t_y`, where `t_x` and `t_y` are the components of the translation vector. Motion of a Rigid Object: Rotation Pure rotation around a point (e.g., the object's center) is described using a rotation matrix. The rotation matrix R is a 2x2 matrix dependent on the rotation angle θ. The rotation equations are: `x' = x cosθ - y sinθ` and `y' = x sinθ + y cosθ`. `x', y'` are the rotated coordinates. Combi...

Explain different classes of attacks

Demystifying Cyber Attacks: A Classification for Enhanced Security Passive Attacks Eavesdropping on network traffic. Traffic analysis to infer communication patterns. Monitoring user activity without interaction. Active Attacks Modification of data in transit. Denial-of-service attacks flooding systems. Impersonation through forged packets. Man-in-the-middle attacks intercepting communication. Attacks Based on Target Web Application Attacks (SQL Injection, XSS). Network Attacks (ARP Spoofing, DDoS). Host-Based Attacks (Malware infections, privilege escalation). Data Attacks (Data breaches, data exfiltration). Attacks Based on Methodology Exploiting vulnerabilities in software/hardware. Social engineering (phishing, baiting). Brute-force attacks (password guessing). Insider threats (malicious employees). Attacks Based on Intent Data theft for financial gain or espionage. System disruption for vandalism or protest. Data manipulation to defraud or manipulate....

What is meant by “Scope” and “Rigor” of a project? Briefly discuss the factors that influence Rigor during agile project development.

Agile Development & UI/UX: Balancing Scope and Rigor What is Project Scope? Defines the project's boundaries. Includes features, functionalities, and deliverables. Outlines what will be created and what will not. Crucial for managing expectations and resources. What is Project Rigor? The level of precision, formality, and adherence to process. Impacts quality, consistency, and predictability. Higher rigor often means more documentation and testing. Lower rigor allows for greater flexibility and speed. Factors Influencing Rigor in Agile Development Team Expertise: Experienced teams might need less formal processes. Project Complexity: Complex projects demand higher rigor. Client Involvement: High client involvement may necessitate more defined processes. Regulatory Requirements: Compliance needs increase rigor. Risk Tolerance: Higher risk tolerance can lead to lower rigor. Time Constraints: Tight deadlines can impact the level of rigor. UI/UX Design Complexi...