Skip to main content

Computer Networks (3150710) - Information Technology

 Computer Networks (3150710) - Information Technology

  1. Explain Route Summarization or Route Aggregation in network layer.
  2. State the port number for the following application layer protocols.i) FTP ii) HTTP iii) SMTP iv) POP3
  3. Justify the statement, “HTTP server is stateless”.
  4. Besides bandwidth and latency, what other parameter(s) is/are needed to give a good characterization of the quality of service offered by network used for (i) Online financial transaction traffic? (ii) Video streaming traffic?
  5. Which of the OSI layers handles each of the following:i) Dividing the message into segments.ii) Determining which route through the subnet to use.iii) Dividing the transmitted bit stream into frames.
  6. For the below mentioned internet applications protocol, mention the underlying transport protocol (TCP or UDP). i) Telnet ii) FTP iii) HTTP
  7. Explain User Datagram Protocol (UDP) in detail and discuss how it differs from Transmission Control Protocol (TCP).
  8. Discuss the five layer internet protocol stack along with the functionalities of each layer in detail.
  9. Discuss the circuit switching versus packet switching approaches for moving data through a network of links and switches.
  10. What is the significance of the following flags in TCP segment? i) URG ii) SYN iii) FIN iv) PSH
  11. Define the term unicasting, multicasting, and broadcasting.
  12. Explain the class-full sub-netting with example.
  13. Discuss the count-to-infinity problem in distance vector routing algorithm with example.
  14. Difference between bit rate and baud rate.
  15. Differentiate between TCP vs. UDP
  16. Differentiate between Circuit Switching vs. Packet Switching
  17. Explain the UDP checksum mechanism for error detection with example.
  18. Demonstrate the various error detection techniques at data link layer with example.
  19. What are the three most important network-layer functions in a virtual-circuit network?
  20. Discuss the working of slotted aloha along with its efficiency in terms of channel utilization.
  21. Data link protocols almost always put CRC in a trailer rather than in a header. Why?
  22. Explain p-persistent CSMA protocol in detail.
  23. Explain the following static channel allocations mechanisms: i) TDMA ii) FDMA
  24. Explain functionality of Repeater, Hub, Bridge, Switch, Router and Gateway.
  25. Write short note on Domain Name System (DNS).
  26. Explain various delay which are occur in data packet transmission.
  27. What is topology? Explain star topology in brief.
  28. What is HTTP? Differentiate its persistent and non-persistent types with request-response behavior of HTTP.
  29. Explain Physical Address, IP address, Port Address in brief.
  30. Explain Distance Vector Routing Algorithm.
  31. Explain DHCP and Email in detail.
  32. Compare IPv4 and IPv6.
  33. Give difference between connection oriented and connectionless services.
  34. Differentiate its persistent and non-persistent types with request-response behavior of HTTP.
  35. Give differences between TCP and UDP.
  36. Discuss the principles of Reliable Data Transfer.
  37. What do you mean by congestion and overflow? Explain the slow-start component of the TCP congestion-control algorithm.
  38. Explain packet fragmentation with example.
  39. Write a short note on broadcast and multicast routing.
  40. What is IP address? Explain sub netting with example.
  41. What is socket? Explain its importance at transport layer protocols.
  42. Discuss transport layer multiplexing and demultiplexing concepts.
  43. Discuss CSMA/CD Protocol.
  44. Explain CRC code generation with example.
  45. Explain the hierarchical DNS system
  46. What do you mean by stream and datagram sockets?
  47. How the Jitter is different from the delay in streaming applications?
  48. Explain leaky bucket algorithm for the network traffic shaping.
  49. Explain flow and error control in TCP.
  50. Discriminate fully qualified domain name from partially qualified domain name.
  51. What do you mean by random access protocols? Explain slotted ALOHA in brief.

Popular Posts

Explain Data collection methods and Techniques in UX Evaluation.

UX Evaluation: Agile Data Collection Methods & Techniques Qualitative Data Collection Methods User Interviews: Structured, semi-structured, or unstructured. Focus Groups: Moderated discussions with small groups. Contextual Inquiry: Observing users in their natural environment. Card Sorting: Organizing information architecture. Diary Studies: Users document their experiences over time. Think Aloud Protocols: Users verbalize their thoughts while using a product. Usability Testing Observations: Direct observation of user interactions. Heuristic Evaluation: Expert review against usability principles. Cognitive Walkthroughs: Step-by-step analysis of user tasks. Quantitative Data Collection Methods A/B Testing: Comparing two versions of a design. Eye Tracking: Measuring visual attention. Surveys: Gathering user feedback through questionnaires. Analytics: Tracking website or app usage data (e.g., Google Analytics). System Usability Scale (SUS): Standardized questionn...

What is Stegnography and list two examples.

Unveiling the Secrets: Understanding Steganography in Cybersecurity What is Steganography? Steganography is the art and science of hiding information within other information. It focuses on concealing the very existence of a secret message. Unlike cryptography (which scrambles messages), steganography aims to make hidden data undetectable. It's a powerful tool for covert communication and data exfiltration. Often used in conjunction with cryptography for enhanced security. Steganography Examples in Cybersecurity Hiding data within an image file: Modifying least significant bits (LSBs) of image pixels to embed secret data. The changes are usually imperceptible to the human eye. Embedding data within audio files: Similar to images, small modifications to audio waveforms can hide information without noticeably altering the sound quality.

What is LZW compression? Explain with example.

Decoding the Magic of LZW Compression: A Data Compression Deep Dive What is LZW Compression? Lempel-Ziv-Welch (LZW) is a lossless data compression algorithm. It works by replacing repeating sequences of data with shorter codes. It's widely used in GIF image format and other applications. Highly effective for data with repeating patterns. How LZW Compression Works: A Step-by-Step Guide Starts with a dictionary containing single characters. Reads the input data character by character. Concatenates characters to form strings. When a string is not found, it's added to the dictionary with a new code. The code for the longest matching string is written to the output. This process continues until the entire input is processed. LZW Compression Example: Initial Dictionary: {'A': 1, 'B': 2, 'C': 3} Input String: "ABABCABABCACC" Processing: - 'A' is encoded as 1. - 'AB' is encoded as 4 (added to diction...

Explain different compression techniques with example.

Mastering Data Compression: A Comprehensive Guide Lossless Compression Techniques Run-Length Encoding (RLE):  Represents consecutive repeating characters with a single count and character. Example: "AAABBBCC" becomes "3A3B2C". Huffman Coding: Assigns shorter codes to frequently occurring symbols and longer codes to less frequent ones. Example: In text, "e" gets a shorter code than "z". Lempel-Ziv (LZ77 & LZ78):  Identifies repeating patterns and replaces them with pointers to earlier occurrences. LZ77 uses a sliding window, LZ78 uses a dictionary. Arithmetic Coding: Represents data as a single fractional number, encoding probability. More efficient than Huffman for many cases. Lossy Compression Techniques JPEG (Joint Photographic Experts Group): Discards some image data, particularly high-frequency components, which are less noticeable to the human eye. MPEG (Moving Picture Experts Group): Uses techniques like motion compen...

what is type conversion in python? Explain with the suitable example.

Data Compression: Mastering Type Conversion in Python What is Type Conversion? Type conversion, also known as type casting, is the process of changing a variable's data type from one to another. Python supports both implicit (automatic) and explicit (manual) type conversion. Implicit Type Conversion Python automatically converts data types in certain situations to prevent errors. Example: Adding an integer to a float results in a float. Explicit Type Conversion We use built-in functions like `int()`, `float()`, `str()`, `bool()` etc. to explicitly change data types. Example: Converting a string "10" to an integer using `int("10")`. Example: Data Compression Context Imagine you're storing compressed file sizes (originally floats) in a database designed for integers. Explicit type conversion (using `int()`) would truncate the decimal part, losing precision but saving space. This is a type of lossy compression. Converting from a larger data t...