Skip to main content

Computer Networks (3150710) - Information Technology

 Computer Networks (3150710) - Information Technology

  1. Explain Route Summarization or Route Aggregation in network layer.
  2. State the port number for the following application layer protocols.i) FTP ii) HTTP iii) SMTP iv) POP3
  3. Justify the statement, “HTTP server is stateless”.
  4. Besides bandwidth and latency, what other parameter(s) is/are needed to give a good characterization of the quality of service offered by network used for (i) Online financial transaction traffic? (ii) Video streaming traffic?
  5. Which of the OSI layers handles each of the following:i) Dividing the message into segments.ii) Determining which route through the subnet to use.iii) Dividing the transmitted bit stream into frames.
  6. For the below mentioned internet applications protocol, mention the underlying transport protocol (TCP or UDP). i) Telnet ii) FTP iii) HTTP
  7. Explain User Datagram Protocol (UDP) in detail and discuss how it differs from Transmission Control Protocol (TCP).
  8. Discuss the five layer internet protocol stack along with the functionalities of each layer in detail.
  9. Discuss the circuit switching versus packet switching approaches for moving data through a network of links and switches.
  10. What is the significance of the following flags in TCP segment? i) URG ii) SYN iii) FIN iv) PSH
  11. Define the term unicasting, multicasting, and broadcasting.
  12. Explain the class-full sub-netting with example.
  13. Discuss the count-to-infinity problem in distance vector routing algorithm with example.
  14. Difference between bit rate and baud rate.
  15. Differentiate between TCP vs. UDP
  16. Differentiate between Circuit Switching vs. Packet Switching
  17. Explain the UDP checksum mechanism for error detection with example.
  18. Demonstrate the various error detection techniques at data link layer with example.
  19. What are the three most important network-layer functions in a virtual-circuit network?
  20. Discuss the working of slotted aloha along with its efficiency in terms of channel utilization.
  21. Data link protocols almost always put CRC in a trailer rather than in a header. Why?
  22. Explain p-persistent CSMA protocol in detail.
  23. Explain the following static channel allocations mechanisms: i) TDMA ii) FDMA
  24. Explain functionality of Repeater, Hub, Bridge, Switch, Router and Gateway.
  25. Write short note on Domain Name System (DNS).
  26. Explain various delay which are occur in data packet transmission.
  27. What is topology? Explain star topology in brief.
  28. What is HTTP? Differentiate its persistent and non-persistent types with request-response behavior of HTTP.
  29. Explain Physical Address, IP address, Port Address in brief.
  30. Explain Distance Vector Routing Algorithm.
  31. Explain DHCP and Email in detail.
  32. Compare IPv4 and IPv6.
  33. Give difference between connection oriented and connectionless services.
  34. Differentiate its persistent and non-persistent types with request-response behavior of HTTP.
  35. Give differences between TCP and UDP.
  36. Discuss the principles of Reliable Data Transfer.
  37. What do you mean by congestion and overflow? Explain the slow-start component of the TCP congestion-control algorithm.
  38. Explain packet fragmentation with example.
  39. Write a short note on broadcast and multicast routing.
  40. What is IP address? Explain sub netting with example.
  41. What is socket? Explain its importance at transport layer protocols.
  42. Discuss transport layer multiplexing and demultiplexing concepts.
  43. Discuss CSMA/CD Protocol.
  44. Explain CRC code generation with example.
  45. Explain the hierarchical DNS system
  46. What do you mean by stream and datagram sockets?
  47. How the Jitter is different from the delay in streaming applications?
  48. Explain leaky bucket algorithm for the network traffic shaping.
  49. Explain flow and error control in TCP.
  50. Discriminate fully qualified domain name from partially qualified domain name.
  51. What do you mean by random access protocols? Explain slotted ALOHA in brief.

Popular Posts

What is architectural design? Discuss different style and patterns of architecture.

Mastering Software Architecture: Styles and Patterns What is Architectural Design? Blueprint for software systems. Defines structure, behavior, and interactions. Guides development, ensuring scalability and maintainability. Addresses high-level concerns, not implementation details. Impacts performance, security, and cost. Architectural Styles Layered Architecture: Organizes system into horizontal layers (presentation, business logic, data access). Microservices Architecture : Breaks down application into small, independent services. Event-Driven Architecture: Components communicate asynchronously via events. Space-Based Architecture: Distributes data and processing across geographical locations. Client-Server Architecture :** Classic model with clients requesting services from servers. Architectural Patterns Model-View-Controller (MVC):  Separates concerns into model (data), view (presentation), and controller (logic). Model-View-ViewModel (MVVM): Variation o...

State the need for software configuration review.

The Indispensable Software Configuration Review: Why It Matters Early Problem Detection Prevents costly late-stage bug fixes. Identifies inconsistencies early in the development lifecycle. Reduces integration challenges. Enhanced Collaboration Improves communication between development teams. Facilitates knowledge sharing among team members. Ensures everyone is on the same page regarding the software configuration. Improved Quality Assurance Helps meet compliance requirements. Reduces the risk of security vulnerabilities. Ensures software stability and reliability. Better Traceability and Auditability Simplifies future maintenance and updates. Provides clear documentation for compliance audits. Allows for easier rollback in case of errors. Reduced Risks Minimizes potential for configuration drift. Prevents deployment failures and downtime. Improves overall project success rate.

What are key featuers of python?.

Python for Data Compression: Key Features Readability and Simplicity Clear syntax, making code easy to write and understand. Reduced development time compared to other languages. Extensive Libraries `zlib`, `gzip`, `bz2`, for common compression algorithms. `lzma` for advanced LZMA compression. `zipfile` for managing compressed archives. Cross-Platform Compatibility Runs smoothly on various operating systems (Windows, macOS, Linux). Facilitates easy deployment of data compression solutions. Community Support and Resources Abundant online tutorials, documentation, and community forums. Easier troubleshooting and faster problem-solving. Integration with other tools Seamlessly integrates with other data science tools (NumPy, Pandas). Simplifies data preprocessing and post-processing steps.

List the main pillars of Tagore’s concept of education.

Tagore's Vision: Pillars of Education & IT Ethics Holistic Development Character building. Moral and spiritual growth. Creative self-expression. Physical and mental well-being. Creative Learning Emphasis on self-discovery. Experiential learning. Fostering imagination and innovation. Rejection of rote learning. Freedom and Self-Expression Individuality and uniqueness valued. Openness to diverse perspectives. Critical thinking and questioning. Encouraging independent learning. Social Responsibility Understanding societal needs. Contribution to community welfare. Ethical considerations in all actions. Promoting social justice. Connection with Nature Appreciation of natural world. Environmental consciousness. Sustainable living practices. Holistic understanding of existence. Relevance to IT Professional Ethics Ethical use of technology. Responsible data handling. Intellectual property rights awareness. Social impact of technology consideratio...

Define Engineering Ethics. Distinguish between ethics, laws and morals.

Navigating the Ethical Minefield: Engineering Ethics in IT Defining Engineering Ethics The study of moral issues and decisions confronting individuals and organizations engaged in engineering. Application of ethical principles to engineering practice, design, and research. Focus on responsible innovation, safety, and societal well-being in engineering projects. Consideration of potential impacts on stakeholders – users, environment, society. Ethics vs. Laws vs. Morals Ethics: Formal system of principles governing conduct; professional codes and guidelines. Laws: Societal rules enforced by governmental authority; legally binding requirements. Morals: Individual beliefs and values about right and wrong; personal sense of what is good/bad. Distinguishing the Three in IT Ethics:  IT professional codes (ACM, IEEE) specify confidentiality, data security, intellectual property respect. Laws:  Copyright laws, data privacy regulations (GDPR, CCPA), cybercrime statut...