Está en la página 1de 4

PART B Unit I: 1. Explain ISO/OSI reference model.

Physical layer Data link layer Network layer Transport layer Session layer Presentation layer Application layer 2. Explain the topologies of the network. Mesh topology Star topology Tree topology Bus topology Ring topology 3. Explain the categories of networks/ network hardware. Local Area Network(LAN) Metropolitan Area Network(MAN) Wide Area Network(WAN) 4. Explain connecting devices in detail Repeaters Hubs Bridges Switches Routers Gateways 5. Explain TCP/IP protocol suite. Host to network Internet layer Transport layer Application layer 6. Comparison of TCP/IP with OSI model. 7. Network software 8. Uses of computer. 9. Compare OSI and TCP/IP.

Unit II: 1. Explain error detection and error correction techniques. Types of errors ._Single bit error ._Burst error Error detection ._Vertical redundancy check(VRC) ._Longitudinal redundancy check(LRC) ._Cyclic redundancy check(CRC) ._Checksum Error correction ._Single-bit error correction ._Hamming code ._Burst error correction 2. Explain error control mechanism. Stop and wait ARQ Sliding window ARQ . Go back-n Selective-reject 3. Explain the flow control mechanism Elementary data link protocols Sliding window. 4. Explain coaxial cable & fiber optics. Coaxial cable ._Coaxial cable standards ._Coaxial cable connectors Fiber optics ._Propagation modes ._Fiber sizes ._Cable composition . Light sources for optical cable ._Fiber optic connectors . Advantages & disadvantages of optical fiber 5. Explain about Ethernet. Addressing Electrical specification Frame format Implementation: ._10 base 5 :Thick Ethernet ._10 base 2 :Thin Ethernet ._10 base T :Twisted-pair Ethernet ._1 base 5 :Star LAN 8. Sliding Window Protocol. Unit III: 1. Explain the two approaches of packet switching techniques. Datagram approach Virtual circuit approach ._Switched virtual circuit(SVC) ._Permanent virtual circuit(PVC)Circuit switched connection versus virtual circuit connection ._Path versus route ._Dedicated versus shared 2. Define routing & explain distance vector routing and link state routing. Distance vector routing ._Sharing information ._Routing table ._Creating the table Updating the table ._Updating algorithm

Link state routing ._Information sharing ._Packet cost ._Link state packet ._Getting information about neighbors ._Initialization ._Link state database 3. Explain about congestion control. Congestion avoidance ._BECN ._FECN ._Four situations Discarding 4. Explain leaky bucket and token bucket algorithm Leaky bucket algorithm ._Leaky bucket ._Switch controlling the output rate ._Flowchart 5. What is routing algorithm? (Write optimality principle, distance vector, link state, flooding, shortest path) 6. Comparison of virtual circuits and datagram subnets. (8/6marks) Unit IV: 1. Explain the duties of transport layer. End to end delivery Addressing Reliable delivery Error control Sequence control Loss control Duplication control Flow control Multiplexing 2. Explain socket in detail. Introduction Explanation program 3. Explain UDP . User Datagram Protocol(UDP) ._Source port address ._Destination port address ._Total length ._Checksum 4. Explain TCP Transmission Control Protocol(TCP) ._Source port address ._Destination port address ._Sequence number ._Acknowledgement number ._Header length ._Reserved ._Control ._Window size ._Check sum ._Urgent pointer ._Options and padding 5. Explain connection management, conection release, congestion control in TCP.

Unit V: 1. Explain the functions of SMTP. System for sending messages to other computer users based on e-mail addresses. SMTP provides mail exchange between users on the same or different computers. User Agent Mail Transfer Agent Multipurpose Internet Mail Extensions Post Office Protocol 2. Write short notes on FTP. Transfer a file from one system to another. TCP connections Basic model of FTP 3. Explain about HTTP. HTTP transactions HTTP messages URL 4. Explain the WWW in detail. Hypertext & Hypermedia Browser Architecture Categories of Web Documents HTML CGI Java 5. Explain the type of encryption/decryption method. Conventional Methods: Character-Level Encryption: Substitutional & Transpositional 6. Explain about RSA algorithm. Public key Encryption technique. Encryption algorithm Decryption algorithm Security in RSA 7. Email Architecture and services, user agents, message format. 8. explain MIME.

También podría gustarte