CS3591-Unit Wise Question and Answer
CS3591-Unit Wise Question and Answer
PART-A
4 Why do we need a Domain Name System? What role does the DNS Resolver play in the
DNS system? (Nov 12)
Domain Name System can map a name to an address and conversely an address to name.
The Domain Name System converts domain names into IP numbers. IP numbers
uniquely
identify hosts on the Internet
5 What are the four fundamental characteristics that the data communication system
depends on?
The four fundamental characteristics are: Delivery, Accuracy,
Timeliness and Jitter.
6 What are the five components of data communications system?
The five components are Message, Sender, Receiver, Transmission Medium and Protocol.
Page 1 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 2 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 3 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 4 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
24 Why is an application such as POP needed for electronic messaging? (May 12)
Workstations interact with the SMTP host, which receives the mail on behalf of every host
in the organization, to retrieve messages by using a client-server protocol such as Post
Office Protocol.
Although POP3 is used to download messages from the server, the
27 How are the subgroups of the OSI model layers segregated by their functions? (May /
June 2021)
The lower 4 layers (transport, network, data link and physical) are concerned with the
flow of data from end to end through the network and hence are called as network
support layers. The upper four layers of the OSI model (application, presentation and
session) are orientated more toward services to the applications
and hence are called user support layers.
Page 5 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
28 Identify the Port number of Hyper Text Transfer Protocol and Telnet. (Nov 21)
By default, these two protocols are on their standard port number
of 80 for HTTP and 443 for HTTPS. For telnet port number is 23.
29 Discuss the three main division of the domain name space. (May
12)
Domain name space is divided into three different sections: generic domains, country
domains & inverse domain.
Generic domain: Define registered hosts according to their
generic behavior, uses generic suffixes.
Country domain: Uses two characters to identify a country as the last suffix.
Inverse domain: Finds the domain name given the IP address.
Page 6 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 7 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 8 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
12 What are the four aspects related to the reliable delivery of data?
(May 12)
The four aspects are
(i) Error control,
(ii) Sequence control
(iii) Loss control
(iv) Duplication control.
Page 9 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 10 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 11 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 12 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
4 Define CIDR?
CIDR, which stands for Classless Inter-Domain Routing, is an IP addressing scheme that
improves the allocation of IP addresses. It replaces the old system based on classes A, B,
and C. This helped to extend the life of IPv4 as well as slow the growth of routing
tables.
5 How many network addresses and host addresses are supported by class A, class B
networks?
Class A: Number of networks = 127 Number of hosts = 224 -1
Class B: Number of networks = 214 -1
Number of hosts = 216 – 1 = 65,535
6 List out the functions of IP.
IP services are unreliable, best-effort, connectionless packet delivery system. Unreliable –
delivery is not guaranteed, Connectionless – each pocket is treated independent from
others,
Best-effort delivery – it makes an earnest attempt to deliver
packets. It defines basic unit of data transfer through TCP/IP.
7 What do you mean by ICMP?
ICMP is an error reporting mechanism. It does not specify the action to be taken for each
possible error. The source must relate the error to an individual application program
and take other
actions to correct the problem.
Page 13 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
11 How many network addresses and host addresses are supported by class A, class B
networks?
Class A: Number of networks = 127 Number of hosts = 224 -1 Class B: Number of networks
= 214 -1
Number of hosts = 216 – 1 = 65,535
Page 14 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
12 What is the network address in a class A subnet with the IP addresses of one of the
hosts as 25.34.12.56 and mask 255.255.0.0? (May 14)
IP Address - 25.34.12.56 , Mask - 255.255.0.0 , Network Address
- 25.34.0.0
13 What is IP address?
An Internet Address is made of four bytes (32 bits) that define a host’s connection to a
network. There are currently 5 different field lengths patterns, each define a class of
addresses. These are designed to cover the needs of different types of organizations,
class A, B, C, D, E.
Page 15 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
23 Define RARP.
Allows a host to discover its internet address when it knows only its physical address (a
diskless computer). The host wishing to retrieve its internet address broadcasts an RARP
query packet that
contains its physical address to every host on its physical network.
Page 16 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 17 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
2 Write on the packet cost referred in distance vector and link state routing. (May 2012)
In distance vector routing, cost refer to hop count while in case of link state routing, cost
is a weighted value based on a variety of
factors such as security levels, traffic or the state of the link.
Page 18 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
6 What does a router do when it receives a packet with a destination address that it
does not have an entry for, in its routing table?
Default Router: If IP Software is not able to find the destination, from routing table then it sends
the datagram to default router. It is useful when a site has small set of local address connected to it
and connected
to the rest of the Internet.
9 What is RIP?
RIP (Routing Information Protocol) is a widely-used protocol for managing router information
within a self-contained network such as a corporate local area network or an interconnected
group of such LANs. Using RIP, a gateway host (with a router) sends its entire routing table
(which lists all the other hosts it knows about) to its closest neighbor host every 30 seconds.
Page 19 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
12 What is DVMRP?
The Distance Vector Multicast Routing Protocol (DVMRP), is a routing protocol used to
share information between routers to facilitate the transportation of IP multicast
packets among
networks. The protocol is based on the RIP protocol. The router
Page 20 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
generates a routing table with the multicast group of which it has knowledge with
corresponding distances. When a multicast packet is received by a router, it is
forwarded by the router's
interfaces specified in the routing table.
13 What are the metrics used by routing protocols? (Apr/May 2015) Path length, bandwidth,
load, hop count, path cost, delay, Maximum Transmission Unit (MTU), reliability and
communications cost.
15 Explain BGP.
BGP stands for Border Gateway Protocol. It can be defined as a standardized exterior gateway
protocol which is developed to interchange routing information and reachability information
between various autonomous systems (AS) on the Internet. It is classified as a path vector
protocol as well as a distance-vector
routing protocol.
18 What techniques are used to overcome the count to infinity issue in distance vector
routing?
Split horizon technique and split horizon with poison reverse
technique are used to overcome count to infinity issue in distance vector routing.
Page 21 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 22 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
20 What is the main difference between BGP and Distance vector routing.
BGP differs from Distance Vector and Link State routings as it
advertises complete paths as an enumerated list of ASs to reach a particular network.
7 Explain Distance Vector Routing Algorithm for the graph given below.
1 List out the functions of data link layer (May / June 2021)
Page 23 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
3 What are the two types of errors occurred during data transmission? (May/June 2012)
Single bit error and burst error
Page 24 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 25 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
10 Why sliding window flow control is considered to be more efficient than stop and wait
flow control?
In sliding window flow control, the transmission link is treated as a pipeline that may be
filled with frames in transit. But with stop-
and-wait flow control only one frame may be in the pipe at a time.
11 Define Piggybacking?
The technique of temporarily delaying outgoing acknowledgment so that they can be
hooked onto the next outgoing data frame is
widely known as piggybacking.
12 Find the hamming distance between the two pair of code words: A = 01011; B = 11110
(May / June 2021)
Hamming distance is the numbers of bits by which two codes
differ. Here hamming distance = 3
13 Define hidden node problem. (May 16)
In wireless networking, the hidden node problem or hidden terminal problem occurs when
a node is visible from a wireless access point (AP), but not from other nodes
communicating with
that AP. This leads to difficulties in media access control sub layer.
Page 26 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 27 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 28 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
26 Define Bandwidth
Bandwidth refers to the number of bits per second that a channel, a link, or even a network
can transmit.
27 What is Throughput?
It is a measure of how data can actually be sent through network.
28 What is meant by the contention period of Ethernet?
When several stations on an Ethernet have data to send, there are contention periods
during which collisions happen and no data is successfully transmitted.
Page 29 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 30 of
28
Saranathan College of Engineering,Tiruchirapalli
Department of Artificial Intelligence and Data Science
Page 31 of
28