0% found this document useful (0 votes)
321 views23 pages

Ans: A: 18Csc363J-Computer Networks Question Bank MCQ

The document contains multiple choice questions related to computer networks. It covers topics like OSI layers and their functions, transmission media for LANs, spread spectrum techniques, twisted pair cabling, characteristics of data communication, UDP, TCP, HTTP, FTP, Telnet, encryption techniques like Caesar cipher, wireless LAN concepts, and networking models.

Uploaded by

Diksha Nasa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
321 views23 pages

Ans: A: 18Csc363J-Computer Networks Question Bank MCQ

The document contains multiple choice questions related to computer networks. It covers topics like OSI layers and their functions, transmission media for LANs, spread spectrum techniques, twisted pair cabling, characteristics of data communication, UDP, TCP, HTTP, FTP, Telnet, encryption techniques like Caesar cipher, wireless LAN concepts, and networking models.

Uploaded by

Diksha Nasa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

18CSC363J-COMPUTER NETWORKS

Question Bank

MCQ

The pairs of OSI protocol layer/sub-layer and its functionality are given below, the
INCORRECT pair from among these are:

a. Data Link Layer and Bit synchronization


b. Network Layer and Routing
c. Medium Access Control sub-layer and Channel sharing
d. Transport Layer and End-to-end process communication

Ans: a
Which of these is a Transmission media that can be used in LAN?
fibre optics
coaxial cable
microwave
satellite
Ans: a
The Spread spectrum expands the required bandwidth for to each station from B to Bss by
adding _____________
noise
Spreading code
K-bit pattern
Frequency
Ans: B
The purpose of twisting the cable in twisted pair is_____________
Balance the noise
Cover more distance
Avoid refraction
Avoid reflection
Ans:A
Which of the following is not the fundamental characteristics of data communication?
Jitter
Timeliness
Accuracy
Redundancy
Ans: D

Beyond IP, UDP provides additional services such as _______


a) Routing and switching
b) Sending and receiving of packets
c) Multiplexing and demultiplexing
d) Demultiplexing and error checking

What is the main advantage of UDP?


a) More overload
b) Reliable
c) Low overhead
d) Fast

What is the header size of a UDP packet?


a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes

“Total length” field in UDP packet header is the length of _________


a) Only UDP header
b) Only data
c) Only checksum
d) UDP header plus data

Which is the correct expression for the length of UDP datagram?


a) UDP length = IP length – IP header’s length
b) UDP length = UDP length – UDP header’s length
c) UDP length = IP length + IP header’s length
d) UDP length = UDP length + UDP header’s length

The ______ field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port

In TCP, sending and receiving data is done as _______


a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets

TCP process may not write and read data at the same speed. So we need __________ for
storage.
a) Packets
b) Buffers
c) Segments
d) Stacks

TCP groups a number of bytes together into a packet called _______


a) Packet
b) Buffer
c) Segment
d) Stack

Communication offered by TCP is ________


a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte

To achieve reliable transport in TCP, ___________ is used to check the safe and sound
arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment

In segment header, sequence number and acknowledgement number fields refer to _______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment

Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered
10001. What is the sequence number of the segment if all data is sent in only one segment?
a) 10000
b) 10001
c) 12001
d) 11001
Bytes of data being transferred in each connection are numbered by TCP. These numbers
start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s

The value of acknowledgement field in a segment defines _______


a) sequence number of the byte received previously
b) total number of bytes to receive
c) sequence number of the next byte to be received
d) sequence of zeros and ones

The Minimum size of the process data that can be encapsulated in a user datagram
Protocol(UDP) datagram would be

0 Bytes
4 bytes
8 bytes
28 bytes

To distinguish between different streams, stream control transmission (SCTP) uses


stream borders
stream identifier
stream wall
stream ID code

The token bucket can easily be implemented with a counter, initialized by

0
1
-1
-2

A leaky bucket algorithm shapes bursty traffic into fixed rate traffic by averaging the
a) data rate
b) average rate
c) traffic rate
d) traffic shaping

In Quality of Service (QoS) techniques, packets wait in a buffer (Queue) until the node is
ready to process them in
a) Out-of-order Ones
b) First-in First Out
c) Last-in First Out
d) First-in-Last Out
Integrated Services is based on flow based Quality of Service model is designed for
a) CPU
b) Data Node
c) IP
d) Traffic Shaping

All telnet operations are sent as ________


a) 4 bits
b) 8 bits
c) 16 bits
d) 32 bits
In which mode of telnet, the client echoes the character on the screen but does not send it
until a whole line is completed?
a) default mode
b) character mode
c) server mode
d) command mode
The application layer protocol used by a Telnet application is ________
a) Telnet
b) FTP
c) HTTP
d) SMTP
Telnet is used for _______
a) Television on net
b) Network of Telephones
c) Remote Login
d) Teleshopping site
Which operating mode of telnet is full duplex?
a) default mode
b) server mode
c) line mode
d) character mode
FTP is built on _____ architecture.
a) Client-server
b) P2P
c) Data centric
d) Service oriented
FTP uses _________ parallel TCP connections to transfer a file.
a) 1
b) 2
c) 3
d) 4
If 5 files are transferred from server A to client B in the same session. The number of TCP
connections between A and B is _______
a) 5
b) 10
c) 2
d) 6
_______ allows you to connect and login to a remote computer
a) Telnet
b) FTP
c) HTTP
d) SMTP
HTTP client requests by establishing a __________ connection to a particular port on the
server.
a) user datagram protocol
b) transmission control protocol
c) border gateway protocol
d) domain host control protocol
In HTTP pipelining ________________
a) multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) multiple HTTP requests are sent at random on a single TCP connection
FTP server listens for connection on port number ____________
a) 20
b) 21
c) 22
d) 23
In File Transfer Protocol, data transfer cannot be done in ___________
a) stream mode
b) block mode
c) compressed mode
d) message mode
In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol

AbsoluteTelnet is a telnet client for _______ Operating system.


a) windows
b) linux
c) mac
d) Ubuntu

FTP server _____________


a) Maintains state information
b) Is stateless
c) Has single TCP connection for a file transfer
d) Has UDP connection for file transfer

The commands, from client to server, and replies, from server to client, are sent across the
control connection in ________ bit ASCII format.
a) 8
b) 7
c) 3
d) 5

The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is
________
a) Stream mode
b) Block mode
c) Compressed mode
d) Message mode

The password is sent to the server using ________ command.


a) PASSWD
b) PASS
c) PASSWORD
d) PWORD

In the network HTTP resources are located by


a) uniform resource identifier
b) unique resource locator
c) unique resource identifier
d) union resource locator

The number of objects in a Web page which consists of 4 jpeg images and HTML text is
________
a) 4
b) 1
c) 5
d) 7

The time taken by a packet to travel from client to server and then back to the client is called
__________
a) STT
b) RTT
c) PTT
d) JTT

The HTTP request message is sent in _________ part of three-way handshake.


a) First
b) Second
c) Third
d) Fourth

In the process of fetching a web page from a server the HTTP request/response takes
__________ RTTs.
a) 2
b) 1
c) 4
d) 3

The first line of HTTP request message is called _____________


a) Request line
b) Header line
c) Status line
d) Entity line

The values GET, POST, HEAD etc are specified in ____________ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
The __________ method when used in the method field, leaves entity body empty.
a) POST
b) SEND
c) GET
d) PUT

9. The HTTP response message leaves out the requested object when ____________ method
is used
a) GET
b) POST
c) HEAD
d) PUT

Caesar Cipher is an example of


a) Poly-alphabetic Cipher
b) Mono-alphabetic Cipher
c) Multi-alphabetic Cipher
d) Bi-alphabetic Cipher
If there are n signal sources of same data rate, then the TDM link has _______ slots.
a) n
b) n/2
c) n*2
d) 2n
A wireless network interface controller can work in _______
a) infrastructure mode
b) ad-hoc mode
c) both infrastructure mode and ad-hoc mode
d) WDS mode
Which one of the following event is not possible in wireless LAN?
a) collision detection
b) acknowledgement of data frames
c) multi-mode data transmission
d) connection to wired networks
Consider the following Statements:
1. UDP is an unreliable protocol.
2. In a star network, each device (workstation, server, printer) connects to a switch or
hub
3. The number of bits a system can send per second is bandwidth.
Which of the following statement(s) is/are true?
a) Only 1, 2
b) Only 2, 3
c) Only 1, 2, 3
d) Only 1, 3
A network consists of five computers. Four computers are running Windows 10 Professional.
One computer has been upgraded from Windows 10 Professional to Windows Server 2016.
All the computers are connected to a switch, which is connected to a router, which is
connected to the Internet. Which networking model can the network support that it could not
support without the upgrade?
a) Hybrid
b) Client-Server
c) Star-bus
d) Ring
The data link layer takes the packets from _________ and encapsulates them into frames for
transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
Which sublayer of the data link layer performs data link functions that depend upon the type
of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
When 2 or more bits in a data unit has been changed during the transmission, the error is
called ____________
a) random error
b) burst error
c) inverted error
d) double error
Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Automatic repeat request error management mechanism is provided by ________
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer
The network layer is concerned with __________ of data.
a) bits
b) frames
c) packets
d) bytes
The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the
following subnet masks can be used for the above requirement?

a) 255.243.240.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255
ICMP is primarily used for __________
a) error and diagnostic functions
b) addressing
c) forwarding
d) routing
The Open Shortest Path First(OSPF) protocol is an intra-domain routing protocol based on
____________ routing.
a). distance vector
b). link state
c). path vector
d). non distance vector
The RIP protocol cannot have more than 15 hops if infinity is defined as
a). 13
b). 14
c). 15
d). 16
An endpoint of an inter-process communication flow across a computer network is called?
A. socket
B. pipe
C. port
D. machine

User datagram protocol is called connectionless because _____________


a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly

What is the purpose of the PSH flag in the TCP header?


A. Typically used to indicate end of message
B. Typically used to indicate beginning of message
C. Typically used to push the message
D. Typically used to indicate stop the message

Unlike TCP, this alternative method of data exchange does not provide the service of
dividing a message into packets and reassembling it at the other end, but instead relies on the
application program to make sure that the entire message has arrived and is in the right order.
a. SMTP
b. UDP
c. DHCP
d. ARP

In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window
(A) does not increase
(B) increases linearly
(C) increases quadratically
(D) increases exponentially
Electronic mail uses this Application layer protocol:
A. SMTP
B. HTTP
C. FTP
D. SIP

2 The packet of information at the application layer is called __________


a) Packet
b) Message
c) Segment
d) Frame

3. Which one of the following statements is NOT correct about HTTP cookies?
(A) A cookies is a piece of code that has the potential to compromise the security of an
Internet user
(B) A cookie gains entry to the user’s work area through an HTTP header
(C) A cookie has an expiry date and time
(D) Cookies can be used to track the browsing pattern of a user at a particular site

Network layer firewall works as a __________


a) Frame filter
b) Packet filter
c) Content filter
d) Virus filter
There are _______ major ways of stealing email information.
a) 2
b) 3
c) 4
d) 5
Communication between a computer and a keyboard involves ______________ transmission.
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex

The first Network was called ________


a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
The size of the bit pattern to include gray scale image
a) 1
b) 2
c) 3
d) 4

The loss in signal power as light travels down the fiber is called
a) Attenuation
b) Propagation
c) Scattering
d) Interruption
If data rate of ring is 20 Mbps, signal propagation speed is 200 b/ms, then number of bits that
can be placed on the channel of 200 km is
a). 2000 bits
b) 20000 bits
c) 1000 bits
d) 4000 bits
Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
When 2 or more bits in a data unit has been changed during the transmission, the error is
called ____________
a) random error
b) burst error
c) inverted error
d) double error
A slotted ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What
is the throughput if the system (all stations together) produces 1000 frames per second?
a). 364
b). 368
c). 372
d). 380

ARQ stands for _________.


a) Automatic repeat quantization
b) Automatic repeat request
c) Automatic retransmission request
d) Acknowledge repeat request
The Internet is
a) communication system for some states of India
b). A communication system for the Indian government
c). An internal communication system for a business
d). A large network of networks
Which of these is not a type of error-reporting message?
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
Header size of the ICMP message is _________
a) 8-bytes
b) 8-bits
c) 16-bytes
d) 16-bits
------------was originally developed to provide a loop-free method of exchanging routing
information between autonomous systems.
a) OSPF
b) EIGRP
c) BGP
d) RIP
In _________ the router forwards the receive packet through only one of its interfaces.
a) unicasting
b) multicasting
c) broadcasting
d) point to point
Which DNS client maps an address to a name or a name to an address especially when
required by a host?

a. Resolver
b. Mapper
c. Primary Server
d. Secondary Server
Transport layer aggregates data from different applications into a single stream before
passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
Which among the following are delivered by the transport layer in process-to-process
delivery mechanism?

a. Frames
b. Datagrams
c. Packets
d. Bits
Which of the following system calls results in the sending of SYN packets?
(A) socket
(B) bind
(C) listen
(D) connect
Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD) algorithm
where the window size at the start of the slow start phase is 2 MSS and the threshold at the
start of the first transmission is 8 MSS. Assume that a timeout occurs during the fifth
transmission. Find the congestion window size at the end of the tenth transmission.
(A) 8 MSS
(B) 14 MSS
(C) 7 MSS
(D) 12 MSS
Which of the following is/are example(s) of stateful application layer protocols?
(i) HTTP
(ii) FTP
(iii) TCP
(iv) POP3
a.(i) and (ii) only
b.(ii) and (iii) only
c.(ii) and (iv) only
d.(iv) only
The Application layer in TCP/IP contains the ___________ protocols.
a.Routing
b.Routed
c.Communication
d.Process-to-process
Telnet protocol is used to establish a connection to
a.TCP port number 21
b.TCP port number 22
c.TCP port number 23
d.TCP port number 24
If 5 files are transferred from server A to client B in the same session. The number of TCP
connection between A and B is
a.5
b.10
c.2
d.6
If you have to send multimedia data over SMTP it has to be encoded into
a.Binary
b.Signal
c.ASCII
d.HDB3

Descriptive Question
Discuss about physical properties and medium access protocol of Ethernet.
List the various categories of Multiplexing. Explain each.
Describe the CSMA/CD protocol and comment on its performances for medium access.
The message 11001001 is to be transmitted using CRC error detection algorithm. Assuming
the CRC polynomial to be x 3 + 1, determine the message that should be transmitted. If the
second left most bit is corrupted, show that it is detected by the receiver.
Explain in detail the operation of OSPF protocol by considering a suitable network.
i) A host with IP address 130.23.43.20 and physical address 0xB23455102210. Another host
with IP address 130.23.43.25 and physical address 0xA46EF45983AB. The two hosts are on
the same Ethernet network. Show the ARP request packet encapsulated in Ethernet frames.
ii) Explain the Packet format of RARP with neat sketch
Explain the congestion control techniques to improve the QOS of the computer Network
Discuss the need for name resolution. Illustrate the domain name hierarchy and the steps in
resolution
Discuss briefly about Electronic mail (SMTP, MIME and IMAP)
Discuss the functions of SNMP in detail
Explain in detail about OSI layer model with neat diagram
A)For n devices in a network, what is the number of cable links required for a mesh, ring,
bus, and star topology and I/O port required for mesh and star topology?
B)For each of the following four networks, discuss the consequences if a connection
fails.
a. Five devices arranged in a mesh topology
b. Five devices arranged in a star topology (not counting the hub)
c. Five devices arranged in a bus topology
d. Five devices arranged in a ring topology
How frame order and flow control is achieved using the data link layer? Explain.
i)Given the dataword 1010011010 and divisor 10111. Show the generation of the codeword
at the sender side and show the checking of the codeword at the receiver side.
ii) Explain steps involved in sender and receiver side in checksum
i) A slotted pure aloha network transmits 200 bit frames on a shared channel of 200 kbps.
What is the throughput if the system (all station together) produces a) 1000 frames per second
b) 500 frames per second c) 250 frames per second?
ii) Write short notes on ARP.
Explain the RIP algorithm with a simple example of your choice
Explain the principles of congestion control in TCP.
Explain the following:
(i) DEC bit
(ii) RED
Discuss in detail about HTTP operation
i. Explain Telnet in detail.
ii. Illustrate the role of POP3 in electronic mail applications.Explain in detail.
Explain the duties of transport layer?

Explain UDP &TCP?

Explain about congestion control?

Explain detail about QoS Policing?

What is the purpose of leaky bucket algorithm?

What is Token Bucket algorithm in computer networks?

Computer A has 19.5MB to send on a network and transmits the data in a burst @

6 Mbps. The maximum transmission rate across routers in the network is 4 Mbps.
If Computer A's transmission is shaped using a leaky bucket, how much capacity
must the queue in the bucket hold not to discard any data?
A leaky bucket is at the host network interface. The data rate on the network is 2MByte/s and
the data rate on the link from the host to the bucket is 2.5Mbyte/s.
In your view is there any alternative model to the OSI model? If yes, explain that model and
compare with OSI model. If no, explain OSI model in detail with each layer’s functionality.

A) Define the type of the following destination addresses:


a. 4A:30:10:21:10:1A
b. 47:20:1B:2E:08:EE
c. FF:FF:FF:FF:FF:FF
d. 05:01:02:03:04:05
e. 18:34:42:5D:8E:9F

B) How does the following Ethernet address appear on the line in memory?
a. 1A:3B:4C:6D:2E:1F
b. 47:20:1B:2E:08:EE

A) For n devices in a network, what is the number of cable links required for a mesh,
ring, bus, and star topology and I/O port required for mesh and star topology?
B) For each of the following four networks, discuss the consequences if a connection
fails.
a. Five devices arranged in a mesh topology
b. Five devices arranged in a star topology (not counting the hub)
c. Five devices arranged in a bus topology
d. Five devices arranged in a ring topology

A) i)Given the dataword 1010011010 and divisor 10111. Show the generation of the
codeword at the sender side and show the checking of the codeword at the receiver side.
ii) Explain steps involved in sender and receiver side in checksum

B) i) A pure aloha network transmits 200 bit frames on a shared channel of 200 kbps.
What is the throughput if the system (all station together) produces a) 1000 frames per second
b) 500 frames per second c) 250 frames per second?
ii) Explain stop and wait protocol

A) i) Find the class of following IP addresses


a) 00000001 00001011 00001011 11101111
b) 11000001 10000011 00011011 11111111
c) 14.23.120.8
d) 252.5.15.111 (8 marks)
ii) What is the significance of ICMP? Discuss in detail.
B) i) A host with IP address 130.23.43.20 and physical address 0xB23455102210.
Another host with IP address 130.23.43.25 and physical address 0xA46EF45983AB. The two
hosts are on the same Ethernet network. Show the ARP request packet encapsulated in
Ethernet frames.
ii) Explain the Packet format of RARP with neat sketch.
A) i)Given the dataword 1001 and divisor 1011. Show the generation of the codeword at
the sender side and show the checking of the codeword at the receiver side. (8 marks)
ii) Explain simple parity check with example
B) i) A slotted pure aloha network transmits 200 bit frames on a shared channel of 200
kbps. What is the throughput if the system (all station together) produces a) 1000 frames per
second b) 500 frames per second c) 250 frames per second? (8marks)
ii) Explain sliding window technique with suitable diagram.
A) i) Find the class of following IP addresses
a) 01110111 11110011 10000111 11011101
b) 11101111 11000000 11110000 00011101
c) 200.34.2.1
d) 130.34.54.12
ii) What is the significance of BOOTP? Discuss in detail.
B) i) A host with IP address 130.23.43.20 and physical address 0xB23455102210.
Another host with IP address 130.23.43.25 and physical address 0xA46EF45983AB. The two
hosts are on the same Ethernet network. Show the ARP reply packet encapsulated in Ethernet
frames.
ii) Explain the Packet format of IPV4 with neat sketch.
0045DF0000580000 is a dump (contents) of a UDP header in hexadecimal format.
a) What is the source port number?
b) What is the destination port number?
c) What is the total length of the user datagram?
d) What is the length of the data?
e) Considering that an IP frame can have a maximum total length of 65 535 bytes,
what is the maximum length of the data in a UDP frame?

a) In SMTP, a sender sends unformatted text. Show the MIME header.


b) With neat sketch draw the SNMP PDU format

Hosts A and B are communicating over a TCP connection, and Host B has already received
from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B
back-to-back. The first and second segments contain 80 and 40 bytes of data respectively. In
the first segment, the sequence number is 127, the source port number is 302, and the
destination port number is 80. Host B sends an acknowledgment whenever it receives a
segment from Host A.
a) In the second segment sent from Host A to B, what are the sequence number,
source port number, and destination port number?
b) If the first segment arrives before the second segment, in the acknowledgment
of the first arriving segments, what is the ACK number, the source port
number and the destination port number?
c) If the second segment arrives before the first segment, in the ACK of the first
arriving segment, what is the ACK number?
a) Encrypt "INTERNET" using a transposition cipher with the following key:
35214
12345
b) Encrypt the message "THIS IS AN EXERCISE" using a shift cipher with a key
of 20.
Ignore the space between words. Decrypt the message to get the original
plaintext.

In File Transfer Protocol transaction, assume a client with user name Alice needs to
retrieve his file named as “Computer Networks 5” from the server systems directory
/Course/Computer Networks/Unit5. After that, the client needs to upload the new file
named as “Computer Network 6” is to the above same directory path available in the
server. Show that, what are the commands used for the above transaction and also for
response messages exchanged between the FTP client and the FTP server. The client
system chosen ephemeral port number 58013 used for downloading the file from server
and ephemeral port number 59051 used for uploading the file from client to server. Draw
the necessary diagram to show the exact message exchange sequence.

E29300170000000100000000500207FF… is part of a TCP header dump in hexadecimal


format.
a) What is the source port number?
b) What is the destination port number?
c) What is the sequence number?
d) What is the length of the header?
e) What is the type of the segment?

Write the scenario for SMTP protocol services between for the Server and Client systems,
which shows the mail transaction done by Mani from host abc.com and also Babu, David
and Arun both have forwarded the same way from host imp.com. Here assume that, for
the above transaction the host abc.com contacts the host imp.com directly to exchange
email messages. The mail has been received and accepted by Babu and Arun. but, David
does not receive any email since he has not having mailbox at host imp.com. Explain the
following scenarios

a) A Typical SMTP Transaction Scenario


b) Aborted SMTP Transaction Scenario

In a TCP connection, the initial sequence number at the client site is 2171. The client opens the
connection, sends three segments, the second of which carries 1000 bytes of data, and closes
the connection. What is the value of the sequence number in each of the following segments
sent by the client?
a. The SYN segment
b. The data segment
c. The FIN segment
d. With neat sketch explain the sequence.

(a)How a client can directly connect to a server using TELNET, which logs into port 80?
(b)How a client can imposes the modification of data and time condition on a request?
Explain the following:
a) DEC bit
b) RED

You might also like