Computer Networks - CS3591 - Important Questions With Answer - Unit 5 - Data Link and Physical Layers
Computer Networks - CS3591 - Important Questions With Answer - Unit 5 - Data Link and Physical Layers
Environmental Sciences
Professional English and Sustainability -
Professional English - - II - HS3252 Discrete Mathematics GE3451
I - HS3152 - MA3354
Statistics and Theory of Computation
Matrices and Calculus Numerical Methods - Digital Principles and - CS3452
3rd Semester
4th Semester
- MA3151 MA3251 Computer Organization
1st Semester
2nd Semester
8th Semester
6th Semester
E
Anna University Regulation: 2021
O
C
CS3591- Computer Networks
E
III Year/V Semester
AC
Question Bank
R
G
Prepared By,
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes&hl=en_IN
CS3591_CN
4931_Grace College of Engineering,Thoothukudi
www.BrainKart.com
CS3591-Computer Networks Department of CSE
UNIT V DATA LINK AND PHYSICAL LAYERS
Data Link Layer – Framing – Flow control – Error control – Data-Link Layer Protocols – HDLC –
PPP - Media Access Control – Ethernet Basics – CSMA/CD – Virtual LAN – Wireless LAN (802.11)
- Physical Layer: Data and Signals - Performance – Transmission media- Switching – Circuit
Switching.
UNIT V - PART A
1. Why do we need a Domain Name System? What role does the DNS Resolver play in
the DNS system? (Nov 12)
Domain Name System can map a name to an address and conversely an address to
name. The Domain Name System converts domain names into IP numbers. IP numbers
uniquely identify hosts on the Internet: however they are difficult to remember. We
therefore need a memorable way of identifying hosts. A DNS Resolver is responsible
for making requests of the local DNS server in behalf of clients. A DNS Resolver must
know the IP address of at least one DNS server. It uses this address to start the DNS
Lookup process.
2. What are the four main properties of HTTP?
E
Global Uniform Resource Identifier
Request-response exchange
Statelessness
O
Resource metadata.
3. What are the TCP connections needed in FTP?
C
FTP establishes two connections between the hosts. One connection is used for data
transfer, the other for control information.
The control connection uses very simple rules of communication. The data connection
needs more complex rules due to the variety of data types transferred.
E
4. What is WWW and SMTP? (Nov 10,15)( May 15)
World Wide Web is an internet application that allows user to view pages and move
AC
General headers
Entity Headers
Request Headers
Response Headers.
Two methods of HTTP are
GetMethod( ) PostMethod( )
6. What is PGP? (Nov 10)(May 12)
Pretty Good Privacy (PGP) is used to provide security for electronic mail. It provides
authentication, confidentiality, data integrity, and non-repudiation. It is a program
using public key encryption popularly used with email. Pretty Good Privacy uses a
variation of the public key system. In this system, each user has an encryption key that
is publicly known and a private key that is known only to that user. PGP comes in two
public key versions -- Rivest-Shamir-Adleman (RSA) and Diffie-Hellman.
Page 21 of 26
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes&hl=en_IN
CS3591_CN
4931_Grace College of Engineering,Thoothukudi
www.BrainKart.com
CS3591-Computer Networks Department of CSE
7. What are the transmission modes of FTP? (Nov 21)
Stream mode: Default mode and data is delivered from FTP to TCP as a
continuous stream of data.
Block mode: Data is delivered from FTP to TCP in terms of blocks. Each data block
follows the three byte header.
Compressed mode: File is compressed before transmitting if size is big. Run
length encoding method is used for compression.
8. Why is an application such as POP needed for electronic messaging? (May 12)
Workstations interact with the SMTP host, which receives the mail on behalf of every
host in the organization, to retrieve messages by using a client-server protocol such as
Post Office Protocol. Although POP3 is used to download messages from the server, the
SMTP client still needed on the desktop to forward messages from the workstation user
to its SMTP mail server.
9. Compare the HTTP and FTP.
FTP HTTP
FTP transfers the file from client to server and HTTP transfer the file from server to
server to client. client.(i.e. web pages)
E
It uses two different port connections. (i.e. port 20 HTTP use only one port connection.
and port 21) (i.e. Port 80)
O
FTP uses two parallel TCP connections to transfer It also uses TCP protocol.
a file. They are Control Connection and Data
connection.
10. What is the use of MIME Extension?
C
Multipurpose Internet Mail Extensions ( MIME) is a supplementary protocol that
allows non-ASCII data to be sent through SMTP. MIME transforms non-ASCII data at
E
the sender site to NVT ASCII data and deliverers it to the client SMTP to be sent through
the Internet. MIME converts binary files, executed files into text files. Then only it can
AC
SMTP adds log info to the start (i.e.) path of the message.
Basic functions of e-mail: composition, Transfer, Reporting, Displaying, and
Disposition.
G
Page 22 of 26
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes&hl=en_IN
CS3591_CN
4931_Grace College of Engineering,Thoothukudi
www.BrainKart.com
CS3591-Computer Networks Department of CSE
14. What is use of digital signature?
Digital signature is a method to authenticate the sender of a message. It is similar to that
of signing transactions documents when you do business with a bank. In network
transactions, one can create an equivalent of an electronic or digital signature by the way
you send data. Data appended to, or a data unit that allows a recipient of the data unit
to prove the source and integrity if the data unit and protect against forgery.
15. What is a URL, web browser and rlogin?(May 16)
Uniform Resource Locator is a string identifier that identifies a page on the World
Wide Web.
Web browser is a software program that interprets and displays the contents of
HTML web pages.
Remote login or rlogin is used to login into remote system and access its contents.
16. Discuss the three main division of the domain name space. (May 12)
Domain name space is divided into three different sections: generic domains, country
domains & inverse domain.
Generic domain: Define registered hosts according to their generic behavior, uses
generic suffixes.
E
Country domain: Uses two characters to identify a country as the last suffix.
Inverse domain: Finds the domain name given the IP address.
O
17. Name four factors needed for a secure network? (Nov 21)
Privacy: The sender and the receiver expect confidentiality.
Authentication: The receiver is sure of the sender’s identity and that an imposter has
not sent the message.
C
Integrity: The data must arrive at the receiver exactly as it was sent.
Non-Reputation: The receiver must able to prove that a received message came from a
E
specific sender.
18. Define SNMP. (May 12)
AC
term to refer to the science and art of transforming messages to make them secure and
immune to attacks.Original message before being transformed is called plaintext. After
the message is transformed, is called cipher text.
20. Explain Cyber Squatting.
The practice of registering a domain only to turn around and sell it off to an interested
party at a much higher price even has a name. It is called cyber squatting.
21. Define Name Resolution.
To improve reliability, some of the name servers can be located outside the zone. The
process of looking up a name and finding an address is called name resolution.
22. Explain Email.
E-mail (electronic mail) is the exchange of computer-stored messages by
telecommunication. Email messages are usually encoded in ASCII text. The architecture
of the email system consists of two kinds of subsystems: the user agents, which allow
people to read and send email, and the message transfer agents, which move the
messages from the source to the destination.
Page 23 of 26
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes&hl=en_IN
CS3591_CN
4931_Grace College of Engineering,Thoothukudi
www.BrainKart.com
CS3591-Computer Networks Department of CSE
23. What is Telnet?
A Telnet is a Transmission Control Protocol (TCP). Connection used to transmit data
with interspersed Telnet Control Information. The Telnet Protocol is built upon three
main ideas:
The concept of a network virtual terminal
The principle of negotiated options
A symmetric view of terminals and processes.
Telnet is the standard TCP/IP protocol for virtual terminal service.
24. What if TFTP?
Trivial file transfer protocol is designed for transferring bootstrap and configuration
files. It is so simple and can fit into ROM of a disc less memory. TFTP does reading and
writing of files. Reading means copying files from server site to client site and writing
in FTP means copying a file from client site to server site.
25. Describe why HTTP is defined as a stateless protocol.
Maintaining state across request – Response connections significantly increases the
initial interactions in a connections since the identity of each party needs to be
established and any saved state much be retrieved. HTTP is therefore stateless to ensure
E
that internet is scalable since state is not contained in a HTTP request / response pairs
by default.
O
26. Present the information contained in a DNS resource record. (May 17)
Different types of resource records can be used to provide DNS-based data about
C
computers on a TCP/IP network. This section describes the following resource records
SOA , NS , A , PTR, CNAME , MX ,SRV
27. List the two types of DNS message.(May 16)
There are two types of DNS messages,
E
Query and Response
Query message – consists of the header and question records.
AC
Generic domain: Define registered hosts according to their generic behavior, uses
generic suffixes.
G
Country domain: Uses two characters to identify a country as the last suffix.
Inverse domain: Finds the domain name given the IP address.
29. Define TELNET.
Telnet is a user command and an underlying TCP/IP protocol for accessing remote
computers. Through Telnet, an administrator or another user can access someone else's
computer remotely.
On the Web, HTTP and FTP protocols allow you to request specific files from remote
computers, but not to actually be logged on as a user of that computer. With Telnet, you
log on as a regular user with whatever privileges you may have been granted to the
specific application and data on that computer.
Page 24 of 26
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes&hl=en_IN
CS3591_CN
4931_Grace College of Engineering,Thoothukudi
www.BrainKart.com
CS3591-Computer Networks Department of CSE
30. State the usage of conditional get in HTTP. (May 17)
The GET method means retrieves whatever information (in the form of an entity) is
identified by the Request-URI. If the Request-URI refers to a data-producing process, it
is the produced data which shall be returned as the entity in the response and not the
source text of the process, unless that text happens to be the output of the process.
The semantics of the GET method change to a "conditional GET" if the request message
includes an If-Modified-Since, If-Unmodified-Since, If-Match, If-None-Match, or If-
Range header field. A conditional GET method requests that the entity be transferred
only under the circumstances described by the conditional header field(s).
31. What is Http? (Nov 19)
HTTP means Hyper Text Transfer Protocol. HTTP is the underlying protocol used by
the World Wide Web and this protocol defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take in response to
various commands.
32. Define anonymous FTP (Nov 20)(May 21 )
Anonymous FTP is a means by which archive sites allow general access to their archives
E
of information. These sites create a special account called "anonymous". User
"anonymous" has limited access rights to the archive host, as well as some operating
restrictions.
O
33. Present an outline of SSH. (Nov 19)
Secure Shell (SSH) is a cryptographic network protocol for operating network
C
services securely over an unsecured network.
Typical applications include remote command-line, login, and remote command
execution, but any network service can be secured with SSH. SSH provides a secure
E
channel over an unsecured network by using a client–server architecture, connecting
an SSH client application with an SSH server.
AC
34. What is the difference between IMAP and POP? (Nov 20)(May 21 )
Post Office Protocol (POP3) Internet Message Access Protocol (IMAP)
POP is a simple protocol that only allows IMAP is much more advanced and
downloading messages from your Inbox to allows the user to see all the folders on
R
The POP server listens on port 110, and the the IMAP with SSL secure(IMAPDS)
POP with SSL secure(POP3DS) server listens server listens on port 993.
on port 995
35. Define Jitter.
Jitter is the variation in time delay between when a signal is transmitted and when it's
received over a network connection, measuring the variability in ping.
36. What are the three broad categories of audio and video services ?
Page 25 of 26
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes&hl=en_IN
CS3591_CN
4931_Grace College of Engineering,Thoothukudi
www.BrainKart.com
CS3591-Computer Networks Department of CSE
37. Show the format of the RTP packet header.
UNIT-V / PART-B
1. Discuss how the Simple Mail Transfer Protocol (SMTP) is useful in electronic mail.
(May 12,15)(Nov 13,15,19)/Architecture of mailing system (Nov 20) (May 21 )
2. Write in detail about PGP.
3. Describe about Secure Shell (SSH).
4. Explain the role of a DNS on a computer network, including its involvement in the
process of a user accessing a web page. (May 13) (Nov 15,19)
5. Discuss about MIME, IMAP and POP3. (May 15,17)
6. Explain about HTTP. Give their uses, state strengths and weaknesses. (Nov 10,13)
E
7. Illustrate the features of TELNET. What is the need for network virtual terminal?
(May 13) (Nov 21)
O
8. Explain about FTP. (Nov 12, 13,19)(May 13)
Explain WWW. (Nov 12)
9.
10.
C
Explain about SNMP and SMTP. (May 15) (Nov 19)
11. Explain in detail about web service architecture(May 16)
i) Describe how SMTP protocol is used in E-mail applications(May 16)
E
12.
ii) Explain HTTP with an example. (Nov 15)
13. Describe how SMTP transfers message from one host to another with suitable
AC
Page 26 of 26
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes&hl=en_IN
CS3591_CN
Click on Subject/Paper under Semester to enter.
Environmental Sciences
Professional English and Sustainability -
Professional English - - II - HS3252 Discrete Mathematics GE3451
I - HS3152 - MA3354
Statistics and Theory of Computation
Matrices and Calculus Numerical Methods - Digital Principles and - CS3452
3rd Semester
4th Semester
- MA3151 MA3251 Computer Organization
1st Semester
2nd Semester
8th Semester
6th Semester