30
2 Marks Questions and Answers MC E07 – TCP/IP Protocol Suite 1.What are the layers available in OSI? (AU MAY/JUNE 2008) Application Layer i Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer 2. What are called network support layers? The physical, data link, and network layers are the network support layers. 3. What are called User support layers? The session, presentation, and application layers are the user support layers. 4. Why we need Transport layer? The transport layer links the network support layers and the user support layers. 5. What is the purpose of Physical layer? The physical layer coordinates the functions required to transmit a bit stream over a physical medium. 6. What is the use of Data link layer? The data link layer is responsible for delivering data units from one station to the next without errors. 7. What is the need for Network layer? The network layer is responsible for the source-to- destination delivery of a packet across multiple network links. 8. What is the different between layer 2 and layer 3 switches? (AU MAY/JUNE 2008)

MD - MC E07 TCP-IP Protocol Suite

Embed Size (px)

Citation preview

Page 1: MD - MC E07 TCP-IP Protocol Suite

2 Marks Questions and AnswersMC E07 – TCP/IP Protocol Suite

1.What are the layers available in OSI? (AU MAY/JUNE 2008)Application Layeri

Presentation LayerSession LayerTransport LayerNetwork LayerData Link LayerPhysical Layer

2. What are called network support layers?The physical, data link, and network layers are the network support layers.

3. What are called User support layers?The session, presentation, and application layers are the user support layers.

4. Why we need Transport layer?The transport layer links the network support layers and the user support layers.

5. What is the purpose of Physical layer?The physical layer coordinates the functions required to transmit a bit stream over a physical medium.

6. What is the use of Data link layer?The data link layer is responsible for delivering data units from one station to the next without errors.

7. What is the need for Network layer?The network layer is responsible for the source-to-destination delivery of a packet acrossmultiple network links.

8. What is the different between layer 2 and layer 3 switches? (AU MAY/JUNE 2008)A layer 2 switch operates utilizing Mac addresses in it's caching table to quickly pass information from port to port. A layer 3 switch utilizes IP addresses to do the same.

9. Given the IP address is 18.250.31.14 and the subnet mask is 250.240.0.0, what is the subnet address? (AU MAY/JUNE 2008)Subnet id - 18.240.0.0

10. What is Encapsulation? (AU MAY/JUNE 2008)In computer networking, encapsulation is a method of designing modular communication protocols in which logically separate functions in the network are abstracted from their underlying structures by inclusion or information hiding within higher level objects.

Page 2: MD - MC E07 TCP-IP Protocol Suite

11. What is the purpose of seven layer?The transport layer is responsible for the source-to-destination delivery of the entire message. The session layer establishes, maintains, and synchronizes the interactions between communicating devices.The presentation layer ensures interoperability between communicating devices throughtransformation of data into a mutually agreed-upon format.The application layer enables the users to access the network.

12. What is Point to Point WAN? (AU-cbe JUNE 2009)The Point-to-Point Protocol (PPP) was designed for users who need a reliablepoint-to-point connection to the Internet. PPP operates at the physical and data link layers of the OSI model.

13. What is LANE ?Local Area Network Emulation (LANE) is a client/server model that allows the use of ATM technology in LANs.

14. What are the servers included in LANE?LANE software includes LAN emulation client (LEC), LAN emulation configura tion server (LECS), LAN emulation server (LES), and broadcast/unknown server (BUS) modules.

15. What are the contents of socket address? (AU MAY/JUNE 2008)Socket address is a combination of IP Address + Port Address

16. What is concurrency? (AU MAY/JUNE 2008)Concurrency is a property of systems in which several computations are

executing simultaneously, and potentially interacting with each other.

17. What is NVT Data Character Set? (AU MAY/JUNE 2008), (AU cbe MAY/JUNE 2010)                         -NVT uses NVT ASCII - 8 bit char. set                         -several lowest order bit are same & higer ordr bit is 0                  -fig                        -it is also possible to send an 8-bit ASCII with highest order                           bit set to 0001          18. What is  NVT Character Set ?                        2 set of character - one for data & another for control - both are 8 bit bytes                         a)Data Character:                                    -NVT uses NVT ASCII - 8 bit char. set                                    -several lowest order bit are same & higer ordr bit is 0                                    -fig                                    -it is also possible to send an 8-bit ASCII with highest order

Page 3: MD - MC E07 TCP-IP Protocol Suite

                                     bit set to 0001                        b)Control Character:                                    -NVT uses 8-bit char set - higher order bit is set                                    -fig                                    -table lists some of ctrl char & their description

19. Mention the purpose of sub netting ? (AU-cbe JUNE 2009)Subnetting divides one large network into several smaller ones. Subnetting adds anintermediate level of hierarchy in IP addressing.

20. What is meant by masking ?Masking is a process that extracts the network address from an IP address. Subnet masking is a process that extracts the subnetwork address from an IP address. A network or subnet address is obtained from applying the bit-wise AND operation on the IP address and the mask.

21. What is supernetting?Supernetting combines several networks into one large one.

22. What is meant by connectionless protocol?The IP protocol is a connectionless protocol. Every packet is independent and has norelationship to any other packet.

23. What is direct delivery?The delivery of a packet is called direct if the deliverer (host or router) and the destination are on the same network.

24. What is indirect delivery ?The delivery of a packet is called indirect if the deliverer (host or router) and the destination are on different networks

25. What is the function of routing table?Every host or router has a routing table to route IP packets. In next hop routing instead of a complete list of the stops the packet must make only the address of the next hop is listed in the routing table. In network specific routing all hosts on a network share one entry in the routing table. In hostspecific routing the full IP address of a host is given in the routing table. In default routing, a router is assigned to receive all packets with no match in the routing table.

26. What is static and dynamic routing ?A static routing table’s entries are updated manually by an administrator. A dynamic routing table’s entries are updated automatically by a routing protocol.

Page 4: MD - MC E07 TCP-IP Protocol Suite

27. What are the contents of routing table? (AU MAY/JUNE 2008), (AU-cbe JUNE 2009)The routing table can consist of seven fields: a mask, a destination address, a next-hop address, flags, a reference count, a use, and an interface. The routing module applies the mask, row by row, to the received destination address until a match is found. Classless addressing requires hierarchical and geographical routing to prevent immense routing tables.

28. What is the maximum length of a datagram?The maximum length of a datagram is 65,535 bytes.

29. What is Maximum Transfer Unit ?The MTU is the maximum number of bytes that a data link protocol can encapsulate. MTUs vary from protocol to protocol.

30. What is Fragmentation?Fragmentation is the division of a datagram into smaller units to accommodate the MTU of a data link protocol. The fields in the IP header that relate to fragmentation are the identification number, the fragmentation flags, and the fragmentation offset. The IP datagram header consists of a fixed, 20- byte section and a variable options section with a maximum of 40 bytes.

31. How the errors are detected in IP?The error detection method used by IP is the checksum. The checksum uses one’s complement arithmetic to add equal-size sections of the IP header. The complemented result is stored in the checksum field. The receiver also uses one’s complement arithmetic to check the header.

32. What are the modules and tables in IP package?An IP package can consist of the following: a header-adding module, a processing module, a routing module, a fragmentation module, a reassembly module, a routing table, an MTU table, and a reassembly table.

33. What is the purpose of OSI Model?The seven-layer OSI model provides guidelines for the development of universally compatible networking protocols.

34. Explain the purpose of various layers?The physical layer coordinates the functions required to transmit a bit stream over a physical medium. The data link layer is responsible for delivering data units from one station to the next without errors. The network layer is responsible for the source-to-destination delivery of a packet across multiple network links. The transport layer is responsible for the source-to-destination delivery of the entire message. The session layer establishes, maintains, and synchronizes the interactions between communicating devices. The presentation layer ensures interoperability between communicatingdevices through transformation of data into a mutually agreed-upon format. The application layer enables the users to access the network.

Page 5: MD - MC E07 TCP-IP Protocol Suite

35. Explain the three types of addresses in TCP/IP?Three types of addresses are used by systems using the TCP/IP protocol: the physical address, the internetwork address (IP address), and the port address. The physical address, also known as the link address, is the address of a node as defined by its LAN or WAN. The IP address uniquely defines a host on the Internet. The port address identifies a process on a host.

36. What is ATM?Asynchronous Transfer Mode (ATM) is the cell relay protocol designed to support thetransmission of data, voice, and video through high data rate transmission media such as fiber-optic cable.

37. Explain connecting devices?Connecting devices can connect segments of a network together; they can also connectnetworks together to create an internet.

38. Explain various types of connecting devices?There are five types of connecting devices: repeaters, hubs, bridges, routers, and switches.Repeaters regenerate a signal at the physical layer. A hub is a multiport repeater. Bridges have access to station addresses and can forward or filter a packet in a network. They operate at the physical and data link layers. Routers determine the path a packet should take. They operate at the physical, datalink, and network layers. A two-layer switch is a sophisticated bridge; a three-layer switch is a sophisticated router.

39. What is IP address?The Internet address (or IP address) is 32 bits (for IPv4) that uniquely and universally defines a host or router on the Internet. The portion of the IP address that identifies the network is called the netid. The portion of the IP address that identifies the host or router on the network is called the hostid. An IP address defines a device’s connection to a network.

40. What is Unicast, Multicast and Broad cast communication?Unicast communication is one source sending a packet to one destination. Multicastcommunication is one source sending a packet to multiple destinations. Hosts with the same multicast address can either be on the same network or on different networks. Multicast addresses are often used for information retrieval and conferencing purposes. Broadcast communication is one source sending a packet to all hosts on its network.

41. What is IETF?The Internet Engineering Task Force (IETF) is a forum of working groups responsible foridentifying operational problems and proposing solutions to these problems.

Page 6: MD - MC E07 TCP-IP Protocol Suite

42. What is IRTF?The Internet Research Task Force (IRTF) is a forum of working groups focusing on long-term research topics related to Internet protocols, applications, architecture, and technology.

43. What is the purpose of NIC?The Network Information Center (NIC) is responsible for collecting and distributinginformation about TCP/IP protocols.

44. What is the purpose of ISOC?The Internet Society (ISOC) promotes research and other scholarly activities relatingto the Internet.

45. What is Protocol? (AU cbe MAY/JUNE 2010)A protocol is a set of rules that governs data communication; the key elements of aprotocol are syntax, semantics, and timing.

46. What is Standards? What are the organizations involved in standard creation committee?Standards are necessary to ensure that products from different manufacturers can work together as expected. The ISO, ITU-T, ANSI, IEEE, and EIA are some of the organizations involved in standards creation.

47. What is process-to-process communication?The IP is responsible for communication at the computer level(host-to-host). As a network layer protocol, IP can deliver the message only to the destination computer. However, this is an incomplete delivery. The message still needs to be handed to the correct process. This is where a transport layer protocol such as UDP takes over. UDP is responsible for delivery of the message to the appropriate process.

48. What is classless addressing?In classless addressing, there are variable-length blocks that belong to no class. The entireaddress space is divided into blocks based on organization needs.

49. Explain buffering?TCP creates sending and receiving buffers for each connection. TCP uses a buffer to store the stream of data coming from the sending application program. The receiving TCP also buffer data when they arrive and deliver them to the application program.

50. What is connection establishment?TCP transmit data in full-duplex mode, when two TCP’s in two machines are connected they are able to send segments to each other simultaneously. This implies that each party must initialize communication and get approval from the other party before any data transfer is called connection establishment.

Page 7: MD - MC E07 TCP-IP Protocol Suite

51. What is connection termination?Any of the two parties involved in exchanging data can close the connection. When connection in one direction is terminated, the other party can continue sending data in the other direction. Therefore both machines are needed to close the connection in both direction.

52. Differentiate Static and Dynamic Routing tables? (AU cbe MAY/JUNE 2010)A static routing table’s entries are updated manually by an administrator. A dynamic routing table’s entries are updated automatically by a routing protocol.

53. What is the purpose of client-server model?The purpose of a network, or an internetwork is to provide services to end users. A user at a local site wants to receive a service from a computer at a remote site. To achieve this a computer runs a program to request a service from another program and also provide service to another computer. This means that two computer connected by an internet, must each run a program, one to provide a service and one to request a service.

54. What is concurrency in server?A concurrent server can process many request at the same time and can share its time between many request.

55. How messages are transferred in a LAN using token ring? (AU cbe MAY/JUNE 2010)

A Token Ring network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit-or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time.

56. What is the role of ARP? (AU cbe MAY/JUNE 2010)The ARP protocol plays a key role among Internet Layer protocols relating to

TCP/IP, Since it enables the physical address of a network interface card corresponding to an IP address to be known. That is why it is called Address Resolution Protocol.

57. What are the layers of TCP/IP model? (AU cbe MAY/JUNE 2010)Application LayerTransport LayerInternet LayerNetwork Access LayerPhysical Layer

Page 8: MD - MC E07 TCP-IP Protocol Suite

58. Draw the generic format of ARP response packet. (AU cbe MAY/JUNE 2010)

59. Mention the use of MTU table. (AU cbe MAY/JUNE 2010)The Maximum Transmission Unit (MTU) is a parameter that determines the longest datagram can be transmitted by an IP Interface without needing to be fragmented into smaller units. The MTU should be larger than the largest datagram youwant to convey without being fragmented.( The MTU defines the Maximum size (in Bytes) of packets can be transmitted at once.)

60. What is BOOTP?BOOTSTRAP Protocol is a client/server protocol designed to provide the following fourinformation for a diskless computer or a computer that is booted for the first time.IP address, Subnet mask, IP address of a router, IP address of a name server.

61. What is DHCP?The Dynamic Host Configuration Protocol has been derived to provide dynamic configuration.DHCP is also needed when a host moves from network to network or is connected and disconnected from a network.

62. What is DNS?Domain name service is the method by which Internet address in mnemonic form such assun.it.ac.in are converted into the equivalent numeric IP address such as 134.220.4.1. To the user and application process this translation is a service provided either by the local host or from the remote host via the Internet. The DNS server may communicate with other internet DNS server if it cannot translate the address itself.

Page 9: MD - MC E07 TCP-IP Protocol Suite

63. What is Fully Qualified Domain Name?If a Label is terminated by a null string, it is called a fully qualified domain name (FQDN). An FQDN is a domain name that contains the full name of a host. It contains all labels, from the most specific to the most general, that uniquely defines the name of the host.

64. What is Partially Qualified Domain Name?If a label is not terminated by a null string, it is called a partially qualified domain name(PQDN). A PQDN starts from a node, but it does not reach the root. It is used when the name to be resolved belongs to the same site as the client.

65. What is Generic Domains?Generic domain define registered hosts according to their generic behaviour. Each node in the tree defines a domain, which is an index to the domain name space database.Eg. com – Commercial organizationsedu - Educational institutionsgov - Government institutions

66. What is Country Domain?The country domain section follows the same format as the generic domains but uses twocharacters country abbreviations.Eg. in - Indiaus - United Statesuk - United Kingdom

67. What are the modules and tables are in IP package?An IP package can consist of the following: a header-adding module, a processing module, a routing module, a fragmentation module, a reassembly module, a routing table, an MTU table, and a reassembly table.

68. Why do we need subnetting of a network?Subnetting divides one large network into several smaller ones

69. What is the format of UDP packet?Explain.Header and data. Header contains: Source port number, Destination port number, Total length, Checksum.

70. Describe the various fields in IP Header format.The fields in the IP header that relate to fragmentation are the identification number, thefragmentation flags, and the fragmentation offset.

71. Give the importance and working of DHCP.The DHCP has been devised to provide dynamic configuration. DHCP is an extension toBOOTP.

Page 10: MD - MC E07 TCP-IP Protocol Suite

72. List the various timers used in TCP.Retransmission, Persistence, Keep alive and Time-waited.

73. How is a connection established and terminated in TCP?Three way handshaking and four way handshaking.

74. What is Zone?What a server is responsible for or has authority over is called a zone. If a server acceptsresponsibility for a domain and does not divide the domain into smaller domains, the “domain” and the “zone” refer to the same thing.

75. What is root server?A root server is a server whose zone consists of the whole tree. A root server usually does not store any information about domains but delegates its authority to other servers, keeping references to those servers.

76. What is simple mail transfer protocol [SMTP]? (AU MAY/JUNE 2008)The TCP/IP protocol that supports electronic mail on the internet is called Simple MailTransfer Protocol (SMTP). It is a system for sending messages to other computer users based on email addresses.

77. What is User Agent?A user Agent is defined in SMTP, but the implementation details are not. The UA is normally a program used to send and receive mail. Popular user agent programs are MH, Berkeley Mail, Elm, Zmail, and Mush.

78. What is Mail Transfer Agent?The actual mail transfer is done through mail transfer agents (MTAs). To send mail, a system must have the client MTA, and to receive mail, a system must have a server MTA.

79. Describe mail address.The mail address consists of two parts: a local address (user mailbox) and a domain name. The form is localname@domainname

80. What are steps to transfer a mail message?The steps in transferring a mail message area) Connection establishmentb) Mail transferc) Connection termination

81. What is MIME?Multipurpose Internet Mail Extension (MIME) is an extension of SMTP that allows the transfer of multimedia messages.

Page 11: MD - MC E07 TCP-IP Protocol Suite

82. What is POP?Post Office Protocol, version3 (POP3) and Internet Mail Access Protocol version4 (IMAP4) are protocol used by a mail server in conjunction with SMTP to receive and hold mail for hosts.

83. What is the purpose of using Alias?An alias allows one user to have multiple email addresses or many users to share the same mail address.

84. What is SNMP? (AU-cbe JUNE 2009)The Simple Network Management Protocol (SNMP) is a frame work for managing devices in an internet using the TCP/IP protocol suite. It provides a set of fundamental operations for monitoring and maintaining an internet.

85. What is Structure of Management Information?The SMI is a component for network management. Its functions are, To name objects, Todefine the type of data that can be stored in an object, To show how to encode data for transmission over the network.

86. What is Management Information Base?The MIB is the component used for network management. Each agent has its own MIB, which is a collection of all the objects that the manager can manage. The objects in the MIB are categorized under ten different groups: system, interface, address translation, ip, icmp, tcp, udp, egp, transmission, and snmp.

87. What are the services used by SNMP for other protocols?SMI –Structure of Management Information and MIB – Management Information Base.

88. What is HTTP?The Hypertext Transfer Protocol (HTTP) is a protocol used mainly to access data on the world wide web. The protocol transfers data in the form of plain text, hyper text, audio, video and so on.

89. List the format of Request message?A request message consists of a request line, a header, and sometimes a body.

90. What is Proxy server?A proxy server is a computer that keeps copies of responses to recent requests. In the presence of a proxy server, the HTTP client sends a request to the proxy server. The proxy server checks its cache. If the response is not stored in the cache, the proxy server sends the request to the corresponding server.

91. List the features of HTTP?Persistent Connection and Non persistent Connection.

Page 12: MD - MC E07 TCP-IP Protocol Suite

92. List out the different types of ICMP messages. (AU cbe MAY/JUNE 2010)Echo Request/Reply (used to ping)Destination UnreachableSource QuenchRedirect MessageRouter AdvertisementTime ExceededAddress Mask Request/ReplyInformation Request/ReplyDomain Name Request/Reply

93. Define ephemeral port number. (AU cbe MAY/JUNE 2010)A TCP or UDP port number that is automatically allocated from a predefined range by the TCP/IP stack software, typically to provide the port for the client end of a client-server communication.

94. List any two advantages of UDP. (AU cbe MAY/JUNE 2010) It doesn't restrict you to a connection based communication model, so

startup latency in distributed applications is much lower, as is operating system overhead.

All flow control, acking, transaction logging, etc is up to user programs; a broken os implementation is not going to get in your way. additionally, you only need to implement and use the features you need.

The recipient of udp packets gets them unmangled, including block boundaries.

Broadcast and multicast transmission are available with udp.

95. What are the services offered by TCP? (AU cbe MAY/JUNE 2010)Stream Data Transfer ServiceFull-Duplex ServiceReliable Service

96. Which method is called three way handshaking? Why? (AU cbe MAY/JUNE 2010)The 3-way handshake method is used by the TCP protocol to establish a

connection between a client and the server. It involves three steps:

1. In the first step of the three-way handshake method, SYN message is sent from a client to the server.

2. In the second step of the three-way handshake method SYN/ACK is sent from the server to the client.

3. In the third step of the three-way handshake method ACK (usually called SYN-ACK-ACK) is sent from the client to the server. At this point, both the client and server have received an acknowledgement of the TCP connection.

Page 13: MD - MC E07 TCP-IP Protocol Suite

97. Write down the transition states in DHCP. (AU cbe MAY/JUNE 2010)DHCPDISCOVERDHCPOFFERDHCPREQUESTDHCPACKDHCPRELEASE

98. Which Protocol uses aliases? Why? (AU cbe MAY/JUNE 2010)File Transfer Protocol uses Aliases for Network Services

99. Compare and contrast HTTP and SMTP. (AU cbe MAY/JUNE 2010)There are three main differences between HTTP and SMTP:

1) HTTP is mainly a pull protocol--someone loads information on a web server and users use HTTP to pull the information from the server. On the other hand, SMTP is primarily a push protocol--the sending mail server pushes the file to receiving mail server.

2) SMTP requires each message, including the body of each message, to be in seven-bit ASCII format. If the message contains binary data, then the message has to be encoded into seven-bit ASCII format. HTTP does not have this restriction.

3) HTTP encapsulates each object of message in its own response message while SMTP places all of the message's objects into one message.

100. What are the organizations involved in Standard creation committee?The ISO, ITU-T, ANSI, IEEE, and EIA are some of the organizations involved instandards creation.

101. What is ISOC?The Internet Society (ISOC) promotes research and other scholarly activities relatingto the Internet.

102. Who is IAB?The Internet Architecture Board (lAB) is the technical advisor to the ISOC.

103. What is NIC?The Network Information Center (NIC) is responsible for collecting and distributinginformation about TCP/IP protocols.

104. What is ICANN?The Internet Corporation for Assigned Names and Numbers (ICANN), formerly knownas IANA, is responsible for the management of Internet domain names and addresses.

105. What is NSP?National service providers (NSPs) are backbone networks created and maintained by

Page 14: MD - MC E07 TCP-IP Protocol Suite

specialized companies.

106. What is ISP?Local Internet service providers (ISPs) connect individual users to the Internet.

107. What is Forum?Forums are special-interest groups that quickly evaluate and standardize newtechnologies.

108. Why we need Proxy server?A proxy server is a computer that keeps copies of responses to recent requests. In the presence of a proxy server, the HTTP client sends a request to the proxy server. The proxy server checks its cache. If the response is not stored in the cache, the proxy server sends the request to the corresponding server.

109. How to Transfer a mail from one computer to another?The steps in transferring a mail message are :Connection establishment, Mail transfer,Connection termination

110. What is the purpose of User Agent?A user Agent is defined in SMTP, but the implementation details are not. The UA is normally a program used to send and receive mail. Popular user agent programs are MH, Berkeley Mail, Elm, Zmail, and Mush.

111. List the components of IP package?An IP package can consist of the following: a header-adding module, a processing module, a routing module, a fragmentation module, a reassembly module, a routing table, an MTU table, and a reassembly table.

112. What are the difference fields in Routing table? (AU MAY/JUNE 2008)The routing table can consist of seven fields: a mask, a destination address, a next-hop address, flags, a reference count, a use, and an interface.

113. What is class less addressing?Classless addressing requires hierarchical and geographical routing to prevent immense routing tables.

114. What are the fields Option Header contains?The options header contains the following information: a code field that identifies the option, option length, and the specific data.

115. What is Checksum? (AU-cbe JUNE 2009)The checksum uses one’s complement arithmetic to add equal-size sections of the IP header. The complemented result is stored in the checksum field. The receiver also uses one’s complement arithmetic to check the header

Page 15: MD - MC E07 TCP-IP Protocol Suite

116. What is SHTTP? (AU cbe JUNE 2009)S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol

(HTTP) that allows the secure exchange of files on the World Wide Web. Each S-HTTP file is either encrypted, contains a digital certificate, or both.

117. What is the size of MTU?The MTU is the maximum number of bytes that a data link protocol can encapsulate. MTUs vary from protocol to protocol.

118. Why we need root server?A root server is a server whose zone consists of the whole tree. A root server usually does not store any information about domains but delegates its authority to other servers, keeping references to those servers.

119. What is the difference between Partially Qualified Domain Name and Fully Qualified Domain name? (AU cbe MAY/JUNE 2010)

If a label is not terminated by a null string, it is called a partially qualified domain name (PQDN). A PQDN starts from a node, but it does not reach the root. It is used when the name to be resolved belongs to the same site as the client.

If a Label is terminated by a null string, it is called a fully qualified domain name (FQDN). An FQDN is a domain name that contains the full name of a host. It contains all labels, from the most specific to the most general, that uniquely defines the name of the host

120. Under what situation does SMTP uses NOOP and REST commands? (AU cbe MAY/JUNE 2010)

NOOP (NOOP) Specifies no action other than that the receiver sent an OK reply.

RESET (RSET) Aborts the current mail transaction. Any stored sender, recipients, and mail data must be discarded, and all buffers and state tables must be cleared. The receiver must send an OK reply.

121. Categorize the list of commands in FTI. (AU cbe MAY/JUNE 2010)LISTSTATUSFIXUPENABLEDISABLE

122. Can we call HTTP as a stateless protocol? Why? (AU cbe MAY/JUNE 2010)As we know that the Http protocol is a stateless protocol, that means that it can't

persist the data. Http treats each Http GET requests when the client clicks on the links embedded with a page.

Page 16: MD - MC E07 TCP-IP Protocol Suite

123. How are OSI and ISO related to each other? (AU cbe JUNE 2009)ISO is the International Standards Organization, part of the United Nations.OSI (Open System Interface) is a networking standard, developed by ISO.

124. What is Port address? (AU cbe JUNE 2009)Port addressing is giving different applications a unique port number so data can

be forwarded to the correct application

125. Write the concept of token ring. (AU cbe JUNE 2009)A Token Ring network is a local area network (LAN) in which all computers are

connected in a ring or star topology and a bit-or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time.

126. Write the use of ARP and RARP. (AU cbe JUNE 2009)The ARP protocol plays a key role among Internet Layer protocols relating to TCP/IP, Since it enables the physical address of a network interface card corresponding to an IP address to be known. That is why it is called Address Resolution Protocol.

RARP (Reverse Address Resolution Protocol) is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway server's Address Resolution Protocol (ARP) table or cache

127. What is meant by datagram? (AU cbe JUNE 2009)A datagram is a basic transfer unit associated with a packet-switched network in

which the delivery arrival time and order are not guaranteed. A datagram consists of header and data areas, where the header contains information sufficient for routing from the originating equipment to the destination without relying on prior exchanges between the equipment and the network. The source and destination addresses as well as a type field are found in the header of a datagram.

128. Why UDP is called stateless protocol? (AU cbe JUNE 2009)UDP (User Datagram Protocol) is Stateless.  This means it has no expectations.  Here are some of the characteristics of the expectationless UDP:- I don't care if what I send is received- I don't care if one of my packets was lost in transit- I don't care if you acknowledge my existence- I don't care if you like me or simply discard me

129. What is name space? (AU cbe JUNE 2009)A namespace uniquely identifies a set of names so that there is no ambiguity when objects having different origins but the same names are mixed together

130. Abbreviate BOOTP and DHCP. (AU cbe JUNE 2009)Bootstrap Protocol

Page 17: MD - MC E07 TCP-IP Protocol Suite

Dynamic Host Configuration Protocol

131. Differentiate telnet login with remote login. (AU cbe JUNE 2009) SSH is a recently designed, high-security protocol. It uses strong cryptography to

protect your connection against eavesdropping, hijacking and other attacks. Telnet and Rlogin are both older protocols offering minimal security.

Telnet allows you to pass some settings on to the server, such as environment variables. (These control various aspects of the server's behaviour. You can usually set them by entering commands into the server once you're connected, but it's easier to have Telnet do it automatically.) SSH and Rlogin do not support this. However, most modern Telnet servers don't allow it either, because it has been a constant source of security problems.

SSH and Rlogin both allow you to log in to the server without having to type a password. (Rlogin's method of doing this is insecure, and can allow an attacker to access your account on the server. SSH's method is much more secure, and typically requires the attacker to have gained access to your actual client machine.)

SSH allows you to connect to the server and automatically send a command, so that the server will run that command and then disconnect. So you can use it in automated processing.

132. Give the cause of congestion. (AU cbe JUNE 2009)Bad NIC’sFailing Switches/RoutersDaisy ChainingNetBIOS conflictsIP ConflictsExcessive network-based applicationsSpyware InfestationVirus InfestationInsufficient BandwidthDNS errors

133. Give the purpose of SMTP. (AU cbe JUNE 2009)The main purpose of SMTP is to deliver messages to user's mailboxes. A very similar service provided by some hosts is to deliver messages to user's terminals

134. What is meant by Anonymous FTP? (AU cbe JUNE 2009)A host that provides an FTP service may additionally provide anonymous FTP

access. Users typically log into the service with an 'anonymous' account when prompted for user name. Although users are commonly asked to send their email address in lieu of a password, no verification is actually performed on the supplied data.

Page 18: MD - MC E07 TCP-IP Protocol Suite

16 Marks Questions

1. Discus briefly the History of Internet.Network is a grope of Connected, Communicated device such as computers and printer.An Internet is two or more networks that can communicate with each other .The most notable Internet is a collaboration of more than hundreds of thousands interconnected networks.ARPANET, MILNET,CSNET,NSFNET,ANSNET & Internet Today is ISPs,NSPs, RSPs.

2. Discus with the followingStandards Organizations – (i) Standard creation Committees ISO,ITU-T,ANSI,IEEE,EIA(ii) FORUMS frime realy forum , ATM forum(iii)Regulatory Agencies Federal Communications (FCC)Internet Standards (i) maturity levels, Proposal std, draft standard, Internet standard,Historic, experiomental. Infornational.Requirement levels, required, recommended, Elective, Limited use.

3. Explain the OSI model (open system interconnection)Layers in the OSI model: Physical layer, Datalink layer, Network layer, Transport layer,Session layer, Presentation layer, Application layer.

4. Discuss with TCP/IP Protocol suite.Physical & Data link layer, Network layer(IP,ARP, RARP,ICMP,IGMP)Transport layer (UDP,TCP), Application layer (SMTP,FTP,DNS,SNMP)

5. Discuss briefly various connecting devices.LAN, WAN Repeatus, Bridges, Hubs, Routes and Switches.

6. Discuss various routing methods.Next-Hop routing, Network-Specific routing, Host-Specific routing, Default routing

7. Explain briefly the ARP package design.Packet format, Operations, ARP Package – cache table, queues, Output module, Inputmodule, Cache-control module

8. Discuss with IP Package components and their interactions.Header-adding module, Processing module, Queues, Routing table, Routing module,MTU table, Fragmentation module, Reassembly table, Reassembly module

9. Discuss Internet Control Message Protocol (ICMP).Types of Messages1. Error-reporting – Destination unreachable, Source Quench, Time Exceeded, Parameterproblem, redirection.

Page 19: MD - MC E07 TCP-IP Protocol Suite

2. Query – Echo request and reply, Timestamp request and reply, address-mark request and reply, Router solicitation and advertisement

10. Explain Internet Group Management Protocol (IGMP).IGMP Messages1. Query – General and Special2. Membership report3. Leave report

11. Discuss briefly UDP operations.Connectionless services, Flow & Error control, Encapsulation and Decapsulation,Queuing, Multiplexing and Demultiplexing

12. Explain briefly UDP package components and their interactions.Control-block table, Input Queues, Control-block module, Input module, OutputModule

13. Explain briefly the services offered by TCP.Stream Delivery Service, Full-duplex service, Connection Oriented service, ReliableService

14. Discuss the various connection process carried out in TCP.Connection Establishment, Connection Termination

15. Explain briefly TCP package components and their interactions.Transmission control blocks, set of Timers, Main module, Input processing module,Output processing module

16. Explain briefly the Domain Name System with their various services.Domain Name Space1. Distribution of Name Space – Hierarchy of name server, Zone, root, primary and Secondary server2. DNS in the Internet – Generic domain, country domain, inverse domain

17. Discuss with the followingTelNet –Rlogin –

18. Explain briefly Network Virtual Terminal (NVT).

19. Discuss briefly File Transfer Protocol (FTP).Connections – Control Connection, Data ConnectionCommunications – Communication over control and data connectionCommand processingFile Transfer

Page 20: MD - MC E07 TCP-IP Protocol Suite

20. Explain briefly Simple Mail Transfer Protocol services.Components of SMTP – User Agent (UA), Mail Transfer Agent (MTA)Commands and Response Mail Transfer Phases – Connection Establishment, Message Transfer, Connection Termination.

21. Discuss simple Network Management Protocol framework.SNMP Concept – managers and AgentsManagement Components – Structure of management Information (SMI), ManagementInformation Base (MIB)

22. Explain the various functions of Hypertext Transfer Protocol.HTTP Transaction, HTTP Message- request, response,Features of HTTP – persistent versus nonpersistent connection, proxy server.

23. Explain ARP and RARP operations and the use of ARP cache.

24. Explain the function of DHCP protocol with respect to DHCP server and DHCP enabled client communication.

25. List down the SNMP services and explain the server support for each.

Page 21: MD - MC E07 TCP-IP Protocol Suite

i Department of Computer Applications, Erode Sengunthar Engineering College, Thudupathi – 638 057.