CCN qb3

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

CCN question bank – IA3

Module 4
1. Explain IPv4 datagram format.
2. Explain Options field in the header of IPv4 datagram format. Mention the two types
of options and briefly explain them
3. Briefly describe how we can defeat the following security attacks
a. packet sniffing b. packet modification c. IP spoofing
4. What is the use of ICMPv4 in traceroute? Explain with a neat diagram
5. Describe the following inefficiency in mobile IP in brief.
a) Double crossing b) Triangle routing
6. Which are the three phases a mobile host goes through to communicate with a remote
host. Explain in brief.
7. Explain the distance vector routing. What are the problems associated with distance
vector routing?
8. Explain Least cost tree using shared link state database with suitable example.
9. With a neat diagram describe areas in an Autonomous system in OSPF
10. Explain path vector routing with an example.
11. With a neat diagram explain general format of ICMP messages
12. Apply link state routing for the given Fig.(a) below and create a least cost tree using
Dijkstra Algorithm (and other similar problems)

13. An IP datagram has arrived with the following partial information in the
header (in hexadecimal): (and other similar problems)

45000054 00030000 2006...

a) What is the header size?


b) Are there any options in the packet?
c) What is the size of the data?
d) Is the packet fragmented?
e) How many more routers can the packet travel to?
f) What is the protocol number of the payload being carried by the packet?

Dept. of ECE,RNSIT Page 1


CCN question bank – IA3

14. Determine if a datagram with the following information is a first fragment, middle
fragment, a last fragment, or the only fragment (no fragmentation)
a. M bit is set to 1 and the value of the offset field is zero.
b. M bit is set to 1 and the value of the offset field is nonzero. (and other similar
problems)
15. Explain the operation of External and Internal Border Gateway Protocol

Module 5

1. What are the different services provided by the transport layer?


2. Explain the concept of sliding window with a neat diagram.
3. Explain connectionless and connection-oriented service represented as FSMs for
transport layer
4. Write outline and explain send window and receive window for selective repeat
protocol/ Go back N protocol.
5. Explain why the send window size for Go- Back N must be less than 2m ?
6. What are the services provided by UDP? Mention any four typical applications of
UDP.
7. What are the different TCP services and features? Explain them
8. With a neat diagram explain TCP segment format
9. What are the different states of TCP? Describe them in brief.
10. Explain TCP connection establishment and connection termination using three way
handshaking
11. Describe the windows used in TCP.
12. Define the following related to the error control in TCP
a) Checksum b) Acknowledgement c) Cumulative acknowledgement
d) Selective acknowledgement
13. TCP’s Congestion policy for handling congestion is based on three algorithms.
Mention and explain all three algorithms in brief.

Refer problems from text

Dept. of ECE,RNSIT Page 2

You might also like