ICS 432 Reading Assignment
Chapter 24:
- What is the relationship between a client and server?
- How does a server handle more than one client at a time?
- What is the difference between concurrent and iterative servers?
- What is an ephemeral port?
- What do you mean by a socket?
- What is the difference between stream, datagram and raw sockets?
- Discuss the steps involved in connection-oriented concurrent server and connectionless iterative server.
Chapter 25:
- What is the use of DNS?
- Why do we need hierarchical name space?
- What is the difference between fully qualified and partially qualified domain name?
- What is the relation between zones and domains?
- What do you mean by primary and secondary DNS servers?
- Why do you need inverse domains and how do they work?
- Discuss about iterative and recursive resolution.
- How does caching helps in DNS? What are its short-comings?
- What is the structure of query and response messages in DNS?
- Why does DNS use TCP as well as UDP? Explain.
Chapter 26:
- What is the use of user agent?
- Why do you need MIME along with SMTP?
- What is the use of each header fields in MIME?
- What is the need to have multipart in MIME?
- What are the various data encoding techniques available? Compare and contrast among them.
- Does SMTP use TCP? If yes, how is this connection done in the email transfer?
- What are the various stages of message delivery?
- What are the various mail access protocols? What are the salient features in them?
- FTP uses two ports. What are they? Why are they needed?
- Discuss the data format and data structure used for data transfer in FTP.
- Know the needs for various ftp commands.
Chapter 27:
- What are the various request methods available in HTTP?
- What is the relationship between request and response messages of HTTP?
- What is the difference between persistent and non-persistent communications?
- What is the use of proxy server?
- Differentiate between static, dynamic and active web documents.
Chapter 3:
- What is the relationship between frequency and period?
- What is the relationship between radians and degrees?
- How do we link change in signal to frequency?
- How can a composite signal be represented?
- Does having different frequencies in a signal impact the bandwidth? Justify.
- Why do we say the digital signals are aperiodic in nature?
- What does bit interval and bit rate mean in the case of digital signal?
- Which is preferable for digital signal, low-pass or band-pass? Why?
- Referring to both Nyquist and Shannon theorems, what is the relationship [in bit rate] between noisy and noiseless channels?
- What do you mean by distortion?
- Why do we represent signals in decibels?
Chapter 4:
- How does a bit interval of the sender and receiver impact on the clock synchronization?
- What is the use of middle transition?
- In AMI, which data [0 or 1] is represented using two levels?
- Apply various line encoding techniques [NRZ-I, Manchester, Differential Manchester, AMI] to the data: 01001110
- What are the various stages of block coding? Write about 4B/5B encoding.
- What are the steps involved in converting an analog signal into a PCM digital code?
- What is the relationship between highest frequency and sampling rate, according to Nyquist theorem?
- When do we need start and stop bits?
- Do we need gaps between bit streams in asynchronous transmission? Justify.
- How does synchronous transmission differ from asynchronous transmission?
Chapter 6:
- What are steps involved FDM? What is the use of carrier frequency?
- What do you mean by guard band? What is the use of this?
- How does interleaving impact on TDM?
- A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. Show the output with four arbitrary inputs. What is the frame rate? What is the frame duration? What is the bit rate? What is the bit duration?
- What is the use of framing bits?
- What does a T line mean? How is it related to E line?
Chapter 7:
- How does twisted pair handle crosstalk?
- Among UTP and STP, which one is better, under specified conditions?
- How about the densities between the cladding and the core of a fiber? Does this relation have an impact on the signal?
- What is the difference between multimode [step-index and graded-index] and single-mode fibers?
- What are the different kinds of connectors used in fiber optics?
- What is the benefit of radio waves being omnidirectional?
- How is an infrared signal differing from radio waves?
Chapter 8:
- What is the use of crossbar switch?
- What is the use of circuit switching?
- What is the major role played by time-slot interchange in time-division switch? Does TSI posses RAM in them? If yes, what is the need of it?
- What do you mean by TDM bus?
- What is the benefit of combining time division and space division switching?
Chapter 10:
- What are two sub-layers of data link layer? Why do we need sub-layers?
- Adding extra bits in two-dimensional parity provides some extra features compared to single parity bit. Justify.
- Discuss the steps in CRC. What is the number of bits in the remainder?
- How is the CRC polynomial selected?
- Discuss the steps involved in Checksum.
- Discuss about hamming code.
- How is the number of parity bits selected?
- How is the position of parity bits selected?
- What is the impact of each parity bit on data bits?
- How do we deduct errors using hamming code?
Chapter 11:
- In stop-and-wait:
- What is the difference between packet lost and ack lost?
- Is there a chance of out-of-order arrival of packets? Justify with an example.
- What happens if the ack arrives later than the time-out?
- Go back N ARQ
- What is the window size at the sender and receiver?
- What is the case when the receiver will wrongly accept a frame?
- Is the time-out related to each frame or towards all the frames in a single window?
- What is the use of ACK being cumulative?
- What is the relation between the number of bits allocated for sequence number and window size?
- Selective repeat
- What is Negative ACK?
- What is the relationship between the window size of the sender and the receiver?
- How does the window size of the go-back-N and selective repeat differ?
- HDLC
- Define: I-Frame, S-Frame and U-Frame.
- When is the Reject used? Does it have an impact on I-Frame?
- What is bit stuffing? What is the use of flags in HDLC frame? Should flags be bit stuffed, justify.
- Is there any sequence in the case of S-frame? Justify your answer.
Chapter 12:
- Why do we need PPP in dedicated connections?
- What are the main functions of PPP?
- Why is it that the address of PPP protocol a broadcast? Does the client have an IP address? If yes, can’t we use that one as the destination address?
- What are the various states of PPP?
- When do you use LCP? What are the options available in LCP packets?
- What is the difference between PAP and CHAP?
- How does CHAP handle authentication without actually transmitting the password?
- How is encapsulation of network traffic handled in PPP?
Chapter 13:
- What is the need for random access in shared medium?
- Is there a chance of collision in CSMA? Justify your answer.
- What is the difference between persistent and non-persistent strategies?
- What is the use of jam signal in CSMA/CD algorithm?
- How does CSMA/CA avoid collisions?
- Discuss the process of select and poll in controlled access?
- Is there a chance of collision in token-passing techniques?
Chapter 14:
- What is the use of transceiver?
- Explain the difference between type and length fields in 802.3 frames.
- What is the use of preamble in 802.3 frames?
- What is the need for maximum and minimum data length in 802.3 frames?
- What is the use of MAC address and how is it represented?
- How is collision handled in bridges?
- How is sharing of network bandwidth handling in hubs and switches?
- Why don’t we need CSMA/CD in switched Ethernet?
Chapter 15:
- What do you mean by adhoc architecture?
- Discuss the steps involved CSMA/CA algorithm and why CSMA/CD algorithm is not suitable.
- What is the use of backoff algorithm and NAV?
- What is the difference between piconet and scatternet?
Chapter 16:
- What is the job of repeater?
- Can a repeater connect LANs with different protocols? Justify your answer.
- Why is there a length limitation in 10Base5? How does a repeater help to overcome this problem?
- What are the differences between a repeater and bridge?
- What do you mean by learning or transparent bridge? How does a bridge learn about the location of the PCs?
- Given a network of switches with loops, is there a problem? Why? How do you solve this problem?
- What is a VLAN? What is the use of it? How do you configure VLANs on switches?
- Can PCs that belong to different VLANs communicate with each other via a switch?
Chapter 19:
- What are the main duties of network layer?
- You already have an IP address, why do you need a MAC address?
- Differentiate between the network layer jobs at the source, router and the destination.
- Differentiate between circuit switching, packet switching and virtual circuits.
- Given any IP address, identify the following:
- Whether it is a valid IP or not.
- Its class.
- Its default subnet mask.
- Its network address.
- Indicate whether the given IP is a private or public IP.
- Given the needs [number of subnets and number of hosts per subnet] of a network, do the following:
- Indicate the possible class of IP address we should use.
- Indicate the number of bits needed for the subnet part and the host part.
- Indicate the subnet mask.
- Indicate the network address, broadcast address and range of IP addresses for each valid subnet.
- Discuss the following about DHCP:
- The steps needed for a client IP to acquire an IP address from a DHCP server.
- What is the use of lease time?
- When does the client contact the server to renew the IP?
- What happens if the client did not receive any OFFER message from the server?
- What is the use of NAT? When do you use it?
- When do you use static or dynamic routing?
- When do you need a default route?
- What are the entries in the routing table?
Chapter 20:
- What is the use of static mapping of IP to MAC address?
- Is ARP request a broadcast, why?
- What about ARP reply? Is it a broadcast or unicast? Why?
- How about the MAC addresses [source and destination] in a packet when the packet travels from a PC in one network to a PC in another network?
- Why is it that the IP packets are called as datagram?
- What is the use of Protocol field in the IP packet?
- How do you calculate header checksum in IP datagram?
- While fragmenting packets, how to recognize the following:
- First fragment.
- Last fragment.
- Whether the receiver has received all the fragments or not.
- Why do we need ICMP packets? To whom does an ICMP packet sent to?
- When is the following ICMP messages generated?
- Destination unreachable
- Source Quench
- Time exceeded
- Parameter Problem
- Redirection
- Echo request and echo reply.
- Router solicitation
- Why do we need to go for IPv6?
- What do you mean by tunneling in IPv6?
Chapter 21:
- What is the use of metric in routing protocols?
- What is the difference between distance vector and link state routing protocols?
- If there is a chance in routing information, does distance vector send an update?
- Why distance vector is called as ‘routing by rumor’?
- What are the steps involved in routing updates in RIP?
- What is the need of OSPF to divide an autonomous system into many areas?
- What do you mean by internal routers, backbone routers, area border routers and autonomous system boundary routers?
- What is backbone area? How do you determine a backbone area? What is the use of virtual link?
- Why do you need to have designated router in transient links? Why don’t we have the same in the case of RIP?
- What is the use of various LSAs [router link, network link, summary link, external link] available?
- Why it is that distance vector or link state is not suitable for inter-autonomous system routing protocols?
- What do you mean by policy routing?
- How does path vector in the routing information help to avoid looping of routing packets?
- Describe about the different type of attributes.
- What is the use of keep-alive messages in the case of BGP?
- What are the two major protocols involved in multicasting? Which class of IP address is used for multicasting?
- Why do we have two query types in ICMP?
- What is the need of maximum response time in IGMP packets?
- What is the groupid in the IGMP packet for IGMP Query packets? Justify your answer.
- Why is it that IGMP acts locally?
- When is a leave report generated?
- What is the need for multicasting membership in multicasts?
- Without delayed response in multicasts, we will have multiple replies for a single query. Justify your answer.
- How do we handle the problem of duplicate copies in RPF?
- Define pruning and grafting.
- Discuss the problems and solutions for MOSPF.
- Discuss the difference between DVMRP, MOSPF and CBT.
- What is the use of rendezvous router?
- What is the difference between PIM-Dense mode and PIM-Sparse mode?
Chapter 22:
- Discuss about port numbers in transport layer.
- What are the steps involved in connection creation and termination?
- Data link layer provides flow control and error control. Why do you need to do the same thing at the transport layer?
- What is the use of sequence number and acknowledgement number in TCP?
- Discuss the use of various control fields [URG, ACK, PSH, RST, SYN, FIN] in TCP.
- How do you handling sender window size in sliding window protocol?
- What causes silly window syndrome?
- How is silly window syndrome handled at the sender and receiver?
- How do you calculate retransmission timer? Discuss Karn’s algorithm.
- Discuss: Persistent timer, keep-alive timer, time-waited timer.
Chapter 23:
- Define the following:
- Constant bit rate
- Variable bit rate
- Bursty traffic
- Peak data rate
- Average data rate
- Maximum burst size
- Jitter
- How does a router handle the packets?
- Discuss the methods through which we can prevent and handle congestion.
- Write about slow start, additive increase, and multiplicative decrease.
- Discuss about BECN and FECN.
- Compare among the following:
- FIFO, Weight pair and priority queueing
- Leaky bucket and token bucket
- How are Path and Resv messages used in RSVP?
Chapter 29:
- What is ciphertext and plaintext?
- Discuss about symmetric and asymmetric key cryptography.
- What is the difference between monoalphabetic, polyalphabetic, and transpositional ciphers?
- Discuss the components of Block cipher.
- Why do we need a product block?
- Discuss the various blocks in DES algorithm.
- Various operation modes of DES:
- Electronic code block (ECB)
- Cipher block chaining (CBC)
- Cipher feedback mode (CFM)
- Cipher stream mode (CSM)
- Discuss the steps involved in RSA Algorithm.
Chapter 30:
- Define the following:
- Privacy
- Message Authentication
- Integrity
- Non-repudiation
- What is the need for digest in Digital Signature?
- Discuss the steps involved in Digital Signature. How does Digital Signature provide all the necessary security measures?
- How does digital signature provide the integrity of the message using the signed digest?
- How is authentication provided using symmetric key? What is the use of nonce here? What is Bidirectional authentication?
- How can we distribute keys among various communication entities?
- How does man-in-the-middle affect security?
- What is the use of key distribution center?
- How do you confirm the identity of the public key?
- What is the use of hierarchy structure in CA?
- What is Kerberos? How does it handle authentication and key distribution?
Chapter 31:
- How does IPSec operate?
- What is the difference between ESP and AH?
- What is the sequence number restriction in AH?
- Why is AH unable to provide privacy?
- How do you preserve the protocol information of IP layer if we use AH or ESP approach?
- What is the use of handshake protocol in TLS?
- How does packet-filter firewall operate?
- What is the use of VPN?
- How does addressing in VPN work?
- What do you mean by hybrid networks?
Extra Questions:
How many usable hosts are available given a Class C IP address with the default subnet mask?254
255
256
510
511
512
Which subnet mask would be assigned to the network address of 192.168.32.0 to provide 254 useable host addresses per subnetwork?
255.255.0.0
255.255.255.0
255.255.254.0
255.255.248.0
Which statement accurately describes public IP addresses?
Public addresses cannot be used within a private network.
Public IP addresses must be unique across the entire Internet.
Public addresses can be duplicated only within a local network.
Public IP addresses are only required to be unique within the local network.
Network administrators are free to select any public addresses to use for network devices that access the Internet.
When a host has an empty ARP cache, what is the next step the host will take to find the destination MAC address of a remote host?
sends an ARP request as a unicast to the server
sends an ARP request as a unicast to the destination
sends an ARP request as a broadcast to all hosts in the local network
sends an ARP request as a unicast to the default gateway
Which two statements correctly describe the IP address 127.0.0.1? (Choose two.)
It belongs to the Class A range of addresses.
It belongs to the Class B range of addresses.
It belongs to the Class C range of addresses.
It is reserved for loopback testing.
It is reserved for multicast group testing.
It is reserved for unicast testing.
Refer to the exhibit. The small office LAN shown in the exhibit may eventually be connected to the Internet. According to Cisco best practice, which IP network addresses should be used?
12.0.0.0
172.0.0.0
172.168.0.0
192.32.17.0
192.168.67.0
225.1.5.0
What are two facts about how ARP resolves an IP address to a MAC address? (Choose two.)
The originating host dynamically issues an arp –a command to obtain the destination MAC address.
The originating host broadcasts an ARP request packet and each host in a local network receives this packet.
The originating host dynamically issues an icmp echo request command to obtain the destination MAC address.
The host with the specified destination IP address sends an ARP reply packet containing its MAC address back to the originating host.
The host with the specified destination IP address sends an icmp echo reply packet to the originating host with its MAC address.
What is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask?
192.168.0.0
192.168.0.255
192.168.32.0
192.168.32.254
192.168.32.255
Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?