You are on page 1of 16

PL 4 MOCK QUESTION BANK SOLUTIONS

ASSIGNMENT NO. 4
What is HTTP?
The Hypertext Transfer Protocol (HTTP), the Web's applicationlayer protocol, is at the heart of the Web.
HTTP is implemented in two programs: a client program and
server program.
A Web page (also called a document) consists of objects.
The base HTML file references the other objects in the page with
the objects' URLs.
Why HTTP is stateless protocol?
An HTTP server maintains no information about the clients, HTTP
is said to be a stateless protocol.
What are its versions?
Two versions: - Persistent and Non-persistent
What is persistent and non-persistent connection?
With persistent connections, the server leaves the TCP
connection open after sending responses.
With non-persistent connections , the server closes the TCP
connection after sending one response.
Explain HTTP request and response message?
Request Message :
The message is written in ordinary ASCII text, so that your
ordinary computer-literate human being can read it.
The message consists of five lines, each followed by a carriage
return and a line feed.
It consists of GET and POST methods
Read its complete structure
Response Message:
It has three sections: an initial status line, six header lines,
and then the entity body.
The entity body is the meat of the message -- it contains the
requested object itself (represented by data data data data
data ...).

The status line has three fields: the protocol version field, a
status code, and a corresponding status message. In this
example, the status lineindicates that the server is using
HTTP/1.1 and that that everything is OK.
Read its status code and phrase and its explanation
What is its port number?
Port 80
What is HTTPs?
HTTPS (also called HTTP over TLS,[1] HYPERLINK
"https://en.wikipedia.org/wiki/HTTPS"[2]
HTTP over SSL,[3] and HTTP Secure[4]
HYPERLINK "https://en.wikipedia.org/wiki/HTTPS"[5]
) is a protocol for secure
communication over a computer network which is widely used on
the Internet.
Explain its header in detail
HTTP Request Message
HTTP request message contains request line and header line. Request
line has 3 fields1. Method- The request method indicates the method to be performed
on the resource identified by the given Request-URI. It includes
GET,POST,HEAD
2. URL- It is a unique address for a file that is accessible on the
internet.
3. Version- HTTP version either 1.0 or 1.1
Header line has 2 fields, header field name and its value.
HTTP Response Message
HTTP response message contains status line and header line and
entity body.A Status-Line consists of the protocol version followed
by a numeric status code and its associated textual phrase. The
response-header fields allow the server to pass additional
information about the response which cannot be placed in the
Status- Line.

What is caches and cookies in HTTP?


An HTTP
cookie (also
called web
cookie, Internet
cookie, browser cookie or simply cookie), is a small piece of data
sent from a website and stored in the user's web browser while
the user is browsing.
Every time the user loads the website, the browser sends the
cookie back to the server to notify the user's previous activity.
[1]
Cookies were designed to be a reliable mechanism for
websites to remember stateful information (such as items added
in the shopping cart in an online store) or to record the user's
browsing activity (including clicking particular buttons, logging
in, or recording which pages were visited in the past).
A web cache (or HTTP cache) is for temporary storage
(caching) of web documents, such as HTML pages and images, to
reduce bandwidth usage, server load, and perceived lag. A web
cache system stores copies of documents passing through it;
subsequent requests may be satisfied from the cache if certain
conditions are met.
What is significance of last modified date in http?
The last modified date for the requested object (in "HTTP-date"
format as defined by RFC 7231) specifies the date on which the
object is modified so that fresh copy of information can be
delivered to user as and when requested.
What is get and post method in http?
GET - Requests data from a specified resource
POST - Submits data to be processed to a specified resource

ASSIGNMENT NO. 5
What is DHCP protocol?
The Dynamic Host Configuration Protocol (DHCP) is a
standardized network protocol used on Internet Protocol (IP)
networks for dynamically distributing network configuration

parameters, such as IP addresses for interfaces and services.


With DHCP, computers request IP addresses and networking
parameters automatically from a DHCP server, reducing the need
for a network administrator or a user to configure these settings
manually.
What is underlying transport layer protocol?
TCP/IP protocol
Its port number.
Port 0
What is BOOTP protocol?
The Bootstrap Protocol (BOOTP) is a computer
networking protocol used in Internet Protocol networks to
automatically assign an IP address to network devices from a
configuration server. The BOOTP was originally defined in RFC
951
What is DORA protocol in DHTP or how client and server
are communicating to each other in DHCP through
various processes?
DORA Discovery , Offer , Request , Acknowledgement
Read which message is sent from client to server and from server
to client
What is address pool and lease time in DHCP?
Pool is range of IP address configures in DHCP scope after
exclusion of certain statically assigned IP address to a device.
When a network device requests an IP address and
a DHCP server responds with one, it's called an address lease.
Like a lease on a car or apartment, a DHCP IP address lease has
a fixed duration, and before it expires the lease must be
renewed.
What are advantages of DHCP?
There is no need to manually configure each client with an IP
address.
You don't need to keep a record of the IP addresses that you
have assigned.
You can automatically assign a new IP address if you move a
client to a different subnet.

You can release the IP address of a computer that is offline and


reassign the address to another computer.
Address duplication is eliminated as DHCP automatically tracks IP
address assignments.
The DHCP server can detect unauthorised DHCP servers on the
network.
ASSIGNMENT NO. 6
What is LAN and what is its range?
A local area network (LAN) is a group of computers and
associated devices that share a common communications line or
wireless link to a server.
Typically, a LAN encompasses computers and peripherals
connected to a server within a small geographic area such as an
office building or home.
Its range is 10 to 1000 metres.
What is SAN and how can it be connected to LAN for
storage?
A storage area network (SAN) is a network which provides access
to consolidated, block level data storage.
SANs are primarily used to enhance storage devices, such
as disk arrays, tape libraries, and optical jukeboxes, accessible to
servers so that the devices appear to the operating
system as locally attached devices.
Ethernet connectivity is generally used on the greater local area
network (LAN), its use in the SAN has been limited by its
relatively slow bandwidth. Traditional Ethernet ports support
10/100 Mbps -- far slower than FC.
Explain various SAN components.
File Server
Storage Area Network Fibre
Host Bus Adaptors
Fibre Cabling
Tape Library
Management Software

Group :
Assignment no 1: grab the image from Camera and apply the edge
detection algorithm
What do u mean by edge detection in image processing and
what is its importance (its applications )
What is sobel operator?
How its equations are used for edge detection of the given image
Assignment no 3: WAN (RIP)
What is RIP
What are interior and exterior routing protocols
Versions of RIP and its comparison
Various times in RIP
What is packet tracer
Which version of packet tracer is used?
With what extension simulation of RIP is stored?
What is variable length subnet mask and Classless inter domain
routing 3-19
Assignment no 4: Linux networking commands emulation
What are various networking commands
Explain PING, TRACEROUTE, NETSTAT,IFCONFIG,NSLOOKUP
commands
Assignment no 5: FTP/Telnet program using socket programming
What is FTP?
Its stateless or stateful protocol
Compare between HTTP and FTP
Port numbers of all protocols(FTP data-20 ,control-21 ,TFTP
69,DNS 53,DHCP 0,TELNET 23,SMTP 25,POP3 110 ,IMAP 143)
What are various status code in FTP
200-suc
300-redirection
400-invalid/ prob with req

500-prob with server


FTP needs authentication or not for its functioning?
Assignment no 6: Write TFTP program using socket programming
What is TFTP and its port number
Does it need authentication?
Comparison between FTP and TFTP
Explanation of output and program
Assignment no 7: Create TCP/IP packet using standard TCP/IP
includes files
Socket programming in detail
TCP/UDP socket primitives/operations
Types of socket : RAW, STREAM,DATAGRAM socket
Difference between bind and connect
Assignment no 8: congestion control algorithm
What is congestion control
Difference between congestion control and flow
Various approaches to avoid it
Slow start and congestion window explanation
Explanation of program and its output
Assignment no 10: Implementation of Concurrent Proxy server
program
What do u mean by concurrent programming
What is proxy server
Advantages of proxy server
Explanation of program and its output
Types of proxy
Normal (Regular/Caching) Proxy:
A regular caching proxy server is a server which listens on
a separate port (e.g. 3128) and the clients (browsers) are
configured to send requests for connectivity to that port.
So the proxy server receives the request, fetches the
content and stores a copy for future use.
So next time when another client requests for the same
webpage the proxy server just replies to the request with

the content in its cache thus improving the overall requestreplyspeed.


Transparent Proxy:
A transparent proxy server is also a caching server but the
server is configured in such a way that it eliminates the
client side (browser side) configuration.
Typically the proxy server resides on the gateway and
intercepts the WWW requests (port 80, 443 etc.) from the
clients and fetches the content for the first time and
subsequently replies from its local cache.
The name Transparent is due to the fact that the client
doesn't know that there is a proxy server which mediates
their requests. Transparent proxy servers are mostly used
in big corporate organizations where the client side
configuration is not easy (due to the number of clients).
This type of server is also used in ISP's to reduce the load
on
the
bandwidth
usage.
Reverse Proxy:
A reverse proxy is totally different in its usage because it is
used for the benefit of the web server rather than its
clients.
Basically a reverse proxy is on the web server end which
will cache all the static answers from the web server and
reply to the clients from its cache to reduce the load on the
web server. This type of setup is also known as Web Server
Acceleration.
Assignment no 11: Implementation of Multithreaded web server.
What is multithreaded server
A threaded web server is one that handles each request with a
new thread, as opposed to handling each request with a new
process.
Multi-threading is more complex than concurrency with
processes, so there's an increased risk of the web server

crashing if one of its modules isn't working correctly. Also, if it


does crash, it's more likely to crash all of the threads (ie. all of
the requests being handled at the time). However, multithreaded servers consume less memory and are generally faster.
What is web server
A web server is an information technology that processes
requests via HTTP, the basic network protocol used to distribute
information on the World Wide Web.
The primary function of a web server is to store, process and
deliver web pages to clients.
The communication between client and server takes place using
the Hypertext Transfer Protocol (HTTP).
Pages delivered are most frequently HTML documents, which
may include images, style sheets and scripts in addition to text
content.
A user agent, commonly a web browser or web crawler, initiates
communication by making a request for a specific resource using
HTTP and the server responds with the content of that resource
or an error message if unable to do so.
The resource is typically a real file on the server's secondary
storage, but this is not necessarily the case and depends on how
the web server is implemented.
Assignment no 13: Implementation of sliding window protocol
What is sliding window protocol
A sliding window protocol is a feature of packet-based data
transmission protocols.
Sliding window protocols are used where reliable in-order
delivery of packets is required, such as in the Data Link
Layer (OSI model) as well as in the Transmission Control
Protocol (TCP).
Why sliding window protocol is used
In any communication protocol based on automatic repeat
request for error control, the receiver must acknowledge
received packets. If the transmitter does not receive an
acknowledgment within a reasonable time, it re-sends the data.
A transmitter that does not hear an acknowledgment cannot

know if the receiver actually received the packet; it may be that


it was lost or damaged in transmission.
If error detection reveals corruption, the packet will be ignored by
the receiver and no acknowledgement will be sent.
Similarly, the receiver is usually uncertain about whether its
acknowledgements are being received.
It may be that an acknowledgment was sent, but was lost or
corrupted in the transmission medium.
In this case, the receiver must acknowledge the retransmission
to prevent the data being continually resent, but must otherwise
ignore it.
Types of sliding window protocol
Go back to n
Selective repeat
Why sliding window protocol is used
Difference between selective repeat and go back to N protocol
GO BACK AND ARQ

SELECTIVE REPEAT ARQ

Go Back N ARQ is inefficient for noisy link.

Selective repeat ARQ is efficient for noisy


links

Only the frame which is lost or corrupted is The corrupted frame with all the frames
resent

numbered after that are resent

Go Back N ARQ is less complicated than Selective Repeat ARQ is complicated


Selective repeat ARQ.
Needs sorting mechanism as the receiver side Doesnt need sorting mechanism as the
as the frames received will be out of order

receiver side as the frames received will be in


order

Go Back N ARQ Sender Window Size is 2^ .in Sender and receiver Window Size is 2^ (m(m)-1 and receiver window size is 1.

1)

Go-Back-N ARQ is a specific instance of the Selective Repeat ARQ / Selective Reject ARQ

automatic repeat request (ARQ) protocol, in is a specific instance of the Automatic Repeatwhich the sending process continues to send Request

(ARQ)

protocol

used

for

a number of frames specified by a window communications. It may be used as a protocol


size

even

without

receiving

an for the delivery and acknowledgement of

acknowledgement (ACK) packet from the message units, or it may be used as a protocol
receiver. It is a special case of the general for the delivery of subdivided message subsliding window protocol with the transmit units.
window size of N and receive window size
of 1.

Assignment no 14: Implementation of distance vector routing


algorithm
Types of routing algorithm
Static (nonadaptive ) which does not adapts to the changes in
network and routing table entry will be fixed for long time and
entry will be made at the time of network formation
Dynamic (adaptive) which adapts to the changes in network
and makes the necessary changes in the routing table for
efficient routing and dynamic
Static and dynamic routing
Static routing manually sets up the optimal paths between the
source and the destination computers.
On the other hand, the dynamic routing uses dynamic protocols
to update the routing table and to find the optimal path between
the source and the destination computers.
The routers that use the static routing algorithm do not have
any controlling mechanism if any faults in the routing paths.
The dynamic routing algorithms are used in the dynamic routers
and these routers can sense a faulty router in the network.
Also, the dynamic router eliminates the faulty router and finds
out another possible optimal path from the source to the
destination.
The static routing is suitable for very small networks and they
cannot be used in large networks. As against this, dynamic

routing is used for larger networks.


Interior and exterior gateway routing protocols
INTERIOR GATEWAY PROTOCOLS Interior Gateway Protocols
(IGPs) handle routing within an Autonomous System (one routing
domain).
In plain English, IGP's figure out how to get from place to place
between the routers you own. These dynamic routing protocols
keep track of paths used to move data from one end system to
another inside a network or set of networks that you
administrate (all of the networks you manage combined are
usually just one Autonomous System).
IGP's are how you get all the networks communicating with each
other.
IGP's fall into two categories:
Distance Vector Protocols Routing Information Protocol
(RIP)
Interior Gateway Routing Protocol (IGRP)
Link State Protocols Open Shortest Path First (OSPF)
Intermediate System to Intermediate System (IS-IS)
EXTERIOR GATEWAY PROTOCOLS
To get from place to place outside your network(s), i.e. on the
Internet, you must use an Exterior Gateway Protocol.
Exterior Gateway Protocols handle routing outside an
Autonomous System and get you from your network, through
your Internet provider's network and onto any other network.
BGP is used by companies with more than one Internet provider
to allow them to have redundancy and load balancing of their
data transported to and from the Internet.
Examples of an EGP: Border Gateway Protocol (BGP) Exterior
Gateway Protocol (Replaced by BGP)

Disadvantages of distance vector routing algorithm


Count to infinity : explain
Explanation of link state routing algorithm steps
There are five steps in link state algorithm

1.) Discover your neighbors and learn their addresses.


2.) Measure the cost (delay) to each neighbor.
3.) Construct a packet containing all this information
4.) Send this packet to all other routers.
5.) Compute the shortest path to every other router.
What is autonomous system
Within the Internet, an autonomous system (AS) is a collection
of connected Internet Protocol (IP) routing prefixes under the
control of one or more network operators on behalf of a single
administrative entity or domain that presents a common, clearly
defined routing policy to the Internet.

Assignment no 17: program to generate a Sign wave of


Programmable frequency and capture samples at programmable
frequency
Formula/expression for sine wave generation
Explain frequency, sampling frequency, amplitude etc
What is the classification of signals
Types of signal
Definition of signal
Operations on signals with their expressions
Scaling
Advancing
Shifting
Addition
Subtraction
Reversing
Delay

DSPA:

Explain ADC to DAC conversion


Steps in ADC conversion
Sampling
Quantization
Encoding
What is DT system and its properties
LTI system and its properties
What is convolution and its methods
Steps to calculate convolution
Which method to calculate convolution is fast
What is impulse response
How many number of samples we are getting as output of
convolution
What is circular convolution
What if Fourier transform
Expression of DFT and IDFT
What is FFT and its explanation
Twiddle factor and its properties
How to represent a signal in time domain
What is Z transform
What is ROC , poles and zeros
What is IIR and FIR filter and their comparison
Building blocks of DSP and its explanation
Difference between DIT and DIF

CN
Unit

1: Application Layer:
Layers of OSI and TCP/IP reference model
DNS function explanation
DNS types of queries: iterative and recursive query explanation
How many root level DNS available, What is its function
What is the function of authoritative and top level DNS
Port number of DNS
What is PUSH and PULL protocol
What is MTA

Port number of SMTP,POP3, IMAP protocol


Difference between POP3 and IMAP
What is TELNET and its function with port number.
Which protocol uses UDP as a underlying transport layer protocol

Unit 2: Transport Layer:


Difference between connection oriented and connectionless
services
Difference between TCP and UDP
Difference between circuit switching and packet switching
Where Real time transport protocol is used
What are the applications of Stream control transmission protocol
(SCTP),
What is Quality of services (QoS)
What are various parameters to ensure QoS
Differentiate between Differentiated services and Integrated
services
Explanation of RSVP protocol
Explanation of leaky and token bucket algorithm and its
comparison , which is more efficient and why ?
Unit

3: Network Layer:
Protocol header of IPV4 and IPV6
Length of addresses in IPV4 and IPV6
Write any IPV4 and IPV6 address
Write any MAC address
Who gives the IP address to ur machine
What is ISP
Who is the ISP for ur college
Which topology is used to establish network of ur dept/college
IP address is unique locally or globally?
MAC address is unique locally or globally? Explain
What is unicast , broadcast and multicast address and process?
What is subnetting and supernetting
What are the default subnet masks of each IP address class?
What is query message and error messages in ICMPV4, ICMPV6

What is ARP and RARP


In ARP and RARP
In ARP and RARP request message is broadcast and reply
message is unicast . WHY?
Unit

4: Basic Concepts in Wireless LAN:


What are various IEEE standards in networking for
WiFi, Blutooth, ZigBee, WiMAX
Explain Wireless application protocols in details
Explain WAP protocol stack and its layers
What is WML ? for what it is used .

You might also like