CS610 important topics
LAYERING AND TCP/IP
PROTOCOLS:
ORIGINAL CLASSES OF IP
ADDRESSES
DOTTED DECIMAL NOTATION
CIDR NOTATION
UDP vs TCP
DATAGRAM TRANSMISSION AND
FRAMES
IPV6 DATAGRAM FORMAT
TYPES OF MESSAGES
PACKET LOSS AND
RETRANSMISSION pg 125-127
NAT concept
CLASSIFICATION OF
INTERNET ROUTING PROTOCOLS
Internet Routing
Protocols.
Multicast
Routing
===facebook
FINAL-TERM IMPORTANT
QUESTIONS
computer network where TCP is used for flow control of the transmission. Which mechanism is used by TCP for controlling the flow of data?
Q: Suppose the first four bits
as 1111 of an IP address then to which class this IP address belongs?
Q: Question: Assume a multinational organization has a very large computer network across the country. A network engineer is given a task to configure a protocol to manage routing
information in this network. In this scenario which protocol will be
configured? Briefly explain the proper reasons.
Q: Make a Network of 7 computers.
Which is the best suitable topology if demand is that the
network must be centrally manageable? Justify it with
4 possible advantages.
Q: Make a Network of 7 computers. Which is best
suitable topology if demand is that the
the network must be centrally
manageable? Justify it with 4 possible advantages. Today my cs610 paper all subjective plus objectives from
Waqar files
Most
of the questions from
EGP and IGP
Autonomous system
Message
errors
NAT
columns match krny thy OSPF sy related.
OSPF graph??
Features ka table tha jis m btana tha k lookup, closed
computation, data exchange, kn kn sy ha?
1111 which class to
belong?
Ping protocol sy related
ik question,
Internet routing k types,
FINAL-TERM IMPORTANT
QUESTIONS
computer network where TCP is used for flow control of the transmission. Which mechanism is used by TCP for controlling the flow of data?
Q: Suppose the first four bits
as 1111 of an IP address then to which class this IP address belongs?
Q: Question: Assume a multinational organization has a very large computer network across the country. A network engineer is given a task to configure a protocol to manage routing
information in this network. In this scenario which protocol will be configured?
Briefly explain the proper reasons.
Today my cs610 paper all
subjective plus objectives from Waqar files
Most of the questions
from
EGP and IGP
Autonomous system
Message errors
NAT
Today cs 610 coulmns
match krny thy OSPF sy related .
OSPF graph??
Features ka table tha jis
m btana tha k lookup,closed computation, data exchange, kn kn sy ha?
1111 which class to
belong?
Ping protocol sy related
ik question,
Internet routing k types,
Between two computers connect to WAN through which device??
Final Term Current
Paper SPRING 2020
*MCQ's 90% from past
paper*
Short Questions:
1.Diffrent b/w
Destination and source?
2.In ARS the protocol
address independent of the hardware address which technique uses?
3.A company ABC has
LAN network contact to gather with bridge how can send the message.
5.Types of address
masks.
4.Short note on MTU
6. OSPF kidr use hota.
Long question
1.IPv6 mai sy 8 shorts
aye thy 2 question thy same.
1. Size of IPv6
2. Feature of IPv6
3. Multiple headers
Iss trha k aur thy
easy thy
2. Aik question tha
1. What is dynamic
routs.
2. Can have routs are
router?
3. Whose largest
routs?
4. Whose smallest
routs?
3. LAN mai kis trha
bridge aur switch ka use kiya jata.
=====2020
mcqs
past papers se repeat hoye hen
If a
data exceeds MTU, which technique is best used to transfer data? (5 Marks)
Find
the number of useable host addresses in the block if one of the subnet
addresses is 140.120.84.24/20. (3 Marks)
Different
Multicast Routing Methodologies have their different mechanisms of forwarding
the datagram according to the situation. You are required to write the names of
these multicast routing methodologies and suggest the suitable choice of these
methodologies for the following cases:
When the group
includes few members.
When the
members are scattered. (5 Marks)
Enlist 3 error
message and 2 informational messages by ICMP? (5 Marks)
Reason for different network technologies. (5 Marks)
NAT (Network Address
Translation) and its implementation. (5 Marks)
Which multicast protocol designed for use within the organization? Write its complete name. (3 Marks)
Identify the Ethernet frame regarding given fields. CRC,
Frame type, flag, preamble, sequence no. (3 Mark)
How TCP is a Reliable
transfer protocol, proves with its function. (5 Marks)
How an administrator updates the routing table in routing.
Answer the Question regarding
Static routing and dynamic routing
Current
Paper CS610. (17-02-2020)
Delay
ki types
Layer
names.
GP and EGP b/w
ICMP ki types
Topology k name btna tha
aik paragraph tha or advantages btna thy.
Subnetting 255.255.254.0?
Multicast k complete
name?
UDP or TCP kis ki type name mention Kray?
mcqs past sy thy maaz or waqar files sy
In
order to understand 255.255.254.0 subnetting, we first look at the usual
255.255.255.0 subnet mask.
If
you use 255.255.255.0 (on binary each 255 is 11111111 and each 0 is 00000000),
it means that you decided to use the last 8 bits of the address for your
devices. 8 binary bits gives you 256 decimal, so you can have 256 addresses for
the devices on your network ranging from 192.168.0.0 to 192.168.0.255. In real
life, you can't use the first and the last so you are in this case limited to
254 addresses.
Now,
if you change the network mask to 255.255.254.0, then you will have 9 bits for
your devices (254 is 11111110). 9 binary bits translated to decimal gives you
512, so you can have 512 addresses for your devices ranging from 192.168.0.0 to
192.168.1.255. Just like before you can't use the first and the last so you are
in this case limited to 510 addresses.
=====2019
Cs610 at 5am
Mostly MCQs from past papers
Long question
Ak column tha us ko correct kar ka likhna tha
Unicaste and multicaste
Protocol and greedy algorithm
Find subnet and addresses
Mostly supposed waly questions ty but tough nhe
ty...
CS610
current paper 26 aug 2019 (11 am)
15%
MCQs from past papers.
1)In
the context of address resolution, given the names of technique which is only
possible to apply in a case where protocol addresses are assigned from a compact
range(3 marks)
2)Consider
a large scale computer network where updates or changes are made manually in
the routing table.you are required to mention the name of the intarect routing a technique which is being used in this organization,(3 marks)
3)Which
type of protocol is used to exchange internal routing information in
autonomous group.(3 marks)
4)Write
two IPv6 headers that control information and encapsulate at very large like
IPv4.You are required to mention the size of the base header of IPv6.(3 marks)
5)Which the technique is adopted by computers connected to Ethernet to reduce the likelihood
of the sequence of collisions.Can this network be totally protected from
collision?? (3 marks)
6)Write any four characteristics of
UDP (5 marks)
7)Define
the terms:(5 marks)
a)Table
lookup
b)Closed
form computation
c)Data
exchange
etna e yadd h
CS610
current paper 26 Aug 2019 (11 am) 15% MCQs from past papers.
1)In
the context of address resolution, given the names of technique which is only
possible to apply in the case where protocol addresses are assigned from a
compact range(3 marks)
2)Consider
a large scale computer network where updates or changes are made manually in
the routing table.you are required to mention the name of the intrect routing a technique which is being used in this organization,(3 marks)
3)Which
type of protocol is used to exchange internal routing information in an
autonomous group.(3 marks)
4)Write
two IPv6 headers that control information and encapsulate at very large like
IPv4.You are required to mention the size of the base header of IPv6.(3 marks)
5)Which the technique is adopted by computers connected to Ethernet to reduce the likelihood
of the sequence of collisions. Can this network be totally protected from
collision?? (3 marks)
6)Write any four characteristics of
UDP (5 marks)
7)Define the terms:(5 marks) a)Table
=====2017
CS610
(26-2-2017)
MCQs 90% from Moazz file.
The subjective part as under.. and see The ZIP file for MCQs
Subjective almost were from Past papers but not from Moazz file.
see the attached file for subjective
52:
Suppose a manufacturing organization has a network of 400 computers. The network engineer is given a task to track a problem whenever it happens in the network,
to achieve this goal he prefers ICMP protocol. You are required to enlist any
three types of error messages and two types of informational messages which are
identified by Internet Control Message Protocol (ICMP).
51: Consider the IP address: 178.200.127.5 and the corresponding subnet mask
255.255.255.0, find out the followings:
a.
The number of bits used for subnetting
b. Total number of useable hosts in the subnet
c. Write the CIDR notation for the above scenario
50:
In the real-world, usually private IP addresses interact with the global internet. In
this situation, discuss which type of device will be used to handle the
traffic? Explain the working of the device with proper steps.
49: Suppose an organization has a computer network where multicasting is
required. There are different types of multicast routing protocols that can be
used in this scenario. You are required to enlist five multicast routing
protocols with complete names.
48: How IP multicast group becomes anonymous? Describe any two ways.
47: Consider an organization where a large-scale network is deployed having
both the static and dynamic environments for routing. How a network
administrator can handle these static and dynamic routings when some update or
change is required?
46: If an application selects a datagram size greater than Maximum Transmission
Unit along the path to the destination then which technique will be used for
successful data transfer? Explain briefly.
45: Is it possible that a single host B can be connected with two different
ISPs? Support your answer by giving a reason?
44: Why there is the need for Autonomous Systems on the Internet?
43: Identify IPv4 datagram header fields from the following.
• Source IP Address
• Sequence Number
• Acknowledgement Number
• Time to live
42: Suppose a medical company has
computer network where TCP is used for flow control of the transmission. Which mechanism is used by TCP for controlling the flow of data?
41: Suppose the first four bits as 1111 of an IP address then to which class this The IP address belongs?
my today paper
1.perfrmnce maintenance
2 list guidelines for successful project management
3. explain SQA
4 different b/w ASAP AND ALAP
5 EXPLAIN project software engineering
6 explain SLOC
7 explain WBS
8. soft project schedule
40
MCQs (Many from moaaz files and handouts)
10
Questions
5
Questions were of 3 marks and 5 questions were of 5 marks
(3
marks questions)
1.
What is Vertical Error?
2. if
a data exceeds MTU, which technique is best used to transfer data?
3. IP the address was given and host addresses were needed to be identified.
128.146.124.0/20
4.
Select the data in header files out of the following 1. Acknowledgment no 2.
Sequence number 3. Flags 4. Code bits 5. Fragment offset
5.
what is an autonomous system?
(5
marks questions)
1.
Which address resolution technique will be used for debugging in a software the company, also write any two tools that use these protocols ((LEC 27 is
important))
2. Write three characteristics of
UDP?
3. VPN
I had
paper today
MCQ
was easy 60% from Moaz file
1:
about data flow
2: TCP reliability
3:
Nat table example is given in handouts
4: IP
mask conversion 2 questions
5: 2 scenarios were given
No comments:
Post a Comment