CS610 Subject important topics

CS610 important topics


LAYERING AND TCP/IP PROTOCOLS:

ORIGINAL CLASSES OF IP ADDRESSES

DOTTED DECIMAL NOTATION

CIDR NOTATION

UDP vs TCP

DATAGRAM TRANSMISSION AND FRAMES

IPV6 DATAGRAM FORMAT

TYPES OF MESSAGES

PACKET LOSS AND RETRANSMISSION pg 125-127

NAT concept

CLASSIFICATION OF INTERNET ROUTING PROTOCOLS

Internet Routing Protocols.

Multicast Routing

===facebook

FINAL-TERM IMPORTANT QUESTIONS

computer network where TCP is used for flow control of the transmission. Which mechanism is used by TCP for controlling the flow of data?

Q: Suppose the first four bits as 1111 of an IP address then to which class this IP address belongs?

Q: Question: Assume a multinational organization has a very large computer network across the country. A network engineer is given a task to configure a protocol to manage routing information in this network. In this scenario which protocol will be configured? Briefly explain the proper reasons.

Q: Make a Network of 7 computers. Which is the best suitable topology if demand is that the

network must be centrally manageable? Justify it with 4 possible advantages.

Q: Make a Network of 7 computers. Which is best suitable topology if demand is that the

the network must be centrally manageable? Justify it with 4 possible advantages. Today my cs610 paper all subjective plus objectives from Waqar files

Most of the questions from

EGP and IGP

Autonomous system

Message errors

NAT

columns match krny thy OSPF sy related.

OSPF graph??

Features ka table tha jis m btana tha k lookup, closed computation, data exchange, kn kn sy ha?

1111 which class to belong?

Ping protocol sy related ik question,

Internet routing k types,

Between two computers connect to WAN through which device??


FINAL-TERM IMPORTANT QUESTIONS

computer network where TCP is used for flow control of the transmission. Which mechanism is used by TCP for controlling the flow of data?

Q: Suppose the first four bits as 1111 of an IP address then to which class this IP address belongs?

Q: Question: Assume a multinational organization has a very large computer network across the country. A network engineer is given a task to configure a protocol to manage routing information in this network. In this scenario which protocol will be configured? Briefly explain the proper reasons.

Today my cs610 paper all subjective plus objectives from Waqar files

Most of the questions from

EGP and IGP

Autonomous system

Message errors

NAT

Today cs 610 coulmns match krny thy OSPF sy related .

OSPF graph??

Features ka table tha jis m btana tha k lookup,closed computation, data exchange, kn kn sy ha?

1111 which class to belong?

Ping protocol sy related ik question,

Internet routing k types,

Between two computers connect to WAN through which device??

 

Final Term Current Paper SPRING 2020

*MCQ's 90% from past paper*

Short Questions:

1.Diffrent b/w Destination and source?

2.In ARS the protocol address independent of the hardware address which technique uses?

3.A company ABC has LAN network contact to gather with bridge how can send the message.

5.Types of address masks.

4.Short note on MTU

6. OSPF kidr use hota.

Long question

1.IPv6 mai sy 8 shorts aye thy 2 question thy same.

1. Size of IPv6

2. Feature of IPv6

3. Multiple headers

Iss trha k aur thy easy thy

2. Aik question tha

1. What is dynamic routs.

2. Can have routs are router?

3. Whose largest routs?

4. Whose smallest routs?

3. LAN mai kis trha bridge aur switch ka use kiya jata.

 

=====2020

mcqs past papers se repeat hoye hen

If a data exceeds MTU, which technique is best used to transfer data? (5 Marks)

Find the number of useable host addresses in the block if one of the subnet addresses is 140.120.84.24/20. (3 Marks)

Different Multicast Routing Methodologies have their different mechanisms of forwarding the datagram according to the situation. You are required to write the names of these multicast routing methodologies and suggest the suitable choice of these methodologies for the following cases:

When the group includes few members.

When the members are scattered. (5 Marks)

Enlist 3 error message and 2 informational messages by ICMP? (5 Marks)

Reason for different network technologies. (5 Marks)

NAT (Network Address Translation) and its implementation. (5 Marks)

Which multicast protocol designed for use within the organization? Write its complete name. (3 Marks)

Identify the Ethernet frame regarding given fields. CRC, Frame type, flag, preamble, sequence no. (3 Mark)

How TCP is a Reliable transfer protocol, proves with its function. (5 Marks)

How an administrator updates the routing table in routing.

Answer the Question regarding Static routing and dynamic routing

 

Current Paper CS610. (17-02-2020)

 

Delay ki types

Layer names.

GP and EGP b/w

ICMP ki types

Topology k name btna tha aik paragraph tha or advantages btna thy.

 

Subnetting 255.255.254.0?

 

Multicast k complete name?

 

UDP or TCP kis ki type name mention Kray?

 

mcqs past sy thy maaz or waqar files sy

 

In order to understand 255.255.254.0 subnetting, we first look at the usual 255.255.255.0 subnet mask.

If you use 255.255.255.0 (on binary each 255 is 11111111 and each 0 is 00000000), it means that you decided to use the last 8 bits of the address for your devices. 8 binary bits gives you 256 decimal, so you can have 256 addresses for the devices on your network ranging from 192.168.0.0 to 192.168.0.255. In real life, you can't use the first and the last so you are in this case limited to 254 addresses.

Now, if you change the network mask to 255.255.254.0, then you will have 9 bits for your devices (254 is 11111110). 9 binary bits translated to decimal gives you 512, so you can have 512 addresses for your devices ranging from 192.168.0.0 to 192.168.1.255. Just like before you can't use the first and the last so you are in this case limited to 510 addresses.

 

 

=====2019

Cs610 at 5am
Mostly MCQs from past papers
Long question
Ak column tha us ko correct kar ka likhna tha
Unicaste and multicaste
Protocol and greedy algorithm
Find subnet and addresses
Mostly supposed waly questions ty but tough nhe ty...

CS610 current paper 26 aug 2019 (11 am)

15% MCQs from past papers.

1)In the context of address resolution, given the names of technique which is only possible to apply in a case where protocol addresses are assigned from a compact range(3 marks)

2)Consider a large scale computer network where updates or changes are made manually in the routing table.you are required to mention the name of the intarect routing a technique which is being used in this organization,(3 marks)

3)Which type of protocol is used to exchange internal routing information in autonomous group.(3 marks)

4)Write two IPv6 headers that control information and encapsulate at very large like IPv4.You are required to mention the size of the base header of IPv6.(3 marks)

5)Which the technique is adopted by computers connected to Ethernet to reduce the likelihood of the sequence of collisions.Can this network be totally protected from collision?? (3 marks)

6)Write any four characteristics of UDP (5 marks)

7)Define the terms:(5 marks)

a)Table lookup

b)Closed form computation

c)Data exchange

etna e yadd h

CS610 current paper 26 Aug 2019 (11 am) 15% MCQs from past papers.

1)In the context of address resolution, given the names of technique which is only possible to apply in the case where protocol addresses are assigned from a compact range(3 marks)

2)Consider a large scale computer network where updates or changes are made manually in the routing table.you are required to mention the name of the intrect routing a technique which is being used in this organization,(3 marks)

3)Which type of protocol is used to exchange internal routing information in an autonomous group.(3 marks)

4)Write two IPv6 headers that control information and encapsulate at very large like IPv4.You are required to mention the size of the base header of IPv6.(3 marks)

 5)Which the technique is adopted by computers connected to Ethernet to reduce the likelihood of the sequence of collisions. Can this network be totally protected from collision?? (3 marks)

 6)Write any four characteristics of UDP (5 marks)

7)Define the terms:(5 marks) a)Table

=====2017

CS610 (26-2-2017)
MCQs 90% from Moazz file.
The subjective part as under.. and see The ZIP file for MCQs
Subjective almost were from Past papers but not from Moazz file. 
see the attached file for subjective

52: Suppose a manufacturing organization has a network of 400 computers. The network engineer is given a task to track a problem whenever it happens in the network, to achieve this goal he prefers ICMP protocol. You are required to enlist any three types of error messages and two types of informational messages which are identified by Internet Control Message Protocol (ICMP).
51: Consider the IP address: 178.200.127.5 and the corresponding subnet mask 255.255.255.0, find out the followings:

a. The number of bits used for subnetting 
b. Total number of useable hosts in the subnet 
c. Write the CIDR notation for the above scenario

50: In the real-world, usually private IP addresses interact with the global internet. In this situation, discuss which type of device will be used to handle the traffic? Explain the working of the device with proper steps.
49: Suppose an organization has a computer network where multicasting is required. There are different types of multicast routing protocols that can be used in this scenario. You are required to enlist five multicast routing protocols with complete names.
48: How IP multicast group becomes anonymous? Describe any two ways.
47: Consider an organization where a large-scale network is deployed having both the static and dynamic environments for routing. How a network administrator can handle these static and dynamic routings when some update or change is required? 
46: If an application selects a datagram size greater than Maximum Transmission Unit along the path to the destination then which technique will be used for successful data transfer? Explain briefly.
45: Is it possible that a single host B can be connected with two different ISPs? Support your answer by giving a reason?
44: Why there is the need for Autonomous Systems on the Internet?
43: Identify IPv4 datagram header fields from the following.
• Source IP Address
• Sequence Number
• Acknowledgement Number 
• Time to live

42: Suppose a medical company has computer network where TCP is used for flow control of the transmission. Which mechanism is used by TCP for controlling the flow of data?
41: Suppose the first four bits as 1111 of an IP address then to which class this The IP address belongs?

my today paper 

1.perfrmnce maintenance

2 list guidelines for successful project management 

3. explain SQA

4 different b/w ASAP AND ALAP

5 EXPLAIN project software engineering

6 explain SLOC

7 explain WBS

8. soft project schedule

40 MCQs (Many from moaaz files and handouts) 

10 Questions

5 Questions were of 3 marks and 5 questions were of 5 marks 

(3 marks questions)

1. What is Vertical Error?

2. if a data exceeds MTU, which technique is best used to transfer data?

3. IP the address was given and host addresses were needed to be identified. 128.146.124.0/20

4. Select the data in header files out of the following 1. Acknowledgment no 2. Sequence number 3. Flags 4. Code bits 5. Fragment offset

5. what is an autonomous system?

(5 marks questions)

1. Which address resolution technique will be used for debugging in a software the company, also write any two tools that use these protocols ((LEC 27 is important))

2. Write three characteristics of UDP?

3. VPN

I had paper today

MCQ was easy  60% from Moaz file

1: about data flow

2: TCP reliability

3: Nat table example is given in handouts

4: IP mask conversion 2 questions

5: 2 scenarios were given 

 


No comments:

Post a Comment