VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following...
Transcript of VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following...
VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur – 603 203.
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
QUESTION BANK
I SEMESTER
CP7101 – DESIGN AND MANAGEMENT OF COMPUTER NETWORK
Regulation – 2013
Academic Year 2017 – 2018
Prepared by
Mr. KARTHIKEYAN.L, Assistant Professor/CSE
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur – 603203.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Year & Semester : I Year/I Semester
Subject Code : CP7101
Subject Name : Design and Management of Computer Networks
Degree & Branch : M.E CSE
Staff in charge : Ms L.Karthiekeyan
S.No QUESTIONS COMPETENCE LEVEL
UNIT -1 INTRODUCTION TO NETWORK MANAGEMENT 9
Overview of Analysis, Architecture and Design Process-System Methodology, Service methodology, Service Description - Service
characteristics - Performance Characteristics- Network supportability - Requirement analysis – User Requirements – Application
Requirements – Device Requirements – Network Requirements – Other Requirements- Requirement specification and map.
2 MARK QUESTIONS
1. Define network analysis. Give its purpose Remember BTL 1
2. Draw the information flow between network analysis, architecture Evaluate BTL 5
and design.
3. What are hierarchy and interconnectivity? What its uses? Create BTL 6
4. Give the list of importance of network analysis. Analyze BTL2
5. Demonstrate the content delivery network Apply BTL3
6. What are the performance characteristics? Create BTL6
7. Give the different types of Requirements Understand BTL2
8. Define network services Analyze BTL4
9. Point out Audit Trials Analyze BTL4
10. What are the two major tasks to ensure supportability? Understand BTL2
11. Show the List of types of applications, Apply BTL3
12. What are the device types? Remember BTL1
13. Define Network Metrics Remember BTL1
14. What is level of funding? Analyze BTL4
15. Distinguish between Service Request and Service Requirements. Understand BTL2
16. What are the user requirements? Remember BTL1
17. What are the four categories of network management? Remember BTL1
18. Draw the template for requirements specification. Evaluate BTL5
19. Demonstrate the enterprises Requirements? Apply BTL3
20. What are the factors affect the post implementation costs? Remember BTL1
PART- B
1 i) Give an example for device descriptions and discuss it based on Understand BTL2
the categories of devices
ii) Classify and discuss in detail about the four categories of
network
2 i) Discuss in detail about the roles of specification and map in Understand BTL2
the establishment of network architecture
ii) Enumerate on the various application groups identified based
on the network requirement analysis process.
3 i) List out service characteristic and discuss about performance Remember BTL1
characteristics.
ii) Based on what all perspectives the requirements differs?
Explain for any two perspectives.
4 i) In what way network requirements differ from other software Apply BTL3
project requirements.
ii) Explain in details about gathering requirements for any
network project of your own interest.
5 Explain in detail about the overview of Analysis, Architecture and Analyze BTL4
Design
6 Explain Network hierarchy and diversity in detail with suitable Analyze BTL4
diagram
7 Discuss system methodology and service description in detail? Understand BTL2
8 Demonstrate various performance characteristics of a network Apply BTL3
system in detail?
9 Describe User requirements in detail Remember BTL1
10 Explain Application requirements in detail Analyze BTL4
11 Describe Device requirements in detail? Remember BTL1
12 Describe the Network requirements in detail? Remember BTL1
13 Write generalize in detail about Requirement Specification and Create BTL6
Mapping?
14 Explain Network supportability in detail? Evaluate BTL5
15 MARK QUESTIONS
1 Develop problem statements, objectives and requirements for VPN.
Develop an analysis, architecture and design solely around VPN
deployment.
2 What is a CDN? Show how a CDN uses interconnectivity to provide
better performance characteristics to its users.
3 Which of the following applications require best-effort, guaranteed
or predictable service? Give reasons for your choice.
a. High-quality voice calls
b. VOIP calls
c. File transfers via FTP
d. Audio file downloads
e. Commercial video on demand services
4 Show how performance boundaries and thresholds could
be used in the following scenarios.
f. An application has a service requirement for round trip
delay to be less than 100ms. If delay is greater than
100ms notify the network administrator.
g. User requires capacity of upto 512 kb/s but may not
exceed 1.5 Mb/s. you want to keep track of how much
time the user’s capacity is between 512kb/s and 1.5 Mb/s.
UNIT -2 REQUIREMENTS ANALYSIS
Requirement Analysis Process – Gathering and Listing Requirements- Developing service metrics – Characterizing behavior –
Developing RMA requirements – Developing delay Requirements - Developing capacity Requirements - Developing supplemental
performance Requirements –Requirements mapping – Developing the requirements specification
2 MARK QUESTIONS
1 What are the types of Network project? Remember BTL1
2 Draw the requirement analysis process Remember BTL1
3 Order the successful communication techniques Analyze BTL4
4 What is test bed? Give its uses? Understand BTL2
5 What are the service metrics for RMA? Remember BTL1
6 Write generalize about the measurement tools? Create BTL6
7 Give the goals of Characterizing behavior Analyze BTL2
8 Order the types of behavior Create BTL6
9 Compare the types of threshold Evaluate BTL5
10 Compare Uptime and Downtime Evaluate BTL5
11 What are the types of applications Remember BTL1
12 Give the tasks should be consider before measuring uptime Understand BTL2
13 What are the general threshold and limit for delay Remember BTL1
14 Show the List of sources of delay Apply BTL3
15 Show the List the types of data rates Apply BTL3
16 Order the categories of supplemental performance requirements Analyze BTL4
17 Show the reliability block diagram Apply BTL3
18 Point out the need of Questionnaire in Requirements specification Understand BTL4
19 At the time of requirement analysis what is the need for downtime Remember BTL1
20 What are the uses of Requirement mapping? Understand BTL2
PART- B
1 i) Give in details about any two ways to make an uptime Understand BTL2
requirements of 99.999% more precise.
ii) Develop a questionnaire to gather requirements from users,
management and staffs, if yours customers is a hospital
management that wants to upgrade its LAN
2 i) Consider a network project where you can’t talk to users or Analyze BTL4
staffs what resources will you use to gather user, application,
device and network requirements
ii) Elaborate on the development of delay and capacity
requirement
3 i) With neat diagram explain requirement analysis process Remember BTL1
ii) How to develop metric based service provider? Explain in
detail about developing service metric.
4 Describe in detail about supplemental performance requirments. Remember BTL1
5 Discuss in detail about the Gathering and listing requirements. Understand BTL2
6 Explain service metrics development in detail Evaluate BTL5
7 Discuss and illustrate characterizing behavior in detail Apply BTL3
8 Describe the method of developing RMA requirements in detail Apply BTL2
9 Describe the method of developing Delay requirements in detail Create BTL6
10 Tell the details about Requirement analysis process Remember BTL1
11 Explain the method of developing supplemental performance Analyze BTL4
requirements in detail
12 Tell the details about the method of developing capacity Remember BTL1
requirements in detail
13 Explain in detail requirements specification Analyze BTL4
14 Describe the complete requirements mapping in detail Apply BTL3
15 MARK QUESTIONS
1 Develop a questionnaire to gather requirements from users, hospital
management and staff. What kind of questions would you ask to
better understand their environment.
2 Consider a network project where you cannot talk to users or staff.
What resources can you use to gather user, application, device and
network requirements? Briefly outline a method for gathering and
deriving requirements in the absence of user/staff involvement.
3 Develop a network for a telemetry processing application that consist of an automated guidance-control system that will analyze telemetry data from airplanes and a motion visualization system
used by controllers at workstations. Develop lower and upper delay bounds for this application and show them on a graph]
4 Describe how you would test performance both on a test bed and on
the existing network. List any equipment, software and network
devices you would use b. Assume the following choices i) Increasing the number of single precision lanes to 16
ii)Increasing the number of SIMD processor to 15
iii)Adding the cache that will effectively reduce memory latency by
40% which will increase the instruction issue rate to 0.95 what is speedup in throughput for each of these improvements?
UNIT -3
FLOW ANALYSIS
Individual and Composite Flows – Critical Flows - Identifying and developing flows – Datasources and sinks – Flow
models- Flow prioritization – Flow specification algorithms – Example Applications of Flow Analysis
2 MARK QUESTIONS
1 Show the types of Flows? Apply BTL3
2 Analyze the common flow characteristics? List it. Analyze BTL4
3 What is critical flow? Remember BTL1
4 List the processes for identifying and developing flows? Remember BTL1
5 Discuss Flow aggregation point? Understand BTL2
6 Discuss the uses of developing a profile? Understand BTL2
7 Draw and Pointout the consolidating flows using flow aggregation Analyze BTL4
point?
8 Define data source? Understand BTL2
9 Analyze data sinks? Analyze BTL4
10 Draw the example diagram for data source and sink? Create BTL6
11 What is meant by flow models? Remember BTL1
12 List the types of flow models? Remember BTL1
13 What are the uses of peer to peer flow models? Understand BTL2
14 Give Complete definition of Flow prioritization? Apply BTL3
15 Classify the three categories of Flow specification? Apply BTL3
16 Define flow specification? Remember BTL1
17 What are the three categories of Flow specification? Remember BTL1
18 Draw the flow models for flow type one? Create BTL6
19 Compare capacity plan and service plan? Evaluate BTL5
20 Select and write the four types of flows analysis? Evaluate BTL5
13 MARK QUESTIONS
1 i) Prepare the reasons to care about network flows in routing Create BTL6
ii) Discuss about Netflow and flow reporting
2 How to prioritize flow? Explain with flow specification algorithm. Remember BTL1
3 i) Discuss a flow model for real/near time flow. How would you Understand BTL2
characteristic the flow for his model?
ii) What is flow prioritization? Elaborate on any one of the flow
specification
4 Consider a transaction-processing application, authorizing credit card Evaluate BTL5
Transactions between a company retail store and its head
quarters.Give the most likely directions for the flow described by
each flow model
5 Explain in detail about identifying and developing flows? Analyze BTL4
6 Describe data sources and sinks in detail? Remember BTL1
7 Give the explanation about the Flow models? Understand BTL2
8 Describe the complete Flow specification and Flowspec algorithm in Apply BTL3
detail?
9 Identify the details about critical flows? Remember BTL1
10 Explain the Flow prioritization in detail? Analyze BTL4
11 Discuss the four types of flows in flow analysis in detail? Understand BTL2
12 Discuss the four types of flows in flow analysis in detail? Understand BTL2
13 Give explanation about performance envelope from requirement Apply BTL3
analysis?
14 What is flow map? Explain the flow map in detail? Analyze BTL4
15 MARK QUESTIONS
1 Which of the following devices are data sinks or data sources?
a. A storage device receiving streaming video from a camera
b. A video editing unit using video from the storage device
in (a)
c. A web server and its clients
d. A storage disk farm
2 Which flow models apply to each set of flows described below
a. Users on the internet accessing the same web server
b. Forty workstations processing batch jobs overnight
managed by a central mainframe.
c. Email use across the internet
d. A trans action processing application authorizing credit
card transaction between a company’s retail stores and it’s
headquarters
3 Develop a flow model for real time/ nearly real time flows.
How would you characterize the flows for this model? What
are likely data sources and sinks? Apply your model to a
video conferencing application
4 Develop a network for a company’s online transaction processing
(OLTP) who use mainframe that has several terminals connected to
it. Now it is moving to a hierarchical client-server network where
there will be multiple regional database servers each acting in a
client-server fashion and updating each other’s regions via DB
manager.
UNIT-4
NETWORK ARCHITECTURE
Architecture and design – Component Architectures – Reference Architecture – Architecture Models – ystem and Network
Architecture – Addressing and Routing Architecture – Addressing and Routing Fundamentals – Addressing Mechanisms –
Addressing Strategies – Routing Strategies – Network Management Architecture – Network Management Mechanisms -
Performance Architecture – Performance Mechanisms – Security and Privacy Architecture – Planning security and privacy
Mechanisms 2 MARK QUESTIONS:
1 Distinguish between Network Architecture and Network Design Remember BTL1
2 What do you meant by Flow based architectural model? Understand BTL2
3 List the mechanism for network management Create BTL6
4 What are the mechanisms considered for network security Remember BTL1
5 Tabulate the Dependencies between Performance Mechanisms Remember BTL1
6 Point out Reference Architecture? Analyze BTL4
7 Define Topological Model? Apply BTL3
8 Differentiate between network Functions and Network Analyze BTL4
Mechanisms
9 Define Service Provider Architectural model Remember BTL1
10 Complete the definition of end-to-end architectural model? Apply BTL3
11 Discover the uses of Architectural Models Apply BTL3
12 Define. Sub-netting and Super netting Remember BTL1
13 List the recommendations for choosing and applying routing Evaluate BTL5
protocols for a network.
14 List the Network Management Hierarchy Apply BTL3
15 Point out the FCAPS model? Analyze BTL4
16 What do you mean by Threat Analysis? Evaluate BTL5
17 What is Route Aggregation? Create BTL6
18 Define In-band and Out-band Management Understand BTL2
19 Distinguish between Network Security and Network Privacy Understand BTL2
20 What are Tunneling and Encapsulation? Remember BTL1
13 MARK QUESTIONS
1 With neat sketches explain various component architecture of a Create BTL6
network.
2 Give details the process of developing Architectural Models for a Understand BTL2
network system
3 Explain the Flow based Architectural Model with a neat sketch Evaluate BTL5
4 How architectural models combined to provide a comprehensive Remember BTL2
architectural view of the network? Explain
5 Explain the Addressing and Routing mechanism used in a network. Remember BTL1
6 Explain the process of applying the Addressing & the Routing Analyze BTL4
Strategies in a network.
7 Provide explanation about the Network Management Apply BTL3
Mechanisms.
8 Explain the various architectural considerations for network Remember BTL1
management process
9 Discuss in detail about the Performance Mechanisms used in a Remember BTL1
network.
10 Explain the Security and Privacy architecture with neat sketches. Understand BTL2
11 i) How does the addition of out of band management between Apply BTL3
the corporate NOC and remote sites potentially impact the
security of the network?
ii) List four types of problems that the performance architecture
addresses. Give examples of each type of problems
12 i) What are the layers of network management? Give an Analyze BTL4
example of management at each layer and explain how it is
management.
ii) Outline the development of DMZ that could be applied at
each site where connections are made to other autonomous
systems. What type of device would be used at these sites?
13 i) Why high level message are encapsulated inside the low Remember BTL 1
level messages?Explain
ii) Explain three way handshake protocols in security
mechanisms.
14 Discuss about client/server program that uses the socket interface Analyze BTL4
to send messages over TCP connection
15 MARK QUESTIONS
1 Give examples of external relationships between each of the
following component architectures: addressing/routing, network
management, performance, and security.
2 For each of the following address/prefix length pairs, give its
natural mask, subnet and range of networks or subnets permitted
by the mask. Also describe any problems and limitations with the
address/mask pairs, if any.
a. 129.99.0.0/16
b. 136.178.0.0/22
c. 198.9.9.0/28
d. 192.92.240.0/20
e. 192.92.243/20
3 How much management data would be generated in a centralized
management approach, assuming data collection of nine SNMP
counters on all routers and ICMP ping polling of all devices
(network and user), with a polling interval of 5 minutes? Each
SNMP counter and ping generates 64 bytes of data.
4 4. For the queuing mechanisms shown below, give an example of
how each would be used within a network. What problem(s) is
each mechanism solving?
a. First in first out (FIFO)
b. Class-based queuing (CBQ)
c. Weighted fair queuing (WFQ)
d. Random early detect (RED)
e. Weighted RED (WRED)
UNIT-5
NETWORK DESIGN
Design Concepts – Design Process - Network Layout – Design Traceability – Design Metrics –
Logical Network Design – Topology Design – Bridging, Switching and Routing Protocols- Physical Network
Design – Selecting Technologies and Devices for Campus and Enterprise Networks – Optimizing Network Design.
2 MARK QUESTIONS:
1 List the characteristics of structured network design process Remember BTL1
2 Why is it important to use a structured, systematic method Remember BTL1
for designing networks? What problems can occur if such
methods are not used?
3 Why is it important to explore divisional and group Analyze BTL4
structures of an organization when starting a network
design project?
4 Define Scalability Understand BTL2
5 What are some challenges designers faces when designing for Remember BTL1
scalability?
6 Distinguish between Throughput and Bandwidth Analyze BTL4
7 What is Runt frame? Apply BTL3
8 What is Reconnaissance Attacks? Apply BTL3
9 Define design metrics Evaluate BTL5
10 In a full-mesh topology, if N is the number of routers/switches Apply BTL3
in the network, what is the total number of links in the
Network
11 Define physical security. List facets of physical security Understand BTL2
12 What are the benefits of having hierarchy in addressing and Remember BTL1
routing models?
13 What is the difference between a security plan and a security Remember BTL1
policy? How do these two relate to each other?
14 What are the pros and cons of out-of-band network management Create BTL6
versus in-band network management?
15 Give most important criteria for selecting internetworking Analyze BTL4
devices? Justify.
16 Why are QoS features often necessary in LAN switches and Remember BTL1
routers?
17 What are the most important criteria for selecting a WAN service Understand BTL2
provider?
18 List any four typical goals for a network design testing project Evaluate BTL5
19 What is regression testing? Why is regression testing usually an Create BTL6
important part of a network testing project?
20 How does multicast routing differ from unicast routing? Understand BTL2
1 Compare and contrast the top-down network design method with Create BTL6
the PDIOO method
2 With neat sketches explain the network design process Analyze BTL4
3 Explain various network topology design models with suitable Evaluate BTL5
Examples
4 Discuss in detail about Virtual Private Networks (VPN) Understand BTL2
5 Discuss the network security related to network topologies Analyze BTL4
6 Compare and contrast distance-vector and link-state routing. If Analyze BTL4
you were designing a new routing protocol, which would you
use and why?
7 Explain the concept of Network Security Design in detail Apply BTL3
8 List and briefly describe four tradeoffs that often must be made Understand BTL2
in order to achieve good network security
9 With a neat sketch explain the architecture of Network Remember BTL1
Management.
10 Explain the process of Writing and Implementing a Test Plan for Apply BTL3
Your Network Design 11 i) In routing discuss about split connection approach? Remember BTL1
ii) How channel mapping can be established for enterprise network?
12 i) In routing Architecture bring the importance of bridges and Understand BTL2
LAN
ii) List and explain the limitations of bridges
13 i) What are network blueprint,network diagrams and Remember BTL1
component plan? Why would a network design have sets of
each of these?
ii) Enumerate in details about the various switching and
routing protocol available for routing data in the network.
14 i) What are the steps to be followed for adhoc design Remember BTL1
decision?How do such decisitions reduce the quality of the
resulting design?
ii) Compare and contrast logical network design with physical
network design.
15 MARK QUESTIONS
1 What are ad hoc design decisions? How do such decisions reduce
the quality of the resulting design? Give an example of an ad hoc
design decision.
2 What are network blueprints, network diagrams, and component
plans? Why would a network design have sets of each of these?
3 Enumerate in detail about the various switching and routing
protocols available for routing data in the network
4 1. Compare and contrast logical network design with physical
network design with an example.