VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following...

15
VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK I SEMESTER CP7101 DESIGN AND MANAGEMENT OF COMPUTER NETWORK Regulation 2013 Academic Year 2017 2018 Prepared by Mr. KARTHIKEYAN.L, Assistant Professor/CSE

Transcript of VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following...

Page 1: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur – 603 203.

DEPARTMENT OF

COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK

I SEMESTER

CP7101 – DESIGN AND MANAGEMENT OF COMPUTER NETWORK

Regulation – 2013

Academic Year 2017 – 2018

Prepared by

Mr. KARTHIKEYAN.L, Assistant Professor/CSE

Page 2: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur – 603203.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Year & Semester : I Year/I Semester

Subject Code : CP7101

Subject Name : Design and Management of Computer Networks

Degree & Branch : M.E CSE

Staff in charge : Ms L.Karthiekeyan

S.No QUESTIONS COMPETENCE LEVEL

UNIT -1 INTRODUCTION TO NETWORK MANAGEMENT 9

Overview of Analysis, Architecture and Design Process-System Methodology, Service methodology, Service Description - Service

characteristics - Performance Characteristics- Network supportability - Requirement analysis – User Requirements – Application

Requirements – Device Requirements – Network Requirements – Other Requirements- Requirement specification and map.

2 MARK QUESTIONS

1. Define network analysis. Give its purpose Remember BTL 1

2. Draw the information flow between network analysis, architecture Evaluate BTL 5

and design.

3. What are hierarchy and interconnectivity? What its uses? Create BTL 6

4. Give the list of importance of network analysis. Analyze BTL2

5. Demonstrate the content delivery network Apply BTL3

6. What are the performance characteristics? Create BTL6

7. Give the different types of Requirements Understand BTL2

8. Define network services Analyze BTL4

9. Point out Audit Trials Analyze BTL4

10. What are the two major tasks to ensure supportability? Understand BTL2

11. Show the List of types of applications, Apply BTL3

12. What are the device types? Remember BTL1

Page 3: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

13. Define Network Metrics Remember BTL1

14. What is level of funding? Analyze BTL4

15. Distinguish between Service Request and Service Requirements. Understand BTL2

16. What are the user requirements? Remember BTL1

17. What are the four categories of network management? Remember BTL1

18. Draw the template for requirements specification. Evaluate BTL5

19. Demonstrate the enterprises Requirements? Apply BTL3

20. What are the factors affect the post implementation costs? Remember BTL1

PART- B

1 i) Give an example for device descriptions and discuss it based on Understand BTL2

the categories of devices

ii) Classify and discuss in detail about the four categories of

network

2 i) Discuss in detail about the roles of specification and map in Understand BTL2

the establishment of network architecture

ii) Enumerate on the various application groups identified based

on the network requirement analysis process.

3 i) List out service characteristic and discuss about performance Remember BTL1

characteristics.

ii) Based on what all perspectives the requirements differs?

Explain for any two perspectives.

4 i) In what way network requirements differ from other software Apply BTL3

project requirements.

ii) Explain in details about gathering requirements for any

network project of your own interest.

5 Explain in detail about the overview of Analysis, Architecture and Analyze BTL4

Design

6 Explain Network hierarchy and diversity in detail with suitable Analyze BTL4

diagram

7 Discuss system methodology and service description in detail? Understand BTL2

8 Demonstrate various performance characteristics of a network Apply BTL3

system in detail?

9 Describe User requirements in detail Remember BTL1

10 Explain Application requirements in detail Analyze BTL4

Page 4: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

11 Describe Device requirements in detail? Remember BTL1

12 Describe the Network requirements in detail? Remember BTL1

13 Write generalize in detail about Requirement Specification and Create BTL6

Mapping?

14 Explain Network supportability in detail? Evaluate BTL5

15 MARK QUESTIONS

1 Develop problem statements, objectives and requirements for VPN.

Develop an analysis, architecture and design solely around VPN

deployment.

2 What is a CDN? Show how a CDN uses interconnectivity to provide

better performance characteristics to its users.

3 Which of the following applications require best-effort, guaranteed

or predictable service? Give reasons for your choice.

a. High-quality voice calls

b. VOIP calls

c. File transfers via FTP

d. Audio file downloads

e. Commercial video on demand services

4 Show how performance boundaries and thresholds could

be used in the following scenarios.

f. An application has a service requirement for round trip

delay to be less than 100ms. If delay is greater than

100ms notify the network administrator.

g. User requires capacity of upto 512 kb/s but may not

exceed 1.5 Mb/s. you want to keep track of how much

Page 5: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

time the user’s capacity is between 512kb/s and 1.5 Mb/s.

UNIT -2 REQUIREMENTS ANALYSIS

Requirement Analysis Process – Gathering and Listing Requirements- Developing service metrics – Characterizing behavior –

Developing RMA requirements – Developing delay Requirements - Developing capacity Requirements - Developing supplemental

performance Requirements –Requirements mapping – Developing the requirements specification

2 MARK QUESTIONS

1 What are the types of Network project? Remember BTL1

2 Draw the requirement analysis process Remember BTL1

3 Order the successful communication techniques Analyze BTL4

4 What is test bed? Give its uses? Understand BTL2

5 What are the service metrics for RMA? Remember BTL1

6 Write generalize about the measurement tools? Create BTL6

7 Give the goals of Characterizing behavior Analyze BTL2

8 Order the types of behavior Create BTL6

9 Compare the types of threshold Evaluate BTL5

10 Compare Uptime and Downtime Evaluate BTL5

11 What are the types of applications Remember BTL1

12 Give the tasks should be consider before measuring uptime Understand BTL2

13 What are the general threshold and limit for delay Remember BTL1

14 Show the List of sources of delay Apply BTL3

15 Show the List the types of data rates Apply BTL3

16 Order the categories of supplemental performance requirements Analyze BTL4

17 Show the reliability block diagram Apply BTL3

18 Point out the need of Questionnaire in Requirements specification Understand BTL4

19 At the time of requirement analysis what is the need for downtime Remember BTL1

Page 6: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

20 What are the uses of Requirement mapping? Understand BTL2

PART- B

1 i) Give in details about any two ways to make an uptime Understand BTL2

requirements of 99.999% more precise.

ii) Develop a questionnaire to gather requirements from users,

management and staffs, if yours customers is a hospital

management that wants to upgrade its LAN

2 i) Consider a network project where you can’t talk to users or Analyze BTL4

staffs what resources will you use to gather user, application,

device and network requirements

ii) Elaborate on the development of delay and capacity

requirement

3 i) With neat diagram explain requirement analysis process Remember BTL1

ii) How to develop metric based service provider? Explain in

detail about developing service metric.

4 Describe in detail about supplemental performance requirments. Remember BTL1

5 Discuss in detail about the Gathering and listing requirements. Understand BTL2

6 Explain service metrics development in detail Evaluate BTL5

7 Discuss and illustrate characterizing behavior in detail Apply BTL3

8 Describe the method of developing RMA requirements in detail Apply BTL2

9 Describe the method of developing Delay requirements in detail Create BTL6

10 Tell the details about Requirement analysis process Remember BTL1

11 Explain the method of developing supplemental performance Analyze BTL4

requirements in detail

12 Tell the details about the method of developing capacity Remember BTL1

requirements in detail

13 Explain in detail requirements specification Analyze BTL4

14 Describe the complete requirements mapping in detail Apply BTL3

15 MARK QUESTIONS

1 Develop a questionnaire to gather requirements from users, hospital

management and staff. What kind of questions would you ask to

better understand their environment.

2 Consider a network project where you cannot talk to users or staff.

What resources can you use to gather user, application, device and

network requirements? Briefly outline a method for gathering and

Page 7: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

deriving requirements in the absence of user/staff involvement.

3 Develop a network for a telemetry processing application that consist of an automated guidance-control system that will analyze telemetry data from airplanes and a motion visualization system

used by controllers at workstations. Develop lower and upper delay bounds for this application and show them on a graph]

4 Describe how you would test performance both on a test bed and on

the existing network. List any equipment, software and network

devices you would use b. Assume the following choices i) Increasing the number of single precision lanes to 16

ii)Increasing the number of SIMD processor to 15

iii)Adding the cache that will effectively reduce memory latency by

40% which will increase the instruction issue rate to 0.95 what is speedup in throughput for each of these improvements?

UNIT -3

FLOW ANALYSIS

Individual and Composite Flows – Critical Flows - Identifying and developing flows – Datasources and sinks – Flow

models- Flow prioritization – Flow specification algorithms – Example Applications of Flow Analysis

2 MARK QUESTIONS

1 Show the types of Flows? Apply BTL3

2 Analyze the common flow characteristics? List it. Analyze BTL4

3 What is critical flow? Remember BTL1

4 List the processes for identifying and developing flows? Remember BTL1

5 Discuss Flow aggregation point? Understand BTL2

6 Discuss the uses of developing a profile? Understand BTL2

7 Draw and Pointout the consolidating flows using flow aggregation Analyze BTL4

point?

8 Define data source? Understand BTL2

9 Analyze data sinks? Analyze BTL4

10 Draw the example diagram for data source and sink? Create BTL6

11 What is meant by flow models? Remember BTL1

12 List the types of flow models? Remember BTL1

Page 8: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

13 What are the uses of peer to peer flow models? Understand BTL2

14 Give Complete definition of Flow prioritization? Apply BTL3

15 Classify the three categories of Flow specification? Apply BTL3

16 Define flow specification? Remember BTL1

17 What are the three categories of Flow specification? Remember BTL1

18 Draw the flow models for flow type one? Create BTL6

19 Compare capacity plan and service plan? Evaluate BTL5

20 Select and write the four types of flows analysis? Evaluate BTL5

13 MARK QUESTIONS

1 i) Prepare the reasons to care about network flows in routing Create BTL6

ii) Discuss about Netflow and flow reporting

2 How to prioritize flow? Explain with flow specification algorithm. Remember BTL1

3 i) Discuss a flow model for real/near time flow. How would you Understand BTL2

characteristic the flow for his model?

ii) What is flow prioritization? Elaborate on any one of the flow

specification

4 Consider a transaction-processing application, authorizing credit card Evaluate BTL5

Transactions between a company retail store and its head

quarters.Give the most likely directions for the flow described by

each flow model

5 Explain in detail about identifying and developing flows? Analyze BTL4

6 Describe data sources and sinks in detail? Remember BTL1

7 Give the explanation about the Flow models? Understand BTL2

8 Describe the complete Flow specification and Flowspec algorithm in Apply BTL3

detail?

9 Identify the details about critical flows? Remember BTL1

10 Explain the Flow prioritization in detail? Analyze BTL4

11 Discuss the four types of flows in flow analysis in detail? Understand BTL2

12 Discuss the four types of flows in flow analysis in detail? Understand BTL2

13 Give explanation about performance envelope from requirement Apply BTL3

analysis?

Page 9: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

14 What is flow map? Explain the flow map in detail? Analyze BTL4

15 MARK QUESTIONS

1 Which of the following devices are data sinks or data sources?

a. A storage device receiving streaming video from a camera

b. A video editing unit using video from the storage device

in (a)

c. A web server and its clients

d. A storage disk farm

2 Which flow models apply to each set of flows described below

a. Users on the internet accessing the same web server

b. Forty workstations processing batch jobs overnight

managed by a central mainframe.

c. Email use across the internet

d. A trans action processing application authorizing credit

card transaction between a company’s retail stores and it’s

headquarters

3 Develop a flow model for real time/ nearly real time flows.

How would you characterize the flows for this model? What

are likely data sources and sinks? Apply your model to a

video conferencing application

4 Develop a network for a company’s online transaction processing

(OLTP) who use mainframe that has several terminals connected to

it. Now it is moving to a hierarchical client-server network where

there will be multiple regional database servers each acting in a

client-server fashion and updating each other’s regions via DB

manager.

Page 10: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

UNIT-4

NETWORK ARCHITECTURE

Architecture and design – Component Architectures – Reference Architecture – Architecture Models – ystem and Network

Architecture – Addressing and Routing Architecture – Addressing and Routing Fundamentals – Addressing Mechanisms –

Addressing Strategies – Routing Strategies – Network Management Architecture – Network Management Mechanisms -

Performance Architecture – Performance Mechanisms – Security and Privacy Architecture – Planning security and privacy

Mechanisms 2 MARK QUESTIONS:

1 Distinguish between Network Architecture and Network Design Remember BTL1

2 What do you meant by Flow based architectural model? Understand BTL2

3 List the mechanism for network management Create BTL6

4 What are the mechanisms considered for network security Remember BTL1

5 Tabulate the Dependencies between Performance Mechanisms Remember BTL1

6 Point out Reference Architecture? Analyze BTL4

7 Define Topological Model? Apply BTL3

8 Differentiate between network Functions and Network Analyze BTL4

Mechanisms

9 Define Service Provider Architectural model Remember BTL1

10 Complete the definition of end-to-end architectural model? Apply BTL3

11 Discover the uses of Architectural Models Apply BTL3

12 Define. Sub-netting and Super netting Remember BTL1

13 List the recommendations for choosing and applying routing Evaluate BTL5

protocols for a network.

14 List the Network Management Hierarchy Apply BTL3

15 Point out the FCAPS model? Analyze BTL4

16 What do you mean by Threat Analysis? Evaluate BTL5

17 What is Route Aggregation? Create BTL6

18 Define In-band and Out-band Management Understand BTL2

19 Distinguish between Network Security and Network Privacy Understand BTL2

Page 11: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

20 What are Tunneling and Encapsulation? Remember BTL1

13 MARK QUESTIONS

1 With neat sketches explain various component architecture of a Create BTL6

network.

2 Give details the process of developing Architectural Models for a Understand BTL2

network system

3 Explain the Flow based Architectural Model with a neat sketch Evaluate BTL5

4 How architectural models combined to provide a comprehensive Remember BTL2

architectural view of the network? Explain

5 Explain the Addressing and Routing mechanism used in a network. Remember BTL1

6 Explain the process of applying the Addressing & the Routing Analyze BTL4

Strategies in a network.

7 Provide explanation about the Network Management Apply BTL3

Mechanisms.

8 Explain the various architectural considerations for network Remember BTL1

management process

9 Discuss in detail about the Performance Mechanisms used in a Remember BTL1

network.

10 Explain the Security and Privacy architecture with neat sketches. Understand BTL2

11 i) How does the addition of out of band management between Apply BTL3

the corporate NOC and remote sites potentially impact the

security of the network?

ii) List four types of problems that the performance architecture

addresses. Give examples of each type of problems

12 i) What are the layers of network management? Give an Analyze BTL4

example of management at each layer and explain how it is

management.

ii) Outline the development of DMZ that could be applied at

each site where connections are made to other autonomous

systems. What type of device would be used at these sites?

13 i) Why high level message are encapsulated inside the low Remember BTL 1

level messages?Explain

ii) Explain three way handshake protocols in security

mechanisms.

14 Discuss about client/server program that uses the socket interface Analyze BTL4

Page 12: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

to send messages over TCP connection

15 MARK QUESTIONS

1 Give examples of external relationships between each of the

following component architectures: addressing/routing, network

management, performance, and security.

2 For each of the following address/prefix length pairs, give its

natural mask, subnet and range of networks or subnets permitted

by the mask. Also describe any problems and limitations with the

address/mask pairs, if any.

a. 129.99.0.0/16

b. 136.178.0.0/22

c. 198.9.9.0/28

d. 192.92.240.0/20

e. 192.92.243/20

3 How much management data would be generated in a centralized

management approach, assuming data collection of nine SNMP

counters on all routers and ICMP ping polling of all devices

(network and user), with a polling interval of 5 minutes? Each

SNMP counter and ping generates 64 bytes of data.

4 4. For the queuing mechanisms shown below, give an example of

how each would be used within a network. What problem(s) is

each mechanism solving?

a. First in first out (FIFO)

b. Class-based queuing (CBQ)

c. Weighted fair queuing (WFQ)

d. Random early detect (RED)

e. Weighted RED (WRED)

Page 13: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

UNIT-5

NETWORK DESIGN

Design Concepts – Design Process - Network Layout – Design Traceability – Design Metrics –

Logical Network Design – Topology Design – Bridging, Switching and Routing Protocols- Physical Network

Design – Selecting Technologies and Devices for Campus and Enterprise Networks – Optimizing Network Design.

2 MARK QUESTIONS:

1 List the characteristics of structured network design process Remember BTL1

2 Why is it important to use a structured, systematic method Remember BTL1

for designing networks? What problems can occur if such

methods are not used?

3 Why is it important to explore divisional and group Analyze BTL4

structures of an organization when starting a network

design project?

4 Define Scalability Understand BTL2

5 What are some challenges designers faces when designing for Remember BTL1

scalability?

6 Distinguish between Throughput and Bandwidth Analyze BTL4

7 What is Runt frame? Apply BTL3

8 What is Reconnaissance Attacks? Apply BTL3

9 Define design metrics Evaluate BTL5

10 In a full-mesh topology, if N is the number of routers/switches Apply BTL3

in the network, what is the total number of links in the

Network

11 Define physical security. List facets of physical security Understand BTL2

Page 14: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

12 What are the benefits of having hierarchy in addressing and Remember BTL1

routing models?

13 What is the difference between a security plan and a security Remember BTL1

policy? How do these two relate to each other?

14 What are the pros and cons of out-of-band network management Create BTL6

versus in-band network management?

15 Give most important criteria for selecting internetworking Analyze BTL4

devices? Justify.

16 Why are QoS features often necessary in LAN switches and Remember BTL1

routers?

17 What are the most important criteria for selecting a WAN service Understand BTL2

provider?

18 List any four typical goals for a network design testing project Evaluate BTL5

19 What is regression testing? Why is regression testing usually an Create BTL6

important part of a network testing project?

20 How does multicast routing differ from unicast routing? Understand BTL2

1 Compare and contrast the top-down network design method with Create BTL6

the PDIOO method

2 With neat sketches explain the network design process Analyze BTL4

3 Explain various network topology design models with suitable Evaluate BTL5

Examples

4 Discuss in detail about Virtual Private Networks (VPN) Understand BTL2

5 Discuss the network security related to network topologies Analyze BTL4

6 Compare and contrast distance-vector and link-state routing. If Analyze BTL4

you were designing a new routing protocol, which would you

use and why?

Page 15: VALLIAMMAI ENGINEERING COLLEGE Semester/CP7101-Design and... · 3 Which of the following applications require best-effort, guaranteed or predictable service? Give reasons for your

7 Explain the concept of Network Security Design in detail Apply BTL3

8 List and briefly describe four tradeoffs that often must be made Understand BTL2

in order to achieve good network security

9 With a neat sketch explain the architecture of Network Remember BTL1

Management.

10 Explain the process of Writing and Implementing a Test Plan for Apply BTL3

Your Network Design 11 i) In routing discuss about split connection approach? Remember BTL1

ii) How channel mapping can be established for enterprise network?

12 i) In routing Architecture bring the importance of bridges and Understand BTL2

LAN

ii) List and explain the limitations of bridges

13 i) What are network blueprint,network diagrams and Remember BTL1

component plan? Why would a network design have sets of

each of these?

ii) Enumerate in details about the various switching and

routing protocol available for routing data in the network.

14 i) What are the steps to be followed for adhoc design Remember BTL1

decision?How do such decisitions reduce the quality of the

resulting design?

ii) Compare and contrast logical network design with physical

network design.

15 MARK QUESTIONS

1 What are ad hoc design decisions? How do such decisions reduce

the quality of the resulting design? Give an example of an ad hoc

design decision.

2 What are network blueprints, network diagrams, and component

plans? Why would a network design have sets of each of these?

3 Enumerate in detail about the various switching and routing

protocols available for routing data in the network

4 1. Compare and contrast logical network design with physical

network design with an example.