Featured

18CS52 CN Repeated Questions and Solutions



Published
Hello Viewer, i have reduced my speed while explaining, therefore set speed as 1.5x for the best experience!

0:00 Exam Paper Pattern
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Module 1
Principles of network application
1:44 Client-server vs P2P
3:59 Transport services provided by internet

Web and HTTP
4:50 HTTP message format
9:10 Client requests objects through web cache
10:43 HTTP presistent/non-persistent

FTP
12:07 FTP commands and replies

Electronic mail
13:19 Short note on SMTP

DNS
14:43 Services provided by DNS
15:35 Interaction of DNS servers

P2P architecture
17:14 Explain Peer-to-Peer architecture

Socket programming
20:14 Socket programming: UDP and TCP
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Module 2
Definitions
24:36 Multiplexing vs demultiplexing
25:35 UDP vs TCP

RDT
26:01 UDP segment structure
26:50 RDT versions (1.0, 2.0, 2.1, 2.2, 3.0) FSM and sequence diagram

TCP
39:39 TCP segment structure

Congestion
40:45 Principles and mechanisms of congestion control

Problem
45:23 Rtt, Dtt and Time out
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Module 3
Router
48:36 Architecture of RDT
50:49 Switching techniques

IPv4 vs IPv6
52:05 IPv6 vs IPv4 format of datagram
54:17 IPv4 addressing vs IPv6 addressing
55:10 IPv4 - IPv6 conversion

Routing
55:49 LS algorithm and example
1:01:43 DV algorithm and example

Hierarchial routing
1:08:39 Intra AS protocols (RIP and OSPF)
1:11:21 Inter AS protocols (BGP)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Module 4
1:13:35 Elements of network security, threats, methods
1:15:20 What are the elements of network security?
1:16:47 What are the threats to network security?
1:21:10 Techniques to protect network
1:24:29 DES algorithm+problem
1:30:21 AES algoirthm
1:31:47 RSA algorithm+problem
1:37:18 DH algorithm+problem
1:39:40 SHA algorithm and firewalls
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Module 5
1:41:33 Overview of topics
1:42:57 Properties of Audio and Video
1:44:00 Categories of streaming stored video
1:46:46 CDN
1:51:01 Limitations of best-effort IP service
1:52:08 Removing jitter from audio
1:53:01 Two loss anticpation schemes
1:55:17 RTP and SIP
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Questions and Solutions PDF link:
https://drive.google.com/file/d/1cIsrxoyM_WBWGyOe1vtAqAGZo_kc-w-B/view?usp=drivesdk

PYQs/IMP questions sheet:
https://docs.google.com/document/d/1YIoypaGMqtXWPzzXFp1KByS971DaVR2ZlOg78Fcnh3k/edit?usp=sharing

If i have helped you in anyway, please do like and subscribe. Thank you :)
Category
Audio
Be the first to comment