SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
No. of Printed Pages : 3                          CS-69

(NI   BACHELOR IN COMPUTER APPLICATIONS
cNi
co
-1.
C
                     Term-End Examination
                             June, 2011
              CS-69 : TCP/IP PROGRAMMING

  Time : 2 hours                          Maximum Marks : 60
  Note : Question number one is compulsory. Answer any three
         questions from the rest.


  1.    (a) What are the reserved bit patterns of the       2
             first bytes for class A and class B
             respectively.
        (b) In a class A subnet, the IP address of one      2
              of the hosts and the mask are as given
              below :
              IP address :      17. 34. 12.    57
              Mask       .
                         •      255. 255. 224. 0
        (c)   What is the subnet address ? How many         2
              octets are there in Ethernet hardware
              address ?
        (d)   Explain the process of TCP correction         6
              termination through illustration.


  CS-69                          1                   P.T.O.
(e) Write a client and a server program in         8
          C- language to establish a TCP connection
          between a client and a server. Once a
          connection is established, the client
          program sends a string to the server. The
          server checks whether the string is a
          palindrome or not and send the reply to
          the client as YES or NO. Also, explain the
          logic of a program.
     (f) Write the syntax and purpose of the           5
          following unix commands.
           (i)    Head
           (ii)   Who
           (iii) Ping
           (iv) IP config
           (v)    Hostname
     (g) What is ARP ? Explain its functionality.       5
          How does it differ from RARP.

2.   Differentiate between the followings :            10
     (a)   Class B and Class C address
     (b)   Hubs and switches
     (c)   Unicast and broadcast method of message
           transmission.
     (d)   Stateful and stateless programs


CS-69                        2
3.   (a) How is FTP different from other application       4
          layer protocols ? List and explain at least
          three attributes to be specified prior to data
          transfer using FTP.
     (b) Write the syntax and meaning of two                6
          functions, one which converts data from the
          host format to the network format and the
         second from the network format to the data
          format respectively.


4.   Explain the purpose and importance of the             10
     following IP and TCP header fields.
     (a)   Header checksum
     (b)   Type of service
     (c)   Sequence number
     (d)   Urgent pointer
     (e)   Padding


5.   (a) Explain the following terms and meaning            6
          and syntax of system call.
           (i)    Socket descriptor
           (ii)   Passive socket
           (iii) inet ( )
     (b) What is the purpose of MIME protocol ?            4
          Explain.




CS-69                         3

Más contenido relacionado

La actualidad más candente

Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Cemal Ardil
 
8086 arch instns
8086 arch instns8086 arch instns
8086 arch instns
Ram Babu
 
8086 labmanual
8086 labmanual8086 labmanual
8086 labmanual
iravi9
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
Dsunte Wilson
 
Computer network (16)
Computer network (16)Computer network (16)
Computer network (16)
NYversity
 
Efficient JIT to 32-bit Arches
Efficient JIT to 32-bit ArchesEfficient JIT to 32-bit Arches
Efficient JIT to 32-bit Arches
Netronome
 

La actualidad más candente (20)

A study to Design and comparison of Full Adder using Various Techniques
A study to Design and comparison of Full Adder using Various TechniquesA study to Design and comparison of Full Adder using Various Techniques
A study to Design and comparison of Full Adder using Various Techniques
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
FP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL QFP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL Q
 
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
 
8086 arch instns
8086 arch instns8086 arch instns
8086 arch instns
 
PLNOG 7: Piotr Jabłoński - Jak wygląda mój pakiet?
PLNOG 7: Piotr Jabłoński - Jak wygląda mój pakiet?PLNOG 7: Piotr Jabłoński - Jak wygląda mój pakiet?
PLNOG 7: Piotr Jabłoński - Jak wygląda mój pakiet?
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz student
 
400-101 Updated Question Answer
400-101 Updated Question Answer400-101 Updated Question Answer
400-101 Updated Question Answer
 
Cs 63
Cs 63Cs 63
Cs 63
 
Unit 2 assembly language programming
Unit 2   assembly language programmingUnit 2   assembly language programming
Unit 2 assembly language programming
 
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comFEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
 
8086 labmanual
8086 labmanual8086 labmanual
8086 labmanual
 
400-101 Cisco Real Exam Questions
400-101 Cisco Real Exam Questions400-101 Cisco Real Exam Questions
400-101 Cisco Real Exam Questions
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
 
III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014
III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014
III EEE-CS2363-Computer-Networks-model-question-paper-set-1-for-may-june-2014
 
Computer network (16)
Computer network (16)Computer network (16)
Computer network (16)
 
2015 comnet pci planning rs
2015 comnet pci planning rs2015 comnet pci planning rs
2015 comnet pci planning rs
 
Networking assignment 2
Networking assignment 2Networking assignment 2
Networking assignment 2
 
Efficient JIT to 32-bit Arches
Efficient JIT to 32-bit ArchesEfficient JIT to 32-bit Arches
Efficient JIT to 32-bit Arches
 

Destacado (8)

Cs 68
Cs 68Cs 68
Cs 68
 
Cs 74
Cs 74Cs 74
Cs 74
 
Cs 70
Cs 70Cs 70
Cs 70
 
Cs 611
Cs 611Cs 611
Cs 611
 
achievements
achievementsachievements
achievements
 
Cs 71
Cs 71Cs 71
Cs 71
 
Eco 2
Eco 2Eco 2
Eco 2
 
Cs 62
Cs 62Cs 62
Cs 62
 

Similar a Cs 69

Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
sangusajjan
 
1102159.334 CP ALB Internal - Page 1 of 7 - .docx
1102159.334 CP       ALB Internal  - Page 1 of  7 - .docx1102159.334 CP       ALB Internal  - Page 1 of  7 - .docx
1102159.334 CP ALB Internal - Page 1 of 7 - .docx
hyacinthshackley2629
 
Ict networking exercise short questions answer
Ict networking exercise short questions answerIct networking exercise short questions answer
Ict networking exercise short questions answer
Gary Tsang
 
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxIFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
scuttsginette
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
guest3f9c6b
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.
igede tirtanata
 

Similar a Cs 69 (20)

Bcs 061
Bcs 061Bcs 061
Bcs 061
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 
1102159.334 CP ALB Internal - Page 1 of 7 - .docx
1102159.334 CP       ALB Internal  - Page 1 of  7 - .docx1102159.334 CP       ALB Internal  - Page 1 of  7 - .docx
1102159.334 CP ALB Internal - Page 1 of 7 - .docx
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptx
 
Connecting network
Connecting networkConnecting network
Connecting network
 
Connecting Networks
Connecting NetworksConnecting Networks
Connecting Networks
 
Ict networking exercise short questions answer
Ict networking exercise short questions answerIct networking exercise short questions answer
Ict networking exercise short questions answer
 
Network programming
Network programmingNetwork programming
Network programming
 
Network (IP)
Network (IP)Network (IP)
Network (IP)
 
Eurec 724
Eurec 724Eurec 724
Eurec 724
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxIFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
 
Connecting network
Connecting networkConnecting network
Connecting network
 
Connecting Network
Connecting NetworkConnecting Network
Connecting Network
 
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
 
17429 computer network
17429 computer network17429 computer network
17429 computer network
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.
 
On tap ccent
On tap ccentOn tap ccent
On tap ccent
 

Más de Web Developer (20)

Cs 612
Cs 612Cs 612
Cs 612
 
Cs 611 (p)s4
Cs 611 (p)s4Cs 611 (p)s4
Cs 611 (p)s4
 
Cs 611 (p)s3
Cs 611 (p)s3Cs 611 (p)s3
Cs 611 (p)s3
 
Cs 611 (p)s2
Cs 611 (p)s2Cs 611 (p)s2
Cs 611 (p)s2
 
Cs 611 (p)s1
Cs 611 (p)s1Cs 611 (p)s1
Cs 611 (p)s1
 
Cs 610
Cs 610Cs 610
Cs 610
 
Cs 601
Cs 601Cs 601
Cs 601
 
Cs 74 (p)s8
Cs 74 (p)s8Cs 74 (p)s8
Cs 74 (p)s8
 
Cs 74 (p)s7
Cs 74 (p)s7Cs 74 (p)s7
Cs 74 (p)s7
 
Cs 74 (p)s6
Cs 74 (p)s6Cs 74 (p)s6
Cs 74 (p)s6
 
Cs 74 (p)s5
Cs 74 (p)s5Cs 74 (p)s5
Cs 74 (p)s5
 
Cs 74 (p)s4
Cs 74 (p)s4Cs 74 (p)s4
Cs 74 (p)s4
 
Cs 74 (p)s3
Cs 74 (p)s3Cs 74 (p)s3
Cs 74 (p)s3
 
Cs 74 (p)s2
Cs 74 (p)s2Cs 74 (p)s2
Cs 74 (p)s2
 
Cs 74 (p)s1
Cs 74 (p)s1Cs 74 (p)s1
Cs 74 (p)s1
 
Cs 73
Cs 73Cs 73
Cs 73
 
Cs 72 (p)s8
Cs 72 (p)s8Cs 72 (p)s8
Cs 72 (p)s8
 
Cs 72 (p)s5
Cs 72 (p)s5Cs 72 (p)s5
Cs 72 (p)s5
 
Cs 72 (p)s4
Cs 72 (p)s4Cs 72 (p)s4
Cs 72 (p)s4
 
Cs 72 (p)s2
Cs 72 (p)s2Cs 72 (p)s2
Cs 72 (p)s2
 

Último

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Cs 69

  • 1. No. of Printed Pages : 3 CS-69 (NI BACHELOR IN COMPUTER APPLICATIONS cNi co -1. C Term-End Examination June, 2011 CS-69 : TCP/IP PROGRAMMING Time : 2 hours Maximum Marks : 60 Note : Question number one is compulsory. Answer any three questions from the rest. 1. (a) What are the reserved bit patterns of the 2 first bytes for class A and class B respectively. (b) In a class A subnet, the IP address of one 2 of the hosts and the mask are as given below : IP address : 17. 34. 12. 57 Mask . • 255. 255. 224. 0 (c) What is the subnet address ? How many 2 octets are there in Ethernet hardware address ? (d) Explain the process of TCP correction 6 termination through illustration. CS-69 1 P.T.O.
  • 2. (e) Write a client and a server program in 8 C- language to establish a TCP connection between a client and a server. Once a connection is established, the client program sends a string to the server. The server checks whether the string is a palindrome or not and send the reply to the client as YES or NO. Also, explain the logic of a program. (f) Write the syntax and purpose of the 5 following unix commands. (i) Head (ii) Who (iii) Ping (iv) IP config (v) Hostname (g) What is ARP ? Explain its functionality. 5 How does it differ from RARP. 2. Differentiate between the followings : 10 (a) Class B and Class C address (b) Hubs and switches (c) Unicast and broadcast method of message transmission. (d) Stateful and stateless programs CS-69 2
  • 3. 3. (a) How is FTP different from other application 4 layer protocols ? List and explain at least three attributes to be specified prior to data transfer using FTP. (b) Write the syntax and meaning of two 6 functions, one which converts data from the host format to the network format and the second from the network format to the data format respectively. 4. Explain the purpose and importance of the 10 following IP and TCP header fields. (a) Header checksum (b) Type of service (c) Sequence number (d) Urgent pointer (e) Padding 5. (a) Explain the following terms and meaning 6 and syntax of system call. (i) Socket descriptor (ii) Passive socket (iii) inet ( ) (b) What is the purpose of MIME protocol ? 4 Explain. CS-69 3