COMPUTER NETWORKS - Question Bank

Download :  Click Here to Download


Department of computer science and engineering

COMPUTER NETWORKS

UNIT I

PART A

1. What are the two types of line configuration?
2. What do you mean by error control?
3. Define flow control?
4. What is redundancy?
5. Write short notes on error correction?
6. Mention the types of error correcting methods.
7. What are the steps followed in checksum generator?
8. Define checksum.
9. Write short notes on CRC checker.
10. Write short notes on LRC.
11. List out the available detection methods.
12. Mention the types of errors and define the terms?
13. Distinguish between peer-to-peer relationship and a primary-secondary
relationship.
14. What are the ways to address the framing problem?
15. What are the responsibilities of data link layer?
16. What are the functions of Application layer?
17. Define Bit stuffing.
18. What are the features provided by layering?
19. What are header and trailers and how do they get added and removed?
20. Group the OSI layers by function?
21. What are the two types of parity checks? Define it.
22. Draw a neat diagram of Internet protocol graph.

PART B

1. Explain in detail the error detection and error corrections. (16)
2. With a neat diagram explain in detail about the Network architecture. (16)
3. Discuss in detail about HDLC. (16)
4. (i)What is the difference between Internet architecture and OSI architecture? (8)
(ii) Explain about coaxial cable and fiber optics media for communication. (8)
5. Discuss about the links operated on the physical media in detail. (16)
6. Explain the different approaches of framing in detail. (16)
7. Discuss about different types of Issues in data link layer. (16)
8. (i)Write about channel access on links. (8)
(ii)Explain about FDMA and TDMA in detail. (8)
9. (i) A block of 32 bits has to be transmitted. Discuss how the thirty two bit block
is transmitted to the receiver using Longitudinal Redundancy Check. (4)
(ii) Consider a 32 bit block of data 11100111 11011101 00111001 10101001 that
has to be transmitted. If Longitudinal Redundancy Check is used what is the
transmitted bit stream? (6)
(iii)In the Hamming code, for a data unit of m bits how do you compute the
number of redundant bits ‘r’ needed? (6)

UNIT II

PART A

1. What is CSMA?
2. Explain CSMA/CD
3. Mention some of the physical properties of Ethernet.
4. What is the role of VCI?
5. What do you mean by error control?
6. What are the functions of bridges?
7. What is the size of Ethernet address?
8. What is the advantage of FDDI over a basic token ring?
9. List any two functions which a bridge cannot perform?
10. Mention the function of hub.
11. Mention different random access techniques?
12. List the two types of data frames in FDDI
13. What is the purpose of the NAV?
14. Name the four types of S frames.
15. What is the access method used by wireless LANs?

PART B

1. Explain the CSMA/CD algorthims of Ethernet. (8)
2. Explain in details about the access method and frame format used in Ethernet and
token ring. (16)
3. Name the four basic network topologies and explain them giving all the
relevant features (16)
4. (i) Explain the working of carrier sense multiple access protocol. (3)
( ii) How does a Token Ring LAN operates? Discuss. (6)
(iii) List and briefly discuss the two different basic transmission technologies
that can be used to set up wireless LAN’s. (7)
5. Explain the frame format, operation and ring maintenance feature of IEEE 802.5
MAC protocol. (16)
6. Briefly define key requirements for wireless LANs. (16)
7. Describe the FDDI frame format and explain. (16)
8. Discuss the MAC layer functions of IEEE 802.11. (8)
9. Explain in details the types of bridges. (8)

UNIT III

PART – A

1. List the difference between circuit switching and Packet switching.
2. What are the different kinds of Multicast Routing?
3. Discuss the class field in IP address.
4. What is meant by circuit switching?
5. What is multicasting?
6. What is a hostid and netid?
7. How does a netid differ from a network address?
8. What is the purpose of subnetting?
9. Define Masking.
10. What is the difference between boundary level masking and non-boundary level
masking.
11. What is the function of router?
12. How does a router differ from a bridge?
13. Find the class of each addresses.
14. Why is adaptive routing superior to non adaptive routing?
15. What are the three main elements of distance vector algorithms.
16. What is address resolution?
17. What are the benefits of subnetting a network?
18. What are the metrics used by routing protocols?

PART B

1. Explain shortest path algorithm with a suitable illustration. (16)
2. Explain the distance vector routing algorithm.(16)
3. Mention the limitations of distance vector routing algorithm.(8)
4. Explain the building and distribution of link state packets in link state routing
algorithm.(8)
5. Mention the limitations of link state routing algorithm.(8)
6. Explain link state routing and discuss its advantages over distance vector routing.(8)
7. Explain in details packet switching.(16)
8. Explain in details Datagram approach.(16)
9. Explain in details IP addressing methods.(16)
11. i. In classful addressing how is an IP address in class A, Class B and Class C
divided? (4)
ii. Given the address 23.56.7.91 and the default class A mask, find the beginning
address (network address). (6)
iii. Given the address 201.180.56.5 and the default class C mask, find the beginning
address (network address). (6)

UNIT IV

PART A

1. What are the services provided by transport layer protocol?
2. What is the difference between network service and transport service?
3. List some of the Quality of service parameters of transport layer
4. What are the functions of transport layers?
5. What is transport entity?
6. What is segmentation?
7. What is the purpose of sequence control?
8. How transport layer performs Duplication control?
9. What are the service primitives in simple transport protocol?
10. What is the methods to improve Qos?
11. What is traffic shaping? Name two methods of shape traffic?
12. What is the use of sequence numbers?

PART B


1. Explain a congestion control algorithm. (16)
2. Explain the duties of Transport layer. (16)
3. Explain the TCP transmission policy, Congestion control. (8)
5. Explain the TCP header and working of the TCP protocol. (16)
6. Explain the various fields of TCP header with the help of a neat diagram.(16)
7. Explain the various steps that are followed in releasing a TCP connection. (16)
8. Explain the three way handshake protocol to establish the transport level
connection. (8)
9. Discuss about congestion control in frame relay. (16)
10. Discuss the various issues of transport layer in details. (16)

UNIT V

PART A

1. Discuss the three main divisions of the DNS.
2. What role does the DNS resolver play in the DNS system?
3. How does a DNS Resolver bootstrap the domain name lookup process?
4. Define SMTP.
5. Define the term domain.
6. What are the two parts of addressing system in SMTP?
7. Discuss MIME.
8. What are the services provided by user agent?
9. What are the four properties of HTTP?
10. What are the four groups of HTTP header?
11. What are categories of web documents?
12. What are basic functions of email system?
13. What is WWW?
14. What is the web browser?
15. What is a post office protocol?
16. Compare the HTTP and FTP.
17. What is mailing list?
18. What are the two main categories of DNS messages?
19. Define cryptography.
20. What are the two categories of cryptography methods? What is the main difference
between the categories?
21. What are the advantages of public key encryption/decryption?

PART B:

1. Explain DNS with reference to its components and working. (16)
2. Explain the message transfer using simple mail transfer protocol. (8)
3. Explain the final delivery of email to the end user using pop3. (8)
4. Write short notes on email services of the application layer. (8)
5. Explain in details WWW. (8)
6. Explain the architecture and services of e-mailing system. (16)
7. What are the two categories of encryption/decryption methods? What is the main
difference between the categories. (8)
8. With a relevant example discuss how the domain space is divided. (6)
ii. Distinguish between a fully qualified domain name and a partially qualified
domain name. Give relevant example. (6)
iii. List the various risks faced by messages that are transmitted over the internet. (4)
9. i. Discuss how simple mail transfer protocol (SMTP) works? Can multimedia
messages be transmitted using SMTP? Discuss. (10)
ii Is common gateway interface a languages. Discuss. (6)