Showing posts with label COMPUTER NETWORKS QB. Show all posts
Showing posts with label COMPUTER NETWORKS QB. Show all posts

COMPUTER NETWORKS Questions Bank 2014

Anna University, Chennai

Anna_University,_Chennai_logo

16 MARKS QUESTIONS&KEYS (COMPUTER NETWORK) UNIT-1

1. Explain ISO/OSI reference model.

_ Physical layer

_ Data link layer

_ Network layer

_ Transport layer

_ Session layer

_ Presentation layer

_ Application layer

2. Explain the topologies of the network.

_ Mesh topology

_ Star topology

_ Tree topology

_ Bus topology

_ Ring topology

3. Explain the categories of networks.

_ Local Area Network(LAN)

_ Metropolitan Area Network(MAN)

_ Wide Area Network(WAN)

4. Explain coaxial cable & fiber optics.

_ Coaxial cable

_ Coaxial cable standards

_ Coaxial cable connectors

_ Fiber optics

_ Propagation modes

_ Fiber sizes

_ Cable composition

_ Light sources for optical cable

_ Fiber optic connectors

_ Advantages & disadvantages of optical fiber

5. Explain line coding (digital to digital conversion).

_ Unipolar

_ DC component

_ Synchronization

_ Polar

_ Non return to zero(NRZ)

_ NRZ-L

_ NRZ-I

_ Return to zero

_ Biphase

_ Manchester

_ Differential Manchester

_ Bipolar

_ Alternate Mark Inversion(AMI)

_ Bipolar 8-zero substitution(B8ZS)

_ High-Density Bipolar 3(HDB3)


UNIT II

1. Explain error detection and error correction techniques.

_ Types of errors

_ Single bit error

_ Burst error

_ Error detection

_ Vertical redundancy check(VRC)

_ Longitudinal redundancy check(LRC)

_ Cyclic redundancy check(CRC)

_ Checksum

_ Error correction

_ Single-bit error correction

_ Hamming code

_ Burst error correction

2. Explain error control mechanism.

_ Stop and wait ARQ

_ Sliding window ARQ

_ Go back-n

_ Selective-reject

3. Explain the flow control mechanism

_ Stop and wait

_ Sliding window.

4. Explain the timers and time registers in FDDI.

Time registers

_ Synchronous allocation(SA)

_ Target token rotation time(TTRT)

_ Absolute maximum time(AMT)

_ Timers

_ Token rotation timer(TRT)

_ Token holding timer(THT)

5. Explain about Ethernet.

_ Access method :CSMA/CD

_ Addressing

_ Electrical specification

_ Frame format

_ Implementation:

_ 10 base 5 :Thick Ethernet

_ 10 base 2 :Thin Ethernet

_ 10 base T :Twisted-pair Ethernet

_ 1 base 5 :Star LAN

6. Explain the frame format for token ring and token bus.

_ Access method: Token passing

_ Priority and reservation

_ Time limits

_ Monitor stations

7. Explain about HDLC.

_ Station types:

_ Primary station

_ Secondary station

_ Configurations:

_ Unbalanced configuration

_ Symmetrical configuration

_ Balanced configuration

_ Modes of communication:

_ Normal Response Mode(NRM)

_ Asynchronous Response Mode(ARM)

_ Asynchronous Balanced Mode(ABM)

_ Frames :

_ Flag field

_ Address field

_ Control field

_ Information field

_ FCS field


UNIT III

1. Explain the two approaches of packet switching techniques.

_ Datagram approach

_ Virtual circuit approach

_ Switched virtual circuit(SVC)

_ Permanent virtual circuit(PVC)

_ Circuit – switched connection versus virtual – circuit connection

_ Path versus route

_ Dedicated versus shared

2. Explain IP addressing method.

_ Internetwork protocol (IP)

_ Datagram

_ Addressing

_ Classes

_ Dotted decimal notation

_ A sample internet

3. Define routing & explain distance vector routing and link state routing.

_ Distance vector routing

_ Sharing information

_ Routing table

_ Creating the table

_ Updating the table

_ Updating algorithm

_ Link state routing

_ Information sharing

_ Packet cost

_ Link state packet

_ Getting information about neighbors

_ Initialization

_ Link state database

4. Define bridge and explain the type of bridges.

_ Bridges

_ Types of bridges

_ Simple bridge

_ Multiport bridge

_ Transparent bridge

5. Explain subnetting

_ Subnetting

_ Three levels of hierarchy

_ Masking

_ Masks without subnetting

_ Masks with subnetting

_ Finding the subnetwork address

_ Boundary level masking

_ Non-boundary level masking

6. Write short notes about repeaters, routers and gateways.

_ Repeaters

_ Routers

_ Routing concepts

_ Least-cost routing

_ Non adaptive routing

_ Adaptive routing

_ Packet lifetime

_ Gateways


UNIT IV

1. Explain the duties of transport layer.

End to end delivery

Addressing

Reliable delivery

Error control Sequence control Loss control Duplication control

Flow control

Multiplexing

2. Explain socket in detail.

Introduction Explanation program

3. Explain UDP & TCP.

_ User Datagram Protocol(UDP)

_ Source port address

_ Destination port address

_ Total length

_ Checksum

_ Transmission Control Protocol(TCP)

_ Source port address

_ Destination port address

_ Sequence number

_ Acknowledgement number

_ Header length

_ Reserved

_ Control

_ Window size

_ Check sum

_ Urgent pointer

_ Options and padding

4. Explain about congestion control.

_ Congestion avoidance

_ BECN

_ FECN

_ Four situations

_ Discarding

5. Explain leaky bucket and token bucket algorithm

_ Leaky bucket algorithm

_ Leaky bucket

_ Switch controlling the output rate

_ Flowchart


UNIT V

1. Explain the functions of SMTP.

System for sending messages to other computer users based on e-mail addresses. SMTP provides mail exchange between users on the same

or different computers.

User Agent

Mail Transfer Agent

Multipurpose Internet Mail Extensions

Post Office Protocol

2. Write short notes on FTP.

Transfer a file from one system to another. TCP connections

Basic model of FTP

3. Explain about HTTP.

HTTP transactions HTTP messages URL

4. Explain the WWW in detail.

Hypertext & Hypermedia Browser Architecture Categories of Web Documents HTML

CGI

Java

5. Explain the type of encryption/decryption method. Conventional Methods:

Character-Level Encryption: Substitutional & Transpositional

Bit-Level Encryption: Encoding/Decoding, Permutation, Substitution, Product, Exclusive-Or & Rotation

Public key Methods

6. Explain about RSA algorithm.

Public key Encryption technique. Encryption algorithm

Decryption algorithm

Security in RSA

7. Explain about secret key encryption algorithm. Data Encryption Standard

Algorithm

Sub key generation

CS2302 Computer Networks–Important Question with Keys (2012 1st Edition)

Anna University
Department of Computer Science Engineering

Department : B.E CSE

Semester : V
Year : 3rd yr
Regulation : 2008
Subject Code : CS2302

Subject Name : Computer Networks

Content : CS2302 Computer Networks– Important Questions with Keys – 1st Edition of 2012.


16 MARKS QUESTIONS & KEYS


UNIT I


1. Explain ISO/OSI reference model.

_ Physical layer

_ Data link layer

_ Network layer

_ Transport layer

_ Session layer

_ Presentation layer

_ Application layer


2. Explain the topologies of the network.

_ Mesh topology

_ Star topology

_ Tree topology

_ Bus topology

_ Ring topology


3. Explain the categories of networks.

_ Local Area Network(LAN)

_ Metropolitan Area Network(MAN)

_ Wide Area Network(WAN)


4. Explain coaxial cable & fiber optics.

_ Coaxial cable

_ Coaxial cable standards

_ Coaxial cable connectors

_ Fiber optics

_ Propagation modes

_ Fiber sizes

_ Cable composition

_ Light sources for optical cable

_ Fiber optic connectors

_ Advantages & disadvantages of optical fiber


5. Explain line coding (digital to digital conversion).

_ Unipolar

_ DC component

_ Synchronization

_ Polar

_ Non return to zero(NRZ)

_ NRZ-L

_ NRZ-I

_ Return to zero

_ Biphase

_ Manchester

_ Differential Manchester

_ Bipolar

_ Alternate Mark Inversion(AMI)

_ Bipolar 8-zero substitution(B8ZS)

_ High-Density Bipolar 3(HDB3)


UNIT II


1. Explain error detection and error correction techniques.

_ Types of errors

_ Single bit error

_ Burst error

_ Error detection

_ Vertical redundancy check(VRC)

_ Longitudinal redundancy check(LRC)

_ Cyclic redundancy check(CRC)

_ Checksum

_ Error correction

_ Single-bit error correction

_ Hamming code

_ Burst error correction


2. Explain error control mechanism.

_ Stop and wait ARQ

_ Sliding window ARQ

_ Go back-n

_ Selective-reject


3. Explain the flow control mechanism

_ Stop and wait

_ Sliding window.


4. Explain the timers and time registers in FDDI.

Time registers

_ Synchronous allocation(SA)

_ Target token rotation time(TTRT)

_ Absolute maximum time(AMT)

_ Timers

_ Token rotation timer(TRT)

_ Token holding timer(THT)


5. Explain about Ethernet.

_ Access method :CSMA/CD

_ Addressing

_ Electrical specification

_ Frame format

_ Implementation:

_ 10 base 5 :Thick Ethernet

_ 10 base 2 :Thin Ethernet

_ 10 base T :Twisted-pair Ethernet

_ 1 base 5 :Star LAN


6. Explain the frame format for token ring and token bus.

_ Access method: Token passing

_ Priority and reservation

_ Time limits

_ Monitor stations


7. Explain about HDLC.

_ Station types:

_ Primary station

_ Secondary station

_ Configurations:

_ Unbalanced configuration

_ Symmetrical configuration

_ Balanced configuration

_ Modes of communication:

_ Normal Response Mode(NRM)

_ Asynchronous Response Mode(ARM)

_ Asynchronous Balanced Mode(ABM)

_ Frames :

_ Flag field

_ Address field

_ Control field

_ Information field

_ FCS field


UNIT III


1. Explain the two approaches of packet switching techniques.

_ Datagram approach

_ Virtual circuit approach

_ Switched virtual circuit(SVC)

_ Permanent virtual circuit(PVC)

_ Circuit – switched connection versus virtual – circuit connection

_ Path versus route

_ Dedicated versus shared


2. Explain IP addressing method.

_ Internetwork protocol (IP)

_ Datagram

_ Addressing

_ Classes

_ Dotted decimal notation

_ A sample internet


3. Define routing & explain distance vector routing and link state routing.

_ Distance vector routing

_ Sharing information

_ Routing table

_ Creating the table

_ Updating the table

_ Updating algorithm

_ Link state routing

_ Information sharing

_ Packet cost

_ Link state packet

_ Getting information about neighbors

_ Initialization

_ Link state database


4. Define bridge and explain the type of bridges.

_ Bridges

_ Types of bridges

_ Simple bridge

_ Multiport bridge

_ Transparent bridge


5. Explain subnetting

_ Subnetting

_ Three levels of hierarchy

_ Masking

_ Masks without subnetting

_ Masks with subnetting

_ Finding the subnetwork address

_ Boundary level masking

_ Non-boundary level masking


6. Write short notes about repeaters, routers and gateways.

_ Repeaters

_ Routers

_ Routing concepts

_ Least-cost routing

_ Non adaptive routing

_ Adaptive routing

_ Packet lifetime

_ Gateways


UNIT IV


1. Explain the duties of transport layer.

  • End to end delivery
  • Addressing
  • Reliable delivery Error control Sequence control Loss control Duplication control
  • Flow control
  • Multiplexing


2. Explain socket in detail.

  • Introduction Explanation program


3. Explain UDP & TCP.

_ User Datagram Protocol(UDP)

_ Source port address

_ Destination port address

_ Total length

_ Checksum

_ Transmission Control Protocol(TCP)

_ Source port address

_ Destination port address

_ Sequence number

_ Acknowledgement number

_ Header length

_ Reserved

_ Control

_ Window size

_ Check sum

_ Urgent pointer

_ Options and padding


4. Explain about congestion control.

_ Congestion avoidance

_ BECN

_ FECN

_ Four situations

_ Discarding


5. Explain leaky bucket and token bucket algorithm

_ Leaky bucket algorithm

_ Leaky bucket

_ Switch controlling the output rate

_ Flowchart


UNIT V


1. Explain the functions of SMTP.

System for sending messages to other computer users based on e-mail addresses. SMTP provides mail exchange between users on the same

or different computers.

  • User Agent
  • Mail Transfer Agent
  • Multipurpose Internet Mail Extensions
  • Post Office Protocol


2. Write short notes on FTP.

  • Transfer a file from one system to another.
  • TCP connections
  • Basic model of FTP


3. Explain about HTTP.

  • HTTP transactions
  • HTTP messages
  • URL


4. Explain the WWW in detail.

  • Hypertext & Hypermedia
  • Browser Architecture
  • Categories of Web Documents
  • HTML
  • CGI
  • Java


5. Explain the type of encryption/decryption method.

Conventional Methods:

Character-Level Encryption: Substitutional & Transpositional

Bit-Level Encryption:

Encoding/Decoding, Permutation, Substitution, Product, Exclusive-Or & Rotation

Public key Methods


6. Explain about RSA algorithm.

  • Public key Encryption technique.
  • Encryption algorithm
  • Decryption algorithm
  • Security in RSA

  • 7. Explain about secret key encryption algorithm.
  • Data Encryption Standard
  • Algorithm
  • Sub key generation

COMPUTER NETWORKS - Question Bank

Download :  Click Here to Download


Department of computer science and engineering

COMPUTER NETWORKS

UNIT I

PART A

1. What are the two types of line configuration?
2. What do you mean by error control?
3. Define flow control?
4. What is redundancy?
5. Write short notes on error correction?
6. Mention the types of error correcting methods.
7. What are the steps followed in checksum generator?
8. Define checksum.
9. Write short notes on CRC checker.
10. Write short notes on LRC.
11. List out the available detection methods.
12. Mention the types of errors and define the terms?
13. Distinguish between peer-to-peer relationship and a primary-secondary
relationship.
14. What are the ways to address the framing problem?
15. What are the responsibilities of data link layer?
16. What are the functions of Application layer?
17. Define Bit stuffing.
18. What are the features provided by layering?
19. What are header and trailers and how do they get added and removed?
20. Group the OSI layers by function?
21. What are the two types of parity checks? Define it.
22. Draw a neat diagram of Internet protocol graph.

PART B

1. Explain in detail the error detection and error corrections. (16)
2. With a neat diagram explain in detail about the Network architecture. (16)
3. Discuss in detail about HDLC. (16)
4. (i)What is the difference between Internet architecture and OSI architecture? (8)
(ii) Explain about coaxial cable and fiber optics media for communication. (8)
5. Discuss about the links operated on the physical media in detail. (16)
6. Explain the different approaches of framing in detail. (16)
7. Discuss about different types of Issues in data link layer. (16)
8. (i)Write about channel access on links. (8)
(ii)Explain about FDMA and TDMA in detail. (8)
9. (i) A block of 32 bits has to be transmitted. Discuss how the thirty two bit block
is transmitted to the receiver using Longitudinal Redundancy Check. (4)
(ii) Consider a 32 bit block of data 11100111 11011101 00111001 10101001 that
has to be transmitted. If Longitudinal Redundancy Check is used what is the
transmitted bit stream? (6)
(iii)In the Hamming code, for a data unit of m bits how do you compute the
number of redundant bits ‘r’ needed? (6)

UNIT II

PART A

1. What is CSMA?
2. Explain CSMA/CD
3. Mention some of the physical properties of Ethernet.
4. What is the role of VCI?
5. What do you mean by error control?
6. What are the functions of bridges?
7. What is the size of Ethernet address?
8. What is the advantage of FDDI over a basic token ring?
9. List any two functions which a bridge cannot perform?
10. Mention the function of hub.
11. Mention different random access techniques?
12. List the two types of data frames in FDDI
13. What is the purpose of the NAV?
14. Name the four types of S frames.
15. What is the access method used by wireless LANs?

PART B

1. Explain the CSMA/CD algorthims of Ethernet. (8)
2. Explain in details about the access method and frame format used in Ethernet and
token ring. (16)
3. Name the four basic network topologies and explain them giving all the
relevant features (16)
4. (i) Explain the working of carrier sense multiple access protocol. (3)
( ii) How does a Token Ring LAN operates? Discuss. (6)
(iii) List and briefly discuss the two different basic transmission technologies
that can be used to set up wireless LAN’s. (7)
5. Explain the frame format, operation and ring maintenance feature of IEEE 802.5
MAC protocol. (16)
6. Briefly define key requirements for wireless LANs. (16)
7. Describe the FDDI frame format and explain. (16)
8. Discuss the MAC layer functions of IEEE 802.11. (8)
9. Explain in details the types of bridges. (8)

UNIT III

PART – A

1. List the difference between circuit switching and Packet switching.
2. What are the different kinds of Multicast Routing?
3. Discuss the class field in IP address.
4. What is meant by circuit switching?
5. What is multicasting?
6. What is a hostid and netid?
7. How does a netid differ from a network address?
8. What is the purpose of subnetting?
9. Define Masking.
10. What is the difference between boundary level masking and non-boundary level
masking.
11. What is the function of router?
12. How does a router differ from a bridge?
13. Find the class of each addresses.
14. Why is adaptive routing superior to non adaptive routing?
15. What are the three main elements of distance vector algorithms.
16. What is address resolution?
17. What are the benefits of subnetting a network?
18. What are the metrics used by routing protocols?

PART B

1. Explain shortest path algorithm with a suitable illustration. (16)
2. Explain the distance vector routing algorithm.(16)
3. Mention the limitations of distance vector routing algorithm.(8)
4. Explain the building and distribution of link state packets in link state routing
algorithm.(8)
5. Mention the limitations of link state routing algorithm.(8)
6. Explain link state routing and discuss its advantages over distance vector routing.(8)
7. Explain in details packet switching.(16)
8. Explain in details Datagram approach.(16)
9. Explain in details IP addressing methods.(16)
11. i. In classful addressing how is an IP address in class A, Class B and Class C
divided? (4)
ii. Given the address 23.56.7.91 and the default class A mask, find the beginning
address (network address). (6)
iii. Given the address 201.180.56.5 and the default class C mask, find the beginning
address (network address). (6)

UNIT IV

PART A

1. What are the services provided by transport layer protocol?
2. What is the difference between network service and transport service?
3. List some of the Quality of service parameters of transport layer
4. What are the functions of transport layers?
5. What is transport entity?
6. What is segmentation?
7. What is the purpose of sequence control?
8. How transport layer performs Duplication control?
9. What are the service primitives in simple transport protocol?
10. What is the methods to improve Qos?
11. What is traffic shaping? Name two methods of shape traffic?
12. What is the use of sequence numbers?

PART B


1. Explain a congestion control algorithm. (16)
2. Explain the duties of Transport layer. (16)
3. Explain the TCP transmission policy, Congestion control. (8)
5. Explain the TCP header and working of the TCP protocol. (16)
6. Explain the various fields of TCP header with the help of a neat diagram.(16)
7. Explain the various steps that are followed in releasing a TCP connection. (16)
8. Explain the three way handshake protocol to establish the transport level
connection. (8)
9. Discuss about congestion control in frame relay. (16)
10. Discuss the various issues of transport layer in details. (16)

UNIT V

PART A

1. Discuss the three main divisions of the DNS.
2. What role does the DNS resolver play in the DNS system?
3. How does a DNS Resolver bootstrap the domain name lookup process?
4. Define SMTP.
5. Define the term domain.
6. What are the two parts of addressing system in SMTP?
7. Discuss MIME.
8. What are the services provided by user agent?
9. What are the four properties of HTTP?
10. What are the four groups of HTTP header?
11. What are categories of web documents?
12. What are basic functions of email system?
13. What is WWW?
14. What is the web browser?
15. What is a post office protocol?
16. Compare the HTTP and FTP.
17. What is mailing list?
18. What are the two main categories of DNS messages?
19. Define cryptography.
20. What are the two categories of cryptography methods? What is the main difference
between the categories?
21. What are the advantages of public key encryption/decryption?

PART B:

1. Explain DNS with reference to its components and working. (16)
2. Explain the message transfer using simple mail transfer protocol. (8)
3. Explain the final delivery of email to the end user using pop3. (8)
4. Write short notes on email services of the application layer. (8)
5. Explain in details WWW. (8)
6. Explain the architecture and services of e-mailing system. (16)
7. What are the two categories of encryption/decryption methods? What is the main
difference between the categories. (8)
8. With a relevant example discuss how the domain space is divided. (6)
ii. Distinguish between a fully qualified domain name and a partially qualified
domain name. Give relevant example. (6)
iii. List the various risks faced by messages that are transmitted over the internet. (4)
9. i. Discuss how simple mail transfer protocol (SMTP) works? Can multimedia
messages be transmitted using SMTP? Discuss. (10)
ii Is common gateway interface a languages. Discuss. (6)