www.rejinpaul.
com
SRM VALLIAMMAI ENGINEERING COLLEGE
(An Autonomous Institution)
SRM Nagar, Kattankulathur – 603 203
DEPARTMENT OF
ELECTRONICS AND INSTRUMENTATION ENGINEERING
QUESTION BANK
VI SEMESTER
EI8074 COMPUTER NETWORKS
Regulation – 2017
Academic Year 2019 – 20(Even)
Prepared by
Ms. V.P. Sandhya, Assistant Professor/EIE
www.rejinpaul.com
SRM VALLIAMMAI ENGINEERING COLLEGE
(An Autonomous Institution)
SRM Nagar, Kattankulathur – 603 203.
DEPARTMENT OF ELECTRONICS AND INSTRUMENTATION
ENGINEERING
QUESTION BANK
SUBJECT : EI8074 COMPUTER NETWORKS
SEM / YEAR : VI / III
UNIT I - FUNDAMENTALS & LINK LAYER
Building a network – Requirements - Layering and protocols - Internet Architecture – Network software –
Performance ; Link layer Services - Framing - Error Detection - Flow control.
PART – A
Q.No Questions BT Competence
Level
1. Write down the requirements to build a computer network. BTL-1 Remember
2. List of services provided by data link layer. BTL-1 Remember
3. Distinguish between packet switched and circuit switched networks. BTL-2 Understand
4. Write the mechanism of stop and wait flow control. BTL-5 Evaluate
5. What is URL? BTL-1 Remember
6. Identify the metrics that influence the performance of computer BTL-3 Apply
networks.
7. What is meant by bit stuffing? Give an example. BTL-2 Understand
8. Calculate the maximum number of frames sent but unacknowledged for a BTL-3 Apply
sliding window of size n-1 (n is the sequence number).
9. State the issues of data link layer. BTL-4 Analyze
10. Outline about encryption and decryption. BTL-2 Understand
11. Give the need for flow control. BTL-2 Understand
12. Which layer implements the node to node channel connection in the OSI BTL-1 Remember
layered architecture?
13. Examine the use of two dimensional parity in error detection. BTL-3 Apply
14. Compare Go –Back N and Selective Reject protocol. BTL-4 Analyze
15. SFormulate the bit duration of the network for the bandwidth of 10Mbps. BTL-6 Create
16. t For 1 MB file over a 1Gbps network with RTT 100ms,find out the transfer BTL-5 Evaluate
a
time and Throughput of the link.
t
17. eDefine the terms: Bandwidth and Latency. BTL-1 Remember
18. Analyze the functions of the layers in OSI model. BTL-4 Analyze
19. Name the four topologies used in the network. BTL-1 Remember
20. Assume 6 devices are arranged in the mesh topology. Design how many BTL-6 Create
cables are needed? How many ports are needed for each device?
www.rejinpaul.com
PART-B
1. (i)Illustrate the need for error detection with typical examples. (5) BTL-3 Apply
(ii)Demonstrate the various methods used for error detection and error
correction. (8)
2. Consider a Point –to-Point link 50 km in length. At what bandwidth would BTL-6 Create
the propagation delay equal transmit delay for 100 byte packets? Calculate
bandwidth for 512-byte packets. (13)
3. Compare byte stuffing and bit stuffing. Which technique is used in byte- BTL-2 Understand
oriented protocols and bit-oriented protocols. Justify the answer. (13)
4. Describe briefly the various layers and functions of OSI model and BTL-1 Remember
compare OSI Model with Internet model. (13)
5. Illustrate the sliding window mechanism with an example of your own BTL-3 Apply
window size. (13)
6. Elaborate Go-Back-N and Selective –Repeat ARQ protocols. (13) BTL-5 Evaluate
7. (i)Explain the challenges faced in building a network. (10) BTL-2 Understand
(ii)Obtain the 4-bit CRC code for the data bit sequence 10011011100
using the polynomial X4 + X2 + 1. (3)
8. (i)With a protocol graph, explain the architecture of Internet. (7) BTL-1 Remember
(ii)Consider a bus LAN with a number of equally spaced stations with a
data rate of 9 Mbps and a bus length of 1 km.What is the mean time to
send a frame of 500 bits to another station, measured from the beginning
of transmission to the end of reception? Assume a propagation speed of
150 m/s. If two stations begin to monitor and transmit at the same time,
how long does it need to wait before an interface is noticed? (6)
9. Examine the Stop-and-Wait ARQ in the following cases: BTL4 Analyze
(i)Damage frames (5)
(ii)Lost data frames and (5)
(iii)Lost acknowledgement (3)
10. (i)Discuss in detail about the network performance measures. (7) BTL4 Analyze
(ii)Explain selective repeat ARQ flow control method. (6)
11. Discuss the different ways to address the Framing problem. (13) BTL2 Understand
12. What is the need for error detection? Explain with typical examples. BTL-1 Remember
Explain methods used for error detection and error correction. (13)
13. (i) Show the various performance metrics of a computer network with BTL-1 Understand
examples. (7)
(ii) How does bit stuffing work in HDLC protocol. (6)
www.rejinpaul.com
14. Explain in detail about Stop-and-wait protocol. (13) BTL-4 Analyze
PART-C
1. (i)With a protocol graph, explain the architecture of internet. (7) BTL 5 Evaluate
(ii) Consider a bus LAN with a number of equally spaced stations with a
data rate of 9 Mbps and a bus length of 1 km. What is the mean time
taken to send a frame of 500 bits to another station, measured from the
beginning of transmission to the end of reception? Assume a propagation
speed of 150m/s. If two stations begin to monitor and transmit at the same
time, how long does it need to wait before an interference is noticed? (8)
2. Discuss in detail about the functions of network layer and transport layers BTL 5 Evaluate
with necessary diagrams. (15)
3. Estimate the relative performance needs and applications in terms of BTL 6 Create
average bandwidth, peak bandwidth, latency, jitter and loss tolerance. (15)
4. In order to transmit the message M = 1 1 1 0 1 1 with divisor bit as C = 1 1 BTL 6 Create
0 1 whose polynomial is given by C(x) = x3+x2+1, Formulate the message
that should be transmitted using polynomial long division and predict the
occurrence of errors in the receiver. (15)
UNIT II - MEDIA ACCESS & INTERNETWORKING
Media access control - Ethernet (802.3) - Wireless LANs – 802.11 – Bluetooth - Switching and bridging –
Basic Internetworking (IP, CIDR, ARP, DHCP, ICMP)
PART – A
Q.No Questions BT Competenc
Level e
1. What is the need for fragmentation? BTL-1 Remember
2. Draw the frame format for Ethernet. BTL-3 Apply
3. What do you understand by CSMA protocol? BTL-1 Remember
4. Analyze the flags in IPv4 datagram. BTL-4 Analyze
5. Define 802.11. BTL-1 Remember
6. Differentiate between internetwork and internet. BTL-4 Analyze
7. List the common approaches for switching. BTL-5 Evaluate
8. Discuss subnetting. BTL-2 Understand
9. What do you meant by switching? BTL-1 Remember
10. State the functions of bridges. BTL-6 Create
11. Analyze the minimum size of an Ethernet frame? BTL-4 Apply
12. Highlight the characteristics of datagram networks BTL-6 Create
13. What is Bluetooth? BTL-2 Understand
14. Summarize the problems in Internetworking. BTL 2 Understand
www.rejinpaul.com
15. Outline the features of IEEE 802.3 protocol. BTL-2 Understand
16. Why frequency hopping is used in Bluetooth? BTL-3 Apply
17. Examine the importance of DHCP? BTL-3 Apply
18. What is the need for ARP? BTL-1 Remember
19. What details are provided by DHCP other than IP address? BTL-1 Remember
20. When is the ICMP redirect message used? BTL-5 Evaluate
PART – B
1. (i)Explain the datagram forwarding in IP. (7) BTL-3 Apply
(ii)Show and explain the ARP packet format for mapping IP addresses
into Ethernet addresses. (6)
2. (i) Discuss the working of CSMA / CD protocol. (6) BTL-2 Understand
(ii)Explain the functions of MAC layer present in IEEE 802.11 with
necessary diagrams. (7)
3. (i)Discuss the MAC layer functions of IEEE 802.11. (7) BTL-4 Analyze
(ii)Briefly define key requirements of wireless LAN. (6)
4. (i)Consider sending a 3500-byte datagram that has arrived at a router R1 BTL-2 Understand
that needs to be sent over a link that has an MTU size of 1000 bytes to
R2. Then it has to traverse a link with an MTU of 600 bytes. Let the
identification number of the original datagram be 465. How many
fragments are delivered at the destination? Show the parameters
associated with each of these fragments. (6)
(ii)Explain the working of DHCP with its header format. (7)
5. Explain the physical properties of Ethernet 802.3 with necessary BTL-5 Evaluate
diagram of Ethernet transceiver and adaptor. (13)
6. (i)Show and explain the Ethernet frame format. (7) BTL-4 Analyze
(ii)Highlight the characteristics of connectionless networks. (6)
7. Explain the functions of Wi-Fi and Bluetooth in detail. (13) BTL-3 Apply
8. (i)Write short notes on Switches and Bridges. (7) BTL-1 Remember
(ii)How does a Bridge come to learn on which port the various hosts
reside? Explain with examples. (6)
9. Write short notes on : BTL-1 Remember
(i) Ethernet (6)
(ii)Wireless LAN. (7)
10. (i)Discuss briefly about the internet protocol and its packet format with BTL-1 Remember
a neat sketch. (6)
(ii)Outline the difference between various global addressing classes in
IP with examples. (7)
www.rejinpaul.com
11. Elaborate about the Internet Control Message Protocol with a neat BTL-6 Create
diagram. (13)
12. Analyze in detail about various IEEE 802.X protocols. (13) BTL-4 Analyze
13. (i) Give the comparison between different wireless technologies. (6) BTL-1 Remember
(ii) Enumerate 802.11 protocol stacks in detail. (7)
14. Demonstrate the concepts of virtual circuit switching with necessary BTL-2 Understand
diagrams. (13)
PART – C
1. (i)Compare the features of different switching techniques. (5) BTL-6 Create
(ii)Construct VCI table and network for establishing a connection in the
following scenario: (a) host A sends its packets to host Y.The
administrator needs to identify a path from switches 1,2,3 and 4. (10)
2. (i)Discuss an algorithm for datagram forwarding in IP. (10) BTL-5 Evaluate
(ii)Illustrate the ARP packet format. (5)
3. Explain in detail about bluetooth architecture with neat diagrams. (15) BTL-5 Evaluate
4. Use IEEE 802.3 and IEEE 802.11 to discuss three differences between BTL-6 Create
wired and wireless LANS. (15)
UNIT III - ROUTING
Routing (RIP, OSPF, metrics) – Switch basics – Global Internet (Areas, BGP, IPv6), Multicast –addresses –
multicast routing (DVMRP, PIM)
PART – A
Q.No Questions BT Competence
Level
1. What are the two major mechanisms defined to help transition from BTL 1 Remember
IPv4 to IPv6?
2. Define routing. BTL 1 Remember
3. How does a net ID differ from a network address? BTL 3 Apply
4. How do routers differentiate the incoming unicast,mulicast and BTL 5 Evaluate
broadcast IP packets?
5. Assess the class of the following IP address: BTL 6 Create
(a) 110.34.56.45.
(b) 212.208.63.23.
6. How does a router differ from a bridge? BTL 1 Remember
7. What are the metrics used by routing protocols? BTL 1 Remember
8. Distinguish between a forwarding table and a Routing table. BTL 4 Analyze
9. Draw the IPv6 packet header format. BTL 3 Apply
10. Mention the limitations of distance vector routing. BTL 3 Apply
www.rejinpaul.com
11. Point out the metrics used in routing protocols. BTL 4 Analyze
12. List the two factors that affect the performance of a network switch. BTL 1 Remember
13. Outline the benefits of Open Shortest Path First (OSPF) Protocol. BTL 2 Understand
14. Differentiate Intradomain and Interdomain routing protocol. BTL 2 Understand
15. Why is IPv4 to IPv6 transition required? BTL 5 Evaluate
16. Give the OSPF header format. BTL 4 Analyze
17. What is Border Gateway Protocol? BTL 1 Remember
18. Interpret about Pruning. BTL 2 Understand
19. Discuss about Multicast routing. BTL 6 Create
20. Outline the features of RIP. BTL 2 Understand
PART – B
1. (i)Describe Distance Vector Routing Algorithm. (7) BTL 1 Remember
(ii)List the limitations of Distance Vector Routing Algorithm. (6)
2. Explain the working of Protocol Independent Multicast (PIM) in BTL 4 Analyze
detail. (13)
3. (i)Write note on the Border Gateway Protocol with neat diagram.(8) BTL 1 Remember
(ii)Draw the BGP-4 update packet format. (5)
4. (i) Can you substitute an alternative protocol for PIM? Justify your BTL 6 Create
answer. (7)
(ii)Outline the need of Distance Vector Multicast Routing Protocol
(DVMRP) (6)
5. Explain the two approaches of packet switching and circuit BTL 3 Apply
switching techniques. (13)
6. (i) Explain in detail the various aspects of IPv6 with relevant BTL 2 Understand
diagrams. (8)
(ii) Illustrate the concept of Link State Advertisement (LSA) in
OSPF. (5)
7. Explain the working of Protocol Independent Multicast (PIM) in BTL 1 Remember
detail. (13)
8. Interpret the RIP algorithm with a simple example of your choice. BTL 5 Evaluate
(13)
9. Define the concept of multicasting and explain in detail about BTL 1 Remember
multicast address. (13)
10. (i) Outline shortest path algorithm. Explain the same with suitable BTL 2 Understand
diagrams and examples. (8)
(ii) Summarize the functions and characteristics of Border Gateway
Protocol(BGP). (5)
www.rejinpaul.com
11. (i) Examine Distance Vector Multicast Routing protocol. (8)
BTL 4 Analyze
(ii)Simplify the metrics and their calculation method. (5)
12. Analyze briefly about:
BTL 4 Analyze
(i) Forwarding and (6)
(ii) Routing (7)
13. Summarize the different Datagram approaches. Also show the BTL 2 Understand
advantages of LSR over DVR. List the limitations of Link State
Routing Algorithm. (13)
14. Describe about RIP. Explain in detail about RIP and OSPF with BTL 3 Apply
diagrams. List the difference between them. (13)
PART – C
1. Discuss in detail the operation of hierarchically structured OSPF BTL 6 Create
protocol by considering a suitable network. (15)
2. Elaborate in detail about Global Internet Protocol and its BTL 5 Evaluate
classification. (15)
3. (i) Evaluate the working of Protocol Independent Multicast(PIM) in BTL 5 Evaluate
detail. (8)
(ii) Outline the need of DVMRP. (7)
4. How do the Protocol Independent Multicast protocols scale well in BTL 6 Create
environments where a relative small proportion of routers want to
receive traffic for certain group? (15)
UNIT IV- TRANSPORT LAYER
Overview of Transport layer - UDP - Reliable byte stream (TCP) - Connection management – Flow control -
Retransmission – TCP Congestion control - Congestion avoidance (DEC bit, RED) – QoS –Application
requirements.
PART - A
Q.No Questions BT Level Competence
1. What do you mean by slow start in TCP congestion? BTL 1 Remember
2. Draw a neat diagram of TCP header format. BTL 2 Understand
3. What are the services provided by Transport layer protocol? BTL 1 Remember
4. How does a fast retransmit mechanism of TCP work? BTL 3 Apply
5. Define congestion control. BTL 1 Remember
6. List the Quality of Service parameters of Transport layer. BTL 1 Remember
7. Define QoS. BTL 1 Remember
8. What are the approaches used to provide a range of Quality of Service BTL 3 Apply
(QoS)?
www.rejinpaul.com
9. Differentiate between TCP and UDP. BTL 2 Understand
10. Analyze the difference between congestion control and flow control. BTL 4 Analyze
11. How transport layer performs Duplication control? BTL 3 Apply
12. Enumerate the advantages of connectionless service & connection BTL 5 Evaluate
oriented service.
13. List the different phases used in TCP connection. BTL 1 Remember
14. Interpret the three ways of handshake. BTL 2 Understand
15. Why TCP services are called Stream delivery services? BTL 4 Analyze
16. A transport layer is creating the connection between source and BTL 4 Analyze
destination. What are the three events involved in the connection?
17. What happens if the quality of service parameters of Transport Layer is BTL 5 Evaluate
not followed? List some of the parameters you have considered.
18. Discuss the advantages of DEC bit mechanism. BTL 6 Create
19. Give the importance of all the flag fields used in a TCP connection. BTL 2 Understand
20. Recommend a scenario in which nagle’s algorithm is preferred by BTL 6 Create
stating the algorithm.
PART - B
1. Elaborate on TCP connection Management using neat diagrams. (13) BTL 6 Create
2. Demonstrate the Random Early Detection mechanism and derive the BTL 3 Apply
expression for drop probability. (13)
3. Explain the congestion control techniques used to improve QoS of the BTL 1 Remember
computer network. (13)
4. (i) Explain the three way handshake protocol to establish a transport BTL 1 Remember
level connection. (6)
(ii) List the various congestion control mechanisms. Explain any one in
detail. (7)
5. Analyze various congestion avoidance techniques in TCP. (13) BTL 4 Analyze
6. (i) Explain how reliable and ordered delivery is achieved through TCP. BTL 4 Analyze
(7)
(ii)Analyze why does TCP uses an adaptive transmission and describe
its mechanism. (6)
7. (i) Explain the Three Way Handshake protocol to establish the transport BTL 4 Analyze
level connection. (7)
(ii)Analyze the various duties of Transport Layer. (6)
8. (i)Explain how TCP manages a byte stream. (7) BTL 1 Remember
(ii)Identify and explain the states involved in TCP. (6)
www.rejinpaul.com
9. Discuss in detail about congestion avoidance in TCP BTL 2 Understand
(i)DEC bit (6)
(ii)Source based congestion avoidance. (7)
10. Write in detail the principle of establishment of QoS through BTL 1 Remember
differentiated services. (13)
11. (i) Illustrate in detail about the Quality of Service (QoS) and its related
parameters. (6) BTL 2 Understand
(ii) Summarize the application requirements in Quality of Service (QoS),
with a suitable example. (7)
12. (i)With neat sketches, explain about the retransmission techniques in BTL 3 Apply
detail. (7)
(ii)Explain the operation of Go Back – N protocol. (6)
13. Discuss in detail the various congestion control mechanisms in TCP. BTL 2 Understand
(13)
14. (i) What is the need for Nagle’s Algorithm? How does it determine BTL 5 Evaluate
when to transmit a data? (6)
(ii) For a path with 1,500 byte segments, RTT of 100ms, what is the loss
rate if we want to saturate a link of 100 Mbps? (7)
PART - C
1. (i) Draw the format of TCP packet header and explain each of its field. BTL 6 Create
(10)
(ii) Justify the allocation of variable field length for the fields in the TCP
header. (5)
2. (i) Explain the adaptive flow control and retransmission techniques used BTL 5 Evaluate
in TCP. (10)
(ii) With TCP slow start and AIMD for congestion control, show how
the window size will vary for the transmission for every lost fifth
packet? Assume an advertised window size of 50 MSS. (5)
3. Describe the adaptive transmission mechanism and how it has evolved BTL 6 Create
time as the Internet community has gained more experience using TCP.
(15)
4. Elaborate the following BTL 5 Evaluate
(i) The causes for congestion. (7)
(ii)Congestion control framework for ATM ABR service (8)
www.rejinpaul.com
UNIT V - APPLICATION LAYER
Traditional applications -Electronic Mail (SMTP, POP3, IMAP, MIME) – HTTP – Web Services – DNS-
SNMP.
PART –A
Q.No Questions BT Level Competence
1. What are the responsibilities of Application Layer? BTL 1 Remember
2. Assess the importance of Push and Pull Protocols. BTL 5 Evaluate
3. Name the two parts of addressing system in SMTP. BTL 1 Remember
4. What is SMTP? BTL 1 Remember
5. Mention the types of HTTP messages? BTL 3 Apply
6. Evaluate GET and SET in SNMP. BTL 5 Evaluate
7. Analyze the usage of “conditional get” in HTTP. BTL 4 Analyze
8. Mention the three phases of a POP-3 protocol. BTL 1 Remember
9. What do you mean by Web Service Description Language (WSDL)? BTL 1 Remember
10. Compare an user agent and a mail transfer agent. BTL 2 Understand
11. Write the uses of HTTP. BTL 2 Understand
12. Draw a diagram to illustrate tunnelling strategy. BTL 6 Create
13. Classify the basic functions of an email system. BTL 3 Apply
14. Compare HTTP with persistent and Non-persistent Connection. BTL 4 Analyze
15. What is DNS? BTL 1 Remember
16. Analyze the DNS cache issues which are involved in changing the IP BTL 4 Analyze
address of a web server host name?
17. Differentiate IMAP and SMTP. BTL 3 Apply
18. Write the uses of HTTP. BTL 2 Understand
19. Illustrate the format of HTTP response message. BTL 2 Understand
20. Draw the scenario of Electronics mail. BTL 6 Create
PART - B
1. (i)Illustrate the various steps involved in the use of non- persistent BTL 4 Analyze
connection of HTTP. (5)
(ii) Draw & explain the general format of a HTTP request message and a
response message. (8)
2. Write short notes on BTL 1 Remember
(i) Web Services (6)
(ii) SNMP (7)
3. (i) Discuss in detail about HTTP with neat diagram. (7) BTL 1 Remember
(ii)With relevant examples discuss how the domain space is divided. (6)
4. With appropriate diagram describe BTL 3 Apply
(i) DNS (7)
(ii) REST (6)
www.rejinpaul.com
5. (i) Describe the message format, the message transfer and the underlying BTL 3 Apply
protocol involved in the working of an electronic mail. (6)
(ii)Write short notes on WSDL in Web Services. (7) BTL 1 Remember
6. Describe the various applications of Mail Access Protocol with neat BTL 2 Understand
diagram. (13)
7. (i)Prepare a model of IMAP state transition diagram. (7) BTL 2 Understand
(ii)Outline the salient features of the SMTP protocol. (6)
8. (i)Elaborate Simple Object Access Protocol (SOAP) with a neat sketch. (8) BTL 5 Evaluate
(ii)Compare REST and SOAP. (5)
9. (i)Generalize the Traditional application in computer networks. (6) BTL 6 Create
(ii)Explain the role of a DNS on a computer network, including its
involvement in the process of a User accessing a web page. (7)
10. (i)Explain how SMTP transfers message from one host to another with BTL 4 Analyze
suitable illustration. (6)
(ii) Explain IMAP with its state transition diagram. (7)
11. (ii)Describe about Domain Name System. (6) BTL 1 Remember
(ii)Tabulate the various HTTP request operations. (7) BTL 3 Apply
12. Briefly discuss about any four network protocols. (13) BTL 4 Analyze
13. Explain in detail how electronic mail application is carried out in a BTL 1 Remember
network.Also explain the protocols used in this application. (13)
14. Describe the message format and the message transfer and the underlying BTL 2 Understand
protocol involved in the working of the electronic mail. (13)
PART - C
1. Discuss the working of Email and describe how SMTP protocol is used in BTL 6 Create
E-mail applications? (15)
2. Illustrate the sequence of events and the respective protocols involved BTL 6 Create
while accessing a web page from a machine when it is connected with
internet for first time. (15)
3. (i)Demonstrate how SMTP Protocol is used in E-mail applications. (7) BTL 5 Evaluate
(ii)How would you elaborate Hypertext Transfer Protocol with an
example? (8)
4. Construct the web service architecture and explain why SOAP is used as a BTL 5 Evaluate
protocol for accessing a web service? (15)