COMPUTER NETWORKS (imp questions)
1 MARKS:
i. Difference between connection oriented and connection less communication
ii. What are the different issues of network model designing?
iii. How TCP/IP and OSI model is different from each other?
iv. Explain CSMA/CD protocol
v. Explain the working of repeaters, bridges , routers and gateways
vi. What is unicasting , multicasting and broadcasting?
vii. Explain the term computer networks and its goals
viii. What is the difference between MAC address and IP address?
ix. What is DNS and why is it required?
x. What is the remainder obtained by dividing x+x5+1 by generator polynomial x3+1?
xi. Contrast the three categories of services provided by ISDN
xii. For 5 devices in a network what is the number of cable links, required for mesh , ring , bus ,
and star topology
xiii. What is topology and define its types?
xiv. What are the different type of network configuration?
xv. What is multicast ?
xvi. What is OSI model and name its different layers?
xvii. Define protocol.
xviii. What is flow control
xix. Define DHCP.
xx. List out the five components of data communication system
xxi. State the duties of the network layer
xxii. What is transmission media and describe the types
xxiii. Write a note on network topologies
xxiv. Which ARQ mechanism utilises pipeline?
xxv. What is an ISDN? Explain its types and functions
xxvi. State the purpose of maintaining the routing table and where it is maintained?
xxvii. Define hamming distance
xxviii. List four methods used in framing.
xxix. What is the use of error control?
xxx. Define checksum
xxxi. Name the device used to connect similar LAN with same protocols.
xxxii. Define band rate and bandwidth.
xxxiii. What are the responsibilities if data link layer?
xxxiv. What is the benefit of DHCP?
xxxv. Enlist the salient feature of IPv6.
xxxvi. List the advantages over UDP or TCP
xxxvii. Expand the following: CDMA , ARPANET , GSM , XML
xxxviii. Write two disadvantages of star topology
xxxix. What is a hub?
xl. Describe the elementary protocol of data link layer
xli. Define sliding window protocol
xlii. Define data compression
5 MARKS:
i. Categorize the four basic topologies in terms of line configuration
ii. Define physical , logical and port address
iii. What is hamming distance? What is minimum hamming distance? Find the hamming
distance for the following cases:
Detection of 3 errors or correction of 2 errors
Detection of 6 errors or correction of 2 errors
iv. What is ARQ? Compare and contrast the Go-Back-N ARQ protocol with Selective-Repeat
ARQ.
v. Compare the TCP header and UDP header. List the fields in the TCP header that are missing
form UDP header. Give the reason for their absence
vi. Explain the design issues of session layer
vii. Explain all the security services provided by cryptography
viii. Write short note on the following:HTTP, FTP, Telnet, DSN , bridges , routers , gateways and
SMTP
ix. List different carrier sense protocol and explain them briefly
x. How CSMA/CD is different from CSMA/CA protocol?
xi. Explain the CRC error detection techniques using generator polynomial x3+1. A bit stream
10011101 is transmitted using standard CRC method what is the actual bit stream
transmitted?
xii. Explain the three way handshake protocol to establish the transport level connection
xiii. Describe DNS in detail. How dies DNS perform name resolution. What are the different types
of name servers?
xiv. Describe 1 bit sliding window protocol.
xv. How connection is managed in transport layer? Explain all the steps of this procedure.
xvi. Give the arguments of why the Leaky Bucket algorithm should allow just one packet per tick,
independent of how large the packet is?
xvii. Explain how hamming code can be used to correct burst error? Construct the odd parity
seven bit hamming code for the bit word 1011.
xviii. Explain the various techniques of substitution cipher.
xix. Compare IPV4 and IPv6.
xx. Explain : HDLC frames ; connectionless and connection oriented
xxi. What are the requirements of CRC?
xxii. State drawback of Stop and Wait protocols.
xxiii. What are the functions of transport layer. Explain in detail.
xxiv. Explain different error detection and correction techniques.
xxv. Explain in brief chanellization techniques.
xxvi. Draw the format of IEE 802.3 MAC frame. Explain each field in brief. Differentiate b/w
Ethernet and IEEE 802.3
xxvii. Explain the routing techniques.
xxviii. How will you transmit the packets by using datagram approach? Explain in detail with neat
diagram.
xxix. Describe the encryption and decryption process used in cipher of your choice.
xxx. Explain ARP and RARP with example give difference.
xxxi. Draw hybrid topology with a star backbone and three bus networks.
xxxii. How does FTP work? Differentiate between active and passive FTP. Also write its merits and
demerits.
xxxiii. Explain in detail real-time transport protocol(RTP)
xxxiv. Compare protocol and service interface; differentiate between switch and router.
xxxv. Define the different classes of IP address with its range and uses.
xxxvi. What is piggy-backing. Explain the three main access protocol in brief.(POP3 , IMAP, SMTP)
xxxvii. Explain the following terms with respect to networking: PPP and GSM.
xxxviii. Compare RTP and TCP
xxxix. Explain unicast, multicast and broadcast.
xl. What is error detection method? Calculate the checksum: 10110011 , 10101011, 010110101
and 11010101.
xli. List the policies of congestion prevention in transport data link and n/w layer.
6 MARKS:
i. Describe ISO/OSI model and TCP/IP reference model and mention the advantages and
disadvantages of both.
ii. What are the differences between narrow band ISDN and broadband ISDN
iii. Explain the significance of switching and explain the techniques used in computer
networks.
iv. What is computer network and discuss various type of network topologies? Also discuss
various advantages and disadvantages of computer networks?
v. What is OSI model? Explain the function , protocols and services of each layer
vi. Define the different classes of IP address with its range and uses
vii. Briefly explain the different types of transmission media in computer networks
viii. Explain the topologies with their merits and demerits in detail and draw the diagram
ix. What are the firewalls? Why are these used? Explain pack filter and proxy firewall.
x. Compare and contrast TCP and UDP, and also draw headers of both
xi. What do you mean by data communication? Define its three fundamentals
characterstics that determine the effectiveness of the data communication system
xii. Explain the following: LAN , MAN , WAN and ARPANET
xiii. What is data link layer and explain in detail?
xiv. What is congestion? Briefly describe the techniques and that prevents congestion