CN QUESTION BANK

nullpitΔίκτυα και Επικοινωνίες

23 Οκτ 2013 (πριν από 4 χρόνια και 15 μέρες)

76 εμφανίσεις

CN QUESTION BANK



Chap
-
1

1.


You are surfing the net from your terminal.Identify software and hardware
components and relate them with ISO
-
OSI layered model.

2.

Explain Circuit Switching, Packet Switching with suitable example and timing
diagrams.

3.

Explain Sub
-
n
etting.

4.

What is the Principal difference between connection less and connection oriented
communication.Characterize al the aspects in terms of quality and service?

5.

List two ways in which the OSI reference model and TCP/IP reference model are
the same and t
he two ways in which they differ?

6.

Explain the need for the layered architecture of computer network.Also explain data
transmission and protocols in layered architecture.

7.

What is standardization? What is need of standardization? Explain standardization
of c
omputer network in brief.

8.

For a channel with 1 Hz bandwidth, if SNR for this channel IS 63. Find bit rate and
signal level.

9.
List two ways in which ISO reference model and TCP/IP


reference model are the same and two ways in which they


differ?

10.

Differentiate X.25 and Frame Relay?

11.

What is difference between a protocol and a service interface ? Explain your answer
in terms of OSI seven layer models.

12.

Write advantages and disadvantages of connection oriented service with
connectionless service and w
rite example application.






Chap
-
2



1.

State

different
P
hysical
Media

properties.
A
lso write about
T
wisted
P
air
C
ables.

2.

Describe

any

five functions of data link layer with
suitable

examples.

3.

Write

detailed notes on PC to PC
communication
.

4.

S
ta
t
e diff. physi
cal media properties .
E
xplain any one in detail.

5.

C
ompare the performance characteristics of coaxial,twisted pair and fiber optic
tramsmission media.

6.

A

network on the internet has a
subnet

mask of 255.255.240.0.what is the max no.
of hosts it can handle.

7.

Ex
plain

one bit sliding window protocol in detail.




Chap
-
3


1.

Find

the hamming code for 1001101.




2.

Explain n
-
bit sliding window protocol.


3.

Consider an
error

detecting CRC with the generator 10101


(a) compute th
e transmitted bit sequence

for the data bit sequence 1101101



(b)

the string of bits 110011001100 is received .is it acceptable and if so what is


the data bit sequence.


4.
E
xplain stop and wait and sliding window protocols
with suitable examples.

5.
D
raw NRZ and Manchester encoding signal transitions for 1000 0110 1111
.

6.
Describe

any five functions of data link layer with suitable examples.

7.
What

is CRC?write the algorithm for computing checksumand explain with


sui
table example.

8.

Consider

an error detecting CRC with the generator 10101.assume the CRC bits
follows the data bits in any transmission.

(a)

compute the transmitted bit sequence for the data bit sequence 01101101.

(b)

The string of bits 11001100 1100 is received.i
s it acceptable and if so
what is the data bit sequence.

9.

1 Gbps CSMA/CD LAN is to be designed over 1 km cable without repeator.the
cable supports signal speed of 200,000 km/sec.what is the max frame size that the
data link should be considered?







Chap
-
4

1.

list Bluetooth features and explain network formation process.

2.

explain the significant role of propogation delay in Ethernet segment.

3.

describe hidden station and exposed station problem in wireless lan.

4.

give functionality of each of the following interne
tworking devices and mention
the layer in which each one operates
-
repeater,hub,bridge,switch,router and
gateway.

5.

compare 802.3,802.4 and 802.5?

6.

write a detailed note on Bluetooth.

7.

give the fu
n
ctions of re
peater,hub,bridge,switch,router

and gateway.

8.

what i
s a hub?explain various types of hub? How hub is different from switch.

9.

identify requirements to setup a LAN based laboratory with 20 terminals.the lab
should provide linux,windows and database servers.list all the components with
their specifications inc
luding various software. List the assumptions and security
features provided.

10.

write short notes on aloha and Bluetooth.

11.

describe the working of a wireless LAN protocol.

12.

describe ISDN , its categories,content and working
?

13.

explain how Ethernet (IEEE 802.3) w
orks when two or more stations want to
transmit a frame.

14.

derive the formula for measuring the efficiency of the ALOHA system and
explain how the efficiency is increased for slotted ALOHA.

15.

how are collisions handled by a 1
-
persistent CSMA protocol?give an e
xample of a
collision free multiple access protocol and explain it in detail.

16.

describe the working of a multiple access protocol for wireless LAN’s.could csma
be used instead?justify.

CHAPTER 5

1.

List the 10 important features of IPV6 Protocol considering ad
dressing, flow control
,error control ,Security ,mobility, Quality of service.

2.

List the special IP addresses (not class A,B).

3.

Explain the working of internetworking in terms of IP and MAC addresses.

4.

Explain Congestion control.

5.

What is static routing?What a
re the advantages of dynamic routing?Explain shortest
path routing in detail.

6.

Describe the classification of IP
-
addresses in IPV4.

7.

What are different types of routing algorithms?Explain any one in detail.

8.

Explain leaky bucket algorithm in detail.Also expla
in advantages and disadvantages
of same compared with token bucket algorithm.

9.

Explain the following terms. IP address, Bandwidth, latency, socket, CCITT, Virtual
protocol, X.25.

10.

What does routing mean and how does it work? Describe routing table structure?

11.

Describe Address Resolution Protocol? What are the difficulties for having a mobile
IP?What can be the solution?

12.

What is internet working? Describe the devices used in internet working?

13.

Give one approach of Congestion control in Datagram Subnets.

14.

Explain

Count
-
to
-
Infinity problem with the help of an example. It is a drawback of
which algorithm?

15.

Briefly explain the primary parameters that are the requirements to provide Quality of
Service in 1 network.

16.

How is Routing done in the Internet? Explain one Inter
ior Gateway Routing Protocol

17.

ARP and RARP both map addresses from one space to another. In this respect they
are similar. In major way do they differ?

18.




Consider the subnet shown above.Determine vector routing is used and the following
vec
tors have just come to Router C
-

From B: (5,0,8,12,6,2)

From D: (16,12,P,0,9,10)

From E: (7,6,3,9,0,4)

Measured delays to B,D and E are 6,3 and 5 respectively.What is C’s new routing
table?Give both the outgoing line to use and the expected delay.



Chap 6

1.

state the use of timers in physical,data link,network and transport layers.

2.

state different TCP flags.

3.

why does UDP exist?would it not have been enough to just let user processes send
raw IP packets?

4.

how TCP controls congestion?

5.

differentiate between TCP
& UDP?

6.

discuss the services offered by transport layer.

7.

write short noteds on Qos in transport layer.

8.

describe the TCP segment header in detail?

9.

describe a scenario in which a tcp connection request is received by a tcp end
point ,but there is infact no co
rresponding tcp endpoint who wishes to establish
communication with the receiver.

10.

show how tcp connection setup protects against the situation in exchange.

(a)

draw the space time diagram for protocol message and explain how the
protocol works.

11.

explain the d
ifference of UDP and TCP socket of server sideespecially when the
client initiates the connection or request to the server.

12.

draw the protocol; stack of internet and write protocol data unit(PDU) of each
layer.

13.

how are the ports numbered using TCP or UDP in

demultiplexing incoming
segments.

14.

which protocol Go
-
Back
-
N or selective
-
repeat makes more efficient use of
network bandwidth?why?

15.

explain sliding window protocol.draw the sender and receiver windows for a
system using Go
-
Back
-
N sliding window system given

that:
-

(i)

frame 0 is sent; frame 0 is ACK

(ii)

frame 1 &2 are sent; frame 1 &2 are ACK.

(iii)

Frame 3,4,5 are sent, frame 4 is ACK and Timder for frame 5 expires.

(iv)

Frame 5,6,7 are sent, frame 4 through 7 are ACK.




Chap
-
7


1.

how mails are sent and received.show with diag
rams.also draw mail headers.

2.

write short notes on DNS,SMTP.

3.

what are “Domain Name System”

and “Name Server”?how are they related?

4.

what is the difference between push protocol and pull protocol?explain using
HTTP and SMTP.








Chap
-

8


1.

how to achieve aut
hentication with secret key.justify it.also describe
authentication with KDC mechanism.

2.

explain RSA algorithm with suitable example for public key security.

3.

write short note in digital certificate.

4.

write detailed notes on Cryptography

5.

write a pseudo
-
code t
o encrypt given text data and decrypt the encrypted data into
original text data.

6.

explain the following i)Email
ii)FTP iii)TELNET iv
)Directory services.

7.

explain how a session layer establishes, maintains and synchronises the
interaction between two communi
cating hosts?

8.

what are the issues in communication security?

9.

describe in detail thje working of WWW. What is the difference between WWW
and the internet?

10.

distuinguish between the application and application layer protocol.use World
Wide Web as an example.




Chap 9


1.

explain ATM adaptation layer.also describe VPI and VCI concept.

2.

write detailed notes on Linux operating system.