0% found this document useful (0 votes)
121 views2 pages

Computer Network Bank

This document contains 5 units of short and long questions related to computer networks. Unit 1 covers topics like the differences between routers and gateways, transport layer functions, terminal handling, and Nyquist theorem. Unit 2 discusses protocols like IEEE 802.4, CRC, stop-and-wait protocol, and CSMA variations. Unit 3 focuses on network layer topics such as load shedding, connection-oriented vs connectionless services, IPv6 improvements, and routing algorithms. Unit 4 compares TCP and UDP, explains encryption techniques, and TCP operation. Unit 5 presents application layer protocols including MIME, TFTP, remote login, DNS, and email protocols.

Uploaded by

Ayushi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views2 pages

Computer Network Bank

This document contains 5 units of short and long questions related to computer networks. Unit 1 covers topics like the differences between routers and gateways, transport layer functions, terminal handling, and Nyquist theorem. Unit 2 discusses protocols like IEEE 802.4, CRC, stop-and-wait protocol, and CSMA variations. Unit 3 focuses on network layer topics such as load shedding, connection-oriented vs connectionless services, IPv6 improvements, and routing algorithms. Unit 4 compares TCP and UDP, explains encryption techniques, and TCP operation. Unit 5 presents application layer protocols including MIME, TFTP, remote login, DNS, and email protocols.

Uploaded by

Ayushi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

DEWAN V.S.

INSTITUTE OF ENGINEERING AND TECHNOLOGY,MEERUT


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
SUB: Computer Network Code:RCS-601 Question Bank
UNIT -1
Short Questions:
1. What are the differences b/w Router and Gateway?(2011-12)
2. What are the functions of Transport Layer?
3. What do you mean by terminal handling?
4. State Nyquist theorem.(2011-12)
5. What are the differences b/w Router and Bridge

Long Questions:
(a)What are the number of cables links required for n devices conneted in mesh,ring,bus and star topology.(2014-15)
(b) Calculate the required bandwidth , if in a communication channel the signal power is 10 W, and the information
transmission rate is 10Kbps.
(c) Discuss the services od each layer of OSI reference model.
(d) It is required to transmit a data at a rate of 64Kbps over a 3KHz telephone channel. What is the minimum SNR required to
accomplish this?(2015-16)
(e) What do you mean by service primitives? Explain in detail.
(f) Explain the merits and demerits of TCP/IP reference model.(2011-12)

UNIT-2
Short Questions:
1. Describe IEEE 802.4.
2. If the frame is to be transmitted is 1101011011 and generator is x3+x2+1. What would be the transmitted frame after
CRC?
3. State drawbacks of stop and wait protocol?
4. What is the receiver window size in Go back-n protocol?
5. Compare Non-persistent and 1-persistent CSMA.
Long Questions:
(a) Consider the use of 1000bit frames on a 1MBPS satellite channel. What is max. link utilization for
1)stop and wait ARQ
2)continuous ARQ with window size 7
3)continuous ARQ with window size 127.

(b). Write short notes on followings: (1) IEEE 802.3 (2) IEEE 802.5 (2013-14)

(c) Discuss the different carrier sense protocols.How are they different than collision protocols.
Sketch the menchester and differential Manchester encoding for the bit stream 0001110101.
(d) Frames of 1500 bits are sent over a 1MBPS channel using geostationary satellite whose propagation time from
earth is 270ms.Four bit sequence numbers are used. What is max. channel utilization for Go back-n protocol?.

(e) Answer the following:


(i) Consider the use of 10 K-bit size frames on a 10. Mbps satellite channel with 770 rns delay. What is the link utilization for
stop-and-wait ARQ technique assumingP:10-3? (2012-13)
(ii) Prove, that for a slotted ALOHA system, the maximum throughput happens at G: l where G is the number of attempts per
packet time. (2012-13)
UNIT-3
Short Questions:
1.Define load shedding?
2. What are the differences b/w connection oriented and connectionless service in network layer?
3.Define Jitter. How can it control?
4. Discuss count to infinity problem.(2006-07)
5.What are the differences b/w ARP and RARP?

Long Questions:
(a) Explain briefly the new features in IPv6 as compared to IPv4. What is the purpose of multiple headers? Explain ,how IPv6
handles multiple headers?
(b) Explain Link State Routing in details with all steps?
(c) What is meant by fragmentation ? Is fragmentation needed in concentrated virtual circuit intemets, or in any datagram
system?(2013-14
(d) Explain Leaky Bucket Algo.?(2013-14)
A router inside an organization receives the same packet with the destination address 190.240.34.95.If the
subnet mask is /19.Find the subnet address?

(e) Explain Token bucket algorithm in details. Also discuss the advantages of token bucket algorithm over Leaky bucket
algorithm.
UNIT-4
Short Questions:
1. Differentiate b/w TCP and UDP.
2. Differentiate b/w block cipher and transposition cipher.(2006-07)
3. Discuss audio compression (2013-14)
4. Discuss about streaming audio.(2013-14)
5. Discuss three way handshaking.
Long Questions:
(a) Explain TCP sliding window management in details? Also explain Nagle algo. and Silly window syndrome?
(b).Explain public key cryptography in details?
Generate the public key and secret key for the following numbers Using RSA algo.
P=3, Q=11
(c) Explain about the TCP header and working of TCP protocol and differentiate between TCP and UDP with frame format.
(2013-14)
(d) Define cryptography with the help of block diagram of Symmetric and Asymmetric key cryptography(2013-14)
(e) Discuss RPC design and implementation issue.(2006-07)

UNIT-5
Short Questions:
1 Define MIME?
2. Describe TFTP?
3. What do you mean by Remote login?
4. What is Domain name system? How does it work?(2011-12)
5. Discuss about ATM virtual circuit. Give its advantages
Long Questions:
(a) What is the difference b/w an active web document and dynamic web page? Also explain the role of CGI.(2015-16)
(b) What are the problems for full implementation of voice over IP? Did you think we will stop using the telephone
network very soon.
(c) Explain the SMTP can handle transfer of videos and images ? Also explain the advantages of IMAP4 over POP3 mail
access protols.(2015-16)
(d) Explain about e-mail architecture and services.(2013-14)
(e) What are the uses of IMAP and POP? Describe the major difference between them and compare on the basis of their
working.(2005-06)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy