0% found this document useful (0 votes)
67 views3 pages

CN Question Bank

This document outlines the topics and objectives covered in 6 units of a Computer Networks course. Unit 1 covers network types and topologies, transmission media, Ethernet cabling, and LAN technologies. Unit 2 discusses error detection/correction mechanisms, ARQ protocols, and CSMA protocols. Unit 3 compares circuit and packet switching, describes IPv6, routing protocols, and unicast routing. Unit 4 explains DNS, protocols like Telnet, FTP, HTTP, and SNMP. Unit 5 covers multiplexing techniques and spread spectrum. Unit 6 discusses email security, cryptography, and the OSI security model. Diagrams and examples are included for most topics.

Uploaded by

Tejas Aditya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views3 pages

CN Question Bank

This document outlines the topics and objectives covered in 6 units of a Computer Networks course. Unit 1 covers network types and topologies, transmission media, Ethernet cabling, and LAN technologies. Unit 2 discusses error detection/correction mechanisms, ARQ protocols, and CSMA protocols. Unit 3 compares circuit and packet switching, describes IPv6, routing protocols, and unicast routing. Unit 4 explains DNS, protocols like Telnet, FTP, HTTP, and SNMP. Unit 5 covers multiplexing techniques and spread spectrum. Unit 6 discusses email security, cryptography, and the OSI security model. Diagrams and examples are included for most topics.

Uploaded by

Tejas Aditya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

BHARATI VIDYAPEETH (DEEMED TO BE UNIVERSITY)

COLLEGE OF ENGINEERING, PUNE


B.Tech CSBS SEM-VI
Subject-Computer Networks
UNIT 1

1. Explain various types of network based on size with diagram.


(Also differentiate in tabular form)
2. Explain different types of topology with diagram.
3. Explain working of Hub, Switch bridge and Routers in detail with diagram.
4. Explain in detail OSI reference model with diagram.
5. Classify various types of transmission media with diagram.
6. Describe Ethernet cabling in detail.
7. Describe the following concepts in detail: –
i. Twisted Pair Cable
ii. Coaxial cable
iii. Optic Fiber Cable
8. Explain fiber optic modes of propagation with diagram.
9. Explain different network devices with diagram? (also comparison in
tabular form)
10. Explain in detail with diagram: Wired LAN, Wireless LAN, Virtual LAN

UNIT 2

1. Explain the various error detection and correction Mechanisms used in


computer network
2. Discuss about
i. GO BACK N ARQ
ii. Selective repeat ARQ
iii. Stop and wait protocol
3. Explain sliding window protocol in detail. Compare and contrast the
GO BACK-N ARQ protocol with selective repeat ARQ.
4. Explain about the Carrier Sense Multiple Access Protocols?
5. Describe in detail with diagram about-
i. CSMS/CD
ii. CSMA/CA
6. Describe sliding window protocol using Go back n.
7. Explain various error detection and correction methods in detail.
8. Explain the working of CRC in detail.
9. A bit stream 10011101 is transmitted using the standard CRC method.
The generator polynomial is x3+1
i. What is the actual bit string transmitted?
ii. Suppose the third bit from the left is inverted during
transmission. How will receiver detect this error?
10.A bit stream 1101011011 is transmitted using the standard CRC
method. The generator polynomial is x4+x+1. What is the actual bit
string transmitted?
11.A bit stream 1001101 is transmitted using hamming code. Show the
actual bit string transmitted. Suppose 7th bit from left is inverted during
transmission show that this error is detected and corrected at the
receivers end.

UNIT 3

1. List the difference between circuit switching and Packet switching.


2. Explain circuit switching and packet switching in detail.
3. Compare IPV6 and IPV4. Draw and explain IPV6 header format.
4. Draw and explain IPv6 header. Explain significance of extension header.
5. Explain in detail:
a. ARP
b. RARP
c. BOOTP
6. Write note on DHCP.
7. Explain routing protocols RIP and BGP with diagram.
8. Explain path vector routing. Discuss its advantages over distance vector
routing.
9. Explain different Unicast Routing Protocol.
10.Explain in detail Unicast Routing Protocols:
a. Distance Vector Routing (RIP)
b. Link State Routing (OSPF)
c. Path Vector Routing (BGP)
UNIT 4
1. Explain DNS. Explain DNS message format. Also explain its various
resource records with one example.
2. Explain with diagram:
1) TELNET
2) Email
3) Bluetooth
4) Firewall
5) DNS
3. Explain FTP. Can we specify file transfer in a webpage? Explain with the
help of suitable example. Explain any four FTP commands.
4. Explain HTTP in detail. Explain HTTP request and reply message.
5. Explain in detail : SNMP
6. Explain SNMP in detail. Why SNMP needed in Computer network.
Explain any four SNMP commands.

UNIT 5
1. Explain Multiplexing in detail. Explain any 2 types of multiplexing in
brief with its application.
2. Write a note on FDM.
3. What is Frequency division multiplexing? How does it work? How does
it different from WDM and TDM.
4. Write a note on WDM.
5. Explain TDM in detail.
6. Explain spread spectrum in detail.
7. What is spread spectrum. Explain different spread spectrum techniques
with its advantages.
8. Write a note on FHSS.
9. Write a note on DSSS.

UNIT 6
1. Explain in detail E-mail Security.
2. Write a note on E-Mail Security Services
3. Explain in detail directory services and network management.
4. Explain various components of cryptography.
5. Explain different cryptographic techniques used in Computer network.
Explain the following cryptographic techniques used in Computer
networks.
6. Differentiate symmetric and asymmetric encryption?
7. Explain about OSI Security architecture model with neat diagram.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy