CN
CN
Explain the scenario where a computer sends a frame to another computer on a bus
topology LAN and the physical destination address of the frame becomes corrupted
during transmission. Analyze the layers of the OSI and TCP/IP models involved in
handling this situation. Additionally, discuss how the sender can be informed about
this issue within the context of networking protocols and their deficiencies.
2. If a computer sends a packet at the network layer to another computer within the
Internet, and the logical destination address of the packet becomes corrupted,
analyze the functions of each layer in the OSI and TCP/IP models in response to this
scenario. Additionally, discuss the mechanisms through which the source computer
can be notified of this issue, considering the responsibilities of each networking layer.
3. List the three traditional switching methods. What are the most common today?
4. Compare space-division and time-division switches.
5. Compare and contrast a circuit-switched network and a packet-switched network.
6. If the data link layer can detect errors between hops, why do you think we need
another checking mechanism at the transport layer?
7. Give some advantages and disadvantages of combining the session, presentation, and
application layer in the OSI model into one single application layer in the Internet
model.
8. Explain the relationship between period and frequency, demonstrating the
responsibilities of each concept in their respective contexts.
9. Differentiate between a signal element and a data element, demonstrating the role
and responsibilities of each within the context of network communication layers.
10. Define block coding and demonstrate its purpose within the context of network
communication layers.
11. Describe the three main multiplexing techniques and demonstrate their roles in
network communication layers. Additionally, distinguish between guided and
unguided media, explaining their responsibilities within the networking context.
12. Compare and contrast a circuit-switched network and a packet-switched network.
What is the role of the address field in a packet traveling through a datagram
13. network?
14. Compare and contrast a circuit-switched network and a packet-switched network,
demonstrating the responsibilities of each within the network communication layers.
Additionally, explain the role of the address field in a packet traveling through a
datagram network.
15. Compare and contrast a circuit-switched network and a packet-switched network,
demonstrating the responsibilities of each within the network communication layers.
Additionally, explain the role of the address field in a packet traveling through a
datagram network.
16. .Distinguish between forward error correction versus error correction by
retransmission. What is the Hamming distance? What is the minimum Hamming
distance?
17. Distinguish between forward error correction and error correction by retransmission,
analyzing their applications in solving complex computing problems. Define the
Hamming distance and explain the concept of minimum Hamming distance.
18. What kind of error is undetectable by the checksum? Briefly describe the services
provided by the data link layer.
19. Explain piggybacking and evaluate its effectiveness within existing network protocols,
identifying potential deficiencies and suggesting improvements.
20. Compare and contrast the Go-Back-N ARQ Protocol with Selective-Repeat ARQ,
analyzing their strengths and weaknesses within existing network protocols and
proposing enhancements.
21. Compare and contrast HDLC with PPP, assessing their functionalities within existing
network protocols and identifying areas for improvement. Determine which protocol
is byte-oriented and which one is bit-oriented.
22. Compare and contrast byte-stuffing and bit-stuffing, evaluating their effectiveness
within existing network protocols and suggesting optimizations. Determine which
technique is typically used in byte-oriented protocols and which one is used in bit-
oriented protocols, considering their respective advantages and limitations.
23. Compare and contrast a random access protocol with a controlled access protocol.
What is a transparent bridge? What is the difference between a forwarding port and a
blocking port?
24. What are the differences between classful addressing and classless addressing in
IPv4?
25. Briefly define subnetting and super netting. How do the subnet mask and super
netting mask differ from a default mask in classful addressing?
26. Explain dotted decimal notation in IPv4 addressing, examining its significance in
effective communication within professional contexts. Determine the number of bytes
in an IPv4 address represented in dotted decimal notation. Discuss hexadecimal
notation in IPv6 addressing, and analyze the number of digits in an IPv6 address
represented in hexadecimal notation within professional communication parameters.
27. List the classes in classful addressing and define the application of each class (unicast,
28. multicast, broadcast, or reserve).
29. Explain the concept of a mask in IPv4 addressing, detailing its role in network
configuration within professional contexts. Define a default mask in IPv4 addressing
and discuss its significance. Identify the network address within a block of addresses
and propose methodologies for determining the network address given one of the
addresses in the block, considering professional standards and practices.
30. Is the size of the ARP packet fixed? Explain.
31. Give an example of a situation in which a host would never receive a redirection
32. message.
33. What is the difference between a direct and an indirect delivery?
34. Find the difference between Intra and Interdomain routing. Justify the statement with
suitable example “ In distance vector routing, each node shares its routing table with
its immediate neighbors periodically and when there is a change.”
35. What is the purpose of RIP? What are the functions of a RIP message? How does the
hop count limit alleviate RIP's problems?
36. create a routing table using path vector routing and show the construction of path
using this concept. Using Dijkstra algorithm show the formation of shortest path tree
for link state routing. Why do OSPF messages propagate faster than RIP messages?
37. Do port addresses need to be unique? Why or why not? Why are port addresses
shorter than IP addresses? What is the maximum size of the process data that can be
encapsulated in a UDP datagram?
38. What is the minimum and maximum size of the TCP header? Describe TCP’s
handshaking procedure.
39. How are congestion control and quality of service related? What determines the
sender window size in TCP?
40. what are the techniques to improve the QoS? Explain leaky bucket with suitable
example.