0% found this document useful (0 votes)
3 views8 pages

Computer Network Important Questions

Computer network
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views8 pages

Computer Network Important Questions

Computer network
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

lOMoARcPSD|29043879

Computer network important questions

Computer science engneering (Chandigarh University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Kruthishree.H Kruthishree.H (kkruthishreeh@gmail.com)
lOMoARcPSD|29043879

TUTORIAL QUESTION BANK


COMPUTER NETWORK

S.No QUESTION

1 State two disadvantages of twisted pair cables.


2 Define packet switching?
3 Define Data rate?
4 List two advantages and two disadvantages of bus topology in
network.
5 State Nyquist Bit Rate?
6 List two advantages of layering principle in computer
networks?
7 Explain the role of ARPANET in computer networks?
8 Distinguish between baseband transmission and broadband
transmission?
9 Define network.
10 List different types of networks?
11 Discuss why are protocols needed?
12 Discuss two points to improve the performance of network?
13 What is meant by topology? Name some popular topologies?
14 Define switching?
15 Describe Why are standards needed?
16 Write the importance about MAN?
17 Describe the Noise?
18 Write a short note on WAN?
19 List the Transmission Impairments?
20 Discuss on Distortion?
21 Describe TCP/IP Model? Explain the functions and protocols
22 Distinguish the OSI and TCP/IP Reference Models
23 Define computer networks? Describe various types of networks topologies in computer
network. Also discuss various
advantages and disadvantages of each topology.
24 Define switching? Explain circuit switching?
25 Give detailed note on three types of transmission impairment?
26 Distinguish between baseband transmission and broadband transmission?

27 Define switching? Explain packet switching?


28 With a neat sketch explain ISO/OSI reference model?
29 Define topology and explain the various topologies of the
network?
30 Discuss and compare various types of networks.
31 List out and explain are the applications of Computer
Networks?
32 Define OSI Model? Explain the functions and protocols and
services of each layer?
33 Explain the following:- a)LAN b)MAN c)WAN d)ARPANET
34 Explain how are OSI and ISO related to each other?
35 Differentiate four basic topologies? With diagrams.

36 Explain Shannon Capacity with example


37 Explain Nyquist Bit Rate with example?
38 Define Bit Rate and explain factors effects the bit rate?
39 List the layers of the TCP/IP reference model with neat
explanation.

Downloaded by Kruthishree.H Kruthishree.H (kkruthishreeh@gmail.com)


lOMoARcPSD|29043879

S.No QUESTION

40 Calculate the maximum bit rate? Consider a noiseless channel with a bandwidth of 3000
Hz transmitting a signal with two signal levels.
41 Imagine a signal travels through a transmission medium and its power is reduced to half. This
means p2 = (1/2) p1. Calculate Attenuation.

42 Consider a telephone line normally has a bandwidth of 3000 Hz (300 to 3300 Hz) assigned
for data communications. The signal-to-noise ratio is usually 3162. Calculate the channel
capacity for this channel?
43 A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per
minute with each frame carrying an average of 10,000 bits. What is the throughput of this
network?

44 Calculate the total time required to transfer a 1.5MB file in the following cases, assuming a
RTT of 80 ms, a packet size of 1 KB data, and an initial 2×RTT of hand shaking” before data
is Sent. The bandwidth is 10Mbps

45 What is redundancy?

46 What is vulnerable period?

47 List three categories of multiple access protocols?

48 Define CSMA and CDMA?

49 List out the available error detection methods.

50 What is an exponential back off?

51 What are the responsibilities of data link layer?


52 Mention the types of errors.
53 Define bridge?
54 Write a short note on Hub?
55 Describe the functionalities of router?
56 Define ALOHA?
57 Describe checksum?

Downloaded by Kruthishree.H Kruthishree.H (kkruthishreeh@gmail.com)


lOMoARcPSD|29043879

S.No QUESTION

58 What is HDLC?
59 Explain VLAN?
60 Write short notes on CRC generator
61 How performance is improved in CSMA/CD protocol
compared to CSMA protocol?
62 Give data transfer modes of HDLC?
63 What is vulnerable time?
64 Distinguish between FDMA and TDMA?
65 Compare and contrast Go back N and selective Repeat
66 List and briefly discuss the two different basic transmission technologies.
67 How many types of frames HDLC uses? Explain briefly?

68 What is pure ALOHA and slotted ALOHA? Consider the delay


of both at low load. Which one is less? Explain your answer.
70 Explain the working of carrier sense multiple access protocol?
71 Describe the back-off time of PURE ALOHA protocol?
72 Explain in details the types of bridges.
73 State and explain the functions of MAC.

74 How performance is improved in CSMA/CD protocol


compared to CSMA
75 How CSMA/CA differs from CSMA/CD. Explain in brief?

76 What is the purpose of the timer at the sender site in systems using
77 Explain Error Control & Flow Control.
78 Why collision is an issue in a random access protocol but not in
controlled access or channelizing protocols?
79 Compare and contrast a controlled access protocol with a channelizing protocol.
80 Do we need a multiple access protocol when we use the local loop of the telephone company to
access the internet? Explain.
81 Write short notes on CRC.
82 What are the steps followed in checksum generator?

83 Define parameter ‘a’? How does it affect the performance of the CSMA
84 Explain Virtual Local Area Network explain it?

85 Define ALOHA? What are the different types of ALOHA

86 Derive the Laplace transform of the message delay in FDMA in which every message contains a
random number of packets. Compare the expected message delay with that of TDMA?
87 A network with one primary and four secondary stations uses polling. The size of a data frame is
1000 bytes. The size of the poll, ACK and NAK frames are 32 bytes each. Each station has 5
frames to send. How many total bytes are exchanged if there is no limitation on the number of
frames a station can
send in response to a poll?
88 Find CRC for P = 110011 and M = 1100011?
89 One hundred stations on a pure ALOHA network share a 1- Mbps channel. If frames are
1000 bits long, find the throughput if each station is sending 10 frames/sec?
90 Calculate the hamming distance for each of the following code words?
i. d(10000,01000) ii. d(10101, 10010) iii.
d(1111,1111) iv. d(0000,0000)
91 State quality of service?
92 List the classifications of the adaptive algorithms?

93 List the classifications of the non-adaptive algorithms?

94 Write the keys for understanding the distance vector routing.


Downloaded by Kruthishree.H Kruthishree.H (kkruthishreeh@gmail.com)
lOMoARcPSD|29043879

95 Define Flooding?
96 What is meant by routing algorithm?

97 Give a note on optimality principle?


98 Define Adaptive routing algorithms?
99 Define Non-Adaptive routing algorithms?
100 What is congestion control?
101 Define Traffic shaping?
102 State on Leaky bucket algorithm?
103 Define Load shedding?
104 What are the design issues of network layer?
105 List network support layers and the user support layers?
106 State store and forward?
107 Illustrate shortest path?
108 Write the keys for understanding the link state routing.
109 List the requirements of the routing algorithms?
110 List the three variant s of the internetworking?
111 How the routers get the information about neighbor?
112 How the packet cost referred in distance vector and link state routing?
113 Describe the Routing Information protocol and Distance vector routing.
114 Explain Leaky bucket algorithm?
115 Describe the Traffic Shaping?
116 Explain in detail about non-adaptive algorithms?
117 Describe the Flooding algorithms?
118 List the fields of an IPv4 datagram header that participate in fragmentation and reassembly.

119 Explain the link state routing algorithm with an example?

120 State the major difference between Distance Vector Routing and Link state
121 Describe the various congestion control mechanism in detail?
122 Explain Internet Protocol with the neat block diagram of IP header foermate.
123 List and explain the features of the IPv6 Protocol?
124 Explain the IP packet format with neat diagram?

125 Describe the IPv6 packet format?


126 Explain the datagram delivery and forwarding in internet protocol?

127 Find the class of each IP address. Give suitable explanation.


i) 227.12.14.87 ii) 193.14.56.22 iii) 14.23.120.8 iv)
252.5.15.111 v) 134.11.78.56 vi) 172.18.58.1
128 Explain ICMPv6 protocol?

Downloaded by Kruthishree.H Kruthishree.H (kkruthishreeh@gmail.com)


lOMoARcPSD|29043879

129 Explain about Internet Control Message Protocol?


130
131 Write the following MASKS in slash notation (/n)? a) 255.0.0.0
b) 255.255.224.0
c) 255.255.255.0
d) 255.255.240.0
132 Why are we running out of IPv4 addresses? How does IPv6
solve this problem?
133 Find the class of the following IP addresses?
a)237.14.2.1
b)208..35.54.12
c)129.14.6.8
d) 114.34.2.8
134 Design the autonomous system with the following specifications :
a. There are 8 networks (N1 toN8)
b. There are8routers (R1 toR8)
c. N1,N2,N3,N4,N5 and N6 are Ethernet LANs
135 Consider a host using leaky bucket strategy for traffic shaping. The host sends a burst data at a rate
of 15Mbps for first 3 seconds and remains silent for 2 seconds. Then again a burst data at a rate of 6
Mbps is send for next 2 seconds and then the host remains silent for next 2 seconds. Now again the
host sends data at rate of 5 Mbps for next 3 seconds. What will be
the output data rate of the leaky bucket?
136 Design the autonomous system with the following specifications : N7 and N8 are point
to point WANs
a. R1 connects N1 andN2
b. R2 connects N1 andN7
c. R3 connects N2 andN8
137 List out functions of transport layer?

138 Define Multi-protocol router?

139 List out duties of the transport layer?

140 Define TCP? Or Reliable byte stream

141 Differentiate between network layer delivery and the

142 What are the different fields in pseudo header?

143 Define quality of service?


144 Explain the main idea of UDP? Or Simple De multiplexer
145 List the timers used by TCP.
146 How an application process running in one host is addressed by another process through TCP?
147 Describe datagram format of UDP?
148 What is traffic shaping?
149 State two protocols available at transport layer?

Downloaded by Kruthishree.H Kruthishree.H (kkruthishreeh@gmail.com)


lOMoARcPSD|29043879

S.No QUESTION

150 List out various congestion avoidance techniques?


151 Distinguish between contention and congestion?
152 How check sum is calculated in TCP?

153 State the use of SYN and FIN bits in TCP?


154 Explain the real transport protocol of UDP and how will you calculate checksum in UDP.
155 Draw neatly the TCP segment format and describe each of it.
156 List out the network performance characteristics.
157 Describe the adaptive retransmission policy in detail.
158 Explain the TCP connection establishment and termination.
159 Describe the three way handshake protocol to establish the transport level connection.
160 Draw TCP state transition diagram and describe each of it.
161 Give a detailed note on connection establishment?
162 Discuss about the TCP sliding window algorithm for flow control.
163 Write congestion control algorithms and describe how it works.

164 Explain leaky bucket and token bucket algorithm.


165 Distinguish UDP &TCP with suitable example?
166 Describe congestion avoidance techniques in detail?
167 List major types of networks and give brief note on each of it.
168 Illustrate data units at different layers of the TCP / IP protocol suite?

169 What is the difference between TCP and UDP?


170 Draw UDP header format with an example.
171 Explain transport layer services and its applications.
172 Explain the method congestion? Write a note on how to control congestion?
173 What is multiplexing? Explain with diagram
174 Explain Internet Transport Protocols?
175 What is the purpose of Domain Name System?
176 State advantages of stateless server of HTTP?
177 Define message Formatting?

178 Discuss the three main division of the domain name space.
179 Differentiate between FTP & HTTP?
180 Discuss the basic model of FTP.
181 Explain the need of Uniform Resource Locator inWWW.

182 List two applications of Application Layer?


183 Explain DNS Name Space?

184 List the advantages of Email?

185 Define SNMP?

Downloaded by Kruthishree.H Kruthishree.H (kkruthishreeh@gmail.com)


lOMoARcPSD|29043879

S.No QUESTION

186 Define FTP?

187 Define Lossy Compression and Lossless Compression?


188 What are the applications of WWW
189 Define domain name server.
190 What are the duties of FTP protocol?
191 Define two methods of HTTP?
192 Define Big-endian format and little-endian format?
193 Describe the role of the local name server and the authoritative name server in DNS?
194 Define Domain Name Service (DNS) and explain in detail .
195 What is HTTP protocol used for? What is the default port number of HTTP protocol?
196 Describe in detail about the World Wide Web (WWW)?
197 Explain the working principle of FTP in detail with neat
198 Explain the WWW in detail?
199 Differentiate between ARP and RARP?
200 Explain the specific purposes of the DNS, HTTP application layer protocols?
201 Compare and contrast client/server with peer-to-peer data
202 Compare and contrast client/server with peer-to-peer data transfer over networks.
203 Differentiate between ARP and RARP.
204 Define two methods of HTTP.
205 Describe the role of the local name server and the authoritative name server in DNS.
206 What is HTTP protocol used for? What is the default port number of HTTP protocol?
207 Explain email, telenet, source shell in detail.
208 Explain simple network management protocol.
209 Discuss the TCP connection needed in the FTP?
210 Define cryptography also explain symmetric key and asymmetric key cryptography.
211 Define Digital signature in detail.
212 Define firewall in detail.
213 Define RSA and Diffie hellman key exchange algo. In detail.

Downloaded by Kruthishree.H Kruthishree.H (kkruthishreeh@gmail.com)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy