0% found this document useful (0 votes)
13 views3 pages

Suggestions DCCN

The document outlines a comprehensive curriculum covering various networking concepts across five modules. Topics include comparative studies of OSI and TCP/IP layers, data flow types, transmission media, network topologies, delay definitions, error detection techniques, IP addressing, transport layer functionalities, and network security. Each module contains multiple questions aimed at exploring theoretical and practical aspects of networking protocols and technologies.

Uploaded by

Ranit Sarkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views3 pages

Suggestions DCCN

The document outlines a comprehensive curriculum covering various networking concepts across five modules. Topics include comparative studies of OSI and TCP/IP layers, data flow types, transmission media, network topologies, delay definitions, error detection techniques, IP addressing, transport layer functionalities, and network security. Each module contains multiple questions aimed at exploring theoretical and practical aspects of networking protocols and technologies.

Uploaded by

Ranit Sarkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

MODULE 1:

1.​ Make a comparative study between OSI Layer and TCP/IP Layer.
2.​ What are the different types of data flow?
3.​ Discuss different types of Transmission Media.
4.​ Discuss Mesh topology along with a diagram
5.​ Discuss Star Topology, ring topology and hybrid topology with diagrams.
6.​ Compare and contrast between Circuit Switching and Packet Switching.
7.​ Define Line Coding. Explain various techniques of Line Coding.

MODULE 2:

1.​ Define Propagation Delay, Transmission Delay, Queuing Delay and Processing Delay.
2.​ Establish the relation between throughput and bandwidth.
3.​ If Transmission delay is 1mSec and Propagation delay is 1.5mSec then what is the
efficiency?
4.​ Discuss Sliding Window Protocol.
5.​ Discuss Duplicate Packet Problem and Missing Packet Problem.
6.​ In Go Back 4, if every 6th packet is lost when transmitted and we have 10 packets to
send, then how many transmissions are required?
7.​ Make a comparative study among Go Back N ARQ, Selective Repeat ARQ and Stop
and Wait ARQ.
8.​ What is the purpose of Time Out Timer? Why is the Sequence number added to the data
packet as well as in the acknowledgement packet during transmission of packets?
9.​ Calculate the Transmission Time for 2KB data packets where Bandwidth of the channel
is 10Mbps. (16*10^-4 seconds)
10.​ In Go Back N ARQ if the sender window size is ‘Q’ then calculate the number of
sequence bits.
11.​Given length of the cable is 100 meters, velocity of the cable is 2*10^8 m/s and
Bandwidth is 10Mbps. Calculate the Data Size when channel utilization is 50%. (10 bits)
12.​Make a comparative study on PAN, LAN, WAN and MAN.
13.​What is the disadvantage of Fixed Size framing?
14.​What are the different approaches to avoiding bit corruption during transmission?
15.​Make a comparison between Bit Stuffing and Byte Stuffing.
16.​Discuss IEEE802.3 Frame format.
17.​Explain any one of the Error detection Techniques with an example.
18.​Suppose the actual Data to be transmitted is 100100. Generating Function G(x) =
x^3+x^2+1. Calculate the final data to be transmitted using CRC and verify whether the
data received by the receiver is the same as the data transmitted or not.
19.​Name one Error Correction technique and have a detailed explanation on it.
20.​State one advantage and disadvantage of Independent Acknowledgment and
Cumulative acknowledgement each.
21.​In Go Back N ARQ if both the sender window size and receiver window size is 1 then
what does it indicate?
22.​State the functionalities of MAC Sublayer.
23.​What are the different Random Access Protocols?
24.​Calculate the maximum efficiency of PURE ALOHA.
25.​Discuss different CSMA access modes.
26.​Differentiate between CSMA/CD and CSMA/CA.
27.​Make a detailed study on the Token Ring Passing.
28.​Have a comparative study between TDMA, CDMA and FDMA.
29.​Write a short note on MAC Addressing.
30.​How is a MAC Address related to NIC?

MODULE 3:

1.​ Name four Network Layer protocols. Discuss any two of them.
2.​ Discuss IPV4 Header in detail.
3.​ What is the difference between Multicasting and Broadcasting?
4.​ Make a detailed discussion on Classful IP Addressing.
5.​ What are the parameters considered while designing a routing protocol?
6.​ An organization is granted the block 130.56.0.0/16. The administrator wants to create
1024 subnets. a)Find the number of addresses in each subnet. (64) b) Find the first and
last addresses of the first subnet. (130.56.0.0 to 130.56.0.63)
7.​ Explain ARP and RARP.
8.​ What is the purpose of ICMP protocol?
9.​ Make a comparative study between IPV4 and IPV6 addresses.
10.​ Comparison between Link state and Distance Vector algorithms.
11.​What are the different components of IP version 4 address? How is an IP address
represented? What are the different ways to avoid the shortage problem of IPv4
Address?
12.​What is the purpose of using loopback Address? Why is an IP address unique? A
subnet mask in class A has fourteen 1’s. How many subnets does it define?
13.​What is the subnetwork address if the destination address is 200.45.34.56 and the
subnet mask is 255.255.240.0? (200.45.32.0)
14.​Identify total number of Networks, total number of IP addresses and number of hosts in
Class A and Class C IP addresses.
15.​Explain VLSM in detail.
16.​Define the Rules of CIDR block.

MODULE 4 and MODULE 5:

1.​ What is Port Number? What are the three different types of Port Number?
2.​ Discuss connectionless and connection-oriented services.
3.​ Make a comparative study between TCP and UDP.
4.​ Discuss Congestion control policy in networking.
5.​ What are the two possible transport services? What is meant by segment? What is
congestion?
6.​ The transport layer creates the connection between source and destination. What are
the three events involved in the connection?
7.​ Why are TCP services called Stream Delivery Services?
8.​ Explain the functionalities of the Transport layer.
9.​ Explain Leaky Bucket and Token Bucket Algorithm.
10.​How is Gateway different from Router?
11.​How Router is different from the switch?
12.​ What is the purpose of Port Number?
13.​What is the port number associated with FTP and which transport layer protocol is used
by FTP?
14.​What is the purpose of FTP?
15.​Describe Namespace.
16.​ Make a short description on Domain Name Space.
17.​What is the difference between IMAP and POP?
18.​What is digital signature?
19.​What is PING?
20.​Write short note on : a) SMTP b) HTTP
21.​What is the purpose of DHCP service?
22.​What is the significance of Network Security?
23.​Explain in detail about function and structure of e-mail protocol.
24.​Write a short note on the World Wide Web.
25.​What are the responsibilities of the Presentation layer and Session layer of OSI Model.
26.​What are the responsibilities of the Transport Layer?
27.​What is Piggybacking?
28.​Explain 3-way Handshaking.
29.​What happens when you type a URL in a web browser?
30.​What is the difference between Firewall and Antivirus?
31.​How HTTPs is different from HTTP?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy