0% found this document useful (0 votes)
9 views38 pages

QB PCCCS602 2025

The document is a question bank for the Computer Network course (PCC-CS-602) for the academic session 2024-25 at the Academy of Technology. It includes a detailed syllabus divided into five units covering various topics such as data communication, network layers, protocols, and security, along with course outcomes aligned with Bloom's Taxonomy. Additionally, it contains a series of questions categorized into Part A and Part B for assessment purposes.

Uploaded by

iamtiyasa27
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views38 pages

QB PCCCS602 2025

The document is a question bank for the Computer Network course (PCC-CS-602) for the academic session 2024-25 at the Academy of Technology. It includes a detailed syllabus divided into five units covering various topics such as data communication, network layers, protocols, and security, along with course outcomes aligned with Bloom's Taxonomy. Additionally, it contains a series of questions categorized into Part A and Part B for assessment purposes.

Uploaded by

iamtiyasa27
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

ACADEMY OF TECHNOLOGY

QUESTION BANK
Academic Session: 2024-25

Course Name: Computer Network Course Code: PCC-CS-602

Department: CSE Semester: 6th

Course Type: Theory Course Category: Course Major

Contact Hours per week: 3 HRS Credit: 3

Faculty Name(s): Prof. Jyotirmoy Chakrabarti (CSE-1 & CSE-2), Prof. Rakhi Neogi(CSE-3)

Dept. of Faculty: Electronics & Communication Engineering (ECE)

Module Wise University Syllabus:


Mod No. Topics

UNIT I
Data communications components: introduction, data representation
(ASCII, ISO etc.), direction of data flow (simplex, half duplex, full
duplex); network criteria, physical structure (type of connection,
topology), categories of network (LAN, MAN, WAN); Internet: brief
history, Protocols and standards; Networking models: ISO OSI model,
TCP/IP reference model, their comparative study.
Overview of data (analog & digital), signal (analog & digital),
transmission (analog & digital) & transmission media (guided &
unguided);
LAN: Wired LAN, Wireless LANs, Connecting LAN and Virtual LAN
Techniques for Bandwidth utilization: Multiplexing - Frequency division,
Time division and Wave division, Concepts on spread spectrum

Data Link Layer and Medium Access Sub Layer: Types of errors, framing
UNIT II (character and bit stuffing), Fundamentals, Block coding, Hamming
Distance, CRC; error detection & correction methods; Flow control;
Protocols: Stop & wait ARQ, Go -Back-N ARQ, Selective repeat ARQ,
Piggybacking, HDLC.
Point to Point Protocol, LCP, NCP, Token passing; Reservation, Polling,
Multiple access protocols: Pure ALOHA, Slotted ALOHA,
CSMA, CSMA/CD, CSMA/CA.
Network Layer: Internetworking & devices: Repeaters, Hubs, Bridges,
UNIT III Switches, Router, Gateway; Addressing: IPv4 addressing, sub-netting;
Routing: techniques, static vs. dynamic routing, forwarding, Unicast
Routing Protocols: RIP, OSPF, BGP; Address mapping – ARP, RARP,
BOOTP and DHCP–Delivery,

Transport Layer: Process to Process delivery; UDP; TCP; Congestion


UNIT IV Control: Open Loop, Closed Loop choke packets; Quality of service:
techniques to improve QoS: Leaky bucket algorithm, Token bucket
algorithm.

Application Layer: Introduction to DNS, DDNS, SMTP, SNMP, FTP,


UNIT V HTTP, TELNET, WWW; Security: Cryptography (Public, Private Key based),
Digital Signature, Firewalls. Introduction to Bluetooth, Firewalls.

Course Outcomes (CO):


At the end of this module the students will be able to

CO No. Outcome Bloom’s Taxonomy Level

CO.01. To analyze the layered network I: Remembering,


architecture and compare between OSI II: Understanding
and TCP/IP models and identify the
responsibility of each layer

CO.02. To explain the concept of data and I: Remembering,


signal, representation of data, data II: Understanding,
transmission, conversion of data to III: Applying
signal and vice-versa
CO.03. To describe error control, flow control I: Remembering,
and access control mechanisms involved II: Understanding,
in the data link layer of different IEEE III: Applying,
standards to improve the network IV: Analyzing
performance

CO.04. To explain IP addressing, sub-netting II: Understanding,


and routing in packet switched networks III: Applying,
IV: Analyzing,
V: Evaluating

Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi


AOT
CO.05. To describe congestion control II: Understanding,
mechanisms in the computer network III: Applying,
IV: Analyzing,
V: Evaluating

CO.06. To explain various networking II: Understanding,


applications like HTTP, FTP, and SMTP III: Applying,
with network security IV: Analyzing

Bloom’s Taxonomy Level: (BL)

I: Remembering, II: Understanding, III: Applying,

IV: Analyzing, V: Evaluating, VI: Creating

Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi


AOT
Question Bank
Subject: Computer Network (PCC-CS 602)
CSE-6th Semester [Year: 2025]

UNIT – 1

Part A

Sl Questions Marks CO BL
No. No.

1 The data link layer provides delivery. 1 1 II

a) host-to-host b) port-to-port c) process-to-process d)hop-to-hop


2 For n devices in a network and duplex mode transmission facility, the number of cable 1 1 III
links required for a mesh topology is –

a) n2 b) 2n c) n(n-1)/2 d) n(n-1)

3 1 1 II
The layer responsible for encryption technique in OSI model is –

a) network b) presentation c) data link d) session


4 Switches function in which layer(s) of OSI model? 1 1 II

a) physical b) data link c) network d)both a and b

5 1 1 II
Which topology requires a multipoint connection?

a) mesh b) ring c) star d)bus

6 The physical layer provides – 1 1 II

a) bit-to-signal transmission b) multiplexing c) circuit-switching d) all of these


7 The transport layer provides delivery. 1 1 II

a) bit-to-signal transmission b) bit synchronization


c) process-to-process d) hop-to-hop
8 The topology with highest reliability is– 1 1 II

a) bus topology b) star topology c) mesh topology d) ring topology


9 The dedicated physical layer devices are – 1 1 II

Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi


AOT
a) Hub & Switch b) Hub & multiplexer
c) ATM switch & MUX d) Repeater & Router
10 Advantage of layering includes – 1 1 II

a) multi-vendor integration b) data hiding & encapsulation


c) easy testing d) all of these
11 A network which is used for sharing data, software and hardware among small number 1 1 II
of users owning micro computers is called

a) WAN b) LAN c) MAN d) PAN


12 Which topology requires a central controller or hub? 1 1 II

a) Mesh b) star c) ring d) bus


13 Flow control in OSI reference model is performed in – 1 1 II

a) Data link layer b) Network layer c) Session layer d) Application layer


14 Open Source Interconnection is developed by and has…… layers. 1 1 I

a) IEEE, 7 b) ISI, 5 c) ISO, 7 d) None of these.

15 Method of communication in which transmission takes place in both directions, But 1 1 II


only in one direction at a time, is called –

a) Simplex b) full-duplex c) four-wire circuit d) half-duplex


16 Communication between a computer and a keyboard involves – 1 1 II

a) Simplex b) Half-duplex c) Duplex d) Automatic


17 The key elements of a protocol are – 1 1 I

a) syntax b) semantics c) timing d) all of these


18 The different networking standards are – 1 1 I

a) De facto (i.e., by fact) b) De jure (i.e., by law)


c) Both a and b d) None of these
19 If a protocol specifies that data should be sent at 100 Mbps, what is the issue? 1 1 II

a) syntax b) semantics c) timing d) none of these


20 When a protocol specifies that the address of the sender must occupy the first 4 bytes 1 1 II
of a message, what is this issue?

a) syntax b) semantics c) timing d) none of these


21 Repeaters function in which layer(s)? 1 1 I

a) physical b) data link c) network d) both a and b


22 Bridges/Switches function in which layer(s)? 1 1 II

a) physical b) data link c) network d) both a and b


23 Routers function in which layers? 1 1 II

a) physical and data link b) physical, data link and network

Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi


AOT
c) data link and network d) network and transport
24 Gateways in OSI model can function all the way up to – 1 1 II

a) transport layer b) session layer


c) presentation layer d) application layer
25 Which of the following can be handled by a gateway? 1 1 II

a) protocol conversion b) packet resizing


c) data encapsulation d) all of the above
26 Protection of data from a natural disaster such as a tornado belongs to which of the 1 1 II
following network issue –

a) performance b) reliability c) security d) management


27 In which OSI layers does FDDI protocol operate? 1 1 I

a) Physical b) Data link c) Network d) a and b both


28 Which of the following allows devices on one network to communicate with devices 1 1 II
on another network?

a) Multiplexer b) Gateway c) Switch d) Modem


29 The two parameters used for measuring the performance of a network are – 1 1 I

a) throughput and delay b)power and delay


c) power and throughput d)throughput and buffer size
30 Different computers are connected to a LAN by a cable and –……………. 1 1 II

a) Modem b) NIC c) special wires d) telephone lines


31 The extended ASCII is of ……bit size and can represent up to characters. 1 1 I

a) 7 bit, 128 b) 8 bit, 128 c) 8 bit, 256 d) 7 bit, 256


32. Guard band increases the bandwidth for – 1 2 II
a) TDM b) WDM c) FDM d) none of these

33. A communication line with bandwidth 1 MHz and SNR value 63, what is the 1 2 V
approximate bit rate and signal level?
a) 8 Mbps, 4 b) 6 Mbps, 3c) 4 Mbps, 2 d)6 Mbps, 4
34. Manchester code is a– 1 2 I
a) Non-return to zero code b) polar code c) both a and b d) none of
these
35. Before data can be transmitted, they must be transformed into– 1 2 II
a) low-frequency sine wave b) electromagnetic signalsc) aperiodic signals d) none of
these
36. In networking terminology UTP means– 1 2 I
a) Unshielded twisted pair b) Ubiquitous Teflon port

c) Uniformly terminating port d) Unshielded T-connector port

Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi


AOT
37. In synchronous TDM, the data rate of link is – 1 2 III
a) n times fasterb) n times slowerc) 2 times faster d) 2 times slower

38. A telephone network is an example of network. 1 2 II


a) Packet-switched b) Circuit-switchedc) Message-switched d) None of the
above
39. Which is not a basic multiplexing method? 1 2 I

40. In an optical fiber, the inner core is the cladding. 1 2 II


a) denser than b) less dense than c) the same density as d) another name for

41. The RJ45 is a connector used in case of_ . 1 2 II


a) 10Base2 b) 10Base5 c) 10BaseT d) 10BaseF
42. For separating channels in FDM, it is necessary to use _. 1 2 III
a) time slots b) band pass filters c) differentiator d) Integrator
43. The number of times a signal changes value per second is called the_ rate. 1 2 II
a) Bit rate b) Baud rate c) frequency rate d) Bit
interval
44. BNC connectors are used by cable. 1 2 I
a) UTP b) STPc) Coaxial d)Fiber-optic

45. What is meant by Protocol in Computer Network? 1 1 I

46 Layer-2 Switch is also called____________ 1 1 II

47 Which Multiplexing technique shifts each signal to a different carrier frequency? 1 2 II

48. In Synchronous TDM for n signal sources of same data rate , what will be the number of 1 2 II
slots in each frame?

Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi


AOT
UNIT – 1

Part B

Sl Questions Marks CO BL
No. No.

1 For n devices, calculate the number of cable links required for a mesh, ring, bus 5 1 III
and star topology.
2 What are the various modes of communication? Explain the fiber optic cable. 5 1 II
3 What do you mean by the term protocol? What are the key elements of a 5 1 II
protocol?
4 What are the different criteria that make a network effective and efficient? 5 1 II
5 Discuss about the different kinds of transmission modes. 5 1 II
6 Explain the utility of layered network architecture. Compare OSI and TCP/IP 2+3 1 III
reference model.
7 What are the responsibilities of the network layer and transport layer in the 5 1 II
Internet model?
8 How do the layers of the TCP/IP model correlate to the layers of the OSI model? 5 1 III
9 What do you mean by transmission impairments? Discuss about different kinds 1+4 1 II
of transmission impairments.
10 Discuss protocols and standards in brief. Explain why a trailer is needed in data 3+2 1 II
link layer frame.
11 Discuss about the different network topologies. 5 1 II
12 Compare star and mess topology with advantages and disadvantages. 5 1 II
13. Given a bit sequence 01001110, encode the binary string using– 5 2 III
i) NRZ (both), ii) RZ, iii) Manchester encoding, iv) Differential
Manchester encoding.
14. What is the purpose of multiplex? FDM is for analog signals, TDM is for digital 5 2 III
signals. Explain
15. What should be the link capacity to multiplex 3 input signals each of 300 bits per 5 2 V
sec speed using 2 bits/sec framing rate?
16. a) Twisted pair cable offers better bandwidth than untwisted pair. How? 5 2 III
b) For a 4 kHz voice channel, what should be the minimum bit rate of the digitized
channel considering 128 different quantization levels? State clearly Shannon’s
capacity formula.
17. a) Sketch the waveform for the bit stream 10110010 in differential Manchester 5 2 V
encoding format.
b) A binary signal is sent over an 8 kHz channel whose signal to noise ratio is 20
dB. What is the maximum achievable rate? Define signaling rate.

AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
18. Explain what the time period of a signal is. If there are two sine waves with 5 2 IV
frequencies of 20 kHz & 40 kHz, what are their time periods? In general, with the
frequency of signal Y is double the frequency of signal X, how are the time periods
of X and Y are related arithmetically.
19. What are the advantages of digital transmission over analog transmission? 5 2 II
20. Write down the advantages of optical fiber over coaxial cable and twisted pair. 5 2 I
21. Explain the theory behind optical fiber communication. Discuss about the different 5 2 I
type of propagation modes in optical fiber.
22. How many types of analog-to-analog conversion techniques are there? Which one is 5 2 II
most susceptible to noise? Give reason.
23. What is switching? Explain the difference between circuit switching and packet 5 2 I
switching?
24. For the bit stream 101100010111, show the digital signal encoding formats 5 2 IV
using the following encoding schemes. State any assumptions you make.
a. NRZ-L

b. NRZ-I

c. Bipolar-AMI

d. Manchester

e. Differential Manchester
25. Derive a formula to find, in a three-stage crossbar switch, the number of cross points 5 2 V
L in terms of the number of input/output lines N, the number of second stage
switches k, and n lines per switch with respect to the input lines.
26. What do you mean by transmission impairments? Discuss about different kinds of 15 2 II
transmission impairments. Discuss about the different kinds of transmission
medium.
27. Explain the different kinds of digital-to-digital encoding techniques. What is 15 2 II
scrambling techniques?
28. In analog transmission, what is the role of carrier signal? Discuss about the different 15 2 III
kind of digital-to-analog conversion.
29. Explain PCM. Differentiate between bit rate and baud rate. What is quantization 15 2 IV
error? Explain QAM. What is the difference between PSK and QAM?
30. Give Gexamples to illustrate the following scenarios: 5 2 III

a. Bit rate = Baud rate

b. Bit rate < Baud rate

c. Bit rate > Baud rate


31. Explain the functions of Physical layer and Data link layer in brief. 5 1 I
32. Describe the function of Session layer in OSI reference moel. 5 1 I
33. a) Discuss the working of Twisted Pair cable. 15 2 II
b) What is Optical fiber? State the advantage of using Optical fiber in Computer
Network.
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
UNIT – 1

Part C

Sl Questions Marks CO BL
No. No.

1 10 1 IV
Assume a layered networking architecture. The packet structure in this architecture,
as seen at thelowest (physical) layer, is as follows:
WBUT AOT CSE Header STUDENT data
Header Header

| 5 Bytes | 15 Bytes | 20 Bytes |


Sketch the layered protocol model that applies to the given architecture
(i.e. packet) by labeling each layer in the figure below with the
appropriate layer name. Your choices are WBUT, AOT, CSE and
STUDENT data.

Layer

Layer

Layer

Layer

2 If, in the given architecture above, the maximum length of the user data field is 150 10 1 IV
bytes, what is the overhead (as a percentage!) to send a 1600 byte user
message?
3 Explain the typical characteristics of a LAN in terms of addressing mechanism, 15 1 III
topology, MAC protocol, channel capacity, cost and application
4. Justify the reason for which the PCM sampling rate been set at 125 μ sec. 5 2 IV

AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
5. Mention the advantage of QAM over ASK or PSK. Discuss 8-QAM constellation 5 2 II
with two amplitude and four phases using the necessary diagram.
6. A telephone line can normally transmit frequencies in the range 300 to 3300 Hz, 5 2 V
and the signal-to-noise ratio is typically 3162. Estimate the capacity of this channel
in bps.
7. A channel has a signal-to-noise ratio of 63 and a bandwidth of 1 MHz. What are the 5 2 V
appropriate bit rate and signal level?
8. Draw a space division three stage switch. There are 18 inputs and 20 outputs. Stage 5 2 IV
1 has three switches, stage 2 has two switches and stage 3 has four switches. How
many cross points are needed to compare this to a system using just one crossbar?
9. Consider a PCM encoder which samples an input analog signal at the rate 10 KHz, 5 2 IV
and digitizes each sample in 8 bits. What will be the required data rate for the
communication channel?
10. Determine the bit rate for high-definition TV (HDTV). 5 2 III

AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
Question Bank
Subject: Computer Network (PCC-CS 602)
CSE-6th Semester [Year: 2025]

UNIT – 2

[Part A]

Sl Questions Marks CO BL
No. No.

1. The Hamming code is used for – 1 3 I


a) Error Detection, b) Error Correction, c) Error Encapsulation. d) both a and b
2. In Ethernet when Manchester encoding is used, the bit rate is 1 3 II
a) Half the baud rates, b) Twice the baud rate, c) Same as the baud rate, d) none of these

3. Trailer is added to frame in – 1 3 I


a) Session layer b) Application layer c) Data link layer d) Network layer
4. Error detection at the data link layer is achieved by – 1 3 I
a) Bit stuffing b) CRC c) Hamming code d) Equalization
5. Four bits are used for packed sequence numbering in a sliding window protocol used 1 3 III
in computer network. What is the maximum window size?
a) 4 b)8 c) 15 d) 16

6. Different computers are connected to a LAN by a cable and – 1 3 I


Modem b) NIC c) special wires d) telephone lines

7. For Stop-and-Wait ARQ, for n data packets sent ………acknowledgements are 1 3 II


needed.
a) n b) 2n c) n-1 d) n+1

8. In HDLC inserts a 0 bit after consecutive 1 bits in the message data. a) 1 3 II


4 b)6 c) 5 d)7

9. In which ARQ, if a NAK received, onlythe specific damaged or lost frame is 1 3 I


retransmitted?
stop-and-wait b) go-back-n c) selective repeat d) both a and b
10. The l-persistent CSMA / CD is a special case of the p-persistent approach with p equal 1 3 I
to –
a) 0.5 b) 0.1 c) 1.0 d) None of these
11. Pure ALOHA has a maximum efficiency of 1 3 I
a) 18% b)37%c) 10% d) none of these

12. In the random-access method there is no collision 1 3 II


a) ALOHA, b) CSMA / CD, c) CSMA / CA, d) Token passing

AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
13. How much channel throughput of Slotted ALOHA will be in comparison to Pure 1 3 II

AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
ECE, AOT
, AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

ALOHA?
a) Same, b) Double, c) Three times, d) None of these
14. FDDI is a – 1 3 I
ring network, b) star network, c) mesh network, d) bus network
15. A bridge has access to which address of a station on the same network? 1 3 I
physical b) network c) service access point d) all of the above
16. Bluetooth uses to communicate between two devices. 1 3 I
a) Radio wave b) Microwave c) Infrared d) Satellite
17. What is the Hamming distance between 11100110 and 10100011? 1 3 III
a) 2 b) 3 c) 4 d) 5

18. An Ethernet has 38 bytes of data. How many bytes padding should be added? 1 3 III
a) 12 b) 8 c) 26 d) 46

19. What is the Hamming Distance between two equal codewords? 1 3 I

20. In bit stuffing when is an extra 0 bit stuffed to the data section of the frame? 1 3 I

21.. What is the receiving window of selective repeat ARQ ? 1 3 II

[Part B]

Sl No. Questions Marks CO BL


No.

1. Discuss about the different types of flow control mechanism in data link 3+2 3 II
layer. Describe different error control mechanism in data link layer.
2. What are the responsibilities of data link layer? Explain the utility of 3+2 3 II
MAC sub layer.

3. A generator function for CRC is given as x 5+ x2 + 1: 1+4 3 III

a) What is the generator function in binary form?

b) What is the checksum for the following message in binary and in


polynomial form? 1101011011

4. Prove that the maximum size of window in Selective Repeat ARQ is 2m-1 5
3 II
where m is the number of bitsused for sequence number.
5. What is working operation of stop and wait ARQ for lost acknowledgement? 5 3 I

6. Prove that the maximum size of window in Go-Back-N ARQ is (2m– 1) where m 5 3 II
is the number of bitsused for sequence number.

7. Explain _Selective Repeat ARQ protocol‘ with an example. 5 3 II


ECE, AOT
, AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

8. Explain with diagram; how the lost frame, delayed frame and lost 5 3 II
acknowledgements are handled inGo-Back-N ARQ.
9. Discuss HDLC frame format in brief. 5 3 II
10. Explain the PPP frame format in brief. 5 3 II
11. Compare and contrast Pure ALOHA and Slotted ALOHA with diagram. 5 3 IV
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

12. Discuss about the channel allocation problem in MAC sub-layer. 5 3 II


13. Describe Ethernet frame format in brief. 5 3 II
14. What do you mean by data transparency and bit stuffing? Why is bit stuffing 3+2 3 II
needed?
15. What is CDMA? State the advantages of CDMA over FDMA or TDMA.
1+2+2 3 IV
Define walsh table.

16. What is the _loop problem‘ with respect to transparent bridge? How can it be 2+3 3 II
avoided?
17. Discuss CSMA/CA multiple access strategy with diagram. Why CSMA/CD 4+1 3 III
cannot be used for wireless environment?
18. Explain with proper reasons about the following, as applied to Ethernet (IEEE 2+2+1 3 II
802.3)
a) The efficiency of Ethernet decreases if the cable length is increased.
b) Ethernet is not suitable for high speed network (like optical fiber
network).
c) The short frames are not allowed in Ethernet.
19. a) If α = propagation delay / transmission delay and p is the probability of 5+5+(3+2) 3 III
frame error then prove that channel utilization in the case of Stop-and-
wait ARQ protocol is (1–p) / (1+ 2α). Let us assume that we neglectthe
processing time and the width of the ACK frame.
b) Draw the simplified phase diagram for bringing up a line up and
bringing it down in PPP and explain various phases.
c) Ethernet technology is based on broadcast protocol. Explain this. What
happens when a collision occurs in Ethernet communication?

20. a) What are random access and controlled access? 2+2+4+4+3 3 III
b) What are the differences between pure ALOHA and slotted ALOHA?
c) Describe ALOHA with flowchart.
d) Derive the expression of throughput for pure ALOHA.
e) What are non-persistence, l-persistence and p-persistence strategies?

21. a) What do you mean by channel utilization? 1+2+5+7 3 IV


b) Discuss and differentiate persistent CSMA and non-pertinent
CSMA?
c) Why are medium access control techniques required? List three
popular medium access control techniques.
d) A 1 km 10 Mbps CSMA/CD LAN has a propagation speed of 200
m/µ sec. Data frames are 256 bits long including 32 bits of header,
checksum and other overhead. The first bit slot after a successful
transition is reserved for the receiver to capture the channel to send a
32 bit acknowledge frame. What is the affective data rate excluding
overhead assuming there is no collision.
22. a) Why is the contention slot of CSMA/CD protocol 2Y? Explain 3+3+2+2+2+ 3 II
b) How a station can join and leave from a Token Ring LAN? 3
c) What is FDDI?
d) Describe the priority scheme of a Token Bus LAN.
e) What is the function of the preamble field of the 802.3 LAN?
f) Why is 802.4 called the ―Logical Ringǁ?
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

23. (4+4+4) + 3 3 II
Describe 'Stop-and-wait ARQ', ‗Go-Back-N ARQ' and 'Selective
repeat ARQ' protocols, with thehelp of diagram. Which one is better
and why?

24. a) Compare and contrast a random access protocol with a controlled 3+3+5+4 3 II
access protocol.
b) The address 43:7B:6C:DE:10:00 has been shown as the source
physical address in an Ethernet frame. The receiver has discarded the
frame. Why?
c) Compare and contrast CSMA/CA with CSMA/CD.
d) What is transparent bridge? How does a repeater extend the length of a
LAN?
25. a) Name the types of HDLC frames, and give a brief description of each.
9+6 3 III
b) Draw the sender and receiver windows for a system using Go-Back-N
ARQ, given the following:
i. Frame 0 is sent; frame 0 is acknowledged.
ii. Frames 1 and 2 are sent; frames 1 and 2 are acknowledged.
iii. Frames 3, 4 and 5 are sent; frame 4 is acknowledged; timer for
frame 5 expires.
iv. Frames 5, 6 and 7 are sent; frames 5 through 7 are
acknowledged.
26. Compare between CSMA/CD AND CSMA/CA 5 3 IV

27. What is piggybacking? Discuss its advantages 5 3 II

28. a) What are the functions of MAC sublayer? 4+3+2+6 3 II


b) Discuss the working principle of pure ALOHA and sloed ALOHA. What is the
vulnerable me in pure and slotted ALOHA?
c) With diagram explain Go-Back-N protocol.

[Part C]

Sl Questions Marks CO BL
No. No.

1. A receiver receives the code 11001110111. When it uses the Hamming coding 5 3 III
algorithm, the result is 0101. Which bit is in error? What is the correct code?

2. An Ethernet MAC sub-layer receives 1510 bytes of data from the upper layer. Can the 5 3 IV
data been capsulated in one frame? If not, how many frames need to be sent?
Calculate the size of the data in each frame.
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

3. A computer uses the following sequence numbers: 5 3 III


0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,0,1,2,3,4……..

Determine the sender and receiver‘s window sizes that are not possible in Selective
Repeat protocol

4. A computer is using the following sequence numbers: 0, 5 3 III


1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0, 1, …

Calculate the size of the window (Assume selective repeat protocol is used).

5. A computer uses the following sequence numbers: 0, 1, 2, 3, 4, 5, 6, 7, 0, 1, 2, 3, … 5 3 III


Calculate the sender‘s and receiver‘s window size that are not possible in Selective
Repeat protocol.

6. A sliding Window protocol with selective repeat ARQ uses a sliding window size of 5 3 IV
4. Frames were sent as follows from station A to station B.

(a) Calculate the frames available in sender and receiver windows after frame 3 is
lost.
(b) Receiver sends one data frame to after receiving frame 3 correctly, along
with piggybacking acknowledgement, then determine the frames in the
sender window of station A and receiver window of station B currently.

7. Match the following list: Sequence number is 5 bits 5 3 III

Protocol Ws, WR
(a) Stop-N-Wait ARQ (1) 31, 1
(b) Go-Back-N ARQ (2) 16, 16
(c) Selective repeat ARQ (3) 1, 1

Give explanations to support your answer.


8. In a CSMA/CD network with a data rate of 10 Mbps, the minimum frame size is 5 3 III
found to be 512 bits for the correct operation of the collision detection process.
Calculate the minimum frame size if we increase the data rate to: i) 100Mbps, ii)
1Gbps, iii) 10Gbps.
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

Question Bank
Subject: Computer Network (PCC-CS 602)
CSE-6th Semester [Year: 2025]

Unit 3

Part A

Sl Questions Marks CO BL
No. No.
1 An IPv6 address consists of bits. 1 CO4 I
a) 48 b) 16 c) 32 d) 128

2 IP address in the class B is given by – 1 CO4 II


a) 125.123.123.2 b) 191.23.21.54 c) 192.128.32.56 d) 10.14.12.34

3 Routers function in which layer(s)? 1 CO4 I


a) physical b) data link c) network d) all of these

4 IP address in the class C is given by – 1 CO4 II


a) 125.123.123.2 b) 191.23.21.54 c) 192.128.32.56 d)
10.14.12.34

5 Different computers are connected to a LAN by a cable and – 1 CO4 II


a) Modem b) NIC c) special wires d) telephone lines

6 Physical to Logical addresses conversion done by which protocol(s)? 1 CO4 I


a) RARP b) BOOTP c) DHCP d) all of the above

7 The field in IP Datagram is used for error detection. 1 CO4 I


a) urgent pointer b) checksum c) sequence number d)
acknowledge number

8 ARP is a – 1 CO4 I
a) TCP/IP protocol used to dynamically bind a high level IP address to a low level
physical hardware address
b) TCP/IP high level protocols for transferring files from one machine to
another
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

c) Protocol used to monitor computers


d) Protocol that handles error and control messages

9 1 CO4 I
ICMP is a –
a) protocol handles error and control messages
b) protocol used to monitor computers
c) both a and b above
d) none of those

10 Which of the following is not an IPv6 address? 1 CO4 II


a) anycast b) multicast c) broadcast d) unicast

11 The network layer provides delivery. 1 CO4 I


a)host-to-host b) port-to-port c) process-to-process d) hop-to-hop

12 Maximum size of the data portion of the IP datagram is 1 CO4 I


a) 65515 bytes b) 65555 bytes c) 65535 bytes d) none of these

13 1 CO4 II
IP address can be used to specify a broadcast and map to hardware broadcast if
available. By conversion broadcast address has hosted with all bits
a) 0 b) 1 c) both a and b above d) none of the above

14 Which of the following is an interior routing protocol? 1 CO4 I


a) RIP b) OSPF c) BGP d) both a and b

15 A station in a network forward incoming packets by placing them on its shortest output 1 CO4 II
queue. What routing algorithm is being used?
a) Distance vector routing b) Flooding c) Static routing d) Delta routing

16 In which routing method do all the routers have a common database? 1 CO4 I
a) distance vector b) link state c) link vector d) none of the above

17 Adaptive or dynamic directory used in packet routing changes 1 CO4 I


a) within each user session b) with each user session
c) at system generation time only d) both (a) and (b)

18 Which routing algorithm requires more traffic between routers for set-up and updating? 1 CO4 I
a) Distance vector b) Link statec) Dijkstra d) Vector link.

19 Which of the following is not an IPv6 address? 1 CO4 I


a) Anycast b) Multicast c) Broadcast d) Unicast

20 The field in IP Datagram is used for error detection. 1 CO4 I


a) urgent pointer b) checksum c) sequence number d)acknowledge
number
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

21 Identify the class of IP address 199.1.2.3. 1 CO4 II


a. Class A
b. Class B
c. Class C
d. Class D

22 A subnet mask in class A has fourteen 1s. How many subnets does it define? 1 CO4 II
a. 32
b. 8
c. 64
d. 128

23 A subnet mask in class B has nineteen 1s. How many subnets does it define? 1 CO4 II
a. 8
b. 32
c. 64
d. 128

24 Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the 1 CO4 II
subnet address?
a. 201.14.78.32
b. 201.14.78.65
c. 201.14.78.64
d. 201.14.78.12

25 Class _ has the greatest number of hosts per given network address. 1 CO4 I
a. A
b. B
c. C
d. D

26 In _ routing, the full IP address of a destination is given in the routing table. 1 CO4 I
a. Next-hop
b. Network-specific
c. Host-specific
d. Default

27 In _ routing, the mask & destination addresses are both 0.0.0.0 in routing table. 1 CO4 I
a. Next-hop
b. Network-specific
c. Host-specific
d. Default
28 What are the number of bits required for IPv4 addresses when expressed in binary? 1 CO4 I

29 Each IP packet must contain ________________. 1 CO4 I

30 IP address of Loop back address is ________________. 1 CO4 II


AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

31 Why IP Protocol is considered as unreliable? 1 CO4 II


AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

28 In _ routing, the destination address is a network address in the routing table. 1 CO4 I
a. Next-hop
b. Network-specific
c. Host-specific
d. Default

29 Find the netid and the hostid of the following IP addresses. 1 CO4 III
a. 114.34.2.8
b. 19.34.21.5
c. 23.67.12.1
d. 127.23.4.0

30 In a class B subnet, we know the IP address of one of the hosts and the mask as given 1 CO4 III
below:
IP address: 195.134.112.66
Mask: 255.255.224.0
What is the first address (network address)?
31 Find the masks that create the following number of subnets in class B. 1 CO4 II
a. 2
b. 5
c. 30
d. 62
e. 120
f. 250
32 What is the maximum number of subnets in class C using the following masks? 1 CO4 II
a. 255.255.255.192
b. 255.255.255.224
c. 255.255.255.240
d. 255.255.255.0
33 For each of the following subnet masks used in class B, find the number of 1s that 1 CO4 III
defines the subnet.
a. 255.255.192.0
b. 255.255.0.0
c. 255.255.224.0
d. 255.255.255.0
34 Write the following masks in the /n format. 1 CO4 II
a. 255.255.255.0
b. 255.0.0.0
c. 255.255.224.0
d. 255.255.240.0
35 Find the range of addresses in the following blocks. 1 CO4 III
a. 123.56.77.32/29
b. 200.17.21.128/27
c. 17.34.16.0/23
d. 180.34.64.64/30
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

Module: IV Network Layer


Part B
Sl Questions Marks CO BL
No. No.
1 Write down the main functions of network layer. 5 CO1 I

2 Explain the functions of repeater, bridge and gateways. 5 CO4 II

3 What is IP datagram? Write all the fields of IPv4 datagram. 1+4 CO4 III

4 Write four advantages of IPv6 over IPv4. 5 CO4 IV


5 Briefly discuss IPv6datagram format. 5 CO4 II
6 Explain the significance of Network Address Translation (NAT) in 5 CO4 IV
networking.5

7 Compare between IPv4options andIPv6extension headers. 5 CO4 IV

8 Suppose a computer sends a packet at the network layer to another computer 5 CO4 IV
somewhere in the internet. The logical destination address of the packet is
corrupted. What happens to the packet? How can the source computer be
informed of the situation?

9 Suppose an organization is given the block 17.12.14.0/26, which contains 64 5 CO4 III
(=26) addresses. The organization has three offices and needs to divide the
addresses into three sub-blocks of 32, 16, and 16 addresses. Design the sub-
networks.

10 What is routing? Why is it needed? Define non-adaptive and adaptive routing 1+1+3 CO4 II
algorithm.

11 a) What are the problems of providing redundant path in a bridged network? 2+3 CO4 II &
b) How does a transport bridge provide solution to those problems? IV

12 What do you mean by the term ‘subnet masking’? Explain with an example, 2+3 CO4 II
how that can be achieved. &IV
13 Explain link-state routing algorithm. Compare it with flooding. 3+2 CO4 II
&IV
14 What do you mean by ‘subnet masking’? Explain with an example, how that 3+2 CO4 II
can be achieved.
15 Write the differences between virtual circuit approach and datagram approach. 5 CO4 IV

16 What are routing tables? Where are they located? Explain the utility of these 1+1+3 CO4 II
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

tables in routing packets from source to destination.


17 Explain path vector routing with an example. 5 CO4 II
18 What is IP address? Compare classful address and classless address. 1+4 CO4 II&IV
19 What is IP address? Describe different classes of IP address. Why IP address 1+2+1+2+2+5+2 CO4 II&IV
is unique and universal? Explain how CIDR is improving the IP address
utilization? Explain the usefulness of subnet mask. Draw the header format of
IPv4 packet. Explain the utility of header length field.
20 Differentiate static routing with dynamic routing. Explain various fields of a (2+3)+(3+2)+5 CO4 II&IV
typical routing table.
b) Explain link state routing principle. What is flooding?
c) Explain count to infinity problem.
21 a) What is the difference between classful addressing and classless 3+3+5+4 CO4 II&III
addressing in IPv4?
b) An ISP has a block of 1024 addresses. It needs to divide the addresses
among 1024 customers.
Does it need sub netting? Explain your answer.
c) Calculate the HLEN field (in IPv4) value if the total length is 1200 bytes;
1176 of which is data from the upper layer.
d) Write the advantages of ICMP over the IPv4.
22 Briefly describe IPv4 header fields. 6+4+5 CO4 II&IV
b) What do you mean by unicasting, multicasting and broadcasting?
c) What are the differences between Distance Vector Routing and Link State
Routing?
23 What is IP address? Describe different classes of IP address. 4+3+2+6 CO4 II&IV
b) Explain the significance of the ARP and ICMP in networking.
c) Differentiate between sub-netting and super-netting.
d) Suppose an organization is given the block 190.100.0.0/16 (65,536
addresses). The organization
needs to divide the addresses into three groups of customers —
i. 1st group has 64 customers; each needs 256 addresses.
ii.2nd group has 128 customers; each needs 128 addresses.
iii.3rd group has 128 customers; each needs 64 addresses.
Design the sub-blocks and find out how many addresses are still available.
24 What do you mean by routing? What is the difference between static and 2 + (5+4) + 4 CO4 II&III
dynamic routing?
b) Describe the distance vector routing algorithm. Discuss the count-to-
infinity problem in distance vector routing algorithm and provide a solution
mechanism for it.
c) Compare between IPv4 and IPv6 packet headers.

25 Write short notes on the following (any three): 3x5 CO4 II


a. ARP
b. RARP
c. BOOTP
d. DHCP
e. ICMP
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

f. IGMP
26 Discuss IPv6 address structure in brief. Describe link state routing with 4+8+3 CO4 II&IV
example. Explain the necessity of hierarchical routing.
27 Distance vector routing suffers from count-to-infinity problem; BGP uses 5+6+4 CO4 II&IV
distance vector routing principle but not suffers from count-to-infinity
problem. Why? Describe the OSPF routing algorithm along with the utility of
“Hello” and “Link state update” message. Discuss about the different types
of OSPF links.
28 What is routing? Why is it needed? Define non-adaptive and adaptive routing 2+2+4+5+2 CO4 II&IV
algorithm. Explain shortest path routing algorithm. Compare it with flooding.

29 What is the first address of a block of classless addresses if one of the addresses 5 CO4
is 12.2.2.76/27

30 Explain Repeater, Router and Gateway 5 CO4

31 A block of 16 addresses is granted to a small organizaon. If one of the addresses 5 CO4


is 205.16.37.39/28, what are the rst and last addresses in the block?

Module: IV Part C

Sl Questions Marks CO BL
No. No.
1 Mention the application of each class present in classful addressing 15 CO4 III &
(unicast, multicast, broadcast, or reserved). Explain the differences IV
between classful addressing and classless addressing in IPv4 with
regard to working principle.
2 An organization is granted a block 130.56.0.0/16. The administrator 15 CO4 III
has created 1024 subnets.
a. Find the number of addresses in each subnet.
b. Find the subnet prefix.
c. Find the first and the last address in the first subnet.
d. Find the first and the last address in the last subnet.

3 An ISP is granted a block of addresses starting with120.60.4.0/22. The 15 CO4 III


ISP wants to distribute these blocks to 100 organizations with each
organization receiving just eight addresses. Design the sub- blocks and
give the slash notation for each sub-block. Find out how many
addresses are still available after these allocations.
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

4 In a block of addresses, we know the IP address of one host is 15 CO4 III


25.34.12.56/16. Calculate the first address (network address) and the
last address (limited broadcast address) in this block.
5 Combine the following three blocks of addresses into a single block: 15 CO4 III
a. 16.27.24.0/26 b. 16.27.24.64/26 c. 16.27.24.128/25

6 A large organization with a large block address (12.44.184.0/21) is 15 CO4 III


split into one medium-size company using the block address
(12.44.184.0/22) and two small organizations. If the first small
company uses the block (12.44.188.0/23), find out the remaining
block that can be used by the second small company.

7 (a) Compare between static and dynamic routing. [8] 15 CO4

(b) Explain the concept of RIP. [7]

8 (a) Explain the two-node instability problem in Distance vector 15 CO4


routing. (b) Discuss the possible solutions of the two-node instability
problem in Distance vector routing. (c) Assume a packet has to visit
two routers during transmission from source to destination. Determine
how many times the packet has to visit the network layer and the data
link layer.
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

Question Bank
Subject: Computer Network (PCC-CS 602)
CSE-6th Semester [Year: 2025]

Module - V: Transport Layer

Part A

Sl Questions Marks CO BL
No. No.

1 TCP requires delivery. 1 5 II

a) connection oriented b) reliable c) both a and b d)connectionless


2 The address required to uniquely identify a running application program is – 1 5 II

a) logical address b) physical address

c) socket address d) network address

3 Connection establishment in TCP involves a handshake. 1 5 II

a) three-way b) two-way
c) one-way d) none of these.
4 UDP is – 1 5 II

a) connection-oriented b) connectionless
c) both a and b d) none of these.
5 UDP and TCP are both ……… layer protocols. 1 5 I

a. Physical
b. Data link
c. Network
d. Transport
6 UDP needs the address to deliver the user datagram to the correct 1 5 II
application program.

a. Port
b. Application
c. Internet
d. Physical
7 Which is a legal port address? 1 5 I

a. 0
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

b. 513
c. 65,535
d. All the above
8 Which of the following does UDP guarantee? 1 5 II

a. Sequence numbers on each user datagram


b. Acknowledgments to the sender
c. Flow control
d. None of the above
9 Which of the following is not part of the UDP user datagram header? 1 5 I

a. Length of header
b. Source port address
c. Checksum
d. Destination port address
10 A host can be identified by while a program running on the host can be 1 5 II
identified by
.
a. An IP address; a port number
b. A port number; an IP address
c. An IP address; a host address
d. An IP address; a well-known port
11 The field is used to order packets of a message. 1 5 II

a. Urgent pointer
b. Checksum
c. Sequence number
d. Acknowledgment number
12 An ACK number of 1000 always means that 1 5 I
.
a. 999 bytes has been successfully received
b. 1000 bytes has been successfully received
c. 1001 bytes has been successfully received
d. None of the above
13 The timer prevents a long idle connection between two TCPs. 1 5 II

a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
14 The timer is needed to handle the zero window-size advertisement. 1 5 II

a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited

15 Karn‘s algorithm is used in calculations by the timer. 1 5 II

a. Retransmission
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

b. Persistence
c. Keep-alive
d. Time-waited
16 The timer is used in the termination phase. 1 5 II

a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
17 The timer keeps track of the time between the sending of a segment and 1 5 II
the receipt of an acknowledgment.

a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
18 A special segment called a probe is sent by a sending TCP when the ………. 1 5 II
timer goes off.

a. Transmission
b. Persistence
c. Keep-alive
d. Time-waited
19 Token bucket algorithm is an advanced form of___________ 1 CO5
20 TCP assigns a sequence number to each segment that is being sent. The sequence 1 CO5
number for each segment is the number of the _______ byte carried in that
segment.
21 What are the transmission modes in FTP? 1 CO5
22 In the ____ bucket algorithm, bursty chunks are stored in bucket and sent out at 1 CO5
an average rate.
23 What are the two categories of QoS attributes? 1 CO5
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

Module - V: Transport Layer

Part B

Sl Questions Marks CO BL
No. No.

1 What is the utility of PSH and RST flag of TCP header? Explain how window field of 2+3 5 III
the TCP header performs the end to end flow control.
2 What are the responsibilities of transport layer? Explain the utility of UDP datagram. 3+2 5 II

3 Describe the token bucket algorithm in brief with necessary diagram. 5 5 III

4 Explain the working of leaky bucket algorithm. Give argument why the leaky bucket 4+1 5 IV
should allow just one packet pet tick independent of how large the packet is.
5 TCP and UDP - which one is better? Justify your answer. 5 5 II
6 Define congestion. What is the difference between congestion control and flow 2+3 5 IV
control?
7 Describe the three-way handshaking procedure in TCP. 5 5 IV

8 Describe TCP segment format in brief. 5 5 III

9 Explain the various Quality of Service (QoS) parameters. Mention the techniques to 3+2 5 III
improve it.
10 What advantages does TCP over UDP? What are the features for which may TCP be a 2+3 5 III
reliable protocol?
11 Suppose that the UDP receiver computes the Internet checksum for the received UDP 5 CO5
segment and nds that it matches the value carried in the checksum eld. Can the receiver
be absolutely sure that no bit errors have occurred? Explain. Would things be different
with TCP?
12
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

Module - V: Transport Layer

Part C

Sl Questions Marks CO BL
No. No.

1 What is port address and socket address? Among TCP and UDP, which one is more 3+4+2 5 IV
reliable and why? Why we use unreliable one? Draw the header format of TCP and +7
explain different fields.
2 Describe the method of congestion control in datagram networks. How does it differ 9+6 5 IV
from the method of congestion control in virtual circuit networks?

3 Compare between the TCP header and the UDP header. List the fields in the TCP header 5+5+5 5 III
that are missing from UDP header. Give the reason for their absence.
4 Are there any circumstances when connection-oriented service will (or at least should) 8 5 IV
deliver packets out of order? Explain.
5 (a} Explain how FTP can be used to browse websites? 7+8 CO5 III

{b) Discuss about the Bluetooth architecture and protocols involved during Bluetooth IV
enabled network.
Question Bank

Subject: Computer Network (PCC-CS 602)


CSE-6th Semester [Year: 2025]
MODULE_VI APPLICATION LAYER [PART-A]

Sl Questions Marks CO BL
No. No.

1. Which protocol in the application layer provides name services? 1 6 I


a) SMTP b) DNS c) HTTP d) SNMP

2. Which of the following is an application layer service? 1 6 II


a) Remote login b) File transfer and access c) Mail service d) All of
these

3. Which of the following is an interpreter? 1 6 III


a) HTTP b) HTML c) CGI d) FTP

4. Which of the following TCP/IP protocol is used for file transfer with minimal capability 1 6 I
and minimal overhead?
a) RARP b) FTP c) TFTP d) TELNET

5. Which of the following is true? 1 6 IV


a) FTP allows systems with different directory structures to transfer file.

b) FTP allows systems using ASCII and a system using EBCDIC to transfer
file.

c) FTP allows a PC and SUN workstation to transfer files.

d) All of these are true.

AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
MODULE_VI APPLICATION LAYER [PART-B]

Sl Questions Marks CO BL
No. No.

6. Discuss about the different types of file transfer protocols in application layer. Why two 5 6 II
port numbers are used by the FTP protocol

7. What is SMTP?What do you mean by ‘mail transfer agent’, ‘mail delivery agent’, and 5 6 II
‘mail user agent’?

8. Why do we need a DNS system? When we can directly use an IP address? What is the 5 6 IV
purpose of the inverse domain?

9. a) What do you mean by ‘web page’? 5 6 III


b) b) Discuss about the different types of web pages with example.
c) Compare between HTTP GET and HTTP POST methods.
d) Explain the significance of CGI.

10. a) What do you mean by ‘terminal network’? How are options negotiated in 15 6 IV
TELNET?How are control and data characters distinguished in NVT?
b) Describe the working principle of SNMP in brief.

11. 15 6 II
Write short notes on the following (any three):
a) HTTP and WWW
b) E-mail and SMTP
c) FTP and TFTP
d) TELNET
e) DNS
f) SNMP

MODULE_VI APPLICATION LAYER [PART-C]


Sl Questions Marks CO BL
No. No.

12. How is HTTP similar to SMTP? 5 6 IV

13. Why do we need POP3or IMAP for electronic mail? 5 6 II

AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
Question Bank
Subject: Computer Network (PCC-CS 602)
CSE-6th Semester [Year: 2025]
Module – VII: Modern Topics [ Part A ]

Sl Questions Marks CO BL
No. No.

1. If A wants to send an encrypted message to B, the plaintext is encrypted with the public key 1 6 II
of
a) A b) B c) the network d) Either A or B

2. If A wants to send a message to B for authentication, it is encrypted with private key of 1 6 II


b) A b) B c) the network d) Either A or B

3. DES encrypts blocks of bits. 1 6 II


a) 32 b) 56 c) 64 d) 128

4. The four primary security principles related to a message are – 1 6 I


(a) confidentiality, authentication, integrity and non-repudiation
(b) confidentiality, access control, non-repudiation and integrity
(c) authentication, authorization, non-repudiation and availability
(d) availability, access control, authorization and authentication

5. A is used to verify the integrity of a message. 1 6 II


c) message digest b) decryption algorithm c) digital envelope d) encryption
algorithm
6. Firewall is a specialized form of a 1 6 II
d) bridge b) disk c) printer d) router

7. works on block cipher mode. 1 6 II


e) CFB b) OFB c) ECB d) CBC

AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
Module – VII: Modern Topics [ Part B ]

Sl No. Questions Marks CO BL


No.

1. Describe RSA algorithm in brief II


5 6
2. What do you understand by message security? Explain the terms: _User 6 II
3+2
Authentication‘,‘ Key Management‘ and _Security Protocols‘.

3. Explain CFB and OFB modes of operation. 6 II


5
4. Describe one round of DES in brief. 6 II
5
5. What do you mean by _message digest‘? What are the key 6 II
2+3
requirements of message digest?

6. What is access control? How is it different from availability? 6 II


5
7. What is the difference between _stream cipher‘and _block cipher‘? 6 IV
2+3
What are the roles of the secret, public and private key?

8. What do you understand by network security? Explain different types 6 II


of attacks. What is cryptography? What are the different kinds of 2+4+2+2+5
cryptography? What is the relation between cryptography and network
security? Describe one symmetric key cryptography method in brief.

9. What is asymmetric key cryptography? Explain the Diffie-Hellman key 6 II


exchange method. Describe one asymmetric key cryptography method. 2+4+5+
What do you mean by authentication? What is digital signature? 1+3

10. a) What are the differences between symmetric key cryptography and 6 IV
asymmetric key cryptography? 4+2+4+
Explain the terms 'encryption' and 'decryption' in the context of 5
cryptography.
Briefly discuss any key exchange algorithm learnt by you.
Describe IPSec in brief.

AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
11. 6 II
Explain substitution, transposition cipher and product cipher. What is 6+4+5
the difference between symmetric key encryption and asymmetric key
encryption? What are the four basic principles related to the security
of a particular message? Explain each principle with proper example.

12. 6 II
Write short notes on the following (any three): 3x5
a) Digital Signature
b)ISDN
c) Firewall
d) FDDI
e) Bluetooth
f) ATM
g) Cable Modem
h) DSL and ADSL
i) VPN

Module – VII: Modern Topics [ Part C ]

Sl Questions Marks CO BL
No. No.

1. Why message digest is used in cryptography? 5 6 III

2. ―The packet filter controls the flow between internal and potentially hostile network.ǁ 5 6 III
– Justify this statement.

Signature of Faculty:
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy