QB PCCCS602 2025
QB PCCCS602 2025
QUESTION BANK
Academic Session: 2024-25
Faculty Name(s): Prof. Jyotirmoy Chakrabarti (CSE-1 & CSE-2), Prof. Rakhi Neogi(CSE-3)
UNIT I
Data communications components: introduction, data representation
(ASCII, ISO etc.), direction of data flow (simplex, half duplex, full
duplex); network criteria, physical structure (type of connection,
topology), categories of network (LAN, MAN, WAN); Internet: brief
history, Protocols and standards; Networking models: ISO OSI model,
TCP/IP reference model, their comparative study.
Overview of data (analog & digital), signal (analog & digital),
transmission (analog & digital) & transmission media (guided &
unguided);
LAN: Wired LAN, Wireless LANs, Connecting LAN and Virtual LAN
Techniques for Bandwidth utilization: Multiplexing - Frequency division,
Time division and Wave division, Concepts on spread spectrum
Data Link Layer and Medium Access Sub Layer: Types of errors, framing
UNIT II (character and bit stuffing), Fundamentals, Block coding, Hamming
Distance, CRC; error detection & correction methods; Flow control;
Protocols: Stop & wait ARQ, Go -Back-N ARQ, Selective repeat ARQ,
Piggybacking, HDLC.
Point to Point Protocol, LCP, NCP, Token passing; Reservation, Polling,
Multiple access protocols: Pure ALOHA, Slotted ALOHA,
CSMA, CSMA/CD, CSMA/CA.
Network Layer: Internetworking & devices: Repeaters, Hubs, Bridges,
UNIT III Switches, Router, Gateway; Addressing: IPv4 addressing, sub-netting;
Routing: techniques, static vs. dynamic routing, forwarding, Unicast
Routing Protocols: RIP, OSPF, BGP; Address mapping – ARP, RARP,
BOOTP and DHCP–Delivery,
UNIT – 1
Part A
Sl Questions Marks CO BL
No. No.
a) n2 b) 2n c) n(n-1)/2 d) n(n-1)
3 1 1 II
The layer responsible for encryption technique in OSI model is –
5 1 1 II
Which topology requires a multipoint connection?
33. A communication line with bandwidth 1 MHz and SNR value 63, what is the 1 2 V
approximate bit rate and signal level?
a) 8 Mbps, 4 b) 6 Mbps, 3c) 4 Mbps, 2 d)6 Mbps, 4
34. Manchester code is a– 1 2 I
a) Non-return to zero code b) polar code c) both a and b d) none of
these
35. Before data can be transmitted, they must be transformed into– 1 2 II
a) low-frequency sine wave b) electromagnetic signalsc) aperiodic signals d) none of
these
36. In networking terminology UTP means– 1 2 I
a) Unshielded twisted pair b) Ubiquitous Teflon port
48. In Synchronous TDM for n signal sources of same data rate , what will be the number of 1 2 II
slots in each frame?
Part B
Sl Questions Marks CO BL
No. No.
1 For n devices, calculate the number of cable links required for a mesh, ring, bus 5 1 III
and star topology.
2 What are the various modes of communication? Explain the fiber optic cable. 5 1 II
3 What do you mean by the term protocol? What are the key elements of a 5 1 II
protocol?
4 What are the different criteria that make a network effective and efficient? 5 1 II
5 Discuss about the different kinds of transmission modes. 5 1 II
6 Explain the utility of layered network architecture. Compare OSI and TCP/IP 2+3 1 III
reference model.
7 What are the responsibilities of the network layer and transport layer in the 5 1 II
Internet model?
8 How do the layers of the TCP/IP model correlate to the layers of the OSI model? 5 1 III
9 What do you mean by transmission impairments? Discuss about different kinds 1+4 1 II
of transmission impairments.
10 Discuss protocols and standards in brief. Explain why a trailer is needed in data 3+2 1 II
link layer frame.
11 Discuss about the different network topologies. 5 1 II
12 Compare star and mess topology with advantages and disadvantages. 5 1 II
13. Given a bit sequence 01001110, encode the binary string using– 5 2 III
i) NRZ (both), ii) RZ, iii) Manchester encoding, iv) Differential
Manchester encoding.
14. What is the purpose of multiplex? FDM is for analog signals, TDM is for digital 5 2 III
signals. Explain
15. What should be the link capacity to multiplex 3 input signals each of 300 bits per 5 2 V
sec speed using 2 bits/sec framing rate?
16. a) Twisted pair cable offers better bandwidth than untwisted pair. How? 5 2 III
b) For a 4 kHz voice channel, what should be the minimum bit rate of the digitized
channel considering 128 different quantization levels? State clearly Shannon’s
capacity formula.
17. a) Sketch the waveform for the bit stream 10110010 in differential Manchester 5 2 V
encoding format.
b) A binary signal is sent over an 8 kHz channel whose signal to noise ratio is 20
dB. What is the maximum achievable rate? Define signaling rate.
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
18. Explain what the time period of a signal is. If there are two sine waves with 5 2 IV
frequencies of 20 kHz & 40 kHz, what are their time periods? In general, with the
frequency of signal Y is double the frequency of signal X, how are the time periods
of X and Y are related arithmetically.
19. What are the advantages of digital transmission over analog transmission? 5 2 II
20. Write down the advantages of optical fiber over coaxial cable and twisted pair. 5 2 I
21. Explain the theory behind optical fiber communication. Discuss about the different 5 2 I
type of propagation modes in optical fiber.
22. How many types of analog-to-analog conversion techniques are there? Which one is 5 2 II
most susceptible to noise? Give reason.
23. What is switching? Explain the difference between circuit switching and packet 5 2 I
switching?
24. For the bit stream 101100010111, show the digital signal encoding formats 5 2 IV
using the following encoding schemes. State any assumptions you make.
a. NRZ-L
b. NRZ-I
c. Bipolar-AMI
d. Manchester
e. Differential Manchester
25. Derive a formula to find, in a three-stage crossbar switch, the number of cross points 5 2 V
L in terms of the number of input/output lines N, the number of second stage
switches k, and n lines per switch with respect to the input lines.
26. What do you mean by transmission impairments? Discuss about different kinds of 15 2 II
transmission impairments. Discuss about the different kinds of transmission
medium.
27. Explain the different kinds of digital-to-digital encoding techniques. What is 15 2 II
scrambling techniques?
28. In analog transmission, what is the role of carrier signal? Discuss about the different 15 2 III
kind of digital-to-analog conversion.
29. Explain PCM. Differentiate between bit rate and baud rate. What is quantization 15 2 IV
error? Explain QAM. What is the difference between PSK and QAM?
30. Give Gexamples to illustrate the following scenarios: 5 2 III
Part C
Sl Questions Marks CO BL
No. No.
1 10 1 IV
Assume a layered networking architecture. The packet structure in this architecture,
as seen at thelowest (physical) layer, is as follows:
WBUT AOT CSE Header STUDENT data
Header Header
Layer
Layer
Layer
Layer
2 If, in the given architecture above, the maximum length of the user data field is 150 10 1 IV
bytes, what is the overhead (as a percentage!) to send a 1600 byte user
message?
3 Explain the typical characteristics of a LAN in terms of addressing mechanism, 15 1 III
topology, MAC protocol, channel capacity, cost and application
4. Justify the reason for which the PCM sampling rate been set at 125 μ sec. 5 2 IV
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
5. Mention the advantage of QAM over ASK or PSK. Discuss 8-QAM constellation 5 2 II
with two amplitude and four phases using the necessary diagram.
6. A telephone line can normally transmit frequencies in the range 300 to 3300 Hz, 5 2 V
and the signal-to-noise ratio is typically 3162. Estimate the capacity of this channel
in bps.
7. A channel has a signal-to-noise ratio of 63 and a bandwidth of 1 MHz. What are the 5 2 V
appropriate bit rate and signal level?
8. Draw a space division three stage switch. There are 18 inputs and 20 outputs. Stage 5 2 IV
1 has three switches, stage 2 has two switches and stage 3 has four switches. How
many cross points are needed to compare this to a system using just one crossbar?
9. Consider a PCM encoder which samples an input analog signal at the rate 10 KHz, 5 2 IV
and digitizes each sample in 8 bits. What will be the required data rate for the
communication channel?
10. Determine the bit rate for high-definition TV (HDTV). 5 2 III
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
Question Bank
Subject: Computer Network (PCC-CS 602)
CSE-6th Semester [Year: 2025]
UNIT – 2
[Part A]
Sl Questions Marks CO BL
No. No.
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
13. How much channel throughput of Slotted ALOHA will be in comparison to Pure 1 3 II
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
ECE, AOT
, AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
ALOHA?
a) Same, b) Double, c) Three times, d) None of these
14. FDDI is a – 1 3 I
ring network, b) star network, c) mesh network, d) bus network
15. A bridge has access to which address of a station on the same network? 1 3 I
physical b) network c) service access point d) all of the above
16. Bluetooth uses to communicate between two devices. 1 3 I
a) Radio wave b) Microwave c) Infrared d) Satellite
17. What is the Hamming distance between 11100110 and 10100011? 1 3 III
a) 2 b) 3 c) 4 d) 5
18. An Ethernet has 38 bytes of data. How many bytes padding should be added? 1 3 III
a) 12 b) 8 c) 26 d) 46
20. In bit stuffing when is an extra 0 bit stuffed to the data section of the frame? 1 3 I
[Part B]
1. Discuss about the different types of flow control mechanism in data link 3+2 3 II
layer. Describe different error control mechanism in data link layer.
2. What are the responsibilities of data link layer? Explain the utility of 3+2 3 II
MAC sub layer.
4. Prove that the maximum size of window in Selective Repeat ARQ is 2m-1 5
3 II
where m is the number of bitsused for sequence number.
5. What is working operation of stop and wait ARQ for lost acknowledgement? 5 3 I
6. Prove that the maximum size of window in Go-Back-N ARQ is (2m– 1) where m 5 3 II
is the number of bitsused for sequence number.
8. Explain with diagram; how the lost frame, delayed frame and lost 5 3 II
acknowledgements are handled inGo-Back-N ARQ.
9. Discuss HDLC frame format in brief. 5 3 II
10. Explain the PPP frame format in brief. 5 3 II
11. Compare and contrast Pure ALOHA and Slotted ALOHA with diagram. 5 3 IV
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
16. What is the _loop problem‘ with respect to transparent bridge? How can it be 2+3 3 II
avoided?
17. Discuss CSMA/CA multiple access strategy with diagram. Why CSMA/CD 4+1 3 III
cannot be used for wireless environment?
18. Explain with proper reasons about the following, as applied to Ethernet (IEEE 2+2+1 3 II
802.3)
a) The efficiency of Ethernet decreases if the cable length is increased.
b) Ethernet is not suitable for high speed network (like optical fiber
network).
c) The short frames are not allowed in Ethernet.
19. a) If α = propagation delay / transmission delay and p is the probability of 5+5+(3+2) 3 III
frame error then prove that channel utilization in the case of Stop-and-
wait ARQ protocol is (1–p) / (1+ 2α). Let us assume that we neglectthe
processing time and the width of the ACK frame.
b) Draw the simplified phase diagram for bringing up a line up and
bringing it down in PPP and explain various phases.
c) Ethernet technology is based on broadcast protocol. Explain this. What
happens when a collision occurs in Ethernet communication?
20. a) What are random access and controlled access? 2+2+4+4+3 3 III
b) What are the differences between pure ALOHA and slotted ALOHA?
c) Describe ALOHA with flowchart.
d) Derive the expression of throughput for pure ALOHA.
e) What are non-persistence, l-persistence and p-persistence strategies?
23. (4+4+4) + 3 3 II
Describe 'Stop-and-wait ARQ', ‗Go-Back-N ARQ' and 'Selective
repeat ARQ' protocols, with thehelp of diagram. Which one is better
and why?
24. a) Compare and contrast a random access protocol with a controlled 3+3+5+4 3 II
access protocol.
b) The address 43:7B:6C:DE:10:00 has been shown as the source
physical address in an Ethernet frame. The receiver has discarded the
frame. Why?
c) Compare and contrast CSMA/CA with CSMA/CD.
d) What is transparent bridge? How does a repeater extend the length of a
LAN?
25. a) Name the types of HDLC frames, and give a brief description of each.
9+6 3 III
b) Draw the sender and receiver windows for a system using Go-Back-N
ARQ, given the following:
i. Frame 0 is sent; frame 0 is acknowledged.
ii. Frames 1 and 2 are sent; frames 1 and 2 are acknowledged.
iii. Frames 3, 4 and 5 are sent; frame 4 is acknowledged; timer for
frame 5 expires.
iv. Frames 5, 6 and 7 are sent; frames 5 through 7 are
acknowledged.
26. Compare between CSMA/CD AND CSMA/CA 5 3 IV
[Part C]
Sl Questions Marks CO BL
No. No.
1. A receiver receives the code 11001110111. When it uses the Hamming coding 5 3 III
algorithm, the result is 0101. Which bit is in error? What is the correct code?
2. An Ethernet MAC sub-layer receives 1510 bytes of data from the upper layer. Can the 5 3 IV
data been capsulated in one frame? If not, how many frames need to be sent?
Calculate the size of the data in each frame.
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
Determine the sender and receiver‘s window sizes that are not possible in Selective
Repeat protocol
Calculate the size of the window (Assume selective repeat protocol is used).
6. A sliding Window protocol with selective repeat ARQ uses a sliding window size of 5 3 IV
4. Frames were sent as follows from station A to station B.
(a) Calculate the frames available in sender and receiver windows after frame 3 is
lost.
(b) Receiver sends one data frame to after receiving frame 3 correctly, along
with piggybacking acknowledgement, then determine the frames in the
sender window of station A and receiver window of station B currently.
Protocol Ws, WR
(a) Stop-N-Wait ARQ (1) 31, 1
(b) Go-Back-N ARQ (2) 16, 16
(c) Selective repeat ARQ (3) 1, 1
Question Bank
Subject: Computer Network (PCC-CS 602)
CSE-6th Semester [Year: 2025]
Unit 3
Part A
Sl Questions Marks CO BL
No. No.
1 An IPv6 address consists of bits. 1 CO4 I
a) 48 b) 16 c) 32 d) 128
8 ARP is a – 1 CO4 I
a) TCP/IP protocol used to dynamically bind a high level IP address to a low level
physical hardware address
b) TCP/IP high level protocols for transferring files from one machine to
another
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
9 1 CO4 I
ICMP is a –
a) protocol handles error and control messages
b) protocol used to monitor computers
c) both a and b above
d) none of those
13 1 CO4 II
IP address can be used to specify a broadcast and map to hardware broadcast if
available. By conversion broadcast address has hosted with all bits
a) 0 b) 1 c) both a and b above d) none of the above
15 A station in a network forward incoming packets by placing them on its shortest output 1 CO4 II
queue. What routing algorithm is being used?
a) Distance vector routing b) Flooding c) Static routing d) Delta routing
16 In which routing method do all the routers have a common database? 1 CO4 I
a) distance vector b) link state c) link vector d) none of the above
18 Which routing algorithm requires more traffic between routers for set-up and updating? 1 CO4 I
a) Distance vector b) Link statec) Dijkstra d) Vector link.
22 A subnet mask in class A has fourteen 1s. How many subnets does it define? 1 CO4 II
a. 32
b. 8
c. 64
d. 128
23 A subnet mask in class B has nineteen 1s. How many subnets does it define? 1 CO4 II
a. 8
b. 32
c. 64
d. 128
24 Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the 1 CO4 II
subnet address?
a. 201.14.78.32
b. 201.14.78.65
c. 201.14.78.64
d. 201.14.78.12
25 Class _ has the greatest number of hosts per given network address. 1 CO4 I
a. A
b. B
c. C
d. D
26 In _ routing, the full IP address of a destination is given in the routing table. 1 CO4 I
a. Next-hop
b. Network-specific
c. Host-specific
d. Default
27 In _ routing, the mask & destination addresses are both 0.0.0.0 in routing table. 1 CO4 I
a. Next-hop
b. Network-specific
c. Host-specific
d. Default
28 What are the number of bits required for IPv4 addresses when expressed in binary? 1 CO4 I
28 In _ routing, the destination address is a network address in the routing table. 1 CO4 I
a. Next-hop
b. Network-specific
c. Host-specific
d. Default
29 Find the netid and the hostid of the following IP addresses. 1 CO4 III
a. 114.34.2.8
b. 19.34.21.5
c. 23.67.12.1
d. 127.23.4.0
30 In a class B subnet, we know the IP address of one of the hosts and the mask as given 1 CO4 III
below:
IP address: 195.134.112.66
Mask: 255.255.224.0
What is the first address (network address)?
31 Find the masks that create the following number of subnets in class B. 1 CO4 II
a. 2
b. 5
c. 30
d. 62
e. 120
f. 250
32 What is the maximum number of subnets in class C using the following masks? 1 CO4 II
a. 255.255.255.192
b. 255.255.255.224
c. 255.255.255.240
d. 255.255.255.0
33 For each of the following subnet masks used in class B, find the number of 1s that 1 CO4 III
defines the subnet.
a. 255.255.192.0
b. 255.255.0.0
c. 255.255.224.0
d. 255.255.255.0
34 Write the following masks in the /n format. 1 CO4 II
a. 255.255.255.0
b. 255.0.0.0
c. 255.255.224.0
d. 255.255.240.0
35 Find the range of addresses in the following blocks. 1 CO4 III
a. 123.56.77.32/29
b. 200.17.21.128/27
c. 17.34.16.0/23
d. 180.34.64.64/30
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
3 What is IP datagram? Write all the fields of IPv4 datagram. 1+4 CO4 III
8 Suppose a computer sends a packet at the network layer to another computer 5 CO4 IV
somewhere in the internet. The logical destination address of the packet is
corrupted. What happens to the packet? How can the source computer be
informed of the situation?
9 Suppose an organization is given the block 17.12.14.0/26, which contains 64 5 CO4 III
(=26) addresses. The organization has three offices and needs to divide the
addresses into three sub-blocks of 32, 16, and 16 addresses. Design the sub-
networks.
10 What is routing? Why is it needed? Define non-adaptive and adaptive routing 1+1+3 CO4 II
algorithm.
11 a) What are the problems of providing redundant path in a bridged network? 2+3 CO4 II &
b) How does a transport bridge provide solution to those problems? IV
12 What do you mean by the term ‘subnet masking’? Explain with an example, 2+3 CO4 II
how that can be achieved. &IV
13 Explain link-state routing algorithm. Compare it with flooding. 3+2 CO4 II
&IV
14 What do you mean by ‘subnet masking’? Explain with an example, how that 3+2 CO4 II
can be achieved.
15 Write the differences between virtual circuit approach and datagram approach. 5 CO4 IV
16 What are routing tables? Where are they located? Explain the utility of these 1+1+3 CO4 II
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
f. IGMP
26 Discuss IPv6 address structure in brief. Describe link state routing with 4+8+3 CO4 II&IV
example. Explain the necessity of hierarchical routing.
27 Distance vector routing suffers from count-to-infinity problem; BGP uses 5+6+4 CO4 II&IV
distance vector routing principle but not suffers from count-to-infinity
problem. Why? Describe the OSPF routing algorithm along with the utility of
“Hello” and “Link state update” message. Discuss about the different types
of OSPF links.
28 What is routing? Why is it needed? Define non-adaptive and adaptive routing 2+2+4+5+2 CO4 II&IV
algorithm. Explain shortest path routing algorithm. Compare it with flooding.
29 What is the first address of a block of classless addresses if one of the addresses 5 CO4
is 12.2.2.76/27
Module: IV Part C
Sl Questions Marks CO BL
No. No.
1 Mention the application of each class present in classful addressing 15 CO4 III &
(unicast, multicast, broadcast, or reserved). Explain the differences IV
between classful addressing and classless addressing in IPv4 with
regard to working principle.
2 An organization is granted a block 130.56.0.0/16. The administrator 15 CO4 III
has created 1024 subnets.
a. Find the number of addresses in each subnet.
b. Find the subnet prefix.
c. Find the first and the last address in the first subnet.
d. Find the first and the last address in the last subnet.
Question Bank
Subject: Computer Network (PCC-CS 602)
CSE-6th Semester [Year: 2025]
Part A
Sl Questions Marks CO BL
No. No.
a) three-way b) two-way
c) one-way d) none of these.
4 UDP is – 1 5 II
a) connection-oriented b) connectionless
c) both a and b d) none of these.
5 UDP and TCP are both ……… layer protocols. 1 5 I
a. Physical
b. Data link
c. Network
d. Transport
6 UDP needs the address to deliver the user datagram to the correct 1 5 II
application program.
a. Port
b. Application
c. Internet
d. Physical
7 Which is a legal port address? 1 5 I
a. 0
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
b. 513
c. 65,535
d. All the above
8 Which of the following does UDP guarantee? 1 5 II
a. Length of header
b. Source port address
c. Checksum
d. Destination port address
10 A host can be identified by while a program running on the host can be 1 5 II
identified by
.
a. An IP address; a port number
b. A port number; an IP address
c. An IP address; a host address
d. An IP address; a well-known port
11 The field is used to order packets of a message. 1 5 II
a. Urgent pointer
b. Checksum
c. Sequence number
d. Acknowledgment number
12 An ACK number of 1000 always means that 1 5 I
.
a. 999 bytes has been successfully received
b. 1000 bytes has been successfully received
c. 1001 bytes has been successfully received
d. None of the above
13 The timer prevents a long idle connection between two TCPs. 1 5 II
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
14 The timer is needed to handle the zero window-size advertisement. 1 5 II
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
a. Retransmission
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
b. Persistence
c. Keep-alive
d. Time-waited
16 The timer is used in the termination phase. 1 5 II
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
17 The timer keeps track of the time between the sending of a segment and 1 5 II
the receipt of an acknowledgment.
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
18 A special segment called a probe is sent by a sending TCP when the ………. 1 5 II
timer goes off.
a. Transmission
b. Persistence
c. Keep-alive
d. Time-waited
19 Token bucket algorithm is an advanced form of___________ 1 CO5
20 TCP assigns a sequence number to each segment that is being sent. The sequence 1 CO5
number for each segment is the number of the _______ byte carried in that
segment.
21 What are the transmission modes in FTP? 1 CO5
22 In the ____ bucket algorithm, bursty chunks are stored in bucket and sent out at 1 CO5
an average rate.
23 What are the two categories of QoS attributes? 1 CO5
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
Part B
Sl Questions Marks CO BL
No. No.
1 What is the utility of PSH and RST flag of TCP header? Explain how window field of 2+3 5 III
the TCP header performs the end to end flow control.
2 What are the responsibilities of transport layer? Explain the utility of UDP datagram. 3+2 5 II
3 Describe the token bucket algorithm in brief with necessary diagram. 5 5 III
4 Explain the working of leaky bucket algorithm. Give argument why the leaky bucket 4+1 5 IV
should allow just one packet pet tick independent of how large the packet is.
5 TCP and UDP - which one is better? Justify your answer. 5 5 II
6 Define congestion. What is the difference between congestion control and flow 2+3 5 IV
control?
7 Describe the three-way handshaking procedure in TCP. 5 5 IV
9 Explain the various Quality of Service (QoS) parameters. Mention the techniques to 3+2 5 III
improve it.
10 What advantages does TCP over UDP? What are the features for which may TCP be a 2+3 5 III
reliable protocol?
11 Suppose that the UDP receiver computes the Internet checksum for the received UDP 5 CO5
segment and nds that it matches the value carried in the checksum eld. Can the receiver
be absolutely sure that no bit errors have occurred? Explain. Would things be different
with TCP?
12
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
Part C
Sl Questions Marks CO BL
No. No.
1 What is port address and socket address? Among TCP and UDP, which one is more 3+4+2 5 IV
reliable and why? Why we use unreliable one? Draw the header format of TCP and +7
explain different fields.
2 Describe the method of congestion control in datagram networks. How does it differ 9+6 5 IV
from the method of congestion control in virtual circuit networks?
3 Compare between the TCP header and the UDP header. List the fields in the TCP header 5+5+5 5 III
that are missing from UDP header. Give the reason for their absence.
4 Are there any circumstances when connection-oriented service will (or at least should) 8 5 IV
deliver packets out of order? Explain.
5 (a} Explain how FTP can be used to browse websites? 7+8 CO5 III
{b) Discuss about the Bluetooth architecture and protocols involved during Bluetooth IV
enabled network.
Question Bank
Sl Questions Marks CO BL
No. No.
4. Which of the following TCP/IP protocol is used for file transfer with minimal capability 1 6 I
and minimal overhead?
a) RARP b) FTP c) TFTP d) TELNET
b) FTP allows systems using ASCII and a system using EBCDIC to transfer
file.
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
MODULE_VI APPLICATION LAYER [PART-B]
Sl Questions Marks CO BL
No. No.
6. Discuss about the different types of file transfer protocols in application layer. Why two 5 6 II
port numbers are used by the FTP protocol
7. What is SMTP?What do you mean by ‘mail transfer agent’, ‘mail delivery agent’, and 5 6 II
‘mail user agent’?
8. Why do we need a DNS system? When we can directly use an IP address? What is the 5 6 IV
purpose of the inverse domain?
10. a) What do you mean by ‘terminal network’? How are options negotiated in 15 6 IV
TELNET?How are control and data characters distinguished in NVT?
b) Describe the working principle of SNMP in brief.
11. 15 6 II
Write short notes on the following (any three):
a) HTTP and WWW
b) E-mail and SMTP
c) FTP and TFTP
d) TELNET
e) DNS
f) SNMP
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
Question Bank
Subject: Computer Network (PCC-CS 602)
CSE-6th Semester [Year: 2025]
Module – VII: Modern Topics [ Part A ]
Sl Questions Marks CO BL
No. No.
1. If A wants to send an encrypted message to B, the plaintext is encrypted with the public key 1 6 II
of
a) A b) B c) the network d) Either A or B
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
Module – VII: Modern Topics [ Part B ]
10. a) What are the differences between symmetric key cryptography and 6 IV
asymmetric key cryptography? 4+2+4+
Explain the terms 'encryption' and 'decryption' in the context of 5
cryptography.
Briefly discuss any key exchange algorithm learnt by you.
Describe IPSec in brief.
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
11. 6 II
Explain substitution, transposition cipher and product cipher. What is 6+4+5
the difference between symmetric key encryption and asymmetric key
encryption? What are the four basic principles related to the security
of a particular message? Explain each principle with proper example.
12. 6 II
Write short notes on the following (any three): 3x5
a) Digital Signature
b)ISDN
c) Firewall
d) FDDI
e) Bluetooth
f) ATM
g) Cable Modem
h) DSL and ADSL
i) VPN
Sl Questions Marks CO BL
No. No.
2. ―The packet filter controls the flow between internal and potentially hostile network.ǁ 5 6 III
– Justify this statement.
Signature of Faculty:
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi
AOT
Prof. Jyotirmoy Chakrabarti, Prof. Rakhi Neogi