0% found this document useful (0 votes)
9 views3 pages

CN Pyq

The document outlines a series of questions and topics related to computer networks, including transmission modes, network classifications, topologies, data link layer services, routing algorithms, congestion control, and protocols such as TCP and UDP. It covers various units that delve into technical aspects such as addressing, routing, and security mechanisms. Each unit contains specific questions aimed at assessing knowledge and understanding of networking concepts.

Uploaded by

gameatgameology
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views3 pages

CN Pyq

The document outlines a series of questions and topics related to computer networks, including transmission modes, network classifications, topologies, data link layer services, routing algorithms, congestion control, and protocols such as TCP and UDP. It covers various units that delve into technical aspects such as addressing, routing, and security mechanisms. Each unit contains specific questions aimed at assessing knowledge and understanding of networking concepts.

Uploaded by

gameatgameology
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Unit 1

(4 marks)
1. What is mode of transmission? Explain all type of transmission modes.
2. What is a computer network? Discuss the classification of computer
networks.
3. Define what is bus topology.
4. Relate how do guided media differ from unguided media? Summarize
different types of guided media and unguided media.

Unit 2
(4 marks)
1. Tell the services provided by the data link layer to the network layer.
2. Explain CSMA/CD.
3. Match the deficiency of pure ALOHA with slotted ALOHA. Why do you
think efficiency is better in slotted ALOHA. What is the effect of efficiency
on number of packet transmitted and collided packet. What happened in
ALOHA if 2 packet gets collided.
4. Compare the different persistent scheme of CSMA. What is the vulnerable
time of CSMS-CD. How sensing is performed in CSMA to find the idle and
busy state of medium. Explain why CSMS-CD is applicable in wired
network and CSMA-CA is applicable in wireless network. Why reverse is
not possible. Justify?

Unit 3
(4 marks)
1. Explain Leaky Bucket algorithm.
2. Apply Static Routing and Dynamic Routing with the help of an example.
3. Demonstrate the responsibilities of the Network Layer.
4. Identify static routing and dynamic routing.
(6 marks)
5. Categorise the diffrent Classful addressing.
-OR -
6. Examine the motivation for moving from IPv4 to IPv6.
7. Compare Distance Vector Routing and Link State Routing.
-- OR ---
8. Divide the IPv4 addresses into different classes. What are those class.
How classful addressing differs from classless addressing. Examining the
concept of Classless and Classful Addressing calculate the following:
1. Find the range of addresses in a block of classless addresses if one
of the addresses is 200.17.21.135/27.
2. Find the class of IP, default mask, network and host address for the
IP address 200.17.21.135.
(10 marks)
9. Define with an example the shortest path routing algorithms used in
computer networks.
--OR--
10. Evaluate basics of 1Pv4 addressing. Write all the classes of IP along with
their net ID bits, host ID bits, default mask and CIDR notation. In what
format IPv4 can be presented?
11. Consider a source computerS) transmitting a file of size 106 bits to a
destination computer(D)over a network of two routers (R1 and R2) and
Three links (L1, L2 and L3). L1 connect S to R1, L2 connects R1 two R2;
and L3 connect R2 to D. Let each link be a length of 100Km. Assume
signal travel over each link at a speed of 108 m/s. Assumed that the link
bandwidth on each link is 1Mbps. Let the file be broken down into 1000
packets each size 1000 bits. Find the total sum of transmission and
propagation delays in transmitting the file from S to D.
--OR--
12. Explain classful IPv4 addressing with examples.
(12 marks)
13. Assess the following Hamming coded (single bit correction) string was
received: 010101010111. Is there an error? If yes, in which position?
Unit 4
(4 marks)

1. Demonstrate the responsibilities of the transport layer.


2. Identify the purpose of Urgent Pointer in the TCP Header.
3. Explain the fields on which the UDP checksum is calculated. Why?
4. Identify the advantages of using UDP over TCP.
(6 marks)
5. Classify the mechanisms that can alleviate congestion.
--OR--
6. List some ways to deal with congestion.
7. Analyse transport layer User Datagram Protocol along with its header.
- OR -
8. Analyse the transport layer connection management.
(10 marks)
9. Explain the congestion Control in CN?
--OR--
10. Examine congestion control in detail with open loop and closed loop policies?
11. Examine TCP Header and explain all the fields in detail.
--OR--
12. Analyse the characteristics related to QoS and also explain the
techniques to improve QoS
(12 marks)
13. Evaluate the transmission control protocol header and its various fields?

Unit 5
(4 marks)
1. Explain the Domain Name System.
2. Construct a diagram to explain the Unicast & Multicast communication.
3. Explain the domain name system with example.
4. Identify the importance of FTP.
(6 marks)
5. Compare HTTP and HTTPS.(*2)
- OR -
6. Explain 3-way handshake protocol.
7. Classify the symmetry and asymmetric cryptography with help of an
example
(10 marks)
8. Explain the steps involve in RSA
--OR--
9. Analyze the working of digital signature with the diagram
10. Explain the steps involved in the RSA.
-- OR -
11. Explain the following:i) WWW ii) UDP.

(12 marks)
12. Elaborate about electronic mail in detail with the role of SMTP and POP
protocol?
13. Elaborate Data Encryption Standards (DES) with all rounds and also
explain one of the rounds in detail.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy