Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
95 views
36 pages
CN
Uploaded by
Anshul Pathania
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save cn (1) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
95 views
36 pages
CN
Uploaded by
Anshul Pathania
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save cn (1) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 36
Search
Fullscreen
UAW Tt - LORS Computer Networks-1 PUNJAB TECHNICAL UNIVERSITY | QUESTION PAPERS UNIVERSITY QUESTION PAPER; MAY-2013 OO SECTIONA Q 1. (a) What is difference between http and https? Ans. HTTP is used mainly to access data on www. This protocol transfer data in the form of slain text, hypertext audio, video ete. The function of HTTP is like a combination of PPP and SMTP HTTP's is a secure socket layer. It is basically used to secure the information. (b) Difference between LAN, MAN and WAN. Ans. Refer to Chapter No. 1 Q.No. 30 on Page No. 11 (c) What are the different types of cryptography? Ans. There are few basic types of cryptography 1. Encryption ‘Symmetric cipher 3. Decryption * Public key cryptography 3. Key One time pad 4, Secure line Steganography 5. Public line (d) What is difference between simplex and half duplex? Ans. Refer to Chapter No. 1 Q.No. 13 on Page No. 6 (e) Give some examples of serial devices. ‘Ans. Devices in linux have major and minor nurrbers. The serial port HySx (X = 0, 1, 2 etc.) is major number 4. You can see this by typing “is ~ 1 Hy S” in the /dev directory. To see the devices names for various devices, see the devices file in Kernel documentation. (f) On which layer do switches and routers work? Ans. Router : It can connect two or more networks. Switch : It is a point to point device. Both router and switches are used in network layer, (g) What is need of modems? Jans, A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demiodulates such as carrier signal to decode the transmitted ‘formation. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data (h) IP defines how many bits for representing an IP and MAC address? ‘Ans. MAC address (Media Access Control) is a 48-bit or 64-bit address associated. IP address (Internet protocol) is 32 bit or 64 bit address associated, (i) How are VLANs useful? Ans. VLAN is @ virtual LAN (where LAN is short for local area network). The virtual LAN is pretty much what is sounds like ~ a virtual separate network, but across the save physical network. (j) How many bits are consumed by IPV4 and IPV6 addresses respectively? ‘Ans. |PV4 contains 32 bits (four byte) addresses which limits the address space to 4294967296 232) addresses ntains 128 bits. 5 . CN-I (4th SEM)LORDS Computer Networks-1 SECTION-B 02, Which of the following address does not belong to the same network? Explain why? 1, 130.31.23.31 2, 130.31.24.22 3, 130.32.23.21 4, 130.31.21.23 Ans. 1, 130.31.23.31 ~ The subnet mask i.e. network mask is 255.255.2 2. 130.31.24.22 ~ The subnet mask i.e. network mask is 255.255.2: 3 130.32.23.21 - The subnet mask i.e. network mask is 255.255.2 “4. 130.31.21.23 — Network mask is 255,255.255.0 “What are two reasons for using layered protocols? What do you mean by link to link ryphet OSI reference model? Explain their functions briefly. ‘ans. 1. Addressing : For every layer, itis necessary to have a mechanism to identify senders and receivers. Since there are multiple possible destinations, some form of addressing is required order to specity a specific destination 2.Direction of Transmission : Another points the direction of data transfer. Based on whether the system communications only in one direction or otherwise, the communication systems are classified as under : (i) Simplex System (i) Half Duplex System (ii) Full Duplex System 3. Error Control : Physical communication circuits are not perfect. Error detection and connection both are essential. Many error detecting and correcting codes are known out of which those agreed by sender and receiver should be used. The receiver shoud he able to tell the sender by some mean that ithas received a correct message. 4. Avoid Loss of Sequencing : All the communication channels cannot preserve the order in which messages are sent on it. So there is a possibilty of loss of sequencing. To avoid this, all the pieces should be numbered so that they can be put back together at the receiver in the appropriate sequence, 5. Ability of Receiving Long Messages : At several levels, another problem should be solved which i inability of al! processes to accept arbitrarily long messages. So, a mechanism needs to be developed to disassemble transmit and then reassemble message. Host to host : Data Link Layer : 1. It provides synchronization and error control forthe information which is to be transmitted over the physical link. 2. To enable the error detection, itadds error detection bits tothe data which i tobe transmitted 3. The encoded data is then passed to the physical layer 4. There error detection bits are used by the data link or other side to detect the correct errors 4. Identity the address class of following IP addresses : 200.58,20.165 ; 128.167.23.20; 16.196.128.50 ; 50.156.10.10 ; 250.10.24.96. Ans, 200.58,20.165 11001000.00111010.00010100.10100101 Class C 128.167.2320 10000000.101001 11.00010111,00010100 Class B & CN-I (4th SEM)LOI) Computer Networks] 400 10000000.00110010 150.156.10.10 10010110.1001011 B 1000010.00000010 250.10.2 41111010,000¢ Class E Q5. Explain the physical and logical structrue of Internet. large number of DNS lookups to be processed. Ans. Q Register its name in DNS. Name resolution. Caching response to name resolution queries. Removes previously names from the cache when it receives a negative response f 1010,0001 1000.01 100000 Explain how the DNS allows a jor the name. Negative caching Keep track of transistory. 2 Maintain connection-specific domain name suffixes. Q6. Contrast link state and distance vector routing protocols, giving an example of each. What is count to infinity problem? Ans. Refer to Chapter No. 5 Q.No. 31 & 40 on Page No. 107 & 112 SECTION-C 7. (a) What is packet switching? Explain two different approaches to packet switching. Ans. Refer to Chapter No. 2 Q.No. 36 on Page No. 40 (b) Discuss the different factors affecting congestion control algorithms. ‘Ans. Refer to Chapter No. 5 Q.No. 42 on Page No. 115 8. (a) Suppose a machine is attached to several physical networks. Why doesit need a different IP address for each attachment? ‘Ans. Refer to Chapter No. 5 Q.No. 39 on Page No. 111 (b) Suppose a computer is moved from CSE Department to Electrical Department in same engineering college. Does the physical address need to change? Does the IP address need to change? Does it make a difference that the machine is a desktop or a laptop? ‘Ans. It will depend upon the layout of your network. If the other department is on the same building its highly unlikely that you have to change the address if does matter you using static or DHCP. Q9. Explain pure-ALHOA and slotted-ALOHA systems. Give the expression for throughout for each, clearly explaining the various terms. Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each. Ans. Refer to Chapter No. 4 Q.No. 5 & 6 on Page No. 82 & 83 7 CHL (4th SEM)LOA Computer Networks-1 UNIVERSITY QUESTION PAPER, DEC.-2013 OO SECTION-A 1. (a) What is the difference between the protocol ARP and RARP? Ans. ARP : Address Resolution Protocol is utilized for mapping IP network address to the hardware address that user data link protocol RARP : Reverse Address Protocols a protocol using which a physical machine in a LAN could request {0 find its IP address from ARP table or cache from a gateway server. (b) Explain as to how error detection at the data link level is achieved Ans. Refer to Chapter No. 3 Q.No. 29 on Page No. 66 (c) What does the subnet mask : 255.255.255.0 signifies? Ans, 255.255.255.0 subnet mask if of a class it signifies 44999991.11111111.11111111.00000000 (Binary) (d) In OSI network architecture, the dialogue control and token management are responsibilities of which layer? ‘Ans. In session layer the dialogue control and token management are responsible. (e) Four bits are used for packed sequence numbering ina sliding window protocol used ina computer network. What is the maximum window size? Ans. It depends upon what kind of sliding window protocol are we using for (i) Selective repeat window size here will be {ii) For go back n window size will be 16-1 =15 maximum size is 15. (f) Whats the difference between simplex and half duplex? Ans. Refer to Chapter No. 1 Q.No, 13 on Page No. 6 (g) Which protocol is used for sending email on the internet? Ans. SMTP protocol is used for sending email on the internet? (h) IP detines how many bits for representing an IP and MAC address? Ans. MAC address (Media Access Control) is a 48-bit or 64-bit address associated IP address (Internet protocol) is 32 bit or 64-bit address associated (i) What are the two types of transmission technology available? ‘Ans. Two types of transmission technology are : O Broadband OD Point to point. (i) What is the difference between the communication and transmission? Ans, Transmission is a kind of one way data transfer but communication is a two way interactive process in which all the participants actively share their data. SECTION-B Q 2, What are the various transmission media available? State advantages and disadvantages of each. Ans. Refer to Chapter No. 2 Q.No. 66 & 69 on Page No. 53. & 55 Q 3. Explain different methods of error detection and error correction. Which method requires more number of bits and why? Ans. Refer to Chapter No. 3.Q.No. 44 on Page No. 72 8 (CNL (4th SEM)LOD Computer Networks-I 2 4. (a) What is the difference between the bit rate and baud rate of a signal? Ans. Bitrate : Bitrate is measure of the number of the data bits (O and 1) transmitted in one second. Baud rate : Baud rate means the number of times a signal in a communication channel changes state. (6) What are the advantages and disadvantages for static and dynamic channel allocation? Ans. Refer to Ch, japter No. 4 Q.No. 3 & 4 on Page No. 62 | Q 8: Describe how email works. Describe the key components and flows. Identify key standards that apply. Ans. Refer to Chapter No. 7 Q.No. 11 on Page No. 141 G6. Why is multiple access required in LAN technologies? Compare FDM, TDM, and SDM in terms of their ability to handle groups of stations. Ans. Refer to Chapter No. 2.Q.No. 33 on Page No. 38 SECTION-C Q7. (a) Whatis the difference between congestion control and flow control? Ans. Refer to Chapter No. 5 Q.No. 41 on Page No. 114 (b) Give one advantage and one disadvantage of window-based flow control vs. rate- based flow control, Ans. Refer to Chapter No. 5 Q.No. 29 on Page No. 107 © 8. (a) List two reasons why intra-domain routing protocols are not suitable for inter- domain routing. Ans. Refer to Chapter No. 5 Q.No. 9 on Page No. 97 (©) Why does distance-vector routing scale better than link-state routing? Ans. Refer to Chapter No. 5 Q.No. 30 on Page No. 107 Q 9. (a) What is a bridge? What is a switch? What are the motivations to use bridges and switches? Ans. A bridge is a device that se network (e.g. a single IP-subnet) A bridge is usually placed between two s but not that much with the computers in the Parates two or more network segments within one logical eparate groups of computers that talk with each other, other group. A good example of this is to consider a cluster of macintoshes and a cluster of unix machines. Both of these groups of machines tend te be quite chatty amongst themselves, and the traffic they produce on the network causes collisions tor the other machines who are typing to speak to one another. Aswitchis a device for making and breaking the connection in an electric. ‘oor adopting one thing in place of another. In networks, a device that fiters and forwards Packets between LAN segments. Switches operate at the data link layer and sometimes the network switch, (0) Describe the forwarding and learning algorithm for transparent bridges. Ans. Out of syllabus. UNIVERSITY QUESTION PAPER, MAY-2014 SECTION-A Q 1. (a) List the important features of WAN. Ans. List of the important features of WAN 1. Hardware is spread over a wide geographical area : A “ting equiment connected over a large area, usually 9 Circuit. An act of changing WAN consists of terminal and in excess of two kilometres. CNT (ath SENLOADS Computer Networks T 2. Third party telecommunication equipment is us SS ena es ‘ telephone, radio of satellite communication links are used. which the orge me coe Telecommunication companies provide the links and each of these has its own rules, reguiay,,, service charges (b) Whats attenuation ? Nee Attenuation refers to decreasing in signal magnitude between two points, Tr, may be along a radio path, transmission line or other devices (c) Define noise. Ans. Refer fo Chapter No. 2 Q.No. 12 on Page No. 30 (d) What is framing ? Ans. Refer to Chapter No. 3 Q.No, 6 on Page No. 59 (e) Differentiate between static and dynamic channel allocation. Ans. Point of difference Static Channel allocation | Dynamic Channel allocation 1. Performance Better under heavy traffic | Better under low/moderate rm 2. Flexibility in channel allocation | Nil High 3. Suitability Suitable forlarge networks | Suitable for smalimedum sized networks. 4. Overall flexibility Low High 5. Suggested application Long-duration voice calls | Voice calls of short duration | data transmission 6. Management overheads [Low High 7. Call/Transmission set-up delay | Low High 8, Signaling load Low High 9. Control Centralized Centralized or distributed (f Differentiate between leaky bucket and token bucket algorithms. Ans. Refer to Chapter No. 5 Q.No. 19.0n Page No 102 (g) What is silly windows syndrome in TCP ? Ans. Silly window syndrome is a problem in com, TCP flow control. fa server with this problem is un: its clients reduce the amount of data they the server continues to be unable to smaller, sometimes to the point that t data transmission extremely inefficie toa “silly” value. Puter networking caused by poorly-implemert ‘able to process all incoming data, it requests! 'y Send at a time (the “window” setting on a TCP packet Process all incoming data, the window becomes small and he data transmitted is smaller than the packet header, mai? nt. The name of this problem is due to the window size shin The sender must not transmit data unless & A packet is at least as large as the maximum segment size Apacket with data which is half of the re a All of the output data may be sent and there is no unacknowledged data or the NAGLE algorithm is disabled ena caseLOIS Computer Networks-1 (b) Detine ports at transport layer. Ans. Each process that wants to communicate with another process identifies itself to the PIP protocol suite by one or more ports. A port is a 16-bit number, used by the host-to-host ‘rotocol to identity to which higher level protocol or application program (process) it must deliver coming messages There are two types of port Well Known : Well-known ports belong to standard server, for example, Telnet uses port 23, Well known port numbers range between 1 and 1023. J Ephemeral : Ephemeral pot numbers have values greater than 1023, normally in the range 1024 10 65535, (i) List the important features of MIME. Ans. The MIME standard provides several important features such as O Specifications for other character sets. J Detinitions for content types such as applications, images, and other multimedia fles types A method to include several different objects with in a single message An extended set of possible headers U Standard encoding methods such as base64 and quote printable (i) What is Manchester encoding ? Ans. Manchester enccding, also known as Phase Encoding (PE), is 2 synchronous clock encoding technique used by the physical layer to encode the clock and data of a synchronous bit stream Manchester encoding is used in the Ethernet media systems. Manchester coding provides a simple way to encode arbitrary binary sequences without ever having long periods without level transitions, thus preventing the loss of clock synchronisation, or bit errors fromlow frequency drift on poorly-equalized analog links. In this technique, the actual binary data to be transmitted over the cable are not sent as a sequence of logic 1’s and 0's (known technically as non Return to zero (NRZ)) Instead, the bits are translated into a slightly different format that has a number of advantages over using straight binary encoding (i.e. NRZ) SECTION-B Q2. Compare the important features of OS! model and TCP/IP architecture. Ans. Refer to Chapter No. 1 Q.No. 64 on Page No. 24 Q3. State and explain the Shannon theorem. What are its uses ? Ans. Refer to Chapter No. 2 Q.No. 28 on Page No. 36 jnrthe design issues of data link layer. Fiela length 1 6 6 Aero in bytes. [— 7 a Y 7 s ; 022 | ] | Destination | Source | Preamoie | 0 ce | Length | header | Fes. | F address: address, ‘and data | | l a BEAL J SOF = Start-of-frame delimiter ; FCS = Frame check sequence 862.3 frame begin with an alternating pattern of Is and Os called a preamble. 11 ‘CN (4th SEM)LORD Computer Networks 1 9 The preamble tells receiving stations that a frame 1s comin’ 3 frame is a start-of-frame (SOF) The byte before the destination address in an IEEE 602 delimiter This byte ends with two consecutive one bits, which serve t0 synchronize the frame reception Portions of all stations on the LAN LANs are the destination and source address Immediately following the preamble in IEEE802. fields IEEE 802.3 addresses are 6 bytes long. Addresses are contained in hardware on the |EEE 802.9 interlace cards. The source address is always a unicast (single node) address, while the destination address may be unicast, Mulicast (group), or broadcast (al 0 des) in IEEE 802.3 frames, the 2-byte fied folowing the source address 1s 8 length field, which indicates the number of bytes of data that follow ths field and precede the frame check sequence (FCS) field Following the length field is the actu layer processing is complete, this data wil of IEEE 802.3, the upper-layer protocol must If data in the frame is insufficient to fil the frame to it inserted to ensure at least a 64-byte frame. ‘After the data fieldis a 4-byte FCS field cortaining a cycle re CRC is created by the sending device and recalculated by the rect that might have occurred to the frame in transit. 'Q6. Explain the meaning of various fields of UDP header. e frame. After physical layer and link- ‘an upper-layer protocol. In the case ta portion of the frame, if at all + be defined with in the dat 5 minimum 64-byte size, padding bytes are jal data contained in the il eventually be sent to dundancy check (CRC) value. The ‘eiving device to check for damage ae UDP Header Ofeets Octet 0 1 2 3 octet | et [o]+]2[3]4 5]6|7|8/2 ro} rz) 16]17] 18] 19}20)21]22)23[24]25]26|27/28|2 30/21 o fo source Pott Destinaon port | | a | 2] Length Checksum | | ur fields, each of which is 2 (bytes) 16 bits. ‘sender's port when meaning ful and should be assumed .d, then it should be zero. If the source host is the client, | port number. If the source host is the server, the port The UDP header consists of fo ‘Source port : This field identifies the tobe the port to reply to if needed. It not use the port number is likely to be an ephemeral number is likely to be a well-known port number. Destination port: This field identifies the receiver's port and is required. Similar to source port umber, ifthe client is the destination host then the port number wil likely be an ephemeral port rimber and if the destination host is the server then the port number will likely be a well-known port number. Length : A field that specifies the length in bytes of the UDP header and UDP data. The minimum length is & bytes since that’s the length of the header. The field size sets a theoretical limit 1 65,55 bytes (8 byte header + 65,527 bytes of data) for a UDP datagram. Checksum : The checksum field is used for error checking of the header and data. If no checksum is generated by the transmitter, the field uses the value all-zero. 12 ‘ch (ath SEM)ae ‘\ . LoaDd Computer Networks SECTION-C ——_.. jitable examy Ne. 07. Whats distance vector routing ? Explain the steps valved ae per {Ans. It is a routing protocol used in routing of packet one tor routing protocols communications. They use the Bellman Ford Algorithm examples of distance: include RIPV1 of 2 and IGRP. wuters, The distance vector routing protocol assumes a network connected through oe bere o cach of which is connected to two or more computer networks Each network may De co ‘one or more routers. 1: The description below describes a very simple dstance-vector routing Protec’ ” 4. in the fist stages, the router makes alist of which networks it can reach, and Te cl reach them (cost is protocol dependent, in RIP case, the cost s measured by number hops) Int reaset this willbe the two or more networks to which this router s connected. The number of hops for these networks will be 1. This table is called a routing table. 2. Periodically typically every 30 seconds) the routing table is shared with other routers of each ofthe connected networks via some specified inter-outer protocol. These routers will add | 10 every hop-countin the table, as it associates a hop cost of 1 for eaching the router that sent the table. This information is just shared between physically connected routers (“neighbors"), so routers on other networks are not reached by the new routing tables yet. 3 Anew routing table is constructed based on the direetly configured network interfaces, as before, with the addition of the new information received from other routers. The hop-countis used as ‘a cost measure for each path, The table also contains a column stating which router offered this hop count, so that the router knows who is next inline for reachinga certain network. ‘4. Bad routing paths are then purged from the new routing tables. If two identical paths to the same network exist, only the one with the smallest hop-count is kept. When the new table has been cleaned up, it may be used to replace the existing routing table used for packet forwarding 5. The new routing table is then communicate to all neighbors of this router. This way the routing information will spread and eventually ll routers know the routing path to each network, which router, it shall use to reach this network and to which router it shall route next. Distance vector routing protocols are simple and efficient in small netwoks, and require ltle,for management. However they do not scale well, and have poor convergence properties, which has led to the development of more complex but more scalable link state routing protocols for use in large networks, They suffer from the “Count to infinity problem” Now let us explain its example IGRP (Interior Gateway Routing Protocol). It used by routers to. exchange routing data within an autonomous system. IGRP was created in part to overcome the limitations of RIP (maximum hop count of only 15, and a single routing metric) when used within large netwroks. IGRP supports multiple metrics for each route, includng bandwidth, load, delay and reliability ; to compare two routes these metrics are combined together into a single metric, using a formula ‘which can be adjusted through the use of pre-set constants. T1e maximum hop count of IGP routed packet is 255 (dafault 100). IGRP is considered a classtul routing protocol. As the protocol has no filed for a subnet mask the router assumes is that all interface addresses have the same subnet mask as the router itself. This contrasts with classless routing protocols that can use variable length subnet mask. Classtul protocols have become less popular as they are wasteful of ip address space. Its sucessor is EIGRP, that adds DUAL, ideas to the basic distance vector mechanism of GAP. Q8. Whats sliding window ? Explain the various sliding window protocols for error and flow control with example. Ans. Refer to Chapter No. 3 Q.No. 49 on Page No. 74 Q9, What is Switching ? Compare circuit, message and packet switching. ‘Ans. Switching : Refer to Chapter No. 2 Q.No. 23 on Page No. 33 (3) eva etn sem)Comparison of circuit, packet and message switching © Packet Switching Circuit Swithcing There is physical connection between transmitter and receiver. 2. All the packet uses same path. 3. Needs an end to end path before the data transmission 4, Reverses the entire bandwidth in advance. 5. Charge is based on distance and time, but not on traffic. Waste of bandwidth is possible. Congestion occur for per minute 8. Itcannot support store and forward transmission 9. Not suitable for handling interactive traffic. Recording of packet can never happen with circuit switching, Galsegns-Propaiton ay ‘signal ‘Processing delay te ad =F} cat accent sipat 10. Nodes't 2 3 ‘Acknowledgement signal Timing diagram 11, Message to be transmitted is in the form of packets 12, Store-and-forward technique is not used 13, Itcanbe used with real-time applications 14, It is used in telephone network for bi-directional fast and real-time data transfer. LORD) Computer Networks No physical path is establis between transmitter receiver. Packet travels independently. and No needs of end to end path before data transmission. Does not reverse the bandwidth in advance. Charge is based on both number of bytes and connect time. No waste of bandwidth: Congestion occur for per packet. it support store and forward transmission. Suitable for handling interactive traffic. Recording of packet is possible. Co Timing diagram Message to be transmitted is in the form of packets Store-and-forward technique is used 't can be used with real-time applications. Itis used for the internet [Message ‘Swithcing | No physical path 1s set in] advance between transmitter and receiver Packets are stored and forward Same as packet switching ‘Same as packet switching. Charge is based on number of bytes and distance. No waste of bandwidth No congestion or very less congestion. Italso support store and forward transmission. Same as circuit Switching, Same as packet switching Caltrequest Call accept packet packet Fe Acknowes gement Backer 18 4 Timing diagram Message to be transmitted is in the form of blocks. Store and froward technique is used. cannot be used with real time applications. Iwas used in the transmission of voice signals and messages. 14 CNT (4th SEM)LOADS Computer Networks-1 UNIVERSITY QUESTION PAPER, DEC.-2014 SECTIONA the major advantages of STP over UTP ? ‘aS protective sheathing © STP offers better performance at lower data rates 3. Less interference. (©) Describe the components of fibre optic cable. Draw a picture, Q 1. (a) What are Ans. 1. STP h reel . Taare pool peewee | a J Optical fibre cable ~ Fiber optic connector ‘The basic elements found in fiber optic systems are a transmitter, fiber optic cable receiver and connector. Three components are required }- Light source : Typically a Light Emitting Diode (LED), or laser diode 2. Fiber medium : Current technology carries light pulses for tremendous distance (e.g. 100s of Kilometers) with virtually no signal loss (i. no amplifiers or repeaters are needed) 3. Detector : Which detects the light and converts it to electric signals. (c) Whats the difference between network layer delivery and transport layer delivery? Ans. |_Network layer delivery | 1. The network layer is responsible for the | 1 source-to-destination delivery of packet | across multiple network links. The network layer must be present on | 2. | allsystems and delivers packets hop-by- | hop between adjacent intermediate | | Transport layer delivery The transport layer is responsible for | source-to-destination delivery of the entire message. The transport layer can technically be absent from intermediate systems and delivers packet content end-to-end | systems (routers or gateways or end between hosts, systems (hosts) 3. The network layer is usually "unreliable" | 3. The transport layer often adds a and connectionless. measure of reliability (such as resending missing or errored packet content) and | | connections to the network layer. The network layer has the network | 4, The transport layer focuses on ports and address. multiplexing application's trafic on the _|__network. (d) How can a device have more than one IP address ? Ans. if a device has more than one interface to the internetwork, it will have more than 15 (CNA (ath SEMLORD) Computer Networks: ° address The most obvious case where this occur is with routers, Which connec) ther different network and thus must have an IP address for the interface on each one, 1 'S also po! to have more than one IP address, however, such a de’ som Ne for aid to be multihomea (e) Which contro! bit is involved in setting up a TCP session ? Ans. A TCP/IP connection is made between two computers, using teir address ang Gepending on the application using TCP, port numbers. The SYN and ACK bits in the Top header are important components used 10 establish this initial connection (f) What are the factors that affects the data rate of a link ? Ans. The data rate of a link depends on the type of encoding used and the bandwidts of the medium (g) What are the advantages of FDDI over a basic token ring ? Ans. Q The data rate on FDDI is about 100Mbps whereas a Token ring supports only 4 or 16 Mbps. FDDI uses fiber optic cable, which is free of EMI, while Token Ring uses shielded twisted pair cable, which is more susceptible to noise. The distance over which a FDDI network can cover is much greater than that of a Token ring network. (h) What is the purpose of the timer at the sender in systems using ARQ ? ‘Ans. The sender starts a timer when it sends a frame. It an acknowledgment is not received within an allotted time period, the sender assumes that the frame was lost or damaged and resends it, (i) Is there any drawback of using piggybacking ? Ans. The major drawback with piggybacking link protocol is that if the receiver (or sender) has no data frames to be transmitted, then the acknowledgment frames have to either wait until they fetch the packets from their respective network layer or transmit the acknowledgement frame separately. This obviously makes the protocol inefficient. (j) How many bits are consumed by IPv4 and IPv6 addresses respectively ? Ans. Refer to Q.No. 1 (j) of May 2013. SECTION-B Q 2. Draw the IP datagram header tormat. it is called an unreliable protocol”. Justify ? Ans, Data transmitted over an internet using IP is carried in messages called IP datagrams Like all network protocol messages, IP uses a specific format for its datagrams. We are of course looking here at IP version 4 and so we will examine the IPva datagram format, which was defined in RFC 791 along with the rest of IPv4. The IPv4 datagram is conceptually divided into two pieces : the header and the payload. The header contains addressing and control fields, while the payload carries the actual data to be sent over the internetwork. Unlike some message formats, IP datagrams do not have a footer following the payload, 16 imes s IP datagram has a checksum field still cet (ath SEM)LOD Computer Networks-1 The WP datagram header format : = ——32 bits 1 8 16 24 32 1 Pe VER | int | Type ot service Total length Identification 7 Fragment offset Time to live Protocol Header checksum Source address, Destination address Option (0 or more words) Header Checksum : A checksum computed over the header to provide basic protection against corruption in transmission, Ths is not the more complex CRC code typically used by Catalink layer technologies such as Ethernet; is just @ 16-bit checksum. Its caleulated by Gividing the header bytes into words (2 word is two bytes) and then adding them together, The data is not checksummed, only the header. Al each hop the device receiving the datagram Goes the same checksum calculation and on a mismatch discards the datagram as damaged © 3. What are the two reasons for using layered protocols ? What do you mean by link to link layers of OSI reference model ? Explain their functions briefly ? Ans. Refer to Q.No. 3 of May 2013 Q 4. A binary signal is sent over a 3-khz channel whose signal-to-noise ratio is 20db. Calculate the maximum achievable data rate ? Ans. In this we are given both the number of levels in the signal (binary, ie. 2) and the signal-to-noise ratio of the channel. We therefore need to consider both the Nyquist limit and Shannon limit and take the lesser value as the answer. From Shannon's theorem : s Max Data Rate = Wlog, (1-8) Note that the signal to noise ratio (SNR) given here is a power ratio, yet we are given the SNR in decibels. . We therefore need to convert back to a power ratio’: SNR in dB = 10log;9 ‘ s = 4912010) therefore N 17 (CN (4th SEM)LORDS Computer Network =100 Therefore, the maximum data rate according to Shannon's theorem 1s s Max Data Rate = Wiog, | 1+ f | = 3000xlog (14100) = 20kbps. The Nyquist limit for binary signalling over a 3KHz channel is Max Data Rate = 2W log) M = 2 x 3000 x logy 2 = 6kbps. Therfore, the maximum achievable data rate is 6kbps. (To achieve higher rates than this (up to the Shannon limit), one would have to use a different signalling method) Q5. Contrast link state and distance vector routing protocols, giving an example of each. What is count to infinity problem ? Ans. Refer to Chapter No. 5 Q.No. 31 & 40 on Page No. 107 & 112 Q 6. How does a token ring network work ? In what way is it different from Ethernet? Ans. A token ring network uses a special frame called a token that rotates around the ring when no stations are actively sending information. When a station wants to transmit on the ring, it must capture this token frame. The owner of the token is the only station that can transmit on the ring, unlike the Ethemet topology where any station can transmit at any time. once a station captures the token, It changes the token into a frame format so data can be sent. As the data traverses the ring, it passes through each station on the way to the destination station. Each station receives the frame and regenerates and repeats the frame on to the ring. As each station repeats the frame, it performs error checks on the information within the frame. If an error is found a special bit in the frame called the error detection bit is set so other stations will not report the same error. Onces the data arrives at the destination station, the frame is copied to the destination’s token ring card buffer memory. The destination station repeats the frame on to the ring, changing two series of bits on the frame. These bits, called the Address Recognized Indicator (ARI) and the Frame Copied Indicator (FC!), determines if the destination station had seen the frame and has had ample butter space available to copy the frame into memory. If the ioe is not copied info memory itis the responsibility of the sendingstation to retransmit the jr ‘The frame continues around the ring, ariving back at the source station who recognizes the sending a as it's own. The frame is then stripped from the ting, and the source = ea is amie Token ring is single access, meaning there is only d ly one station is able to use the LAN. Ethemet is a shared access medium, where all stations have e ess to the network at the same : i : e equal access twork at the s 18 (CNA (4th SEM)LAs Compulel Networks-T SECTION-C t g? Explain two different approaches of packe' Q 7. (a) What is packet switchin switching ? eter to Chapter No. 2 Q No. 36 on Page No. 40 ‘Ans, Refor to Chapter No. 2.Q No. 36 on Page No a0 (b) Discuss the different factors affecting congestion control algorith Ans. Refer to Chapter No. 5 Q.No, 42 on Page No. 116 Q 8. Consider the three-way handshake in TCP connection setup. (a) Suppose that an old SYN segment from station ‘Aarrives at station B, requesting a TCP connection. Explain how the three-way handshake procedure ensures that the connection is rejected - (b) Now suppose that an old SYN segment from station ‘A arrives at station B; followed a bit later by an old ACK segment from A to a SYN segment from B.ls this connection request also rejected ? ‘Ans. (a) In a three - way handshake procedu iitial sequence number is always unique. If station wri) acknowledge the request based on the old sequence numb sexnowiedgement segment from B, A will find out that B received a wrong ‘A will discard the acknowledgement packet and reset the connection. (b) If an old SYN segment from A arrives at B followed by an old ACK segment from A to a SYN segment from B, the connection will also be rejected. Initially, when B receives an old SYN segment, B will send a SYN segment with its own distinct sequence number set by ‘self. IB receives the old ACK from A, B will notify A that the connection 's invalid since the oid ACK sequence number does not match the sequence number previously defined by 8. Therefore, the connection is rejected. Q 9. (a) If a size of a window is 3 bits, Sliding Window protocol? Explain your answe! determine the length of the sliding window. ‘Ans. Refer to Chapter No. 3 Q.No. 52 on Page No. 77 (b) Explain the following ARQ technique in detail. (i) Stop and wait ARQ (ii) Selective repeat ARQ Ans. Refer to Chapter No. 3 Q.No. 49 on Page No. 74 UNIVERSITY QUESTION PAPER, MAY-2015 SECTION-A Q 1. (a) How does TCP differ from UDP ? Ans. Refer to Chapter No. 6 Q.No. 8 on Page No. 127 (b) Differentiate between Polling and Token passing. Ans. Polling : The mechanism of polling roll-call performed in a classroom. Just like the teacher, a controller, a controller sends a message to each node in turn. The message 19 CNL (4th SEM) re, one must ensure the selection of the B recives an Old SYN segment from A,B er, When A receives the sequence number. how many packets can be sent using . Explain the factors which wiLORD) Computer Networks Contains the address of the node being selected for granting access. Although = ecelve the message, only the addressed node responds and then it sends data. f any. j there is no data, usually a “poll reject” message is sent back. In this way, each nod: interrogated in a round-robin fashion, one after the otker, for granting access to the mediy The first node is again polled when the controller finishes with the remaining codes Token Passing : In token passing scheme, all stations are logically connected in th form of a ring and control of the access to the medium is performed using a token. A to a special bit pattern or a small packet, usually several bits in length, which circulate from to node. Token passing be used with both broadcast (token bus) and sequentially connecte (token ring) type of network with some variation ; (c) For n devices in a network, what is the number of cable links required in Mesh and Bus topology ? Ans. Mesh = n (n-1)/2 Bus = n-1 (4) Which class of IP addresses is used for multicasting ? Ans. class D (e) What do you mean by Packet Switched Network ? Ans. Refer to Chapter No. 2 Q.No. 55 on Page No. 46 (f) A 10kHz baseband channel is used by digital transmission system. Ideal pulses are sent at the Nyquist rate, and the pulses can take 8 levels. What is the channel capacity of the system ? Ans. H= 1000 Hz Number of levels V = 8 Bandwidth = 10kHz Therefore, Channel capacity according to Nyquist rate is = loge V bits/sec = 2x10000xlog,8bits/sec 20000 x log; B/log, .2bits/sec = 20000 x 0.903/0.301 bits/sec 20000 x Sbits/sec 0000 bits/sec (9) What is the difference between connection oriented and connectionless services (give at least one example for each) ? Ans. S.No. | Connection oriented “Connection less _— 7 A connection is established between No connection establishment. sender and receiver. 2 Packets are numbered. Packets are not numbered. 3._| Acknowledgement for each packet No acknowledgement (h) What is the difference between WWW and FTP ? Ans, Refer to Chapter No. 7 Q.No. 1& 160n Page No. 128 & 144 (i) Why IP version6 is required 2 Ans. internet Protocol version 6 is a network layer protocol that enables data 20 N-I (4th Sem)LORDS Computer Networks-1 ions over a packet switched network. IP version 6 was developed to increase the # available IP address space \h ils 128-bit address format, PVG can support 3.4%10% or 340, 282, 366, 920, 938, 463, 374, 607, 431, 768, 211, 456 unique IP addresses. This number of addresses is large enough te configure a unique address on every rode in the intemet and still have plenty of addresses lett over. It is inherent problems. also large enough to eliminate the need for NAT, which has its own IPVe has the following additional advantages 2 Simplified header-format for efficient packet handling. G Larger payload for increased throughput and transport efficiency. U Support for widely deployed routing protocols. 4 Increased number of multicast addresses. (j) A telephone line has a bandwidth of 3000Hz. Compute its data transfer capacity if the signal to noise ratio is 30dB. Ans. Refer to Chapter No. 2 Q.No. 28 on Page No. 36 SECTION-B Q 2. What do you mean by Switching ? Describe in brief the various switching methods. Ans. Refer to Chapter No. 2 Q.No. 59 on Page No. 49 Q 3. Discuss the frame format of IEEE 802.3. Ans. Refer to Q.No. 5 of May 2014. Q 4, Explain the functioning of Go back-N protocol by taking some suitable example. Ans. Refer to Chapter No. 3 Q.No. 45 on Page No. 73 Q 5, Describe in brief the design issues of Network layer. Ans. Refer to Chapter No. § Q.No. 1 on Page No. 94 Q 6. Name various Error Detection and Correction techniques. Also find the CRC using a polynomial, P = 110011, for a given data, M = 11100011. ‘Ans. Refer to Chapter No. 3 Q.No. 44 on Page No. 72 CRC using a polynomial : 10 110011/11 4 CN-I (4th SEM)LOWY Computer Networks SECTION-C Q7. Name various services and protocols of MAC layer. How CSMA/CD methog handles the collisions and what should be the minimum size of the message. Discus, in detail. Ans, Services of MAC layer 1. Broadcast message control; 2. Connectionless message control 3. Multi-bearer control Following Protocols are used by Medium Access layer 1. ALOHA 2. Carrier Sensed Multiple Access (CSMA) 3. CSMA/CD (Carrier Sense Multiple Access/Collision Detection) 4. CSMAJCA (Carrier Sense Multiple Access/Collision Avoidance etc) CSMAICD augments the algorithm to handle the collision. Step 1: Apply one of the persistent methods and a station sends a frame. Step 2 : The station monitors the medium to see if the transmission was successful. Step 3(1) : If transmission was successful, the station is finished. Step 3(2) : If, however, a colision is detected Q The station immediately aborts transmission. Send a Jamming signal that enforces the collision in case other stations have not yet sensed the collision. Q Wait Ts time, back-off, and go to STEP 1 Where Tg = Tp x random [0, 21] or T;, x random [0, 2-1] Where, K : Number of attempts Tp : Maximum propagation time Ty, : Average transmission time for a frame Ts,: Back-off time. Q 8. Explain in detail the design issues of Transport layer. Ans. Refer to Chapter No. 6 Q.No. 2 on Page No. 125 Q 9, Write short notes on any two : (a) Time division Multiplexing (b) Wireless Transmission Media (c) Transmission impairments Ans. (a) Refer to Chapter No. 2 Q.No. 60 on Page No. 50 (b) Wireless medium is used in WLAN as well as in mobile and satelite communications. Wireless communication and wireless networks have evolved as a result of rapid development in Communication technologies, computing and people's need for mobility. Wireless networks fall one of the following three categories depending on distance as follows @ Restricted Proximity Network : This network involves local area networks (LANs) with a mixture of fixed and wireless devices 3 Intermediate/Extended Network : This wireless network is actually made up of {wo fixed LANs components joined together by a wireless component. The bridge may be connecting LANS in two nearby bulldings or even further. 22 CN-I (4th SEM)Los Computer Networks-T se network connecting two network elements J Mobile Network : fis is fully wirele k M etwort One of these elements 1 usualy a mobi unit that connects to the home Nn fixed) using cellular or satellite technology ared, ted using basic media such as inf colrum radio, microwave and satellite communication vals travel through transmission media, which afe This means that the signal at the he end of the medium. What is sent distortion, and noise These three types of wireless networks are connec! am, narrow-band, and spread (c) Transmission Impairments pertect The imperfection causes signal impairment ginning of the medium is rot the same as the signal at t what is received. Three causes of impairment are attenuation, [ Impairment causes ] — - — = [Attenuation | [Distortion | [Noise UNIVERSITY QUESTION PAPER, DEC.-2015 SECTION-A 1. (a) Explain the term WWW. Ans. Refer to Chapter No. 7 Q.No. 1 on Page No. 138 (b) Compare circuit, message and packet switching. ‘Ans. Refer fo Q.No. 9 of May 2014. (c) Compare pure and slotted Aloha protocols. Ans. Refer to Chapter No. 4 Q.No. 9 on Page No. 85 (d) What is multiplexing ? Explain. ‘Ans. Refer to Chapter No. 6 Q.No. 21 on Page No. 133 (e) Briefly explain HDLC protocol. ‘Ans. Refer to Chapter No. 3 Q.No. 43 on Page No. 71 (f) What do you mean by Domain Name System ? Discuss. ‘Ans, Refer to Chapter No. 7 Q.No. 29(i) & 30 on Page No. 149 & 150 (g) What are CSMA protocols ? Discuss. Ans. Refer to Chapter No. 4 Q.No. 7 on Page No. 83 (h) Discuss FTP protocol. ‘Ans. Refer to Chapter No. 7 Q.No. 14 on Page No. 143 (i) Discuss IEEE 802.3 frame format. Ans, Refer to Q.No. 5 of May 2014 (i) What is polling ? Discuss. Ans. Refer to Chapter No. 3 Q.No. 5 on Page No. 59 SECTION-B Q 2. Compare and contrast the two transport layer protocols : TCP and UDP. Ans. Refer to Chapter No. 6 Q.No. 14, 10 & 8 on Page No. 130, 128 & 127 23 NAT (4th SEM)LOWY Computer Networks-1 Q 3. Discuss the TCP/IP model with functioning of each layer. Ans. Refer to Chapter No. 1 Q.No. 40 on Page No. 14 Q 4. Discuss the Leaky Bucket congestion control algorithm. Ans. Hofer to Chapter No. 5 Q.No. 41 on Page No. 114 Q 5. Explain the topologies used in a LAN. Write their advantages an, disadvantages also. Ans. Star, Bus and Ring are three commonly used topologies used in local area networks Star topology : All the connections radiate out from a common point. It means that a the modes and networked devices are directly and centrally connected to communication controller called hub. Each networked device in a star topology can access the media independently. All the networked devices shares the hub's available bandwidth. Failure of central controller results in the failure of entire network. Advantage : ‘ U Easy to install and wire U_ No disruptions to the network while connecting or removing devices. Q Easy to detect faults and to remove parts. Disadvantages : G2 Requires more cable length than a linear topology. U if the hub or concentrator fails, the nodes attached are disabled. Q More expensive than the linear bus topologies because of the cost of the concentrators. Bus topology : In a bus topology all the networked nodes are connected peer to peer, using a single, open-ended cable. It does not allow any external electronics such as repeaters thus it is simple and inexpensive. All connected devices listen to bussed transmission and accept those packets addressed to them. Failure of any node does not affect the network, while a node is transmitted, it completely posses all available bandwidth and does not allow any other node to transmit. Advantages : Easy to add/connect a computer or peripheral to a linear bus. G2 Requires less cable length than other topologies. Disadvantages : Q The entire network shuts down if there is a break in the main cable. Q Terminators are required at both ends of the backbone cable. Q Difficult to identify the problem if the entire network shuts down. Not meant to be used as a stand-alone solution in a large building. Ring topology : It is a peer-to-peer LAN topology, in which each networked workstation has two connections one to each of its neighbours. Each workstation acts as a repeater, accepting and responding to packets addressed to it and forwarding other packet to the next workstation on a ring. It uses a token passing scheme in round-robin fashion. Advantages : All computers have equal access to data. During peak use periods, the performance is equal for all users. Ring networks perform well with heavy network traffic. [24] (CN-I (4th SEM)LORD) Computer Networks-1 Disadvantages J Ring topologies are entire network fails. Q 6. Explain different Ans. Refer to Chapter telatively expensive and difficult to install. If ‘one node fail, the framing methods with examples. No. 3 Q.No. 50 on Page No. 75 SECTION-C ina ad Explain in detail various transmission media used for data communication in detail, Ans. Transmission media can be classified into the following two main categories Guided media and Unguided media, The ditterence between the two is the fact that 1. Guided media use physical cable for data transmission, whereas in the case of unguided media, air is the transmission medium, In this media, no cabling is required. The signal is broadcasted in the air and can be ade avallable to anyone who has the device capable ef receiving the signal 2. Twisted-pair cable, coaxial cable and optical fiber are the three mon types of guided "media. Unguided media can be radio, microwave, satelite, infra-red, LASER or cellular phones 5. Guided transmission media is mainly suited for point to point ine Configuration whereas unguided is mainly used for broadcasting purpose. . 4 In guided the signal propagates in the form of voltage, current or photons whereas in unguided the signals propagates in the form of electromagnetic waves, Guided transmission media : A physical path along which the signals are propagated. For guided transmission media the ‘transmission capacity interms of either data rate or bandwidth depends on 1. Distance 2. Whether the medium is point to point or ‘multipoint. Guided media ¥ | ¥ Twisted-Pair| Coaxial Fiber-Optic, cable cable cable 1. Twisted-pair Cable : It is used to transmit both analog and digital signals. Most inexpensive and widely used guided transmission medium is twisted-pair. A twisted pair consists of two conductors (normally copper), each with its own plastic insulation, twisted together as shown below : XOOCOOG Yr ‘Solid copper ou es condos 25 (ONL (4th SEMLOAD) Computer Netw One of the wites is used to carry signals to the receiver and the other is used only as a ground reference. The receiver uses the difference between the two. In addition to the signal send by the sender on one of the wires, interference (noise) and crosstalk may effect both wires and create unwanted signals. If the two wires are parallel, the effect of these unwanted signals is not the same in both wires because they are at diferent locations relative to the noise or crosstalk sources. This resulls in a difference at the receiver By twisting the pairs, a balance is maintained. Applications : 1. In the telephone system, the residential telephone sets are conn telephone exchange by twisted pair wires. tis used within a building for LAN supporting personnel comput Twisted pair cable are of two types : ected to the local ers (i) Shielded twisted pair : Shielded means cable has @ protected shealth which is jackets and two wires, ut still the made up of aluminium or a polyesters between outer i problem of interference still remains. Shielded twisted pair (STP) is expensive. It is dificult to install. Its capacity is upto 500 mega bits per second and it is less suffer from electromagnetic interference (ii) Unshielded twisted pair (UTP) : Unshielded means cables has no protected sheaith to prevent the signal from interference. For example : Telephone cables, In UTP there are different types of variety that are available. (a) Three-twisted pair (b) Five-twisted pair UTP is not expensive and itis easy to install. Its capacity is upto 100 mega bits per second and ji-Sutfer more from electromagnetic interference “axial cable Coaxial cable is copper wire with better shielding than twisted pair so that ean cover longer distance at higher speed. Coaxial cable (or coax) carries signals of {gh frequency ranges than twisted pair cables Insulator Inner conductor Outer conductor (Shield) Plastic cover Frequency range of coaxial cable is 100 kHz to 500 MHz There are two types of coaxial cable (i) Base band (ii) Broad band Beso ben consi nd is ees wire commonly used for digital transmission. ‘al cable is 75 OHM commonly used for analog tran \smissi Coaxial cable is better than twisted pair because it support high band width and high data rate 26 (Che (4th SEM)LOmD> Computer Networks 1 ence an in erence and corsstalk than twisted pair. They are also use it suffer le: LAN and telephone Coaxial cable standards : RG-8. used in thick ethernet RG-9, used in thick ethernet RG-11, used in thick ethemet RG-58. used in thin ethernet RG-59, used for TV. 3. Optical fiber : Optical fiber is used for transmitting light wave rather than electrical signal. ‘An optical fiber is a thin, flexible medium which guide the optical ray. it consist of three concentric section . 1. Core : |t is the inner most section which consist of fibre made up of glass and plastic that conducts light . 2. Cladding : The core is surrounded by cladding which is a layer of glass and plastic that has optical properties different from those of the core. The interface between the core and cladding act as a reflector that reflect the light back into the core and does not allows it to escape. 3. Jacket : It is the outermost layer which is made up of plastic and other material layered to protect against moisture and other requiremental dangers. ~~ \ — Clading + NIZA seat Core Basically four components are required 1. Light source : Light emitting diode (LED) or laser dioae. 2. Fibre : It is the transmission medium that carries light pulses. 3. Detector : Which detects the light and convert it to electrical signal. 4, Convertor : Converter are placed toward the source side and at the sink side to convert electric signal into lightwave and vice-a-versa. Working : When a ray passes from one medium to another the ray is refracted at a boundary but a light ray incident at or above the critical angle is trapped inside the fibre and thus it can propagate for many kilometers with out any loss. Total internal reflection Light source 7 CNT (4th SEM)LOW Computer Networks-] Applications 1. LAN : It can support thousand of . 2. Metropolitan trunks : It is used in metropolitan trunk ovr KM and support 1 lakh voice channel. Advantages 7 tis smaher in size and light in weight 2. It suffers less trom attenuation, electromagnetic interference noise and cross-talk tation in a large buildings. 9 uits for over a distance of Greater capacity because of high band wioth and high data rate. Guided media provide a physical path along w unguided media employ an antenna for transmitting through air, vacuul twisted pair has been the warhorse for communication of all sons Higher data rates over longer distances can be achieved with coaxial cable, and so coaxial cable has often been used for high speed local area network and for high-capacity long-distance trunk applications. de that medium more attractive However, the tremendous capacity of optical fiber has ma than coaxial cable, and thus optical fiber has taken over much of the market for high speed LANs and for long distance applications. Whereas unguided transmission techniques commonly used for information communications include broadcast radio, terrestrial microwave, and satelite. Infrared transmission is used in some LAN applications. Unguided media : Unguided media is also known as unbounded or wireless transmission media. in unguided media, airis the transmission medium. In this media, no cabling is required. The signal is broadcasted in the air and can be made available to anyone who has the device capable of receiving the signal. So unguided transmission media is mainly used for broadcasting purpose. In unguided transmission media the signals propagates in the form of electromagnetic waves. Various unguided media are : 1. Microwave communication 2. Terrestrial microwave communication 3. Satellite 4, Radio transmission 5. Infrared Radio frequency allocation : ae 300GHz Radio Communication | Radio, Microwave, Satellite hich the signals are propagated whereas m or water. Traditionally, a or » ae 300K Fam 30m “oom 3G “\gochz Fs00GHz Surface Tropospheric lonospheric Space & Line of sight 28 CN-I (4th SEM) SpaceLoad Computer Networks: Types of propagation : Surface propagation > Tropospheric propagation jonospheric propagation 4, Line of sight propagation 5, Space propagation 4. Very Low Frequency (VLF) : Long range radio navigation 5) akHe Frequency range for VLF 30KH2 2. Low Frequency (LF) : Long range radio navigation 30KHz Frequency range for uF 300KHz 3. Middle Frequency (MF) : AM Radio 30oKH2 335KHz .605MHz 3MHz 4, High Frequency (HF) : CB Radio MHz Frequency range for HF 30MHz 5. Very High Frequency (VHF) : Paging }713 CL [wire] Aire |v , 3oMHz 5488 (108 174216 300MHz Frequency range for VHF 6. Ultra High Frequency (UHF) : Mobile Telephone Channels 14-69 Paging (on WV o Microwave 300MH2 470 805 Cellular 3GHz radio 7. Super High Frequency (SHF) : 3.GHz > Microwave > 30 GHz for SHF range 8. 30 GHz > Microwave — 300 GHz for EHF range (23) NAT (4th SEM)LOWS Computer Networks] 1, Microwave communication ; Microwave use the line of sight method of Propagaticy, 8 the signals do not travel along the surface of the earth. Therefore, the two antennas mys, be ina straight line, able to look at each other without any obstacle in between. The taller th. antennas, the more is the distance that these waves travel. Usually the antennas are positiong on mountain tops to avoid obstacles. Microwave signals travel only in one direction at a time This means that for two-way communication such as in telephony, two frequencies neeq 1, be allowed. At both ends a transceiver transmitter Repeater —> is used which is a combination of a transmitter and a receiver operating at the two respective frequencies Therefore, only one antenna can serve both the functions and cover both the frequencies. Repeaters are used along with the antennas to enhance the signal. The data rates offered are Mbps -10Gbps. Advantages : , * Microwave is not expensive as compare to fiber optics system. 2. Terrestrial communication : Terrestrial microwave communication are directional parabolic antennae which sends and receive signals. They do not use cables. The signal are focused according to the line of sight. Microwave link are used to connect several building where cabling can be too expensive, difficult to install and prohibited. For example : If two buildings are separated by a public road then it become difficult to get permission to install cable over and under the road. So microwave use are such type of situation. Advantage : 1. They are suitable for short distance upto a range of hundred of meter. 2. Itis not expensive. 3. No attenuation problem. Disadvantage : + Rain, fog and electromagnetic interference effects the signal. 3. Satellite : Satellite microwave system —— ——S transmit signal between parabolic antennae a [eee soeee which must be in line of sight. In Satellite system 7 S ] one of the antennae is on the satellite in geosynchronous orbit. And is placed at 36km — °°M* aie above the equator where its orbit speed exactly matches the earth rotational speed and soit hy appears to be stationary relative to the earth 7 and always remains at the same point with ff respect to the earth / Microwave signals at 6 gega hertz are transmitted from the transmitter to the earth S| but it becomes weak with distance. Transmitting microwave 30 (CN (ath SEM)Bae tworks-l ne ne signal and singe back 10 the eer at y the receiving station on the eart! iving frequency of th Lod Computer Net The transponder in the satellite empiities requency of 4-gega heitz which are received D) The transmitting frequency’ is diferent from the rec void interference. Advantage : pied 1. Satellite microwave system can reach the remotest PI communicate with even mobile devices. 2. If an error is detected in transmis: insmitted. Disadvantage : High cost of manufacturing and launc! 4, Radio transmission : Radio wave irection means that they travel in all the direction from the source. the receiver do not have to careful about the physical. The powe signal is determine by the antennae and the transreceiver Properties : 4. They can travel long distance. 2, Easy to generate. A different radio wave wave which follow the ground where as high frequency that reach the ionosphere a layer of charge particle circuil 500 km are refracted by it and sent back to the earth. ——Tonosphere——~ — a es on earth and can sion of information by the satellite, then the data Is hing the sattellite in the orbit. can be broadcasted, OMNI directional. OMNI So, the transmitter and 1 of the radio frequency like short time, low frequency wave, very low and medium frequency wave and very high frequency wave ling the earth at the height of 100 to Ground wave 199) ie (nom ripe) L\ Earth surface Earth surface For low, very low and Very nih ery nigh and medium frequency uta high frequency Advantage : 1, Omni direction 2. Easy to generate Disadvantage : s all frequence radio wave suffer from electrical interference . Infrared : Infrared signals can be us ed for shor, range area using line-of-sight propagation Sf communveston ss cose 34 ’ NI (4th SEMLOWY Computer Networks-I Q 8 Expiain in detail various sliding window protocols. Ans. Refer to Chapter No 3 QNo. 4° on Page No. 74 Q 9. What Is routing ? Explain the important properties that a routing projoc, Should satisfy, Discuss link state routing algorithm. “ Ans. Routing : Refer to Chapter No. 5 Q.No. 2 on Page No. 94 Link State Routing : Link state protocols of IP are classless protocols In link Protocol, each router floods information about the state of the links that connect it tp Neighbours. Link state protocols use an arbitrary metric Functions of route in link state routing is as follows 1, Router discover its neighbours and learn their network addresses 2. Measure the delay or cost to each of its neighbors. 3. Construct a packet telling all it has just learned. 4. Send this packet to all other routers 5. Compute the shortest path to every other router. Link state routing protocols use event driven updates rather than periodic updates. Ln state routine is widely used in actual networks. OSPF protocol uses in a link state algorithm Link state routing protocols are as follows : 1. OSPF, open shortest path first 2. Netware link services protocol (NLSP) 3. Apple's AURR, 4, ISO's Intermediate system-Intermediate system (IS-IS). gaa 32 (CN (4th SEM)er Networks 10%) Comput y-2016 UNIVERSITY QUESTION PAPER, MA 1¢ . SECTIONA 0 10 ating baud eo gran Pa MO 22 me jon control aims to prevent Joop congesti some po! the source OF (b) What is open loop congestio fans. Open loop congestion control the aims to prevent the congestion from 0 destination handles the congestion “The open loop congestion control method adopts certain ome of these polices are described as follows 1. Retransmission policy 2. Acknowledgement policy 3, Discarding policy 4, Admission policy (c) Define throughput. Ans. Throughput : The through a network. (a) Why FTP uses two connections ? fans. FTP uses two connections between a client and @ Server: One connection is used for the actual file's data transfer, and the other is used for control information (commands and responses). This separation of data transfer and ‘commands makes FTP more efficient. (e) List the important features of LAN. Ans. Refer to Chapter No, 1 Q.No. 63 on Page No. 23 (f) What is RS 232C ? Ans. RS 232C : RS 292C is a long~ interface and protocol for relatively low-spee : The open ither curing by using licies. Eit policies to prevent the congestion. throughput is a measure of how fast we can actually send data established standard that describes the physical -d serial data communication between computers sf volated devices. RS 232C can provide good performance at low cost RS 232C interface tees single common ground forall the signals. Hence effect of noise is maxinm RS 232C is easy to use because the IC is available for RS 2820. Data transfer rate 's slow. Baud rate is 20K baud for less than 50 ft. (g) Why twisted pair cable is twisted ? Ans. Twisted pair cable is a type of wiring in which two conductors of a single circu are twisted together for the purposes of canceling out electromagnetic interference from external sources; for instance, electromagneic radiation from unshielded twisted pair (UTP) cables and crosstalk between neighboring pairs {h) Define interface between layers. Ans. Refer to Chapter No. 1 Q.No. 48 on Page No. 18 (i) What is fading ? Ans. Fading : Where there are obstacles between the base station and the terminal (For example; hills, building etc.) the signal strength goes down further, which mpl: b ; is know (i) Differentiate between pure aloha and slotted aloha. are Ans. Refer to Chapter No. 4 Q.No. 9 on Page No. 85 33 CN (4th SEM)LOWS Computer Networks-T SECTION-B © 2. What are the goals of computer networks ? Explain in brief . Ans, There are several goals of computer networks. The goals of computer networks « as follows 1. To provide sharing of resources such as information oF 2. To provide inter-process communication among users and proce: 3. Computer networks provides the network user with mayimum performance at minum cost 4. Computer networks provides centralized control for a geographically distributed s/ster 5. Computer networks provides compatibility of dissimilar equipment and software 6. It provides centralised management and allocation of network resources 7. It provides distribution of processing functions. Q 3. Differentiate between asynchronous and synchronous TDM. Ans. Refer to Chapter No. 2, Q.No. 18 on Page No. 32 Q 4. Explain the stop and wait ARQ mechanism. Ans. Refer to Chapter No. 3 Q.No. 36 & 58 on Page No. 69 & 79 Q 5. A company is granted the site address 201.70.64.0 The company needs six subnets. Design the subnets. ‘Ans. The number of 1s in the default mask in 24.The company needs six subnets. Ths number 6 is not a power of 2. The next number that is a power of 2 is 8 (28). We need 3 more 1s in the subnet mask. The total number of 1s in the subnet mask is 27 (24 + 3). The total number of Os is 5 (32 - 27). The mask is AA414444 14444441 14114141 11100000 or 255.255.255.224 The number of subnets is 8. The number of addresses in each subnet is 25 (5 is the number of Os) or 32. processors, 68015. 1 i ' aaa aa ' | \ zor 6432 Boo aes | | tnd subnet ns — ee i 201. 70.64.224 ABST coca 250 | a : Finish here. 34 (CNA (ath SEM)rcs rddmns ot bat addam ‘et xing at transport layer 2 Explain in bei 6. What is multiplexing and de-multiple ons twat 8° with example. jexing are the two very important functl 1 mas, Multiplexing and de multiplexing © sulates - oitormed by transport layer erent applications: encap: yer jor side receives data (or) citer undetyind network layer a Transport layer at the ry packet with a {rar job of transport layer side, the transport gall ication. This is known port layer header and pass it on known as multiplexing hers, the data, examines it so ‘as De-multiplexing ket and passes te T ‘At the receiver's gata to the correct app! _- Process. = Transport Soe Transport eto wetwo co Be ome 7) a LS [ Phe physi physical — 'A socket is the interface through which a process (application) communicates with the transport layer 1 Each process can potentially use many sockets. 2 of segments from its © The transport layer in a receiving machine receives a sequenc network layer. In this delivering segments 10 the correct socket is called demultiplexing and assembling segments with the necessary information and passing them to the hetwork layer is called multiplexing. These both are needed whenever a communications channel is shared. SECTION-C EAS CU SANS or inat is link state routing ? Explain the steps involved with an example. ans. Link State routing : Refer to Q.No. 9 of Dec, 2015 Link state routing essentially involves four steps : 1. The first step is to measure the delay or cost to each neighbouring router. For example, each router can send out a special echo packet that gets bounced back almost immediately. Ita timestamp were placed on the packet as it left and again as it returned, the router would know the transfer time to and from a neighboring router. 2 The second step is to construct a link state packet containing all of this timing information. 3. The second step is to distribute the link state . packets via flooding. flooding, the link state routing algorithm is a distributed algorithm. ne 47) ne four an feel aan is to compute new routes based on the updated information r r collects a full set of link state packets fr ‘om usually using Dijkstra’s least-cost algorithm. en (35) (NI (4th SEMLOW Computer Networks | Q 8. Give the data word 1010011010 and the divisor yON17 : R A (a) Show the generation of the codeword at the sendor site (using BInATY Hvisicn, (b) Show the checking of the codeword at the receiver site (assume no er70r) Ans. non (a) Binary division case (b) Receiver using binary division 1010011910 u i f sfroroot1 1 S[oce: M=1o010011010 0 ofoo00 IG=1011 G=1o1rsfroto0o01tot 441 ror t | {| eat dort] r 00000 90000 ortit o1itd 00000 oooo00 | amin ig Ol 11770 10111 so1it! —Fo0TT | | 10011 10111 A101ti 071000 01000 00000 00000 T9000 “T0000 root a sorte O1110 ae 00090) apg 10111 104111 TOT T0110 Rout) 40114 0001 a T= 1010011010 0001 Remainder was 0000 as required. Original message CRC checksum CRC checksum was 0001 Codeword was 1010011010 Q 9. What is DNS ? Differentiate between recursive and iterative queries. Explain the formats of the query and response message used in DNS. ‘Ans. DNS : Refer to Chapter No. 7 Q.No. 29 (Point 1) on Page No. 149. Difference between recursive and iterative queries : In recursive name query, the DNS client requires that the DNS server respond to the client with either the requested resource record or an error message i.e. the record or domain name does not exist. If DNS server is not able to resolve the requested query then it forwards the query to another DNS server until it gets an answer or the query fails. An iterative name query is one in which a DNS client allows the DNS server to return the best answer it can give based on its cache or zone data. If the queried DNS server does not fevelen exact match for the queried name, the best possible information it can return is @ referral. = cn (ath SEM)LORD Computer Networks-1 F a Of the query and response messages used in DNS : DNS has two types of have Header have the same format, The query | = — 29° Consists of the header and the ‘L_2usstn Section question records, the response message Suey Consists of a header, question record, answer * ‘cord, authoritative record and additional records. Header : Both query and re: sponse 7 ; fields set to zero for the Ponse messages have the same header format with some oO identification query message, the header is 12 byte and its format is as follows: Q flags Question Section : This i Present on both query and re: Answer section : Consisti messages. This section inclu 's @ Section consisting of one or more question records. It is sponse messages. ing of one or more resource records. It is present only in response 5. ides answer from the server to the client Authoritative section : This section is also contained only in response messages of DNS. and gives information about domain names regarding authoritative servers for the query Additional information section : This section provides additional information to help the resolver and present only in response part of DNS message format. UNIVERSITY QUESTION PAPER, DEC.-2016 Sees Veet SECTIO! 1. (a) Explain terms LAN and MAN. Ans. Refer to Chapter No. 1 Q.No, 90n Page No. 4 (b) Define protocol. Ans. Refer to Chapter No. 1 Q.Alo 66 on Page No. 25 (c) Write the full form of HDLC and PPP. Ans. HDLC : High-level Data link Control Protocol PPP : Point to Point Protocol (d) What is Nyquist's theorem ? Ans. Nyquist's Theorem : The Nyquist theoremis also known as sampling theorem, According to Nyquist theorem, the sampling rate should be atleast two times ofthe highest frequency contained in the signal to regenerate the original analog signal atthe receiver end. (e) What are the issues of Data Link Layer ? Ans. Refer to Chapter No. 3 Q.No. 20n Page No. 58 (f) Define Bandwidth. Ans. Refer fo Chapter No. 2Q.No. 4 on Page No. 28 (g) What is the difference between port number and IP address ? Ans. Refer to Chp. No. 6 Q.No. 410n P.No. 126.and Chp. No. § Q.No. 23 on P.No. 103 (h) Write the difference between Network Layer delivery and Transport Layer delivery. Ans. Refer fo Q.No. 1(c) of Dec. 2014 37 CN-I (4th SEMLORDD Computer Networ (UWnetie Wars 5 Dd Computer Networks I Ans. Reter to Cp 10 Chaptor Ni ()) Detine subs nvett} Ans, Rotertocnee » fon Page No 138 fer 0 Chaptor Chapter No.4 Q.No. 23 on Page No. 91 ae SECTION-B ae recuse bout pros and cons of different Network Topologies feler 0 Q.No. of Dec. 2015 Q: im ; 3. What are Transmission Impairments ? Ane Heter to Q.No. 9 (c) of May 2015 Q Explain any one Error detection and correction cod! Ana Refer to Chapter No. 3Q.No. 44 on Page No. 72 5. Explain how Leaky Bucket protocol used for cong’ ‘Ans. Refer to Chapter No. § Q.No. 41 on Page No. 114 6. Explain Transmission Control protocol in brief. Ans. Refer to Chapter No. 1 Q.No. 40.0n Page No. 14 SECTION-C Q7. Explain the functions of different layers of OS! Model. Ans. Refer to Chapter No. 1 Q.No. 49 0n Page No. 18 QB (a) Discuss about Stop & Wait ARQ Sliding Window protocol. ‘Ans. Refer fo Chapter No. 3 Q.No, 49 & 36 on Page No. 75 & 69 (b) Explain IP addressing. Ans, Refer to Chapter No. 5 O.No. 4 &23 Q9. Write short notes on following : (a) Coaxial Cable (b) DNS (c) Distance Vector Routing Algorithm. ‘Ans. (a) Refer 10 Q.No. 7 (Point 2) of Dec. 2015 (b) Refer to Chapter No. 7 2.No. 8 on Page No. 139 (c) Reter to Chapter No. 5 Q.No. 31 on Page No, 106 le method. yestion control. on Page No. 95 & 103 UNIVERSITY QUESTION PAPER, MAY-2017 SECTION-A @ 4. (a) Explain in brief the term Computer Network and its goals. ‘Ans. Computer Network : Refer to Chapter No. 1 Q.No. 4 on Page No. 4 For goals : Refer to O.No, 2 of May 2016 (b) Differentiate between broadcast and point to point netwoks. ‘ans. Refer to Chapter No. 1 Q.No. 170n Page No. 7 (c) What is the need of Protocols ? ‘ans. A set of rules is needed for any means of communication Human intercommunication requires rules of conversation to function effectively. Computers are no different. Consider the following simplistic analog ‘Two computers connected via a single connection. Imagine two people talking via two tin cans connected via piece of string. If the two people talk of the same time then we get what is known as data collision Trerelore, we need regulations and rules to how we communicate over a computer network. For example to remote log in, FTP or email. The set of rules and regulations is called a protocol, 38 CN (ath SEM)er NetworksT Low> Computer ae nin reference tO transmission impairme! (a) Explain in brief the term Attenuatio ransmission media ? Ans. Refer to Q.No. i(b) of May 2014 {e) What are the disadvantages of Optic fiber as at fans. Refer to Chapter No. 2Q.No. 41 0n Page No. 41 hester encoding. ()) Explain in brief about Manc! ns. Reter 10 Q.No. 1(j) of May (q) Explain briefly the effects , Yer to Chapter Ne vo, 42 on Page No. 115 ; Oe eter to Chapter No. 5 Q.No. 42 0n Page NO. 118 ting algorithms. (h) Differentiate between Distance vector and Link sté Ans. Refer to Chapter No. No. 31 on Page No. 107 (i) What are the responsibilities of Transport Lave! 2 ‘ins. Refer to Chapter No. 6 Q.No. 16.0n Page No. 130 2014 of Congestion. (j) Explain in brief the term DNS. fans. Refer to Chapter No, 7 Q.No. 29 (Point 1) on Page No. 149 SECTION-B secs Q2. Write a detailed note on following transmission media : (a) Twisted pair (b) Co-axial cable Ans. Refer to Q.No. 7 of Dec. 2015 Any write a detailed note on Selective Repeat ARG Sliding ‘Ans. Refer to Chapter No. 3 0.No. 49.0n Page No. 74 0.4 Write a brief note on Static and Dynamic Channel Allocation. fans. Refer to Chapter No. 4 Q.No. 3 & 40n Page No. 82 05. Explain in detail the concept of flow control and buffering in reference to transport layer. fans. Refer to Chapter No, 6 Q.No. 7 & 270n Page No. 127 & 136 @6. Write a detailed note on E-mail in reference to Application Layer. ans. Refer to Chapter No. 7 Q.No. 11 on Page No. 141 SECTION-C window Protocol. Q7. Write a detailed note on the ISO-OSI reference model. ‘Ans. Refer to Chapter No. 1 Q.No. 490n Page No. 18 Q8. (a) Write a brief note on TCP and UDP protocols. Also compare these protocols in brief. ‘Ans. flefer to Chapter No. 6 Q.No. 14, 10& 8 on Page No. 130, 128 & 127 (b) Write a brief note on ‘Checksum and hamming code in reference to Error detection and Correction codes. ‘Ans, Refer to Chapter No. 3 Q.No. 23 & 56 on Page No. 64 & 78 Q9, Write a detailed note on Link State Routing. Ans. Refer to Q.No. 7 of May 2016 UNIVERSITY QUESTION PAPER, DEC.-2017 7 SECTION-A rm Computer Network and its goals. Q1. (a) Explain in brief the ter Ans. Refer to Chapter No. 1 Q.No. 40n Page No. 4 For Goals : Refer to Q.No. 2 of May 2016 (b) Differentiate between broadcast and point to pointnetworks. Ans. Refer to Chapter No. 1 Q.No. 170n Page No.7 (c) What is the need of protocols? # rules is needed for any means of communication. Human intercommunication Ans. A set of 39 (CN-I (4th SEM(¢) Explain in brief the term Attenuation in reference to transmission impairments, Ans. Refer to Q.No. 1(b) of May 2014 (e) What are the disadvantages of Optical fiber as a transmission media? Ans. Refer to Chapter No. 2.Q.No. 41 on Page No. 41 (t) Explain in brief about Manchester encoding. Ans. Refer to Q.No. 1(j) of May 2014 (9) Explain briefly the effects of Congestion. Ans. Refer to Chapter No. 5 Q.No. 420n Page No. 115 (h) Differentiate between Distance vector and Link state routing aigorithms. Ans. Refer to Chapter No. 5 Q.No. 31 on Page No. 107 {i) What are the responsibilities of Transpo:t Layer? Ans. Refer to Chapter No. 6 Q.No. 16 9n Page No. 130 (j) Explain in brief the term DNS. Ans. Refer to Chapter No. 7 Q.No. 29 (Point 1) on Page No. 149 SECTION-B Q 2. Write a detailed note on following transmission media : (a) Twisted pair (b) Co-axial cable Ans. Refer to Q.No. 7 of Dec. 2015 Q 3, Write a detailed note on Selective Repeat ARQ sliding window protocol. Ans. Refer to Chapter No. 3 Q.No. 49 on Page No. 74 Q 4. Write a brief note on Static and Dynamic Channel Allocation. Ans. Refer to Chapter No. 4 Q.No. 3 & 4 on Page No. 82 Q5. Explain in detail the concept of flow control and buffering in reference to transport layer. Ans. Refer to Chapter No. 6 Q.No. 7 & 27 on Page No. 127 & 136 Q 6. Write a detailed note on E-mail in reference to Application Layer. Ans. Refer to Chapter No. 7 Q.No. 11 on Page No. 141 SECTION-C Q7. Write a detailed note on the ISO-OSI reference model. Ans. Refer to Chapter No. 1 Q.No 49 0n Page No. 18 Q8. (a) Write a brief note on TCP and UDP protocols. Also compare these protocols in brief. Ans. Refer to Chapter No. 6 Q.No. 14, 10 & 8 on Page No. 130, 128 & 127 (b) Write a brief note on Checksum and hamming code in reference to Error detection and Correction codes. Ans. Refer to Chapter No. 3 Q.No. 23 & 56 on Page No. 64 & 78 Q 9. Write a detailed note on Link state routing. Ans. Refer to Q.No. 7 of May 2016 goo 40 CN-I (4th SEM
You might also like
TCP IP and Internet
PDF
No ratings yet
TCP IP and Internet
36 pages
Cns Oral Que
PDF
No ratings yet
Cns Oral Que
39 pages
How Many Numbers of Addresses Are Usable For Addressing in A Class C Network?
PDF
No ratings yet
How Many Numbers of Addresses Are Usable For Addressing in A Class C Network?
13 pages
CN
PDF
No ratings yet
CN
6 pages
Hw اتصالات20نظري 1
PDF
No ratings yet
Hw اتصالات20نظري 1
6 pages
Computer Network Notes 4th Sem BCA
PDF
0% (1)
Computer Network Notes 4th Sem BCA
6 pages
Cs2302 Computer Networks Question Bank Annauniversity 2010 Part V
PDF
No ratings yet
Cs2302 Computer Networks Question Bank Annauniversity 2010 Part V
5 pages
CN Practice Questions (All Modules)
PDF
No ratings yet
CN Practice Questions (All Modules)
7 pages
full_networking_q&a[1]
PDF
No ratings yet
full_networking_q&a[1]
10 pages
Data Communication and Computer Networking Worksheet
PDF
No ratings yet
Data Communication and Computer Networking Worksheet
6 pages
Computer Networks_unit 1 - 5 (Deccan)
PDF
No ratings yet
Computer Networks_unit 1 - 5 (Deccan)
176 pages
Computer Networks 2 Marks
PDF
No ratings yet
Computer Networks 2 Marks
17 pages
CN Sheet 1 Solution
PDF
No ratings yet
CN Sheet 1 Solution
10 pages
CNSL - Important Viva Questions (Answers)
PDF
No ratings yet
CNSL - Important Viva Questions (Answers)
16 pages
QA - Network
PDF
No ratings yet
QA - Network
18 pages
CN 2marks
PDF
No ratings yet
CN 2marks
8 pages
Interview Q&A
PDF
No ratings yet
Interview Q&A
22 pages
Brush Up
PDF
No ratings yet
Brush Up
4 pages
CN VIVA QUESTIONS
PDF
No ratings yet
CN VIVA QUESTIONS
20 pages
Exam Notes Chat Gpt
PDF
No ratings yet
Exam Notes Chat Gpt
23 pages
Computer Network
PDF
No ratings yet
Computer Network
11 pages
Cs3591 Computer Networks Important Questions (2)
PDF
No ratings yet
Cs3591 Computer Networks Important Questions (2)
43 pages
CSE 3124 26 Sep 2024
PDF
No ratings yet
CSE 3124 26 Sep 2024
8 pages
CN SHORT NOTES
PDF
No ratings yet
CN SHORT NOTES
6 pages
Questions
PDF
No ratings yet
Questions
22 pages
Sol 1
PDF
No ratings yet
Sol 1
3 pages
CN PDF
PDF
No ratings yet
CN PDF
51 pages
CCN Lab Viva Voce Questions
PDF
No ratings yet
CCN Lab Viva Voce Questions
13 pages
CN-2 Question Bank
PDF
No ratings yet
CN-2 Question Bank
5 pages
Assignment - PT-1 Question Bank 2023-24 DCC
PDF
No ratings yet
Assignment - PT-1 Question Bank 2023-24 DCC
9 pages
Unit-1
PDF
No ratings yet
Unit-1
28 pages
CNS Oral Questions and Answers Piyush
PDF
No ratings yet
CNS Oral Questions and Answers Piyush
26 pages
CND- 22634 E-content
PDF
No ratings yet
CND- 22634 E-content
29 pages
Computer Network Fundmentals
PDF
No ratings yet
Computer Network Fundmentals
75 pages
TUTORIAL SHEET-1 (Solution) : Kcs-603: Computer Networks
PDF
No ratings yet
TUTORIAL SHEET-1 (Solution) : Kcs-603: Computer Networks
8 pages
Unit1IntroductiontoCNpptx__2021_03_13_15_22_501pptx__2021_12_21_12_52_08
PDF
No ratings yet
Unit1IntroductiontoCNpptx__2021_03_13_15_22_501pptx__2021_12_21_12_52_08
82 pages
Computer Networks Question Papers
PDF
100% (1)
Computer Networks Question Papers
7 pages
DCCN-2marks
PDF
No ratings yet
DCCN-2marks
7 pages
Oral Question Bank
PDF
No ratings yet
Oral Question Bank
37 pages
(MCQ) Computer Communication Networks - LMT2
PDF
No ratings yet
(MCQ) Computer Communication Networks - LMT2
14 pages
QB-CN-1
PDF
No ratings yet
QB-CN-1
8 pages
DCCN Super 25 By V2V
PDF
No ratings yet
DCCN Super 25 By V2V
55 pages
Networking Data Link Protocol Networking Nodes Authentication Encryption Compression
PDF
No ratings yet
Networking Data Link Protocol Networking Nodes Authentication Encryption Compression
9 pages
Computer Networks (PRELIUM)
PDF
No ratings yet
Computer Networks (PRELIUM)
15 pages
CND(22634) summer-2023
PDF
No ratings yet
CND(22634) summer-2023
27 pages
cn_qb
PDF
No ratings yet
cn_qb
10 pages
4 mark networking
PDF
No ratings yet
4 mark networking
29 pages
Cn Solved Question Bank
PDF
No ratings yet
Cn Solved Question Bank
50 pages
CN 2
PDF
No ratings yet
CN 2
3 pages
Introduction To Networking Sample Questions
PDF
No ratings yet
Introduction To Networking Sample Questions
2 pages
Networkin Exercise. Mustafa
PDF
No ratings yet
Networkin Exercise. Mustafa
5 pages
Chapter 2.3.1
PDF
No ratings yet
Chapter 2.3.1
15 pages
Computer Network
PDF
No ratings yet
Computer Network
20 pages
Computer Networks Lab Viva Questions
PDF
No ratings yet
Computer Networks Lab Viva Questions
22 pages
Networking Basic & Ccna Interview Questions and Answers For Freshers
PDF
No ratings yet
Networking Basic & Ccna Interview Questions and Answers For Freshers
7 pages
Final Exam Fall2010
PDF
No ratings yet
Final Exam Fall2010
5 pages