0% found this document useful (0 votes)
53 views

Short Answer Type Questions: List The Steps Involved in Creating The Checksum

This document contains a question bank with short answer and long answer type questions related to computer networks. The short answer type questions section includes 32 questions related to topics like network topologies, error detection, IP addressing, protocols etc. The long answer type questions section includes 50 questions related to topics like multiplexing, OSI model, TCP/IP, routing, congestion control etc. The questions range from easy to difficult levels and cover concepts from different layers of the networking stack.

Uploaded by

jagan19781978
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

Short Answer Type Questions: List The Steps Involved in Creating The Checksum

This document contains a question bank with short answer and long answer type questions related to computer networks. The short answer type questions section includes 32 questions related to topics like network topologies, error detection, IP addressing, protocols etc. The long answer type questions section includes 50 questions related to topics like multiplexing, OSI model, TCP/IP, routing, congestion control etc. The questions range from easy to difficult levels and cover concepts from different layers of the networking stack.

Uploaded by

jagan19781978
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Question Bank

Short Answer Type Questions

Question
Sr. No Question
Type
1 Unit -1 Define the term: network topology and name its various types?
2 Unit -1 List the steps involved in creating the checksum.
3 Unit -1 Point out the difference between 802.11 and 802.6
Obtain the 4-bit CRC code word for the data bit sequence 10011011100 (leftmost bit is the
4 Unit -1
least significant) using the generator polynomial given in the previous problem.
5 Unit -1 Name various operations of Physical layer?
6 Unit -1 Explain the use of parity check for error detection?
7 Unit -1 what is the data in the following hamming code: 1 0 0 1 1 1 0 0 1 0 1
8 Unit -1 Why do you need error detection?
9 Unit -1 What is VLAN and how it will reduce the broadcast traffic?
What is the channel capacity for a teleprinter channel with a 300 Hz bandwidth and a signal-to-
10 Unit -1
noise ratio of 3 DB?
11 Unit -2 What is the job of the Network Layer under the OSI reference model?
12 Unit -2 What is RIP?
13 Unit -2 How can you identify the IP class of a given IP address?
14 Unit -2 What is a private IP address?.
15 Unit -2 What is the main purpose of OSPF?
16 Unit -2 What is tracert?
17 Unit -2 What is ICMP?
18 Unit -2 Name the various flags used in IPV4.
19 Unit -2 Which layers are network support layers?
20 Unit -2 What is a gateway or Router?
Why is SMTP not used for transferring e-mail messages from the recipient’s mail server to the
21 Unit-3
recipient’s personal computer?
22 Unit-3 What is HTTP and what port does it use?
23 Unit-3 What is meant by 127.0.0.1 and local host?
24 Unit-3 In how many ways the data is represented and what are they?
25 Unit-3 What are the properties of Blockchain?
26 Unit-3 What is Remote desktop protocol?
27 Unit-3 List the protocols in application layer
28 Unit-3 Provide A Reason As To Why Https Should Be Used Instead Of Http?
29 Unit-3 What is encryption? What is its role in Blockchain?
30 Unit-3 Write down the comparison between connection-oriented and connectionless services.
31 Unit-3 What are the functions of transport layer?
32 Unit-3 How Does Symmetric Key Encryption Work?

Long Answer Type Questions


Sr. Question
Question
No Type

Unit -1 a) Given the following information, find the minimum bandwidth required for the path:
1
Average FDM Multiplexing Five devices, each requiring 4000 Hz. 200 Hz guard band for each
device.
b) With the help of diagram , Explain the working of Packet Switching

Unit -1 Differentiate between Message switching, Circuit Switching & Packet Switching.
2
Average
Unit -1 How does the logical topology differ from the physical topology? Why can a single physical
3 topology support multiple logical topologies?
Average
Unit -1
4 Elaborate Wavelength Division Multiplexing & its benefits over FDM & TDM
Average
Unit -1 Elucidate the underlying concept of Layers & various design issues of layers
5
Average
Unit -1
6
Average
Unit -1 Illustrate the OSI network model and the advantages & functions of each layer.
7
Average
Unit -1 Illustrate TCP/IP & its advantages over OSI Model
8
Average
Unit -1 Delineate data communication and explain components of datacommunication system.
9
Average
Unit -1 Why multiplexing is required also explain what are the goals of multiplexing.
10
Average

We have the following transmission media


· Twisted pair
Unit -1 · Coaxial cable
11
Difficult · Optical fibre cable
Discuss the advantages and disadvantages of each of these media in
terms of cost, ease of installation and adaptability in providing a range
of services to clients
Unit -1
12
Difficult List the differences between port address, logical address and a physical address?
Unit -1
13
Difficult Write the underlying concept of FDM? Explain de multiplexing and multiplexing process.
Unit -1
14
Difficult Elaborate transmission impairment? List the factors that lead to transmission impairment?
Unit -1
15
Difficult Illustrate OSI model. Explain the functions and protocols of each layer.
Unit -1
16
Difficult Differentiate between a straight-through and crossover cable in detail?
Unit -1
17
Difficult Explain in detail CSMA protocol in detail.
Unit -1
18
Difficult What is a port number and give some examples?
Unit -1 Optical fiber communications system is required for transmission . Justify . Constuct the neat
19
Difficult diagram
Unit -1
20
Difficult How Data breaks down on each layer from top to bottom ?
Unit -1 MAC address works on which layer ? What are the differences of MAC sublayer and LLC
21
Difficult sublayer?
Unit -1
22
Difficult Explain in detail Token Ring protocol in detail.
Unit -1
23
Difficult Mention the different protocols used in data link layer. Explain the operation of HDLC protocol?
Unit -1
24
Difficult Write different protocols which are being used in Transport layer in TCP/IP model
Unit -1
25
Difficult Elaborate the concept of data rate limits with different formulations
Unit -1
26
Difficult Differentiate between point to point and multipoint connections
Unit -1 Differentiate between circuit switching, packet switching, and message switching on the basis of
27
Difficult their concept, transmission system, routing, multiplexing used by them?
Unit -1
28
Difficult List out different Transmission modes in Computer networks.
Unit -1
29
Difficult Name the protocols that fall under the TCP/IP Internet Layer? Explain
Unit -1
30
Difficult List the differences between CSMA/CD and CSMA/CA?
Unit -2 You are designing a subnet mask for the 192.168.172.0 network. In first network you have 50
31
Average hosts and in second network you have 35 hosts. Design the network by using FLSM method.
Unit -2 Do port addresses need to be unique? Why or why not? Why are port addresses shorter than IP
32
Average addresses?
Do the VLSM Subnetting of following network:
In this network: -
• Development department has 74 computers.
• Production department has 52 computers.
Unit -2
33 • Administration department has 28 computers.
Average
• Development and production department is connected with Router R1 and
Administrative department is connected with Router R2.
• The given address space is 192.168.1.0/24.
Design the network using VLSM technique.
Unit -2
34
Average Highlight the various Congestion Control mechanisms to control Congestion problems.
Unit -2 Differentiate between classful and classless addressing. What is CIDR? Highlight the CIDR values
35
Average of each class in case of classful addressing.
Consider the NID of a network is 193.168.0.0, Divide the network into 16 sub-networks, list the
Unit -2 NIDs and BIDs of all the sub-networks. Also find the subnet mask of the network. Using this
36
Average subnet mask and and HOST IP address 193.168.0.29, locate the subnet ID in which this host is
residing.
Unit -2
37
Average Demonstrate the concept of NAT. Explain its types with suitable example.
Unit -2 Construct the different Congestion control Algorithms.
38
Average
Unit -2 What is classful addressing? Discuss Class A, Class B, Class C, Class D and Class E addresses with
39
Average its ranges in decimal dotted notation and example.
Unit -2
40
Average Elaborate the concept of Super and Sub Netting with Example
Unit -2 Illustrate the techniques in short which are used for achieving Good Quality of Service at
41
Difficult Network Layer.
Unit -2
42
Difficult Illustrate IP addressing? How it is classified? How is subnet addressing is performed?
Unit -2 Illustrate congestion control. Why it is required? List all policies used for the congestion control.
43
Difficult Explain any two policies used for the congestion control in detail.
Unit -2
44
Difficult List the responsibilities of the Network layer.
Unit -2
45
Difficult Disclose leaky bucket algorithm and how traffic congestion can be reduced.

Explain the IP address classification. Identify the following IP addresses and their address class:
Unit -2 (i) 200.58.20.165
46
Difficult ii)128.127.23.20
iii)16.196.128.50
iv)150.156.10.10

Unit -2 Disclose Private IP and Public IP. Where to use each? How can get each? What is the purpose of
47
Difficult
these terms?
Unit -2
48
Difficult Illustrate IPV6 with its frame format. Also list advantages of IPV6 over IPV4.
Unit -2
49
Difficult Differentiate between Distance Vector Routing Protocols and Link State Routing Protocols
Unit -2
50
Difficult Expand about the various Channel Allocation problem
Unit -2
51
Difficult Write the underlying concept of Logical Addressing in context with IPv4 and IPv6.
Unit -2
52
Difficult Demonstrate the concept of Flow Control and Error Control in Detail.
Unit -2
53
Difficult Illustrate the role of IEEE in computer networking? Elaborate different IEEE standards.
Unit -2
54
Difficult Illustrate IPV4 with its frame format. Also list advantages of IPV6 over IPV4.
Unit -2
55
Difficult Demonstrate the concept of Dijkstra algorithm. Explain the algorithm with suitable example.
Unit -2
56
Difficult What is IPv6? Explain its advantages over IPv4. Also explain its frame format.
Unit -2 Demonstrate the concept of Bellman Ford algorithm. Explain the algorithm with suitable
57
Difficult example.
Unit -2 Give a reason for the need of network management? Explain the tasks involved in managing a
58
Difficult network.
Unit -2
59
Difficult Elaborate different congestion prevention policies with neat diagrams.
Unit -2
60
Difficult Expound the concept of Routing. How different routing algorithms help in routing
Unit -3 Elaborate the different type of attacks in network security.
61
Average
Unit -3 Elaborate the concept of Security provide services.
62
Average
Unit -3
63
Average Write short note on :
1. FTP
2. TELNET
3. DNS
Unit -3 What are the major differences between Symmetric and Asymmetric key? Explain with
64
Average an example.
Unit -3 Explain briefly about MD5 message digest algorithm.
65
Average
Unit -3 Expound the protocol that provide security services for E-mails.
66
Average
Unit -3 How the different attacks crack the Data Encryption standard (DES)?
67
Average

Write short note on following commands:


Unit -3 1. Ping
68
Average
2. Traceroute
3. Netstat
Unit -3 List down the functionalities of Application Layer in detail.
69
Average
Unit -3 b) Discuss the advantages of AES over DES algorithm.
70
Average c) Write a note on 3DES approach.

Unit -3 Write note on :


71
Difficult 1. Electronic Mail
2. World Wide Web
Unit -3
72
Difficult Discuss the importance of Encryption on a network? Explain different encryption alogorithms.
Unit -3
73
Difficult How Do Digital Timestamps Support Digital Signatures?
Unit -3 Name and elaborate the common sort of ledgers which will be thought of by users in
74
Difficult Blockchain?
Unit -3 What is Digital Signature? Discuss about the RSA approach and the DSS approach of
75
Difficult Digital Signature.
Unit -3
76
Difficult What are the various types of Blockchains? Explain each with an example.
Unit -3
77
Difficult What is the need for network management? Explain the tasks involved in managing a network.
Unit -3
78
Difficult Ellaborate the concept of Domain Name System
Unit -3
79
Difficult Draw the general structure of DES and explain encryption decryption process.
Unit -3 Discuss two security mechanisms applied at the application layer. Are they safer than
80
Difficult those applied at the lower network layer? Justify your answer.
Unit -3
81
Difficult List different protocols in Application layer
Unit -3
82
Difficult How network security is important and explain how security can be achieved in networking.
Unit -3
83
Difficult What Is The Quantum Cryptography? Elaborate with an example.
Unit -3
84
Difficult Ellaborate the concept of Simple Mail Transfer Protocol with proper working.
Unit -3
85
Difficult If you are a victim of Denial of Service (Dos) then what you do?
Unit -3 What is a firewall and what are its limitations? Why do corporate houses implement
86
Difficult more than one firewall for security?
Unit -3 Ellaborate the concept of SSH (Secure Shell).
87
Difficult
Unit -3 Explain the working of different Remote Management Protocols (Telnet, RDP) with
88
Difficult proper working.
Unit -3 Elaborate the components of NetFlow and also define the use of NetFlow in different
89
Difficult fields.
Unit -3 Index the functionalities of Transport Layer in detail.
90 Difficult
Unit -3 Mention different elements of Transport layer. Explain in details
91 Difficult
Unit -3 Name the different protocols in Transport layer
92 Difficult
Unit -3 List the different connection oriented protocols explain with frame format.
93 Difficult
Unit -3
94 Difficult Differentiate between TCP and UDP with the help of frame format.
Unit -3 Compare the TCP header and the UDP header. List the fields in the TCP header that are missing
95 Difficult from UDP header. Give the reason for their absence.
Unit -3
96 Difficult Draw the structure of TCP segment. Explain the feature of TCP
Unit -3 In cases where reliability is not of a good importance, UDP would make a good transport
97 Difficult protocol. Explain with an example.
Unit -3
98 Difficult What do you understand by”3-way Hand Shake” in Tcp Explain
Unit -3
99 Difficult Write down the differences between TCP and SCTCP with the help of frame format.
Unit -3 UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs to
100 Difficult protect the boundaries of its message, which protocol should be used, UDP or TCP?
Unit -3
101 Difficult Draw the structure of TCP segment. Explain the feature of TCP
Unit -3 Index the maximum and minimum size of TCP Header? And also explain how TCP provides the
102 Difficult reliable connection.
Unit -3
103 Difficult Index and elaborate all Transport Layer Protocols.
Unit -3
104 Difficult Compare and Contrast TCP and UDP services.
Unit -3 Ellaborate the concept of Internet Message Access Protocol with proper working.
105
Difficult

You might also like