0% found this document useful (0 votes)
115 views

CN Question Bank

This document contains a question bank for the academic year 2021-2022 for the course EC 8551 – Communication Networks at M.A.M School of Engineering, Trichy. It covers fundamentals of data communication networks, the OSI model, and topics in data link layer and routing. It includes 20 questions in Part A and 10 multi-part questions in Parts B and C related to network principles, topologies, protocols, and standards. The questions are classified based on Bloom's taxonomy levels ranging from basic recall to higher order thinking skills.

Uploaded by

P.Kavitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views

CN Question Bank

This document contains a question bank for the academic year 2021-2022 for the course EC 8551 – Communication Networks at M.A.M School of Engineering, Trichy. It covers fundamentals of data communication networks, the OSI model, and topics in data link layer and routing. It includes 20 questions in Part A and 10 multi-part questions in Parts B and C related to network principles, topologies, protocols, and standards. The questions are classified based on Bloom's taxonomy levels ranging from basic recall to higher order thinking skills.

Uploaded by

P.Kavitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

M.A.

M SCHOOL OF ENGINEERING,TRICHY
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
ACADEMIC YEAR 2021-2022 (ODD)
EC 8551 – COMMUNICATION NETWORKS
QUESTION BANK
YEAR /SEM : III/VI
UNIT I -FUNDAMENTALS & LINK LAYER
Overview of Data Communications- Networks – Building Network and its types– Overview of Internet -
Protocol Layering - OSI Mode – Physical Layer – Overview of Data and Signals - introduction to Data Link
Layer - Link layer Addressing- Error Detection and Correction
PART A
Q. Questions BT Competence
No Level
1. Point out the fundamental characteristics of data communication system. BTL 2 Understanding
2. Name the criteria necessary for an effective and efficient network. BTL 1 Remembering
3. Show the four basic network topologies. BTL 3 Applying
4. Define WAN. BTL 1 Remembering
5. Give an advantages and disadvantages of Bus topology. BTL 2 Understanding
6. Compare the packet-switched and circuit-switched networks. BTL 5 Evaluating
7. What is an Internet? BTL 1 Remembering
8. Write about Protocol layering. BTL 1 Remembering
9. Generalize the Open System. BTL 2 Understanding
10. List the layers of the OSI model. BTL 1 Analyzing
11. Differentiate between Transport layer and Network layer. BTL 3 Applying
12. Write about analog and digital signals. BTL 4 Analyzing
13. Distinguish between baseband transmission and broadband BTL 1 Remembering
transmission.
14. Mention the functions of data-link layer. BTL 2 Understanding
15. Analyze the flow and error control. BTL 4 Remembering
16. Classify the types of addresses in link-layer protocol. BTL 4 Analyzing
17. Illustrate error detection and correction? BTL 3 Applying
18. Summarize types of error. BTL 5 Evaluating
19. Generalize the term checksum. BTL 6 Creating
20. Formulate the minimum Hamming distance. BTL 6 Creating
PART – B
1. Describe in detail about the Data Communication. (13) BTL 1 Remembering
Write short notes on
(i) Network Criteria (3)
2. (ii) Physical Structures (4) BTL 1 Remembering
(iii) Physical Topology (6)
Define the following network topologies with an advantage.
(i) Bus topology (3)
3. (ii) Ring topology (3) BTL 1 Remembering
(iii) Star topology (3)
(iv) Mesh topology (4)
State the following networks in detail.
(i) LAN (3)
4. (ii) MAN (3) BTL 1 Remembering
(iii) WAN (4)
(iv) PAN (3)
5. Discuss about the Internet standards and Administration. (13) BTL 2 Understanding
Summarize the following:
6. (i) Principles of Protocol layering. (7) BTL 2 Understanding
(ii) Layers in TCP/IP protocol. (6)
7. Express the various layers and functions of OSI model. (13) BTL 2 Understanding
8. Illustrate the Transmission of digital signals. (13) BTL 3 Applying
9. Examine the Transmission impairment and Data rate limits. (13) BTL 3 Applying
(i) Analyze the Services provided by data-link layer. (7)
10. BTL 3 Analyzing
(ii) Classify the types of address in link layer. (6)
11. Explain the Address Resolution Protocol with an example. (13) BTL 4 Analyzing
PART - C
1. Generalize the various network topologies and its applications. (15) BTL 6 Creating
2. Develop the OSI model and explain its layers with neat sketch. (15) BTL 6 Creating
3. Summarize the following
(i) Data link layer (8)
(7) BTL 5 Evaluating
(ii) Link Layer Addressing

4. Design a cyclic code with its polynomials and its analysis. (15) BTL 5 Evaluating
UNIT II - MEDIA ACCESS
UNIT III -&ROUTING
INTERNETWORKING
RoutingOverview
- Unicast of Data link
Routing Control and
– Algorithms Media access
– Protocols controlRouting
– Multicast - Ethernet
and(802.3) - Wireless
its basics LANsof– Available
– Overview
Protocols
Intradomain – Bluetoothprotocols
and interdomain – Bluetooth Low Energy
– Overview – WiFi
of IPv6 – 6LowPAN–Zigbee
Addressing - Network
– Transition from IPv4 to layer
IPv6. services –
Packet
Switching – IPV4 Address – Network layer protocols ( IP, ICMP, Mobile IP)
Questions PART – A BT Competence
Q.N
o Level
Q. No Questions BT Competence
1. Discuss about Routing. BTL 2 Level
Understanding
2. What do you mean by Unicast routing?
1. Mention the BTL 1 BTL
Remembering
1 Rememberin
3. Illustrate Least-Cost routing. functions of data BTL3 Applying
g
4. Explain distance-vector routing. link layer. BTL 1 Remembering
2. BTL 3 Applying
5. Evaluate Bellman-Ford equation. Draw the Ethernet BTL 5 Evaluating
frame format.
6. Define Autonomous system. BTL 1 Remembering
3. What is the need of escape character? BTL 1 Rememberin
7. Examine Global routing protocol. BTL 1 Remembering
g
8. Summarize
4. RIP. flow and error control.
Compare BTL 2 Understanding
BTL 5 Evaluating
9. Analyze the performance of OSPF. BTL 4 Analyzing
5. Describe stop-and-wait protocol. BTL 1 Rememberin
10. Manipulate the Dijkstra Algorithm. BTL 3 Applying
g
11. Outline the benefits of Open Shortest Path First (OSPF) Protocol. BTL 2 Understanding
BTL 1 Rememberin
6. State piggybacking.
12. Compare Interdomain and Intradomain routing. BTL 4 Analyzing
g
13. State Multicast
7. Distinguish routing.
between fixed-size framing and BTL 1 BTL 2 Understandin
Remembering
14. variable-size framing.
Generalize the applications of Multicasting. BTL 2 g
Understanding
15. 8. Analyze
Why IPv6 the HDLC
is preferred frame
than types differ from
IPv4? BTL 1 BTL 4 Analyzing
Remembering
16. one another.
Distinguish between RIP and OSPF. BTL 4 Analyzing
17. 9. Illustrate the Media access control. BTL 3 Applying
Classify the destination address in IPv6. BTL 3 Applying
18. Justify the strategies in transition from IPv4 to IPv6. BTL 5 Evaluating
10. Summarize the different Ethernet BTL 2 Understandin
19. Develop a Global unicast address block. BTL 6 Creating
generations. g
20. Integrate the compatible address and mapped address. BTL 6 BTL
Creating
11. Discuss the goals of Fast Ethernet. 2 Understandin
PART – B g
1. (i) What is meant by the Distance Vector Routing Algorithm? (7)
12. Point out the advantages of WLAN.
(ii) List the limitations of Distance Vector Routing Algorithm. (6) BTL 1 BTL 4 Analyzing
Remembering
2. Define Unicast routing and its Internet structure with neat diagram. (13) BTL 1 BTL
Remembering
1 Rememberin
13. Write about total delay in network layer
(i) Write note on the Border Gateway Protocol with neat diagram. (8)
services. g
3. BTL 1 Remembering
(ii) Draw the BGP-4 update packet format. (5) BTL 2 Understandin
14. Explain about piconet and scatternet.
4. Define multicasting and explain in detail about multicast address. BTL 1 g
Remembering
(13) BTL 1 Rememberin
15. Define Bluetooth.
Summarize the different Datagram approaches. Also show the g
5. advantages of LSR over DVR. List the limitations of Link State BTL 2 Understanding
16. Differentiate between basic service set and BTL 4 Analyzing
Routing Algorithm. (13)
extended service set.
6. Summarize the DVMRP and its algorithm. (13) BTL 2 Understanding
17. Examine the open-loop Congestion control
Explain the Protocol Independent Multicast (PIM) and its various BTL 3
7. and closed loop Congestion control. BTL 2 Understanding
Applying
working modes. (13)
18. Evaluate BTL 5 Evaluating
Describe about IPv4.
RIP. Explain in detail about RIP and OSPF with
8. diagrams. List the difference between them. (13) BTL 3 Applying
19. Compose the Security issues in IP protocol. BTL 6 Creating
9. Discuss in detail about the IPv6 Protocol. (13) BTL 3 Applying
(i) Examine
20. DevelopDistance VectortoMulticast
the protocol overcome Routing
the protocol. (8) BTL 6 Creating
(ii) Simplify
deficiencies in IP.and their calculation method.
the metrics (5) BTL 4 Analyzing
10.
PART – B
(i) Explain the internet
Describe multicasting.
the following in detail:Explain in detail. (7)
11. (ii) BTL 4 Analyzing
1. Find
(i)the IPv6 header details and explain them.
Framing (6) (7)
(ii) Flow and Error controlPART ‐ C (6) BTL 1 Remembering
UNIT IV - TRANSPORT LAYER
Introduction to Transport layer –Protocols- User Datagram Protocols (UDP) and Transmission Control
Protocols (TCP) –Services – Features – TCP Connection – State Transition Diagram – Flow, Error and
Congestion Control - Congestion avoidance (DEC bit, RED) – QoS – Application requirements.

BT
Q.No Questions Competence
Level
BTL 1
1. What is Transport layer? Rememberin
g
BTL 4
2. Differentiate Flow control and Congestion Analyzing
control.
BTL 3
3. Examine the buffers used in transport layer Applying
services.
BTL 3
4. Show the responsibilities of error control in Applying
transport layer.
BTL 2
5. Explain Socket Address. Understandin
g
BTL 4
6. Distinguish between UDP and TCP Analyzing
BTL 2
7. Summarize Stop-and-wait protocol and Go- Understandin
Back-N protocol. g
BTL 3
8. Draw the TCP header format. Applying
BTL 4
9. Compare and contrast UDP, TCP, and Analyzing
SCTP.
BTL 1
10. State the features of TCP. Rememberin
g
BTL 6
11. Construct the three-way handshaking with Creating
an example.
BTL 5
12. Give the approaches to improve the QoS. Evaluating
BTL 1
13. Write about SYN Flooding attack. Rememberin
g
BTL 1
14. Name the general policies for handling Rememberin
congestion. g
BTL 5
15. Evaluate the ways to deal with congestion. Evaluating
BTL 6
16. Compose RED. Creating
BTL 2
17. Illustrate the services provided by UDP. Understandin
g
BTL 1
18. List the Quality of Service parameters of Rememberin
Transport layer. g
BTL 2
19. Express the ports used for UDP. Understandin
g
BTL 1
20. Define slow start. Rememberin
g
PART – B
Write short notes on:
1. (4)
(i) Process-to-process communication
(5) BTL 1 Remembering
(ii) Addressing
(iii) Encapsulation and Decapsulation (4)
Summarize the following:
2. (i) Stop-and-Wait Protocol (7) BTL 2 Understanding
(ii) Go-Back-N Protocol (6)
3. Show the services provided by transport layer protocol. (13) BTL 3 Applying
4. Describe the working principle of TCP congestion control. (13) BTL 1 Remembering
Explain the services offered by TCP to the process at the application
5. BTL 2 Understanding
layer. (13)
6. Analyze the TCP connection with its Three-Way Handshaking. (13) BTL 4 Analyzing
Examine the State Transition Diagram for TCP. (13) BTL 1 Remembering
7.
8. Manipulate the flow control mechanism for TCP (13) BTL 3 Applying
(i) With neat sketches, evaluate the retransmission techniques in
detail. (6)
9. BTL 5 Evaluating
(ii) Criticize the events and transitions about the TCP state transition
diagrams. (7)
10. Elaborate on TCP connection Management using neat diagrams. BTL 6 Creating
(13)
PART C
(i) Draw the format of TCP packet header and explain
1. each of its field. (10)
(ii) Justify the allocation of variable field length for the fields BTL 6 Creating
in the TCP header. (5)
How is congestion controlled? Deduct various congestion control
2. techniques in transport layer. (15) BTL 6 Creating

3. Evaluate the services and Applications in User Datagram Protocol. (15) BTL 5 Evaluating
4. Elaborate the following:
(i) Flow control (8)
BTL 5 Evaluating
(ii) Error control (7)

UNIT V - APPLICATION LAYER


Application Layer Paradigms – Client Server Programming – World Wide Web and HTTP - DNS- -
Electronic Mail (SMTP, POP3, IMAP, MIME) – Introduction to Peer to Peer Networks – Need for
Cryptography and Network Security – Firewalls.
BT
Q.N Questions Competence
Level
o
1. Define Application layer protocol. BTL 1 Remembering
2. Distinguish between network applications and application-layer protocol. BTL 4 Analyzing
3. Mention the limitations of SMTP. BTL 3 Applying
4. Write the name of components used in e-mail system. BTL 1 Remembering
5. Illustrate the features of IMAP. BTL 2 Understanding
6. Why DNS Resolver bootstrap the domain name lookup process? BTL 3 Applying
7. Explain the function of User Agent. BTL 2 Understanding
8. Compare HTTP with persistent and Non-persistent Connection. BTL 4 Analyzing
9. Evaluate the types of documents in www. BTL 5 Evaluating
10. What is MIME? BTL 1 Remembering
11. Compose the features of HTTP. BTL 6 Creating
12. Criticize the Application Programming Interface. BTL 5 Evaluating
13. Analyze the security goals in network security. BTL 4 Analyzing
14. How will you recognize the P2P networks? BTL 1 Remembering
15. Draw the general block diagram of cryptography. BTL 3 Applying
16. Explain the classification of cipher. BTL 6 Creating
17. Summarize the applications of RSA. BTL 2 Understanding
18. Expand POP3 and IMAP4. BTL 1 Remembering
19. Express the classification of firewalls. BTL 2 Understanding
20. Construct the Pretty Good Privacy for E-mail security. BTL 1 Remembering
PART – B
(i) How would you transfer the message using Simple Mail Transfer
1. Protocol? (7)
(ii) Explain the final delivery of email to the end user using POP3. BTL 1 Remembering
(6)
Write short notes on
2. (i). Web services (6) BTL 2 Understanding
(ii) SNMP (7)
With appropriate diagram describe
3. (i) DNS (7) BTL 3 Applying
(ii) MIME (6)
(i) Discuss in detail about HTTP with neat diagram. (7)
4. (ii) With relevant examples discuss how the domain space is BTL 1 Remembering
divided.
(6)
5. (i) Prepare a model of IMAP state transition diagram. (7) BTL 2 Understanding
(ii) Outline the salient features of the SMTP protocol. (6)

(i) Illustrate the various steps involved in the use of non- persistent
6. connection of HTTP. (5)
(ii) Draw & explain the general format of a HTTP request message BTL 4 Analyzing
and a response message. (8)
(i) Define MIME with neat a diagram. (5)
7. BTL 1 Remembering
(ii) Give the comparison between POP-3 and IMAP-4. (8)
(i) Describe the message format, the message transfer and the Applying
underlying protocol involved in the working of an electronic mail. BTL 3
8.
(6)
BTL 4 Analyzing
(ii) Analyze the architecture and services of an E-mail system. (7)

9. Evaluate the model for network security with neat diagram. (13) BTL 5 Evaluating
10. (i) Generalize the Traditional application in computer networks. (6)
(ii)Explain the role of a DNS on a computer network, including its BTL 6 Creating
involvement in the process of a User accessing a web page. (7)
PART C
(i) Demonstrate how SMTP Protocol is used in E-mail applications.
1. (7) BTL 5 Evaluating
(ii) How would you elaborate Hypertext Transfer Protocol with an
example? (8)
Construct the following: BTL 5 Evaluating
2. (i) SMTP (5)
(ii) MIME (5)
(iii) POP3 (5)
3. Design the Data Encryption Standard with neat diagram. (15) BTL 6 Creating

You might also like