0% found this document useful (0 votes)
155 views

CS2403 Computer Networks Question Bank

This document contains a question bank for the subject of Computer Networks. It includes questions in three parts - Part A (2 marks), Part B (13-16 marks), and Part C (15 marks). The questions cover topics related to data communication components, network types, network models like TCP/IP and OSI, physical layer, bandwidth utilization, and switching. The document also provides details of the subject code, faculty contact information, and cognitive level and course outcomes associated with each question.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
155 views

CS2403 Computer Networks Question Bank

This document contains a question bank for the subject of Computer Networks. It includes questions in three parts - Part A (2 marks), Part B (13-16 marks), and Part C (15 marks). The questions cover topics related to data communication components, network types, network models like TCP/IP and OSI, physical layer, bandwidth utilization, and switching. The document also provides details of the subject code, faculty contact information, and cognitive level and course outcomes associated with each question.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

(An Autonomous Institution, Affiliated to Anna University, Chennai)

QUESTION BANK FORMAT


(Questions Should Not Repeat)

NAME OF THE DEPARTMENT CSE(AIML),CSE(CS),CSBS,IT,AIDS

YEAR / SEMESTER II/IV

REGULATION 2022
SUBJECT CODE AM2403,CY2403,CB2403,IT2403,AD2403
SUBJECT NAME COMPUTER NETWORKS
FACULTY NAME S.MAHALAKSHMI Contact Number 9381997698
T.C.SABAREESWARI 9500044401
S.RAVISHANKAR 9952735054
T.N.CHARANYA 9790097313
M.C.BABU 9444551255

UNIT-I: Data Communication Components

Introduction: Data Communications, Networks, Network Types, Network Models: Protocol Layering,
TCP/IP Protocol Suite, OSI Model, Introduction to Physical Layer: Data and signals Digital Transmission,
Bandwidth Utilization: Multiplexing and Spectrum Spreading. Switching: Introduction, Circuit Switched
Networks, Packet Switching

PART-A (2-Marks)
S.N
QUESTIONS CO RBT LEVEL
O

1 What is data communication? CO1 K1

2 Why is data communication important? CO1 K1

3 Define a computer network CO1 K1

4 Compare mesh and ring topology. CO1 K2

5 Explain protocol layering CO1 K2

6 Name two well-known network models CO1 K2

7 What is the TCP/IP protocol suite? CO1 K1


8 Mention two key protocols in TCP/IP suite and their functions CO1 K2

9 What is the OSI model? CO1 K1

10 What is the purpose of the OSI model? CO1 K1

11 What is the role of the Physical layer in the OSI model? CO1 K2

12 What are data and signals in the context of the Physical layer? CO1 K2

13 Explain digital transmission CO1 K1

14 What is bandwidth utilization? CO1 K1

15 What is spectrum spreading? CO1 K1

16 Why is switching important in networking? CO1 K2

17 What is a drawback of circuit-switched networks? CO1 K2

18 What are the advantages of packet switching over circuit switching? CO1 K1

19 Explain circuit-switched networks CO1 K2

20 What is switching in networking? CO1 K1


BT
PART-B (13- Marks Or 16-Marks or 8-Marks) CO Marks
Level
Discuss the evolution of Data communication the fundamental
components of a network, and the different types of networks. Illustrate
your answer with relevant examples and highlight the significance of
1 each component in modern networked environments CO1 K2 13
Explain the concept of network types based on geographical scope in
2 detail CO1 K2 13
Explain the concept of protocol layering and its significance in computer
3 networks. CO1 K2 13

4 Explain in detail about TCP/IP protocol suite with neat diagram CO1 K2 13
Discuss in detail about the functions of network layer and transport
5
layers with necessary diagrams. CO1 K3 13
Interpret the major functions performed by the layers of the ISO – OSI
6
model. CO1 K2 13
Explain the OSI model in detail. Highlight the seven layers and provide
7
a brief overview of the function of each layer. CO1 K3 13
Examine the responsibilities of the Data Link layer in the OSI model.
8
How does this layer handle error detection and correction in a network CO1 K3 13
Describe the significance of the OSI model in the field of computer
9 networks. How does it facilitate communication between different
network devices CO1 K3 13
Explain the characteristics of digital signals in the context of computer
10
networks. How are digital signals generated and transmitted? CO1 K2 13
Explain the concept of multiplexing in computer networks. Discuss
11 time-division multiplexing (TDM) and frequency-division multiplexing
(FDM) and their applications. CO1 K2 13
Define bandwidth and data rate in the context of digital transmission.
12 Discuss the relationship between bandwidth and data rate in network
communication. CO1 K3 13
Explain the fundamental principles of multiplexing in computer
13 networks. How does multiplexing enable the efficient use of network
resources? CO1 K3 13
Explain the concept of Time Division Multiplexing (TDM) in detail.
14 How is it implemented, and what are its advantages and limitations in
the context of network communication? CO1 K3 13
Discuss practical applications of spectrum spreading in computer
15 networks. How does spectrum spreading enhance the performance and
security of wireless communication? CO1 K4 13
Compare and contrast multiplexing techniques with spectrum spreading
16 in terms of their applications, advantages, and challenges. When would
one be preferred over the other in specific network scenarios? CO1 K3 13
Differentiate between circuit switching and packet switching. Discuss
17
the key characteristics, advantages, and disadvantages of each type. CO1 K2 13
Explain the principles of circuit switching in computer networks. How
18 does it establish and release dedicated communication paths for data
transmission? CO1 K2 13
Examine the concept of datagram switching in packet-switched
networks. How does datagram switching differ from virtual circuit
19
switching, and What are the advantages and challenges associated with
datagram switching CO1 K3 13
20 Discuss the future trends in switching technologies. What innovations CO1 K3 13
and advancements are expected to shape the future of switching in
computer networks
BT
PART-C (15-Marks) CO Marks
Level
A student attaches a laptop to campus network and request/receives a
web page from www.google.com. Compose your view on the sequence
1 CO1 K3 15
of operations carried out with the help of different protocols used in
application, transport, network and link layers.
A university is planning to upgrade its network infrastructure, and you
2 are consulted to recommend the most suitable network type. Discuss the CO1 K3 15
factors influencing your decision and justify your choice.
You are a network engineer tasked with designing and implementing a
secure online banking system for a financial institution. The system will
3 enable customers to perform transactions, access account information, CO1 K3 15
and communicate securely. Address the following aspects in your
response:
You are an IT consultant hired by a medium-sized company to upgrade
its communication infrastructure. The company is experiencing data
4 CO1 K4 15
transmission issues and desires a more efficient and reliable system.
Address the following aspects in your response:
You are a network consultant hired by a university to enhance its
campus network communication. The university is facing challenges
5 CO1 K4 15
with network congestion, delayed data transfer, and the need for
improved efficiency. Address the following aspects in your response

Unit 2: DATA LINK LAYER AND MEDIUM ACCESS CONTROL

Introduction to Data Link Layer. Error Detection and Correction: Introduction, Block Coding, Cyclic Codes,
Checksum Data Link Control: DLC Services, Data-Link Layer Protocols Media Access Control. Wired
LANs: Ethernet-Ethernet Protocol, Standard Ethernet: Characteristics, Addressing

PART-A (2-Marks)
S.N
QUESTIONS CO RBT LEVEL
O
1 What is the primary purpose of the Data Link Layer in the OSI model? CO2 K1

2 How does the Data Link Layer differ from the Physical Layer? CO2 K3

3 Differentiate between logical and physical addressing. CO2 K2

4 Differentiate between half-duplex and full-duplex communication. CO2 K2

5 How does the Data Link Layer handle framing in a network? CO2 K3

6 Define Error Detection. CO2 K1

7 What is the purpose of a parity bit in error detection? CO2 K1

8 What is the role of Hamming Code in error detection and correction? CO2 K1
How does Cyclic Redundancy Check (CRC) detect errors in data
9 transmission? CO2 K3

10 Define Burst Error in the context of error detection. CO2 K1


What is the significance of the Frame Check Sequence (FCS) in Data
11 Link Control? CO2 K1
Differentiate between synchronous and asynchronous Data Link Control
12
protocols. CO2 K2

13 Define Data Link Control (DLC) Services. CO2 K1


What role does the Address Resolution Protocol (ARP) play in DLC
14
Services? CO2 K1
How does the sliding window mechanism contribute to efficient data
15
transmission in DLC Services? CO2 K3

16 Define the term "unicast storm" in the context of Ethernet networks. CO2 K1

17 Define the term "collision" in the context of Ethernet communication. CO2 K1

18 What is the purpose of the least significant bit in a MAC address? CO2 K1
Define Media Access Control (MAC) in the context of computer
19
networks. CO2 K1
What role does the Address Resolution Protocol (ARP) play in DLC
20
Services? CO2 K1
BT
PART-B (13- Marks Or 16-Marks or 8-Marks) CO Marks
Level
1 Explore the challenges associated with half-duplex communication in CO2 K4 13
the Data Link Layer. Discuss how these challenges are addressed in full-
duplex communication.
Investigate the role of the Data Link Layer in providing flow control
mechanisms. Explain the significance of flow control in network
2 communication. CO2 K4 13
Discuss the impact of frame size on network performance in the Data
3 Link Layer. Analyze the trade-offs between large and small frame sizes. CO2 K2 13
Evaluate the role of Error Detection and Correction in the Data Link
4 Layer. Discuss the mechanisms used for error detection and how errors
are corrected. CO2 K5 13
Investigate the role of the Data Link Layer in managing access to the
shared medium in Ethernet networks. Discuss the advantages and
5
disadvantages of the Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) protocol. CO2 K4 13
Investigate the impact of noise and interference on error detection in
6 communication systems. Discuss the challenges and solutions associated
with noisy channels. CO2 K4 13
Explore the concept of checksum algorithms used for error detection.
7 Compare the strengths and weaknesses of cyclic redundancy check
(CRC) and checksums. CO2 K2 13
Assess the role of error detection and correction in modern wireless
8 communication. Discuss the specific challenges faced in wireless
networks and the techniques employed to address them. CO2 K4 13
Investigate the significance of checksums in the context of file transfers
9 and storage. Discuss how checksums contribute to data integrity in file
management systems. CO2 K1 13
Assess the impact of packet loss on error detection and correction
10 mechanisms in network communication. Discuss how protocols handle
packet loss to ensure data integrity. CO2 K5 13
Compare and contrast the mechanisms used for flow control in Data
11 Link Control protocols. Discuss the advantages and disadvantages of
stop-and-wait and sliding window protocols. CO2 K4 13
Explore the concept of frame sequencing in Data Link Control. Discuss
12
how sequence numbers contribute to the reliability of data transmission. CO2 K1 13
13 Evaluate the impact of varying data rates on the performance of Data CO2 K5 13
Link Control protocols. Discuss strategies employed to address
challenges related to data rate fluctuations.
Investigate the role of DLC Services in satellite communication systems.
14 Discuss the unique challenges and solutions associated with
implementing DLC in satellite networks. CO2 K4 13
Assess the impact of error control mechanisms on the performance of
15 DLC Services. Discuss the trade-offs between different error control
techniques and their implications. CO2 K3 13
Assess the impact of collision domains on the performance of MAC
16 protocols in Ethernet networks. Discuss strategies to minimize collisions
and improve network efficiency. CO2 K3 13
Explore the role of MAC address resolution in network communication.
17 Discuss how Address Resolution Protocol (ARP) operates at the MAC
layer and its significance. CO2 K4 13
Investigate the evolution of Ethernet protocols from the original 10
18 Mbps Ethernet to modern high-speed variants. Discuss the
advancements, challenges, and applications of each.(a) CO2 K4 13
Compare and contrast the Ethernet and Wi-Fi protocols in terms of
19 communication, performance, and security. Discuss scenarios where one
is more suitable than the other. CO2 K4 13
Investigate the significance of MAC address randomization in wireless
20 networks for enhancing privacy and security. Discuss the challenges and
potential benefits of implementing randomized MAC addresses. CO2 K4 13
BT
PART-C (15-Marks) CO Marks
Level
Examine the significance of the Data Link Layer in the OSI model.
Analyze its key responsibilities, including framing, error detection, and
1 CO2 K2 15
flow control. Discuss how the Data Link Layer contributes to reliable
and efficient communication in computer networks.
Investigate the Hamming code as a forward error correction technique.
Explain the concept of Hamming distance and error correction
2 capabilities. Discuss the trade-offs involved in choosing different CO2 K4 15
Hamming codes and evaluate their effectiveness in various
communication scenarios.
Evaluate the role of addressing in the Data Link Layer. Discuss the
purpose of MAC addresses and the differences between unicast,
3 CO2 K5 15
multicast, and broadcast addresses. Analyze how address resolution
protocols contribute to address assignment in local area networks.
Compare and contrast different Data Link Layer protocols such as
HDLC, PPP, and Ethernet. Analyze their respective features, addressing
4 schemes, and error control mechanisms. Discuss scenarios where each K3 15
protocol is most suitable and evaluate their impact on network
performance. CO2
Evaluate the evolution of the impact of collision domains on the
performance of Ethernet networks. Discuss strategies employed to
5 minimize collisions and enhance overall efficiency, considering CO2 K5 15
advancements such as full-duplex communication and switched
Ethernet.

UNIT-III: NETWORK LAYER

Introduction To Network Layer: Network Layer Services, Packet Switching, Network Layer Performance,
IPV4 Addresses Network Layer Protocols: Internet Protocol, ICMPV4, Unicast Routing: Introduction,
Routing algorithms, Unicast routing protocols: Internet Structure, Routing Information Protocol (RIP) Next
Generation IP: IPV6 Addressing, IPV6 Protocol, Transition from IPV4 to IPV6 SPACE FOR SYLLABUS

PART-A (2-Marks)
S.N
QUESTIONS CO RBT LEVEL
O

1 What is fragmentation and reassembly? CO3 K1

2 Show the need for network layer. CO3 K1

3 Highlight the characteristics of datagram networks. CO3 K1

4 List the three types of addresses in TCP/IP. CO3 K1


Identify the class/speciality of the following IP addresses
a)110.34.56.45 b)127.1.1.1
5 c)212.208.63.23 d)255.255.255.255 CO3 K1
6 What is the use of CIDR value in IP addressing? CO3 K1

7 Compare the Ethernet address with IP address CO3 K2


Find the class of each address
a) 00000001 00001011 00001011 11101111
8 b) 14.23.120.8 CO3 K1

9 Demonstrate the need for sub netting? CO3 K2


10 What are the salient features of IPv6? CO3 K1
Check whether the following IPv6 address notations are correct?
a): : OF53:6382:AB00:67DB:BB27:7332.
11 b) 7803:42F2:::88EC-D4BA:B75D:11CD CO3 K1
Check whether the following IPv6 address notations are correct?
12 a): : OF53:6382:AB00:67DB:BB27:7332.
b) 7803:42F2:::88EC-D4BA:B75D:11CD CO3 K1

13 What do you mean by ARP? CO3 K1

14 What do you mean by RARP? CO3 K1

15 Expand ICMP and write the function CO3 K1

16 What is a benefit of DHCP? CO3 K1

17 Canyoudifferentiate IPv4 andIPv6? CO3 K2

18 WhatarethebenefitsofOpenShortestPathFirst(OSPF)protocol? CO3 K1

19 Define RIP CO3 K1

20 Define BGP. What are the 3 types of routing performed by BGP? CO3 K1

21 ComposetheOSPFheaderformat. CO3 K4

22 How can the routing be classified? CO3 K1

23 Write the types of PIM. CO3 K1

24 Differentiate Static and dynamic routing. CO3 K2

25 Give the comparison of unicast, multicast and broadcast routing. CO3 K1


BT
PART-B (13- Marks Or 16-Marks or 8-Marks) CO Marks
Level
Describe in detail the operation of Virtual-Circuit Approach:
1 Connection-Oriented Service. CO3 K2 13

2 Examine the position of IPv4 in TCPIP suit. CO3 K4 13

3 Summarize about the ARP packet and encapsulation of ARP. CO3 K2 13

4 Evaluate and explain the error reporting messages in ICMP. CO3 K6 13

5 Explain the purpose of DHCP in networking and its main benefits. CO3 K2 13

6 i. Discuss theIPaddressing methods.(7) CO3 K2 7


ii. ExplainaboutIPv6? CompareIPv4andIPv6.(6) K2 6

7 Write a detail note on Internet protocols CO3 K1 13

Develop in detail the datagram approach: Connectionless services 13


8
CO3 K5

9 Explain the working of Address Resolution Protocol with an example. CO3 K2 13

Consider a network scenario and explain the functions of ARP and 13


10
RARP protocols with frame formats. CO3 K2
(i)Explain the datagram forwarding in IP. (6) 6
11 K2
(ii)Show and explain the ARP packet format for mapping IP addresses 7
into Ethernet address. (7) CO3 K2
(i)Draw the IPv6 packet header format. (7) K2 7
12
(ii)Show the ARP packet format. (6) CO3 K2 6
Explain the error reporting using ICMP protocol. How does Traceroute
program makes use of ICMP to determine the name and addresses of the
13 K2 13
routers between source and destination?
CO3

14 Outline IPv4 classful and classless addressing with examples. CO3 K1 13

With an example network scenario explain the mechanism of Routing 13


15
Information Protocol and specify the routing table contents. CO3 K1
i. Withaneatdiagramexplain distancevectorroutingprotocol. (7)
16 ii. DemonstratetheworkingofProtocolIndependentMulticast(PIM) K1 7
indetail.(6) CO3 K3 6
Outline Distance Vector Routing with an example and relevant 13
17
diagrams. CO3 K1
18 With an example, explain the function of link state routing protocol. CO3 K1 13

Outline the need of Distance Vector Multicast Routing Protocol K1 13


19
(DVMRP). CO3
Discuss the fundamentals and advantages of open shortest path first K2 13
20
protocol. CO3
BT
PART-C (15-Marks) CO Marks
Level
1 Discover the class of each IP address. Give suitable explanation. CO3 K6 15
i) 227.12.14.87
ii)193.14.56.22
iii) 14.23.120.8
iv) 252.5.15.111
v) 134.11.78.56
2 Assess and explain about the transition from IPv4 to IPv6. CO3 K6 15

Why subnetting is necessary? With suitable example, develop the


3 K5 15
concept of subnetting in class B network. CO3
Withtheneatsketchesgeneralizethealgorithmoflinkstateroutingand
4 K5
explainthe same. CO3 15
Analyze how the protocol independent multicast protocols scale well
5 inenvironments where a relatively small proportion of routers want
K5 15
toreceivetrafficfor certain group? CO3

UNIT-IV: TRANSPORT LAYER

Introduction to Transport Layer. Transport Layer Protocols: Introduction, User Datagram Protocol,
Transmission Control Protocol.

PART-A (2-Marks)
S.N
QUESTIONS CO RBT LEVEL
O

1 What are the advantages of using UDP over TCP? CO4 K2

2 Classify the services provided by Transport layer protocol. CO4 K2

3 Compare connectionless service & connection-oriented service CO4 K2

4 What are the fields on which the UDP checksum is calculated? Why? CO4 K2

5 Define slow start. CO4 K2

6 How do fast retransmit mechanism of TCP work? CO4 K2

7 What is TCP? CO4 K2

8 List the different phases used in TCP connection. CO4 K2

9 How does transport layer perform duplication control? CO4 K2

10 What is the difference between congestion control and flow control? CO4 K2

11 Define congestion. CO4 K2


12 FormulatewhatwillhappenifCongestionControlisnotimplementedinaNetw CO4 K2
ork.
13 List some ways to deal with congestion. CO4 K2

14 What are the services provided by Transport layer protocol ? CO4 K2

15 Give the approaches to improve the QoS. CO4 K2

16 List some of the quality-of-service parameters of transport layer. CO4 K2

17 Examine the performance of three-way handshaking. CO4 K2

18 Differentiate between delay and jitter. CO4 K2

19 Define Throughput. CO4 K2

20 Why TCP services are called Stream delivery services? CO4 K2


BT
PART-B (13- Marks Or 16-Marks or 8-Marks) CO Marks
Level

Define UDP. Discuss the operation of UDP. Explain UDP checksum


1 with an example. CO4 K2 13
How is congestion controlled? Explain in detail about TCP’s general
2 policy for handling congestion. CO4 K2 13

3 i. Explain the principles of concession control in TCP.(7) CO4 K2 13


ii. Explain the following TCP header and Adaptive flow control.(6)
What is the significance of the UDP checksum in ensuring data
4
integrity? CO4 K2 13

How is congestion controlled? Explain in detail about congestion control


5
mechanisms in transport layer. CO4 K2 13
i. How would you describe UDP and TCP?(7)
6 ii. Will you state or interpret in your own words about error control
CO4 K2 13
in TCP and UDP with an example? (6)
Explain in detail about the three-way handshake protocol for
7
connection establishment in TCP. CO4 K2 13
i. Illustrate in detail about UDP header format with neat sketch.(7)
8 ii. Describe in detail about UDP message queue technique with
CO4 K2 13
neat sketch. (6)
9 Describe about congestion avoidance techniques in TCP. CO4 K2 13

Develop with examples the three mechanisms by which congestion


10
control is achieved in TCP. Differentiate these mechanisms. CO4 K2 13
11 Will you state or interpret in your own words about flow control in TCP CO4 K2 13
and UDP with an example.
Explain adaptive flow control and retransmission techniques used in
12
TCP. CO4 K2 13

(i)Discuss about concept of leaky bucket algorithm? (7)


13 (ii)Discuss about to ken bucket algorithm with neat
diagram(6) CO4 K2 13

14 Comparison of TCP and UDP CO4 K2 13


Describe the three-way handshake process in TCP connection
15
establishment. CO4 K2 13

16 Explain about the Adaptive Retransmission in TCP. CO4 K2 13


Suppose TCP operates over a 1-Gbps link, utilizing the full bandwidth
continuously. How long will it take for sequence numbers to wrap
around, completely? Suppose an added 32-bit timestamp field
17 increments, 1000 times during this wrap around time, how long will it CO4 K2 13
take for the, timestamp filed to wraparound?

What is flow control in TCP, and how does it prevent congestion in a


18
network? CO4 K2 13

19 Explain the TCP termination process, including the four-way handshake. CO4 K2 13
Discuss the concept of datagrams in UDP and how they are used for
20
message encapsulation. CO4 K2 13
BT
PART-C (15-Marks) CO Marks
Level
Explain the adaptive transmission mechanism and how it has evolved
1 CO4 K2 15
time as the Internet community has gained more experience using TCP.
Generalize each field of the format of the TCP packet header. Specify
2 the justification for having variable field lengths for the fields in the CO4 K2 15
TCP header.
Explain about UDP and TCP features with neat
3 CO4 K2 15
diagrammatic representation.
Describe with examples the three mechanisms by which congestion
4 CO4 K2 15
controls formulated in TCP.
What is the purpose of the UDP header, and what information does it
5 CO4 K2 15
contain?
UNIT-V: TITLE

Domain Name Space (DNS), DDNS, TELNET, EMAIL, File Transfer Protocol (FTP), WWW, HTTP,
SNMP, Bluetooth, Firewalls, Basic concepts of Cryptography.

PART-A (2-Marks)
S.N
QUESTIONS CO RBT LEVEL
O

1 What is the purpose of Domain Name System? CO5 K2

2 Discuss the three main division of the domain name space. CO5 K2

3 Discuss the TCP connections needed in FTP. CO5 K2

4 Discuss the basic model of FTP. CO5 K2

5 What is the function of SMTP? CO5 K2

What is the difference between a user agent (UA) and a mail transfer
6 agent? (MTA)? CO5 K2

7 How does MIME enhance SMTP? CO5 K2

8 Why is an application such as POP needed for electronic messaging? CO5 K2

9 Write down the three types of WWW documents. CO5 K2

10 What is the purpose of HTML? CO5 K2

11 Define CGI CO5 K2

12 Name four factors needed for a secure network. CO5 K2

13 How is a secret key different from public key? CO5 K2

14 List the Disadvantages of Bluetooth. CO5 K2

15 What are the advantages & disadvantages of public key encryption? CO5 K2

16 List out the security rules in Firewall. CO5 K2

17 List the Advantages of Bluetooth. CO5 K2


18 Define substitution & transposition encryption. CO5 K2

19 What are the types of Bluetooth Network? CO5 K2

20 What is mean by Scatternet? CO5 K2


BT
PART-B (13- Marks Or 16-Marks or 8-Marks) CO Marks
Level
Define the Domain Name System (DNS) and Explain the hierarchical
1 structure of domain names. CO5 K2 13
What is Dynamic DNS (DDNS), and how does it differ from traditional
2 DNS? CO5 K2 13

3 What is Telnet, and how does it function as a network protocol? CO5 K2 13

4 Explain about the Components of E-Mail System CO5 K2 13

5 Describe about the WWW. CO5 K2 13


Explain how FTP have a message format for exchanging commands and
6
responses during control connection? CO5 K2 13
Identify the frame structure of DNS messages also narrate
7
encapsulation. CO5 K2 13

i. Summarize how SMTPtransfers message from one host to


8 another host with suitable illustration. (7)
ii.Can you associate the functions performed by DNS? Give example. (6) CO5 K2 13

9 Organize the role of POP3 in Electronic mail applications. CO5 K2 13


Summarize the elements of network management and explain the
10
operation of SNMP protocol in detail. CO5 K2 13

11 Examine your understanding on File Transfer Protocol. CO5 K2 13


Describe the role of status codes in the HTTP protocol and provide an
12
example of a commonly used status code and its meaning. CO5 K2 13

13 Describe about the file transfer protocol CO5 K2 13


Describe the basic architecture of a Bluetooth network and the roles of
14
devices in a Bluetooth connection. CO5 K2 13

15 What is a firewall, and explain primary purpose in a computer network? CO5 K2 13


What is cryptography, and explain why is it important in computer
16
networks? CO5 K2 13
i. What are the primary goals of cryptography in network security?(6)
17
ii. Explain the difference between encryption and decryption.(7) CO5 K2 13
What is DDNS, and explain how does it differ from traditional DNS
18
(Domain Name System)? CO5 K2 13
In what situations is DDNS particularly useful, and when might it be less
19
suitable? CO5 K2 13
Explain the concept of Bluetooth pairing and the security considerations
20
involved. CO5 K2 13
BT
PART-C (15-Marks) CO Marks
Level
Can you describe a real-world scenario where Dynamic DNS would be
1 CO5 K3 15
particularly useful?

2 Generalize how SMTP protocol is used in E-mail applications? CO5 K3 15

A company's network infrastructure consists of various switches,


routers, and servers spread across different floors of their office
building. The IT team wants to implement a network management
system using SNMP to monitor and manage these devices efficiently.
The IT team wants to monitor the bandwidth utilization of the switches
3 CO5 K3 15
and routers using SNMP. They also want to be alerted if the network
traffic exceeds certain thresholds. Design a plan for the IT team on how
to the key steps and SNMP components involved in the monitoring and
alerting process achieve this using SNMP. Include the key steps and
SNMP components involved in the monitoring and alerting process.
Generalize the structure of HTTP server receives a request message from
4 an HTTP client, how does the server know when all headers have arrived CO5 K3 15
and the body of the message is to follow?
Analyze the message format and the message transfer and the underlying
5 CO5 K3 15
protocol involved in the working of the electronic mail.

You might also like