0% found this document useful (0 votes)
16 views

Question Bank

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Question Bank

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1. Explain the applications of computer networks.

2. List the design perspectives of computer networks and discuss.


3. Define i)Multicast II) Cloud III) PAN IV)Storage area network
4. What are the cost effective resource sharing techniques in computer networks
5. With a neat diagram, Explain internet architecture(TCP/IP Model)
6. Describe the function of each layer of OSI model.
7. Explain briefly the step involved in incrementing network software using sockets.
8. Mention the five issues of getting network connected.
9. Show the NRZ, NRZI and Manchester encoding for the bit pattern 100110111
10. Describe parity error detection scheme along with necessary example.
11. Discuss the frame format of HDLC.
12. Explain the working of byte oriented protocols (BISYNC, PPP, DDCMP)
13. Write the algorithm for encoding and decoding using CRC.
14. Discuss Simplex Stop and wait Protocol.

1. What are the common properties and limitations of transport protocol?


2. What are the four services offered by transport protocol and their respective protocols?
3. Explain UDP protocol with a neat diagram.
4. Write the difference between UDP and TCP.
5. Discuss connection establishment and termination in TCP.
6. . What is congestion? Explain the approaches to control congestion.
7. Elaborate the working of tunneling in internetworking
8. Discuss the factors that influences the quality of service (QOS) in internetworking.
9. Explain the two types of queuing disciplines.
10. Describe the TCP header format.
11. What are the security threats in internetwork
12. With a neat diagram, Discuss the working of symmetric –key encryption using CBC.
13. Write a short note on Data Encryption Standard(DES)
14. Discuss the importance of each component in SNMP.
15. With a neat diagram, bring out the relation between public-key ciphers and authenticators.
16. Write the difference between Symmetric key cipher and Asymmetric key cipher.
17. Narrate the strength and weakness of firewall.
18. Describe the working components of email.
1.a. Bring the differences among bridges and routers.

b. With a neat diagram and forwarding table. Explain diagram networks.

Or

2.a. What are three approaches of forwarding messages in internetwork?

b. Write a short note on Asynchronous Transfer Mode (ATM)

3. With a neat diagram discuss source routing and different ways of handling headers of source routing.

Or

4.a. Explain virtual circuit techniques along with VC table.

b. Discuss spanning tree Algorithm.

5.a. What is internetworking?

b. With neat diagram , Explain the packet forwarding in internetwork.

Or

6.a. State the importance of ICMP

b. With an example, describe fragmentation and assembly of packets in internetwork.

7. Elaborate the header format of IPV4 frame.

Or

8.a.What is count-to-infinity problem?

b. Explain distance vector routing with an example.

9.a. What is congestion?

b. Discuss the approaches to avoid congestion.

Or

10.a. What are the four service offered by transport layer?

b. Discuss connection establishment and termination in TCP.


1. Draw the OSI network architecture. Explain each layer in detail.
2. Differentiate between connection oriented and connectionless Service.
3. Explain the uses of Computer Networks.
4. Define the terms
i) Switch ii) Router iii) Hub
5. Explain in detail about Cost-Effective Resource Sharing.
6. Discuss about support for common services in network requirement.
7. With neat diagram explain layering and protocol in network architecture.
8. Explain internet architecture with neat diagram
9. How encapsulation is used in network communication?. Discuss
10. Discuss the following encoding techniques

i) NRI ii)NRZI iii)Manchester iv) 4B/5B


11. Write a program for distance vector algorithm to find suitable path for transmission.
12. Write a program for Hamming code generation for Error detection and Correction.

1. Discuss the following

i) Byte -oriented protocols ii) Bit-oriented protocols

2. What is clock based framing? Explain with respect to SONET.

3. Explain the following Error detection methods with suitable example.

i) Two dimensional parity ii) Internet checksum

4. What is CRC?. Explain the same with M(x) =10011010000, g(x) =1101.

5. Explain a simplex stop and wait protocol for an error free channel.

6. Discuss sliding window protocol in detail.

7. Discuss the physical properties of Ethernet.

8. Explain 802.11 frame structure.

9. Explain Bluetooth protocol architecture.

10, Explain Virtual circuit switching with necessary diagrams.

11. What is an Internetwork? Also Explain Tunneling with neat diagram.

12. Discuss in detail about Distance Vector routing algorithm.

You might also like