Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Computer Networks

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

UNIT-I

1. Explain the ISO-OSI model of computer network with a neat diagram.

2. Discuss the major functions performed by the Presentation layer and Application

layer of the ISO OSI model.

3. Explain Transport Layer and Physical Layer.

4. What are the major components of an optical communication system? Discuss.

5. Distinguish between point to point links and multi point links. Give relevant

diagrams.

6. Explain Data Link Layer and Network Layer.

7. Compare Connection oriented and connectionless service.

UNIT- II

1. a) What is the need for data encoding and explain the various data encoding

schemes and compare their features. (8)

b) Explain how hamming code can be used to correct burst errors. (8)

2. Explain the operation of the bit-oriented protocol HDLC with the required frames

3.Explain the various error detection and correction Mechanisms used in computer

network.

4. Write short notes on:

a) Go back NARQ (8)

b) Selective repeat ARQ (8)

5. a) Discuss the major functions performed by the Presentation layer and

Application layer of the ISO - OSI model. (8)

b) Compare Connection oriented and connectionless service. (4)

c) What are the major components of an optical communication system?

Discuss. (4)

6. a) A block of 32 bits has to be transmitted. Discuss how the thirty two bit

block is transmitted to the receiver using Longitudinal Redundancy Check.

(4)

b) Consider a 32 bit block of data 11100111 11011101 00111001 10101001

that has to be transmitted. If Longitudinal Redundancy Check is used what

is the transmitted bit stream?(4)

c) In the Hamming code, for a data unit of 'm' bits how do you compute the

number of redundant bits 'r' needed? (4)

d) What kinds of errors can Vertical Redundancy check determine? What

kinds of errors it cannot determine? (4)

7. Discuss stop and wait protocol

8. Discuss sliding window protocol using Go back n.

9. How does a Token Ring LAN operate? Discuss.

UNIT-III

1. Explain distance vector routing in detail.

2. Explain packet switching in detail.

3. What are routers? Explain in detail.

CS2302 Computer Networks

http://csetube.tk/

http://csetube.weebly.com/

4. What are the services provided by DNS server? Explain in detail.

5. Find the class of each IP address. Give suitable explanation. (8 x 2 = 16)

i) 227.12.14.87

ii) 193.14.56.22

iii) 14.23.120.8

iv) 252.5.15.111

v) 134.11.78.56

vi) 172.18.58.1

vii) 00000000 11110000 11111111 00110011

viii) 10000000 11110000 11111111 00110011

6. State the major difference between Distance Vector Routing and Link State

Routing. Discuss

how these routing techniques work.

7. What is the sub network address if the destination address is 200.45.34.56 and

the subnet mask

is 255.255.240.0?

8. List and diagrammatically illustrate and discuss the four general categories of

attack.

9. With relevant example discuss about Substitution Ciphers.

10. Briefly discuss how DES algorithm works.

UNIT-IV

1. a) Perform a comparative study between the ISO OSI model and the TCP/IP

reference model.(8)

b) Distinguish between point to point links and multi point links. Give

relevant diagrams. (8)

2. List and discuss the states used in the TCP connection management finite state

machine.

3. Discuss the various timers used by TCP to perform its various operations.

4. Present a tutorial on User Datagram Protocol (UDP).

5. Discuss the strategies TCP uses to avoid congestion.

6. Explain UDP & TCP.

7. Explain leaky bucket and token bucket algorithm.

8. Explain the duties of transport layer.

UNIT-V

1. Explain how security is provided in interact operations in detail.

2. What is HTTP protocol used for? What is the default port number of HTTP

protocol?

3. Discuss the features of HTTP and also discuss how HTTP works.

4. List and discuss the types of DNS records.

5. Explain WWW.

6. What are the duties of FTP protocol?

7. Explain the type of encryption/decryption method.

8. Explain about RSA algorithm

http://csetube.tk/

You might also like