Computer Networks
Computer Networks
Computer Networks
QUESTION BANK
V SEMESTER
1904003-Computer Networks
Regulation – 2019
Prepared by
Shanthi.S, Assistant Professor (Sr.G) / CSE
S.Benila, Assistant Professor (Sr.G) / CSE
V.Prema, Assistant Professor (Sr.G) / CSE
SRM VALLIAMMAI ENGINEERING COLLEGE
(An Autonomous Institution)
PART – A
BT
Q.No Questions Competence
Level
1. What do you understand by CSMA protocol? BTL 1 Remembering
Assess about Nodes and Links
2. BTL 5 Evaluating
3. What is HDLC? BTL 2 Understanding
4. Outline the services provided by the Data link layer BTL 2 Understanding
5. What is flow control and error control BTL 1 Remembering
6. Infer why the data link layer is subdivided into two sublayers. BTL 4 Analyzing
Suppose the following sequence of bits arrives over a link
1101011111010111110010111110110. Show the resulting frame
7. BTL 6 Creating
after any stuffed bits have been removed .Indicates any errors that
might have been introduced into the frame.
8. What are the three different configuration supported by HDLC? BTL 1 Remembering
9. Define framing BTL 1 Remembering
10. Relate persistent CSMA with non-persistent CSMA. BTL 3 Applying
Compose your view on why fragmentation is recommended in a
11. BTL 6 Creating
wireless LAN?
12. Analyze the role of 802.11 BTL 4 Analyzing
13. What is meant by bit stuffing? Give an example BTL 1 Remembering
14. Assess the four types of S frames. BTL 5 Evaluating
15. Examine the access method used by wireless LAN? BTL 4 Analyzing
16. Identify the hidden node problem BTL 3 Applying
17. Organize the role of error control? BTL 3 Applying
18. Show the Ethernet frame format BTL 2 Understanding
19. Compare Bit oriented versus Byte oriented protocol. BTL 2 Understanding
20. Write about the Hubs and switches. BTL 1 Remembering
PART-B
(i) Explain the physical properties of Ethernet 802.3 with
1. necessary diagram of Ethernet transceiver and adaptor. (6) BTL 5 Evaluating
(ii) Assess and explain the Ethernet frame format (7)
Construct the comparison between different wireless
2. BTL 6 Creating
technologies? Enumerate 802.11 protocol stacks in detail. (13)
3. Analyze the architecture of IEEE 802.11. (13) BTL 4 Analyzing
Illustrate the working of CSMA / CD and CSMA/CA protocol.
4. BTL 2 Understanding
(13)
Explain in detail about the Point to point Protocol (PPP) with neat
5. (13) BTL 1 Remembering
sketch.
(i) Analyze the flow and error control in DLC (7)
6. (ii) Examine the various issues in the Data link layer. BTL 4 Analyzing
(6)
What is the need for error detection? Explain with typical examples.
7. BTL 1 Remembering
Explain methods used for error detection and error correction. (13)
(i). Summarize Cyclic Redundancy Check. Show an example of a
8.
BTL 2 Understanding
CRC code. (7)
(ii). Explain and solve CRC division using polynomials. (6)
9. Discuss the different ways to address the framing problem. (13) BTL 2 Understanding
Write short notes on:
(i) NAV in CSMA/CA, Bridges. (7)
10. BTL 1 Remembering
(ii) How does a Bridge come to learn on which port the various
hosts reside? Explain with examples. (6)
11. Construct the working principle of Switches, Hub and Routers (13) BTL 3 Applying
Identify the working principle of Bluetooth and develop a neat sketch
12. to depict its architecture. (13) BTL 3 Applying
Classify in detail about High-level Data Link Control and the types
13. of frames. (13) BTL 4 Analyzing
8. BTL 4 Analyzing
Fig. 1
(i) Describe in detail about reliable flooding. (6)
9. BTL 6 Creating
(ii) Explain Link State Packet in detail (7)
Discuss in detail about open source shortest path routing with neat
10. BTL 1 Remembering
diagrams. (13)
Examine the function of the Border Gateway Protocol used for
11. Inter domain routing in internetwork(13) BTL 3 Applying
12. Describe in detail the operation of Virtual-Circuit Approach: BTL 4 Analyzing
Connection-Oriented Service(13)
Evaluating
13. Compare Classful Addressing and Classless Addressing. (13) BTL 5
Remembering
Explain the working of Link -state Routing in detail.
14. BTL 1
(13)
PART-C
Find the class of each IP address. Give suitable explanation.
i) 227.12.14.87(3)
ii) 193.14.56.22(3) BTL 5 Evaluating
1.
iii) 14.23.120.8 (3)
iv) 252.5.15.111 (3)
v) 134.11.78.56 (3)
Why subnetting is necessary? With suitable example, develop the BTL 6 Creating
2.
concept of subneting in class B network. (15)
(i) Interpret the function of Routing Information Protocol(RIP).(8)
3. BTL 5 Evaluating
(ii) Draw the IPv6 packet header format. (7)
(i) Consider sending a 2400-byte datagram into a link that has an
MTU of 700 bytes. Suppose the original datagram is stamped
with the identification number 422. How many fragments are
4. generated? What are the values in the various fields in the IP BTL 6 Creating
datagram(s) generated related to fragmentation? (5)
(ii) Discuss the fundamentals and advantages of Open Shortest
Path First protocol. (10)
PART-C
Discuss the adaptive transmission mechanism and propose how it
1. has evolved over time as the internet community has gained more BTL 6 Creating
Experience using TCP. (15)
(i) Can you explain why we need four (or sometimes three)
segments for connection termination in TCP?. (7) Evaluating
2. BTL 5
(ii) Assess the justification for having variable field lengths for
the fields in the TCP header. (8)
Explain the various fields of TCP header and the working of the Evaluating
3. BTL 5
TCP protocol. (15)
Develop with examples the three mechanisms by which congestion
4. control is achieved in TCP. Differentiate these mechanisms. (15) BTL6 Creating