Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Computer Networks

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

SRM VALLIAMMAI ENGINEERING COLLEGE

(An Autonomous Institution)

SRM Nagar, Kattankulathur – 603 203

DEPARTMENT OF COMPUTER SCIENCE AND


ENGINEERING
(Common to Department of Information Technology)

QUESTION BANK

V SEMESTER

1904003-Computer Networks

Regulation – 2019

Academic Year 2021 – 22(ODD SEMESTER)

Prepared by
Shanthi.S, Assistant Professor (Sr.G) / CSE
S.Benila, Assistant Professor (Sr.G) / CSE
V.Prema, Assistant Professor (Sr.G) / CSE
SRM VALLIAMMAI ENGINEERING COLLEGE
(An Autonomous Institution)

SRM Nagar, Kattankulathur – 603203.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


QUESTION BANK
SUBJECT : Computer Networks
SEM / YEAR: V Sem / III Year

UNIT I - INTRODUCTION AND PHYSICAL LAYER


Networks – Network Types – TCP/IP Protocol suite – OSI Model – Physical Layer: Performance –
Transmission media – Switching – Circuit-switched Networks – Packet Switching.
PART – A
BT
Q.No Questions Competence
Level
1. List the different network criteria. BTL 1 Remembering
2. Define Simplex, Half-Duplex and Full-Duplex. BTL 1 Remembering
3. Examine the two types of line configuration. BTL 4 Analyzing
4. What is the purpose of dialog controller? BTL 1 Remembering
5. Analyze all the parameters used to measure network performance. BTL 4 Analyzing
6. Define computer Networks. BTL 1 Remembering
7. Can you list the five components of data communication? BTL 1 Remembering
8. Generalize LAN, WAN and MAN. BTL 3 Applying
9. What is the similarity between transport layer and data link layer? BTL 1 Remembering
10. In what way you can summarize the purpose of layering. BTL 2 Understanding
11. How do guided media differ from unguided media? BTL 6 Creating
Assume 6 devices are arranged in a mesh topology. How many cables are
12. BTL 3 Applying
needed? How many ports are needed for each device?
13. Why are protocols needed? BTL 3 Applying
14. What are the two approaches to packet switching? BTL 2 Understanding
15. List the common approaches for switching. BTL 2 Understanding
In what way would you analyze circuit switched and packet switched
16. BTL 5 Evaluating
networks?
17. List out the advantages of star topology. BTL 2 Understanding
Which layer implements the node to node channel connection in OSI
18. BTL 4 Analyzing
layered architecture?
19. Can you discriminate bandwidth and latency? Justify BTL 6 Creating
20. What are the criteria used to evaluate transmission medium? BTL 5 Evaluating
PART-B
(i) Explain how to build network with OSI and TCP/IP reference model.(6)
(ii)Write short notes on BTL 1 Remembering
1. (a) Multiplexing and Demultiplexing. (4)
(b) Framing (3)
2. Explain fiber optic communication in detail. (13) BTL 1 Remembering
Draw the OSI network architecture and explain the functionalities of
3. BTL 1 Remembering
every layer in detail. (13)
Briefly explain the different types of packet switching techniques with
4.
suitable networks. Write each of its advantages and disadvantages. (13) BTL 1 Remembering
(i).Explain the types of transmission modes. (7)
5. BTL 2 Understanding
(ii).What are the different types of networks? Explain in detail. (6)
Explain the Shielded twisted pair (STP) and Unshielded twisted pair
6. BTL 4 Analyzing
(UTP). (13)
7. Explain in detail about TCP/IP protocol suite with neat diagram? (13) BTL 3 Applying
Formulate and discuss the various types of transmission media,
8. BTL 6 Creating
highlighting their merits and demerits. (13)
Discuss in detail about the functions of network layer and transport layers
9. With necessary diagrams. (13)
BTL 5 Evaluating
(i)Explain the various network performance parameters in detail. (6)
10. BTL 3 Applying
(ii)Explain the purpose of cladding in an optical fiber. (7)
11. What is network topology? Explain the different network topologies. (13) BTL 2 Understanding
(i) Analyze the advantages of optical fiber over twisted pair and coaxial
cable. (6)
12. BTL 4 Analyzing
(ii) Explain the major component of a packet switch and their functions.
(7)
Explain the two approaches of packet switching and circuit switching
13. BTL 2 Understanding
techniques. (13)
(i) Explain in detail about network dependent and network independent
14. layers of OSI reference model. (10) BTL 4 Analyzing
(ii) List out the approaches of switching? (3)
PART – C
(i) List the requirements in building a computer networks. (5)
(ii) Estimate your idea on how guided media differ from unguided
1. media? Briefly explain any three methods used for data BTL 6 Creating
communication using guided media and two methods used for data
communication using unguided media. (10)
Interpret with relevant diagram the functions of physical and data link
2. BTL 5 Evaluating
layer. (15)
Analyze the different types of switching networks and mention its
3. Advantages and disadvantages. (15) BTL 4 Analyzing
Interpret the major functions performed by the layers of the ISO - OSI
4. BTL 5 Evaluating
model. (15)

UNIT II - DATA-LINK LAYER & MEDIA ACCESS


Introduction – DLC Services – HDLC – PPP - Media Access Control - Wired LANs: Ethernet - Wireless
LANs – IEEE 802.11, Bluetooth – Connecting Devices. Hubs, Switches- Routers.

PART – A
BT
Q.No Questions Competence
Level
1. What do you understand by CSMA protocol? BTL 1 Remembering
Assess about Nodes and Links
2. BTL 5 Evaluating
3. What is HDLC? BTL 2 Understanding
4. Outline the services provided by the Data link layer BTL 2 Understanding
5. What is flow control and error control BTL 1 Remembering
6. Infer why the data link layer is subdivided into two sublayers. BTL 4 Analyzing
Suppose the following sequence of bits arrives over a link
1101011111010111110010111110110. Show the resulting frame
7. BTL 6 Creating
after any stuffed bits have been removed .Indicates any errors that
might have been introduced into the frame.
8. What are the three different configuration supported by HDLC? BTL 1 Remembering
9. Define framing BTL 1 Remembering
10. Relate persistent CSMA with non-persistent CSMA. BTL 3 Applying
Compose your view on why fragmentation is recommended in a
11. BTL 6 Creating
wireless LAN?
12. Analyze the role of 802.11 BTL 4 Analyzing
13. What is meant by bit stuffing? Give an example BTL 1 Remembering
14. Assess the four types of S frames. BTL 5 Evaluating
15. Examine the access method used by wireless LAN? BTL 4 Analyzing
16. Identify the hidden node problem BTL 3 Applying
17. Organize the role of error control? BTL 3 Applying
18. Show the Ethernet frame format BTL 2 Understanding
19. Compare Bit oriented versus Byte oriented protocol. BTL 2 Understanding
20. Write about the Hubs and switches. BTL 1 Remembering
PART-B
(i) Explain the physical properties of Ethernet 802.3 with
1. necessary diagram of Ethernet transceiver and adaptor. (6) BTL 5 Evaluating
(ii) Assess and explain the Ethernet frame format (7)
Construct the comparison between different wireless
2. BTL 6 Creating
technologies? Enumerate 802.11 protocol stacks in detail. (13)
3. Analyze the architecture of IEEE 802.11. (13) BTL 4 Analyzing
Illustrate the working of CSMA / CD and CSMA/CA protocol.
4. BTL 2 Understanding
(13)
Explain in detail about the Point to point Protocol (PPP) with neat
5. (13) BTL 1 Remembering
sketch.
(i) Analyze the flow and error control in DLC (7)
6. (ii) Examine the various issues in the Data link layer. BTL 4 Analyzing
(6)
What is the need for error detection? Explain with typical examples.
7. BTL 1 Remembering
Explain methods used for error detection and error correction. (13)
(i). Summarize Cyclic Redundancy Check. Show an example of a
8.
BTL 2 Understanding
CRC code. (7)
(ii). Explain and solve CRC division using polynomials. (6)
9. Discuss the different ways to address the framing problem. (13) BTL 2 Understanding
Write short notes on:
(i) NAV in CSMA/CA, Bridges. (7)
10. BTL 1 Remembering
(ii) How does a Bridge come to learn on which port the various
hosts reside? Explain with examples. (6)
11. Construct the working principle of Switches, Hub and Routers (13) BTL 3 Applying
Identify the working principle of Bluetooth and develop a neat sketch
12. to depict its architecture. (13) BTL 3 Applying
Classify in detail about High-level Data Link Control and the types
13. of frames. (13) BTL 4 Analyzing

Explain in detail about the error detecting techniques


14. BTL 1 Remembering
(i)Checksum (7)
(ii)Forward error correction (6)
PART-C
Analyze the various types of error .Discuss the various types of
1. BTL4 Analyzing
detection and correction (15)
(i) Interpret your understanding of bit oriented protocol namely
2. HDLC. (11) BTL 5 Evaluating
(ii)Assess briefly about CSMA. (4)
Use IEEE 802.3 and IEEE 802.11 to build three differences
3. BTL6 Creating
between wired and wireless LANS. (15)
Explain Cyclic Redundancy Check? Suppose we want to transmit the
message 11001001 and protect it from errors using the CRC
4. BTL5 Evaluating
polynomial x3 + 1. Use polynomial long division to determine the
message that should be transmitted. (15)

UNIT III – NETWORK LAYER


Network Layer Services – Packet switching – IPV4 Addresses: Classful addressing -classless addressing –
Network Layer Protocol: Internet Protocol (IP) – Routing Algorithms: Distance vector routing- Link State
routing- Unicast routing algorithm: OSPF– Multicasting Basics – IPV6 Addressing – IPV6 Protocol
PART – A
BT
Q.No Questions Competence
Level
1. Identify when the forwarding table used. BTL 3 Applying
2. What are the metrics used by routing protocols? BTL 1 Remembering
Choose the class of the following IP address:
3. (a) 110.34.56.45 BTL 6 Creating
(b) 212.208.63.23
4. How would you design Class A, Class B and Class C of IP? BTL 1 Remembering
5. Define routing. BTL 1 Remembering
6. Draw the sketch of IPv4 packet header. BTL 1 Remembering
7. What is Border Gateway Protocol (BGP). BTL 1 Remembering
Discover the network address in a class A subnet with the IP
8. BTL 4 Analyzing
address of one of the hosts as 25.34.12.56 and mask 255.255.0.0?
9. Demonstrate the need for sub netting? BTL 2 Understanding
10. Explain packetizing. BTL 2 Understanding
11. What is the need for fragmentation? BTL 1 Remembering
Analyze how routers differentiate the incoming unicast, multicast
12. BTL 4 Analyzing
and broadcast IP packets.
13. What is multicast routing? BTL 2 Understanding
14. Can you relate the two different classes of routing protocol? BTL 3 Applying
15. Differentiate between forwarding table and routing table BTL 2 Understanding
16. Discover the OSPF header format BTL 4 Analyzing
Recommend the benefits of Open Shortest Path First (OSPF)
17. BTL 5 Evaluating
protocol?
18. Determine the two major mechanisms defined to help transition BTL 5 Evaluating
from IPv4 to IPv6.
Test whether the following IPv6 address notations are correct.
19. (a) ::0F53:6382:AB00:67DB:BB27:7332 BTL 6 Creating
(b) 7803:42F2:::88EC:D4BA:B75D:11CD
20. Identify all the metrics used by routing protocols? BTL 3 Applying
PART-B
Explain in detail the operation of OSPF protocol by considering a
1. BTL 1 Remembering
suitable network. (13)
Explain the Distance Vector routing algorithm. Analyze its
2. BTL 4 Analyzing
limitations comparing with other routing algorithms. (13)
3. Describe the multicast routing in detail. (13) BTL 2 Understanding
4. Explain about IPv6? Compare IPv4and IPv6. (13) BTL 2 Understanding
(i) What is Internet multicasting? Explain in detail. (8) Understanding
5. BTL 2
(ii) Discuss in detail the various aspects of IPV6. (5)
With an example network scenario explain the mechanism of
6. Routing Information Protocol and specify the routing table BTL 1 Remembering
contents. (13)
7. Develop in detail the datagram approach: Connectionless services BTL 3 Applying
(13)
(i) Analyze the Link State algorithm in detail. (5)
(ii) Consider the network shown in Fig 1. Computer the shortest
path from C to all other nodes using Link-State algorithm.
Also update the forwarding table of node C. (8)

8. BTL 4 Analyzing

Fig. 1
(i) Describe in detail about reliable flooding. (6)
9. BTL 6 Creating
(ii) Explain Link State Packet in detail (7)
Discuss in detail about open source shortest path routing with neat
10. BTL 1 Remembering
diagrams. (13)
Examine the function of the Border Gateway Protocol used for
11. Inter domain routing in internetwork(13) BTL 3 Applying
12. Describe in detail the operation of Virtual-Circuit Approach: BTL 4 Analyzing
Connection-Oriented Service(13)
Evaluating
13. Compare Classful Addressing and Classless Addressing. (13) BTL 5
Remembering
Explain the working of Link -state Routing in detail.
14. BTL 1
(13)
PART-C
Find the class of each IP address. Give suitable explanation.
i) 227.12.14.87(3)
ii) 193.14.56.22(3) BTL 5 Evaluating
1.
iii) 14.23.120.8 (3)
iv) 252.5.15.111 (3)
v) 134.11.78.56 (3)
Why subnetting is necessary? With suitable example, develop the BTL 6 Creating
2.
concept of subneting in class B network. (15)
(i) Interpret the function of Routing Information Protocol(RIP).(8)
3. BTL 5 Evaluating
(ii) Draw the IPv6 packet header format. (7)
(i) Consider sending a 2400-byte datagram into a link that has an
MTU of 700 bytes. Suppose the original datagram is stamped
with the identification number 422. How many fragments are
4. generated? What are the values in the various fields in the IP BTL 6 Creating
datagram(s) generated related to fragmentation? (5)
(ii) Discuss the fundamentals and advantages of Open Shortest
Path First protocol. (10)

UNIT-IV TRANSPORT LAYER


Introduction – Transport Layer Protocols – Services – Port Numbers – User Datagram Protocol
(UDP) –Transmission Control Protocol(TCP) – SCTP.
PART – A
BT
Q.No Questions Competence
Level
1. Conclude what would you infer from the term RTT? BTL 5 Evaluating
2. List the flag used in TCP header. BTL 1 Remembering
3. Summarize IP addresses versus port numbers BTL 2 Understanding
What is the purpose of TCP push operation?
4. BTL 1 Remembering
5. Identify how a well-known port different from an ephemeral port? BTL 3 Applying
6. List the different phases used in TCP connection. BTL 1 Remembering
7. Differentiate between TCP and UDP BTL 2 Understanding
8. Identify when can an application make use of UDP? BTL 3 Applying
9. Discover the services provided by Transport layer protocol? BTL 4 Analyzing
10. List the various congestion control techniques in TCP. BTL 2 Understanding
11. How does UDP address flow control mechanism? BTL 2 Understanding
12. State the purpose of service model. BTL 1 Remembering
13. How RTT is computed? BTL 3 Applying
14. Justify that TCP is a reliable byte stream protocol? BTL 4 Analyzing
Classify the advantages of connection oriented services over
15. BTL 4 Analyzing
connectionless services.
Suppose a TCP connection is transferring a file of 5000 bytes. The
first byte is numbered 10001.What are the sequence numbers for
16. BTL 6 Creating
each segment if data are sent in three segments, each carrying
1000 bytes.
17. What is a socket address? BTL 1 Remembering
Formulate what will happen if Congestion Control is not
18. BTL 6 Creating
implemented in a Network?
19. List down TCP services. BTL 1 Remembering
20. Compare unicast, multicast and broadcast routing. BTL 4 Analyzing
PART-B
(i) Draw a TCP state transition diagram for connection
management. (7)
1. BTL 2 Understanding
(ii) If IP provides connectionless service. How TCP supports
connection oriented service? (6)
(i) Examine the Three Way Handshake protocol to establish the
2. transport level connection. (7) BTL 4 Analyzing
(ii) Analyze the various duties of Transport Layer. (6)
3. With a neat architecture, explain TCP in detail. (13) BTL 1 Remembering
Define UDP. Discuss the operations of UDP. Explain UDP Remembering
4. BTL 1
checksum with one example. (13)
Discuss in detail the various congestion control mechanisms in
5. BTL 2 Understanding
TCP. (13)
Explain adaptive flow control and retransmission techniques used
6. BTL 1 Remembering
in TCP. (13)
(i) Analyze how reliable and ordered delivery is achieved through
TCP. (7)
7. BTL 4 Analyzing
(ii) Examine why does TCP uses an adaptive transmission and
describe its mechanism. (6)
8. Identify and explain the various functionalities of SCTP. (13) BTL 3 Applying
9. Analyze various congestion avoidance techniques in TCP. (13) BTL 4 Analyzing
(i) Explain how TCP manages a byte stream. (7)
10. BTL 1 Remembering
(ii) List and explain the states involved in TCP. (6)
(i) Organize three ways of connection termination in TCP using
11. state transition diagram. (8) BTL 3 Applying
(ii) Describe in detail about reliable flooding. (5)
Interpret a network that makes use of sliding window protocol and
12. BTL 5 Evaluating
explain detail the protocol used. (13)
(i) Formulate how would you differentiate UDP and TCP? (7)
13. (ii) Will you state or interpret in your own words about flow control BTL 6 Creating
in TCP and UDP with an example. (6)
(i) Explain the operation of Go-Back-N protocol. (6)
14. BTL 2 Understanding
(ii) With a diagram explain about TCP connection management.(7)

PART-C
Discuss the adaptive transmission mechanism and propose how it
1. has evolved over time as the internet community has gained more BTL 6 Creating
Experience using TCP. (15)
(i) Can you explain why we need four (or sometimes three)
segments for connection termination in TCP?. (7) Evaluating
2. BTL 5
(ii) Assess the justification for having variable field lengths for
the fields in the TCP header. (8)
Explain the various fields of TCP header and the working of the Evaluating
3. BTL 5
TCP protocol. (15)
Develop with examples the three mechanisms by which congestion
4. control is achieved in TCP. Differentiate these mechanisms. (15) BTL6 Creating

UNIT V APPLICATION LAYER


WWW and HTTP – FTP – Email –Telnet –SSH – DNS – SNMP
PART-A
BT
Q.No Questions Competence
Level
1. Define SMTP. BTL 1 Remembering
2. Define Persistent and Non-persistent connections. BTL 1 Remembering
3. Mention the types of HTTP messages BTL 1 Remembering
4. What is the purpose of FTP? BTL 1 Remembering
5. How would you discover MIME types and subtypes? BTL 1 Remembering
6. Mention the different levels in domain name space. BTL 1 Remembering
7. Outline the need of DNS? BTL 2 Understanding
8. Examine the protocol used for e-mail security. BTL 4 Analyzing
9. Interpret the use of Hyper Text Transfer Protocol (HTTP). BTL 2 Understanding
10. Recommend the groups of HTTP header? BTL 5 Evaluating
11. Examine the function of SSH components? BTL 4 Analyzing
12. Discover the usage of conditional get in HTTP. BTL 4 Analyzing
13. Identify the three basic pieces of MIME with example. BTL 3 Applying
14. Differentiate IMAP and POP. BTL 2 Understanding
15. Differentiate IMAP and SMTP. BTL 3 Applying
16. What is the use of SNMP protocol in a network? BTL 2 Understanding
17. How would you express URL? BTL 3 Applying
18. Propose a comparison between GET and SET in SNMP BTL 6 Creating
19. Draw and construct the scenario of Electronics mail. BTL 6 Creating
20. Interpret the design of a MIB for a simple SNMP? BTL 5 Evaluating
PART-B
(i) Examine how SMTP transfers message from one host to
1. another with suitable illustration. (6) BTL 4 Analyzing
(ii) Assess IMAP with its state transition diagram. (7)
2. What is SSH? Explain it briefly. (13) BTL 1 Remembering
3. Analyze in detail about DNS operation. (13) BTL 4 Analyzing
i) Develop in detail about SNMP messages. (7)
4. BTL 3 Applying
ii) Organize the role of POP3 in Electronic mail applications.(6)
Write short notes on :
5. (i) IMAP (7) BTL 1 Remembering
(ii) MIME (6)
6. Explain in detail about HTTP operation. (13) BTL 2 Understanding
7. Examine your understanding on File Transfer Protocol. (13) BTL 4 Analyzing
8. Explain the WWW in detail. (13) BTL 1 Remembering
(i) Summarize the elements of network management and explain
9. the operation of SNMP protocol in detail. (8) BTL 2 Understanding
(ii) Infer the functions performed by of DNS. Give example. (5)
Describe the message format, message transfer and the underlying
10. protocol involved in the working of the electronic mail. BTL 2 Understanding
(13)
(i).Tabulate the various HTTP request operations. (7)
11. BTL 3 Applying
(ii)Identify the comparison between SMTP, MIME and IMAP.(6)
12. Write in detail about DNS and its frame format. (13) BTL 1 Remembering
Assess the importance of Simple Network Management Protocol
13. BTL 5 Evaluating
(SNMP)? (13)
14. Formulate the working of Email in detail. (13) BTL 6 Creating
PART-C
i) Examine the message transfer using Simple Mail Transfer
Protocol. (8)
1. BTL 4 Analyzing
ii) Analyze the basics of POP3 and IMAP mail access protocols.
(7)
A student attaches a laptop to campus network and
request/receives a web page from www.google.com . Compose
your view on the sequence of operations carried out with the help Creating
2. BTL 6
of different protocols used in application, transport, network and
linklayers.
(15)
3. Elaborate on client/server application program TELNET. (15) BTL 6 Creating
Interpret and assess how SMTP protocol is used in E-mail Evaluating
4. BTL 5
applications. (15)

You might also like