Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CN Question Bank

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Module 1

Introduction to networks and data communication

1. Define Data Communication? Explain the fundamental components of data communication?


2. Write a note on Types of Data Communication.
3. Explain some of the network devices used in networking.
4. Explain different types of Network Topologies with pros and cons.
5. Define Network Topology. Summarize four basic types of topologies with advantages and disadvantages.
6. Define Computer Networks. Discuss different types of networks with Advantages and disadvantages.
7. Explain a. LAN b. MAN c. Internetworks
8. Explain a. WAN b. PAN c. Internetworks
9. In order to address the problems with Network Software, a few things need to be investigated. Describe each
process in great detail.
10. Demonstrate Protocol Hierarchies with a neat diagram.
11. Illustrate different design issues of Layers.
12. Distinguish between Connection oriented and connectionless services.
13. Write a note on 1. Service primitives of Network software 2. The relationship of services to protocols.
14. With a neat diagram illustrate the TCP/IP Model by mentioning the different layers.
15. Briefly explain OSI reference model by highlighting the functions carried out by each layer.
16. “Transmission medium is the way in which data is transmitted from one place to another”. Illustrate
Wired/Guided transmission media in detail.
17. “Transmission medium is the way in which data is transmitted from one place to another”. Illustrate
Wireless/Unguided transmission media in detail.
18. Explain in detail a. Twisted pair cable b. Coaxial cable
19. Explain in detail a. Fibre optical cable b. Magnetic Media c. Power Lines
20. Explain in detail a. Electromagnetic waves b. Radio waves
21. Explain in detail a. Micro waves b. Infrared waves c. Light Transmission
22. Define switching? Explain the Circuit Switching in brief.
23. Define switching? Explain the Packet Switching in brief.
24. What is a Switched Network? Differentiate between Circuit Switching and Packet Switching.
25. Compare and contrast TCP/IP Model and OSI Model.
26. What are the two commonly used types of coaxial cable, and how do they differ in terms of impedance
and intended use? Explain with neat labelled diagram.
27. Describe magnetic media and twisted pair cables, including their respective specifications,
accompanied by diagram.
28. Describe fiber optics and provide examples illustrating the transmission of light ray through fiber.
29. Discuss the electromagnetic spectrum and its applications in communication.
30. What is the significance of radio waves being omni directional, why are radio frequency
(RF) waves widely used for communication, both indoors and outdoors?
31. Explain Infrared transmission and light transmission.
32. What is the OSI model? How many layers comprise the OSI model? Provide a clear diagram to illustrate its
structure.
33. Describe the TCP/IP protocol suite, accompanied by a clear diagram highlighting its distinctions from the
OSI model. Illustrate the TCP/IP model by outlining the protocols associated with each layer.
Module 2

The Data link layer

1. Illustrate different design issues in Data Link Layer.


2. Define Framing. Summarize different approaches used in framing.
3. Explain in detail a. Character-oriented framing or Character count framing b. Byte Stuffing
c. Bit Stuffing
4. Describe Block coding with an example.
5. Discuss error detection and error correction in block coding technique.
6. “Parity Checker uses a parity bit to perform error detection”. Write a note on how parity checker
generates redundant bits and how error detection is done in parity checker with an example.
7. Checksum is an error detection technique based on binary addition. Explain the steps how
checksum is created at sender’s side and how checksum is validated at receiver’s side with an
example.
8. Calculate the Checksum for 10011001111000100010010010000100.
9. Calculate the Checksum for 1001100111100010.
10. Calculate the Checksum for 101100111010101101011010110101.
11. Cyclic Redundancy check is an error detection technique based on binary division. Find codeword
using CRC, given CRC generator = 1101, data word= 101101 and show how it is used to check
for error detection at sender side and receiver side.
12. Find CRC for both sender side and receiver side for the databits 1101011011 and calculate CRC
generator by considering the polynomial x4+x+1.
13. Explain the following with an example a. Parity Checker b. Checksum c. CRC
14. “Hamming Code is one of the error detection and correction techniques which are used to identify
single bit error”. By taking an example explain how error is detected and corrected on both sender
side and receiver side.
15. “Protocols used to determine who goes next on a multi access channel belongs to a sub layer of
Data Link Layer called Medium Access Control(MAC) sub layer”, which is called as Channel
Allocation problem. Analyse two different kinds of channel allocation issues.
16. Explain briefly the following Channel Allocation problems for medium access control sublayer
a. Static channel allocation in LAN and MAN b. Dynamic channel allocation.
17. Define ALOHA. Briefly explain different types of ALOHA with neat diagrams.
18. ALOHA is a random access protocol, where any station can send data at any time which might
lead to collision. So this can be handled by considering two different types of ALOHA. Determine
two types of ALOHA.
19. With the random access protocol ALOHA, any station can send data at any moment, potentially
causing a collision. Thus, taking into account two distinct forms of ALOHA will help with this.
Identify two ALOHA kinds.
20. What is CSMA Protocol? Discuss its type with a neat diagram.
21. Explain CSMA with collision detection protocol with neat diagram.
22. Showcase a neat flow diagram and finite state machine of a Unrestricted simple protocol.
23. Use a simple flowchart and a finite state machine to demonstrate the Stop and Wait protocol for
both noisy and noiseless channels.
24. Use a clear illustration to illustrate the One Bit sliding window protocol technique.
25. Use a clear flow diagram to understand the Go Back N ARQ protocol mechanism, which is used
to detect the errors and control them.
26. Illustrate Selective Repeat protocol with a neat flow diagram.
MODULE 3

The Network Layer

1. Explain different design issues of Network Layer.


2. Differentiate between Virtual circuit networks and Datagram networks.
3. By taking an example explain the following a. Unicast Routing b. Least Cost Routing
4. Discuss Uni cast routing. Explain how to find best route.
5. Use a modelled graph as an example to illustrate least cost routing. For each node, determine the
least cost tree by treating one node as the root node.
6. Distance vector routing uses bellman ford equation to find out the least cost tree, define distance
vector routing and write an algorithm for distance vector routing.
7. Calculate initial distance vector and update the distance vector by considering any one of the node
as root node for the given modelled graph.

8. Discuss the problems of distance vector routing.


9. In link state routing algorithm, only the link state information is sent to the nearest neighbour,
Write and Use Dijkstra algorithm to calculate the shortest path by using modelled graph as an
example.
10. For the supplied modelled graph. Compute the initial path vector and update it.

11. Describe Path vector routing.


12. In path vector routing, the path from source to other nodes is determined by best spanning tree.
Find out best spanning tree for every source node by taking an example modelled graph.
13. The best spanning tree determines the path from the source to other nodes in path vector
routing. Using a modelled network as an example, determine the best spanning tree for each
source node.
14. Congestion indicates that there is more demand than available resources. Therefore, several
timelines are used to apply solutions or techniques to manage congestion. Mention and describe
all the approaches to control the congestion.
15. “Quality of service defines the quality of services as something a flow seeks to attain”. Quality of
service (QoS) is the use of mechanisms or technologies that work on a network to control traffic
and ensure the performance of critical applications with limited network capacity. Describe
different techniques used to improve the quality of service.
16. The nearest neighbour receives just the link state information when using the link state
routing algorithm. Create a model of a graph and use the Dijkstra algorithm to determine
the shortest path.
MODULE 4

The Transport Layer

1. “The ultimate goal of the transport layer is to provide efficient, reliable, and cost-effective data
transmission service to its users, normally processes in the application layer”. Explain in detail the
services provided by transport layer to upper layers with a neat diagram.
2. "The ultimate goal of the transport layer is to provide effective, reliable, and cost effective data
transmission services to its users which typically process in the application layer”. Using a clear
diagram, describe in detail the services that the transport layer offers to the upper layers.
3. A user process can utilise the primitives to access the services from the transport layer. Describe
in detail the primitives of transport services.
4. List and explain the socket primitives for TCP.
5. List the elements of the transport protocol and provide a detailed example of addressing.
6. List the elements of the transport protocol and describe the TCP connection establishment and
release phase with a clear diagram.
7. List the elements of the transport protocol and describe the error control and flow control,
Multiplexing and Crash Recovery with a neat diagram.
8. Illustrate different types of Congestion control mechanisms.
9. User Datagram Protocol, or UDP, is a connectionless transport protocol that is supported by the
Internet protocol stack. Describe the Remote Procedure Call (RPC) and UDP Segment header
structure using a neat diagram.
10. TCP Internet Protocol was specifically designed to provide a reliable end-to end byte stream over
an unreliable network. TCP is responsible for timing out, retransmitting the datagrams as
necessary, and reassembling datagrams into messages in the correct order. During this process
different issues will be considered, List the issues and describe the issues in detail.
MODULE 5

The Application Layer

1. Network-applications are the driving forces for the explosive development of the internet.
Describe the process of communicating and the network application architecture.
2. Network-applications are the driving forces for the explosive development of the internet. Explain
a. Transport Services available to applications
b. Transport Services provided by the Internet.
c. Application Layer Protocols
3. With block diagram, explain the working of Web & HTTP.
4. The local host uses File Transfer Protocol (FTP) to send and receive files over a network to a
distant computer. Give a diagram that illustrates how FTP operates.
5. Give a diagram that illustrates how the email system operates. Discuss about the three major
components of an email system.
6. SMTP is the most important protocol of the email system. Discuss the role of SMTP in Electronic
mail.
7. Using Mail Access Protocols, a user can access the mail servers on PCs or laptops. Describe three
Mail Access Protocols in brief.
8. Briefly describe the working of DNS.
9. Explain DNS records and messages in a broad style.

You might also like