Possible Question Summary From Previous Year Question
Possible Question Summary From Previous Year Question
Unit 1:
13. Encode the following bits 0010111101000010 using NRZ-L and Manchester.
14. Define socket. Which layer is responsible for Process to process communication?
15. Draw TCP/IP layer diagram.
Unit 2:
Unit 5 :
Unit 1:
1. Discuss the transmission media in detail based on the bandwidth, attenuation factors in
data communication.
2. Assume if you want to transfer Rs.5Lakh from www.onlinesbi.com to the person x
account. What are the layers it has to cross in the reference model, Mention the task of
each layer in detail.
3. Give the purpose of layering? Explain the Layered architecture of ISO/OSI model in
detail?
4. At what layer of the OSI model would you associate the following?
ICMP
UDP
Hub
Manchester Encoding
5. Define line coding. Describe RZ, NRZ-L, Manchester encoding, Differential Manchester
encoding by applying on the information sequence 101011100.
6. A company X is implementing a Local Area Network with a bandwidth of 100 Mbps. A
company requires high fault tolerance, highly secured and collision free Network. The
down time should not exceed 1m sec. Draw the Network diagram for minimum of 20
machines and Justify the cable, topology selection etcl..,
7. A 2 km long brodcast LAN has 107 bps bandwidth and uses CSMA/CD. The signal
travels along the wire at 2 X108 m/s. What is the Minimum packet size that can be used
on this network?
8. The telephone regional offices needs to be connected to every other regional office.
Which topology do you prefer for it and why?
Unit 2:
1. Obtain the 4-bit CRC code word for the data bit sequence 10011011100 (Leftmost bit is
the least significant) using the generator polynomial X^4+X^2+1
2. A computer network uses polynomial over GF(2) for error checking with 8 bits as
information bits and uses x3 + x + 1 as the generator polynomial to generate the check
bits. How the message 01011011 is transmitted in this network?
i. show the generation of the codeword at the sender site (using binary division)
ii. Show the checking of the codeword at the receiver site (assume no error)
14. Design a high speed wireless Network which can cover 10 km to 40 km range. The
Network should support high bandwidth and interoperability for mobile and Fixed users.
Draw the architecture diagram and compare with WiFi .
15. A company likes to transfer a huge block of data from System A to System D where the
systems are placed in two different regions. Which transmission protocol is suitable for
establishing a link between two systems and Justify.
16. A bit stream 10011101 is transmitted using the standard CRC method. The generator
polynomial is x3 + 1. Show the actual bit string transmitted. Suppose the third bit from
the left is inverted during transmission. Show that this error is detected at the receivers
end.
17. i) Draw and explain sliding window concept.
ii) How do you define sender and receiver window size in sliding window protocol?
ii) Analyze if the sender window size is less than 2m.
18. State the difference between Sliding window and Stop and Wait Protocol
Unit 3:
Show the data that node A will receive on the first iteration of the algorithm.
Show the routing table for node A after the first iteration of the algorithm has been
completed
12. An ISP is granted a block of addresses starting with 120.60.4.0/22. The ISP wants to
distribute these blocks to 100 organizations with each organization receiving just eight
addresses. Design the sub blocks and give the slash notation for each sub block. Find out
how many addresses are still available after these allocations.
13. Why classless Addressing is used? Compare it with Classful Addressing.
14. calculate the checksum for the following IPv4 packet:
i. HVER – 4
ii. HLEN – 4
iii. Total length – 16
iv. Identification – 1
v. TTL – 4
vi. Protocol – 15
vii. Source IP address – 16.32.12.9
viii. Destination IP address – 20.14.8.2
13. Analyze the given IP packet and prove that received IP packet is not corrupted.
14. An ISP is granted a block of addresses starting with 190.100.0.0/16 (65,536 addresses). The
ISP needs to distribute these addresses to three groups of customers as follows:
a. The first group has 64 customers; each needs 256 addresses.
b. The second group has 128 customers; each needs 128 addresses.
c. The third group has 128 customers; each needs 64 addresses.
Design the subblocks and find out how many addresses are still available after these
allocations.
15. If your organization is designing a Local Area Network what kind of addressing you will
prefer, 32 bit addressing or 128 bit addressing discuss in detail.
Unit 4:
1. Explain in detail about Sliding window protocol, Go-back N and selective repeat
protocol.
2. Explain in detail about three way handshaking mechanisms in TCP? Which system call
results in the sending of SYN packets?
3. Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD)
algorithm where the window size at the start of the slow start phase is 2 MSS and the
threshold at the start of the first transmission is 8 MSS. Assume that a timeout occurs
during the fifth transmission. Find the congestion window size at the end of the tenth
transmission.
4. Write short notes on congestion control in TCP.
Unit 5 :
1. In RSA, give two prime numbers, p=19,q=23 find n and Ǿ. Choose e=5 and try to find d.
such that e and d meet the criteria.
2. Explain the role of DNS on a computer network.
3. Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP
address of the HTTP server is initially unknown. What transport and application layer
protocols besides HTTP are needed in this scenario?
4. Assume that Bob uses an e-mail client (mail reader) such as Outlook to send an e-mail to
Alice who uses a Web-based e-mail account (such as Hotmail). The IP address of Alice’s
mail server is initially unknown to Bob’s mail server. List all the transport and
application layer protocols that are involved from the time when Bob sends the e-mail to
the time when Alice reads it. Clearly indicate in which part of the transfer of the e-mail
these transport/application layer protocols are used. Explain each one in detail.
5. How Domain Name Sever works? Explain in detail.
6. Explain the working of Firewalls. Discuss in detail with neat diagram.
7. Which transport layer protocol supports the following applications?
1. Real Time Multimedia
2. E-mail Explain in detail.
8. Explain the methods used in socket programming.
9. Explain the message transfer using simple mail transfer protocol.
10. Explain the final delivery of email to the end user using POP3.
11. Explain the working of Firewalls. Discuss in detail with neat diagram.