CS8591-CN Question Bank
CS8591-CN Question Bank
net
PART – A (2 Marks)
(N/D11 – R08)
Data communication is defined as the exchange of data between two devices via some form of
transmission medium in whatever form that is agreed upon by the parties creating and using the data.
2. What are the three criteria necessary for an effective and efficient network?
The three criteria necessary for the effective and efficient networks are
a. Performance
b. Reliability
c. Security
3. What are the fundamental characteristics that determine the effectiveness of the data communication
system?
The fundamental characteristics that determines the effectiveness of data communication system are
a. Delivery
b. Accuracy
c. Timeliness
d. Jitter
www.AUNewsBlog.net
6. For an ‘n’ device in a network, what is the number of cable links required for a mesh and ring topology?
www.AUNewsBlog.net
The link required for the number of cables for a mesh and ring topologies are Mesh topology: n (n-1)/2
(Duplex), n (n-1) (Simplex)
Ring Topology: n
7. What are the five important component of the data communication? (or) Name the various components of
data communication system. (N/D – 10 R09 MCA)
The five important components of the data communication are
a. Message
b. Sender
c. Receiver
d. Transmission Medium
e. Protocol
12. Assume 6 devices are arranged in the mesh topology. How many cables are needed? How many ports
are needed for each device?
The number of device: 6 Topology used: Mesh
www.AUNewsBlog.net
13. Define – Link www.AUNewsBlog.net
Link is a physical medium that transfers data from one device to another
14. List the types of Link. (N/D – 10 R08)(or) What are the two types of line configuration?
(N/D – 10 R08)
The types of link or line configuration are
a. Point to Point
i. Dedicated link between two devices
ii. Capacity reserved for two nodes
b. Multipoint (or) multidrop
i. More than two devices connected
ii. Link and Capacity shared either spatially or temporally
17. What are headers and trailers and how do they get removed?
Each layer in sending machine adds its own information to the message it receives from the layer just
above it and passes the whole packages to the layer just below it. This information is added in the form of
headers or trailers. Headers are added to the message at the layers 6, 5, 4, 3, 2. Trailers are added in
the layer 2. At the receiving machine, the headers or trailers attached to the data unit corresponding to
the sending layers are removed and appropriate actions are taken at the receiving layers.
18. The transport layer creates a communication between the source and destination. What are the three
events involved in the connection?
The three events involved in connection between the source and destination are
a. Connection Establishment
b. Data Transfer
c. Connection Release
19. What are the modes for propagating light along optical channels?
There are two modes for propagating light along optical channels, multimode and single mode.
Multimode: Multiple beams from a light source move through the core in different paths. Single mode:
Fiber with extremely small diameter that limits beams to a few angles, resulting in an almost horizontal
beam.
www.AUNewsBlog.net
www.AUNewsBlog.net
www.AUNewsBlog.net
PART – B (16 Marks)
www.AUNewsBlog.net
1. Explain in detail, the OSI-ISO reference model of a computer with neat diagram. (16)
(M-11)(N-12)(N-11)
2. Explain the TCP/IP reference model with neat sketch. (16) (M-13)
3. Explain the different types of switching networks and list out its advantages and disadvantages. (16)
(N-12)
4. Explain the four basic network topologies and explain with its relevant features. (16)
(N-10)
5. Distinguish between point-to-point links and multi-point links with relevant diagram. (16)
6. i) Compare connection oriented service with connection less service. (8)
ii) Compare the performance of TCP/IP (Internet model) with ISO/OSI reference model.
(8) (M-11)(M-15)
7. i) Differentiate guided media from unguided media. (8)
ii) How is cable TV used for data transfer? Explain in detail. (8)
8. What are the different types of transmission media available? Explain the various standards of guided
and unguided media. (16) (N-14 MCA)
www.AUNewsBlog.net
UNIT –www.AUNewsBlog.net
II : MEDIA ACCESS & INTERNETWORKING
PART – A (2 Marks)
a. When an error is discovered, the receiver can have the sender to retransmit the entire data
unit.
b. A receiver can use an error correcting code, which automatically corrects certain error.
5. What is a buffer?
Buffer is a device which has a block of memory, reserved for storing incoming data until they are
processed.
The Ethernet is said to be I-persistent protocol because a station with a frame to send transmits with
probability 1 whenever a busy line goes idle.
15. What are the differences between fast Ethernet and gigabit Ethernet? (M/J – 12 R08)
Fast Ethernet Gigabit Ethernet
Fast Ethernet is an improvement of Ethernet, which Gigabit Ethernet Network is an upgrade on Fast
provides 100Mbps speed Ethernet. Gigabit Ethernet provides 1000Mbps
transmission in full-duplex and half-duplex.
Speed improvement over Ethernet is achieved by Although Gigabit Ethernet uses the same CSMA/CD
reducing the bit time (time taken to transmit one bit) and Ethernet framing format, it shows significant
to 0.01 microseconds differences like slot time.
The physical media specifications are100Base-T4, The physical media specifications are 1000Base-
100Base-TX, 100Base-FX. www.AUNewsBlog.net 1000Base-LX, 1000Base-CX, 1000Base-T.SX
www.AUNewsBlog.net
29. List the most common kinds of Base Band in 802.3 LAN.
The common kinds of base band for 802.3 LAN are
a. 10 Base 5
b. 10 Base 2
c. 10 Base T
d. 1 Base 5
e. 100 Base T
www.AUNewsBlog.net
31. Name any two standards/specifications for 802.11 wireless LAN.
www.AUNewsBlog.net (N/D – 10 R08 MCA)
The standards/specifications for 802.11 wireless LAN are
a. 802.11 FHSS - 2.4 GHz, FSK, 1 and 2 Mbps
b. 802.11 DSSS- 2.4 GHz, PSK, 1 and 2 Mbps
c. 802.11 Infrared – PPM, 1 and 2 Mbps
d. 802.11a OFDM - 5.725 GHz, PSK or QAM, 6 to 54 Mbps
e. 802.l1b DSSS 2.4 GHz, PSK, 5.5 and 11 Mbps
f. 802.1Ig OFDM 2.4 GHz, Different, 22 and 54 Mbps
35. What are the functions of bridges? (N/D – 10 R08 )(N/D – 11 R08) or What is meant by bridge?(N/D–11 R08 )
A bridge is a device that can connect segments of a network. A bridge operates in both the physical
and the data link layer. The functions of bridges are:
a. As a physical layer device, it regenerates the signal it receives.
b. As a data link layer device, the bridge check the physical (MAC) addresses (source and
destination) contained in the frame.
www.AUNewsBlog.net
37. What is a protocol data unit? www.AUNewsBlog.net
The data unit in the LLC level is called as Protocol Data Unit. It contains four fields. Those four fields
are
a. Destination Service Point Address (DSAP)
b. Source Service Access Point (SSAP)
c. Control Field
d. Information Field
e. DSAP SSAP Control Information
www.AUNewsBlog.net
PART – B (16 Marks)
www.AUNewsBlog.net
3. Explain the flow and error control mechanisms in data link control. (16) (N-11)
4. i) Explain the stop and wait protocol with a neat diagram. (8) (M-13)
ii) Write short notes on Bluetooth technology. (8) (N-11)
5. i) Compare the dore rakes of standard Ethernet, fast Ethernet, Gigabit Ethernet and Ten-
Gigabit Ethernet. (6) (M-13)
ii) Explain piconet and scatter net with diagrams. (10) (M-13)
6. Explain the architecture and layers of ATM. (16) (N-12)
7. Explain the architecture of a frame relay network with a neat sketch.(16) (M-13)
www.AUNewsBlog.net
UNIT - III : ROUTING
www.AUNewsBlog.net
PART – A (2 Marks)
2. State the goals of Network layer (Or) What are the responsibilities of the network lay (N/D – 10 R08 MCA)
The Network Layer is responsible for the source to destination delivery of packet across multiple
network links. The specific responsibilities of network layer includes
a. Logical Addressing
b. Routing
www.AUNewsBlog.net
8. What are the two types of implementation formats in virtual circuits?
www.AUNewsBlog.net
The two types of implementation formats in virtual circuits are
a. Switched Virtual Circuit
b. Permanent Virtual Circuit
9. What is a router? (Or) What is the function or role of a router? (M/J – 12 R08)
A router is a three layer device that routes packets based on their logical addresses i.e. host to host
addressing. A router normally connects LANs and WANs in the internet and has a routing table that is
used for making decisions about the route.
The function of a router is to
a. Find a path between nodes in a network
b. Route the packets across the path to their final destination
c. router that connects to the internet uses one private address and one global address.
17. Write the keys to understand the link state routing. (N/D11 – R08)
The keys for understanding algorithm are:
a. Knowledge about the whole networks.
b. Routing to all neighbours.
c. Information sharing where there is a change.
d. The shortest route is the route with minimum cost metric.
18. How is the packet cost referred in distance vector and link state routing?
In distance vector routing, cost refer to the hop count while in the case of link state routing, cost is a
weighted value based on a variety of factors such as security levels, traffic or the state of link.
www.AUNewsBlog.net
PART – B (16 Marks)
www.AUNewsBlog.net
www.AUNewsBlog.net
UNIT - IV : TRANSPORT LAYER
www.AUNewsBlog.net
PART – A (2 Marks)
3. What are the four aspects related to the reliable delivery of data?
The four aspects related to the reliable delivery of the data are
a. Error control
b. Sequence control
c. Loss control
d. Duplication control
6. What are the advantages of using UDP over TCP? (N/D – 10 R08 )
The advantages of using UDP over TCP are
a. UDP is a very simple protocol using a minimum overhead.
b. UDP is used to send a small message without reliability.
c. UDP has less interaction between the sender and receiver while sending small messages,
than using TCP or SCTP.
www.AUNewsBlog.net
7. What is TCP? www.AUNewsBlog.net (N/D – 11 R08 )
TCP is a connection-oriented, reliable protocol. It creates a virtual connection between two TCP’s to
send data. TCP uses flow and error control mechanisms at the transport level.
8. List the services of TCP from the application program point of view. (N/D – 10 MCA)
The services of TCP from the application program point of view are
a. Process-to-process communication
b. Stream delivery service
c. Sending and receiving buffers
d. Segments
e. Full-duplex communication
9. What is segmentation?
When the size of the data unit received from the upper layer is too long for the network layer datagram
or data link layer frame to handle, the transport protocol divides it into smaller usable blocks. The dividing
process is called segmentation.
13. The transport layer creates the connection between source and destination. What are the three events
involved in the connection?
The three events involved in the connection are
a. Connection establishment
b. Data transfer
c. Connection release
www.AUNewsBlog.net
15. What is meant by congestion? (Or) Define – Congestion
www.AUNewsBlog.net (N/D – 11 R08 EEE)(N/D – 11 R08 )
Congestion is the blockage in the network which reduces the throughput. Congestion in a network
occurs if load on the network is greater than the capacity of the network.
21. Name the parameters of Quality of Service (QoS) in a network. (M/J – 12 R08)
The parameters of Quality of Service (QoS) in a network are
a. Reliability
b. Delay
c. Jitter
d. Bandwidth
www.AUNewsBlog.net
23. What is queuing? www.AUNewsBlog.net (N/D – 11 R08 EEE)
Packets from different flows arrive at a switch or router for processing. The routers and switches have
queues (buffers) that hold the packets before and after processing. The scheduling method of processing
the packets waiting in a queue is called as queuing.
Three types of queuing are FIFO queuing, priority queuing, and weighted fair queuing.
24. What are the techniques used to improve QOS in process-to-process delivery? (A/M – 11 R08)
The techniques used to improve QOS are
a. Scheduling
b. Traffic shaping
c. Admission control
d. Resource reservation
www.AUNewsBlog.net
PART – B (16 Marks)
www.AUNewsBlog.net
1. Explain the segment formats for TCP and UDP. (16) (N-12)
2. How is connection established and released in TCP? Explain with neat sketch. (8)
(M-13) (M-12)
3. Explain the congestion control mechanism and transmission control protocol with neat sketches. (16)
(N-11) (N-12) (M-12)
4. Explain in detail, the TCP congestion avoidance algorithm. (8) (N-11) (N-11)
5. Explain the default timer mechanism followed in TCP. (8) (M-13)
6. Explain the leaky bucket and token bucket algorithm with flow charts. (8) (N-11)
7. Explain in detail the techniques to improve QOS. (8) (N-11)
8. Explain in detail the user datagram protocol (UDP) in detail. (8) (N-12)
9. Explain in detail, the transmission control protocol. (8) (N-13)
10. Explain the following characteristics (4x4 = 16) (M-14)
i) Reliability
ii) Delay
iii) Jitter
iv) Bandwidth.
www.AUNewsBlog.net
www.AUNewsBlog.net
UNIT - V : APPLICATION LAYER
PART – A (2 Marks)
1. What is the purpose of Domain Name System? (Or)State the role of DNS. (M/J – 12 R08)
Domain Name System maps a name to an address (IP address) and conversely an address to name.
8. What are the functionalities of TELNET? (N/D – 11 MCA) (Or)Name the function of TELNET.
(N/D – 10 MCA)
TELNET enables the establishment of a connection to a remote system in such a way that the local
terminal appears to be a terminal at the remote system.
www.AUNewsBlog.net
9. State the purpose of SNMP. www.AUNewsBlog.net (N/D – 11 R08 )
Simple Network Management Protocol (SNMP) is a framework used for managing devices in an
internet using the TCP/IP protocol suite. It provides a set of fundamental operations for monitoring and
maintaining an internet.
10. Why is POP3 or IMAP4 needed for E-mail? (A/M – 11 R08)
POP3 or IMAP4 is a client-server protocol. POP3 or IMAP4 for E-mail is needed by the client to pull
messages i.e. retrieve messages from the server. The direction of the bulk data is from the server to the
client. The POP3 or IMAP4 are message access agent protocols.
12. What are the three main division of the domain name space? (N/D – 12 R08)
Three main division of the domain name space are generic domains, country domains and inverse
domain.
a. Generic domain: Define registered hosts according to their generic behaviour, uses generic
suffixes.
b. Country domain: Uses two characters to identify a country as the last suffix.
c. Inverse domain: Finds the domain name given the IP address.
14. What is the difference between a user agent (UA) and a mail transfer agent (MTA)?
The UA prepares the message, creates the envelope, and puts the message in the envelope. The MTA
transfers the mail across the Internet.
www.AUNewsBlog.net
17. What is the purpose of HTML? www.AUNewsBlog.net
HTML (Hyper Text Markup Language) is a computer language for creating web pages. It specifies the
contents and format of a web document. It allows additional text to include codes that define fonts,
layouts, embedded graphics and hypertext links.
20. How is a secret key (symmetric) different from public key? (N/D – 12 R08)
In secret (symmetric) key, the same key is used by both parties. The sender uses this key and an
encryption algorithm to encrypt data. The receiver uses the same key and the corresponding decryption
algorithm to decrypt the data.
In public key, there are two keys, a private key and a public key. The private key is kept by the receiver.
The public key is announced to the public.
www.AUNewsBlog.net
PART – B (16 Marks)
www.AUNewsBlog.net
6. Explain the concept of cryptography, the symmetric key and public key algorithms. (16)
(N-11) (N-12)
7. Explain digital signature in detail.(8) (M-12)
8. Draw the architecture of WWW and explain in detail the various blocks. (16) (M-13)
9. Explain the public key encryption technique With a block diagram.(8) (M-13)
10. Explain the private key cryptosystem with an example. (8) (M-14)
11. Explain the RSA algorithm with an example. (8) (M-15)
www.AUNewsBlog.net