0% found this document useful (0 votes)
28 views8 pages

Computer Network Question Bank

2017 regulation computer network question bank

Uploaded by

Shruthi S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views8 pages

Computer Network Question Bank

2017 regulation computer network question bank

Uploaded by

Shruthi S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

P.S.V.

COLLEGE OF ENGINEERING AND TECHNOLOGY


KRISHNAGIRI
DEPARTMENT OF INFORMATION TECHNOLOGY
QUESTION BANK

SUBJECT : CS3591 / COMPUTER NETWORKS


SEM / YEAR: V/ III

UNIT I
PART A
S.
QUESTIONS LEVEL COMPETENCE
NO
1 Describe computer networks. BTL -1 Remember
What differentiates a computer network from other types of BTL -1 Remember
2
networks?
3 Explain why are protocols needed? BTL -5 Evaluate
4 Can you discriminate bandwidth and latency? BTL -2 Understand
5 Can you list five components of data communication? BTL -1 Remember
In what way would you analyze circuit switched and packet
6 BTL -4 Analyze
switched networks?
7 Explain the characteristics of data communication system. BTL -4 Analyze
8 Define Simplex, Half-Duplex and Full-Duplex. BTL -1 Remember
9 Discuss the different network criteria. BTL -2 Understand
10 Can you explain the relationship between period and frequency? BTL -4 Analyze
11 How would you demonstrate internet and Internet? BTL -3 Apply
12 Generalize LAN, WAN and MAN. BTL -6 Create
How would you illustrate the differences between parallel and
13 BTL -3 Apply
serial transmission?
14 Classify about types major classes of guided media. BTL -3 Apply
15 Compose five line coding schemes. BTL -6 Create
16 Describe the three types of transmission impairment. BTL -2 Understand
17 Express how the Shannon capacity have to do with communication? BTL -2 Understand
Solve How many bits of data in a transcontinental channel with a
18 BTL -5 Evaluate
one-way latency of 50ms and a bandwidth of 45Mbps can hold?
19 List four major components of a packet switch and their functions. BTL -1 Remember
PART B
Explain in detail about TCP/IP protocol suite with neat diagram?
1 BTL -1 Remember
(13)
a) Examine OSI architecture with neat diagram. (7)
2 b) Evaluate and explain about your understanding about BTL -5 Evaluate
network. (6)
3 Explain in detail about periodic analog and digitals signals. (13) BTL -3 Apply
Will you state and describe in your own words about a model for
4 BTL -2 Understand
network topologies?(13)
a) Write a note on Quadrature amplitude modulation.(7)
5 b) Based on what you learn develop a model for constellation BTL -1 Remember
diagram. (6)
a) How would you illustrate line coding schemes?(7)
6 BTL -2 Understand
A)b) Explain in detail about block coding schemes. (6)
a) Write short notes on Quality of service. (5)
7 BTL -3 Apply
b) Summarize about performance of computer network. (8)
8 Explain in detail about Multiplexing FDM, TDM and WDM. (13) BTL -5 Evaluate
a) Describe A-D conversion in detail. (7)
9 b) Describe Digital to Analog Conversion in BTL -1 Remember
detail. (6)
Explain the following encoding schemes with examples.
1
i. NRZ (4) BTL -2 Understand
0
ii. NRZI (4) iii. Manchester (5)
1 Describe the techniques to spread the bandwidth: FHSS and BTL -4 Analyze
1 DSSS. (13)
a) Discuss in detail about guided media for
1
transmission.(7) BTL -4 Analyze
2
b) Discuss in detail about unguided media for transmission.(6)
Draw the structure of switch and explain the circuit switching in
1
detail. (7) BTL -6 Create
3
Describe the different components used in packet switch.(6)
PART C
What is the bandwidth of a signal that can be decomposed into
1 five sine waves with frequencies at 0, 20, 50, 100, and 200 Hz? BTL -6 Create
All peak amplitudes are the same. Draw the bandwidth. (15)
We mentioned that two types of networks, datagram and virtual-
circuit, need a routing or switching table to find the output port
2 from which the information belonging to a destination should be BTL -4 Analyze
sent out, but a circuit switched network has no need for such a
table. Give the reason for this difference. Analyze (15)
Four channels, two with a bit rate of 200 kbps and two with a
bit rate of 150 kbps, are to be multiplexed using multiple-slot
TDM with no synchronization bits. Answer the following
questions: a. What is the size of a frame in bits?
3 BTL -5 Evaluate
b. What is the frame rate?
c. What is the duration of a frame?
d. What is the data rate?
(15)
We have a baseband channel with a 1-MHz bandwidth. What is
the data rate for this channel if we use each of the following line
4 BTL -6 Create
coding schemes? Formulate a. NRZ-L b. Manchester c. MLT-3 d.
2B1Q (15)
UNIT II
PART A
1 How will you summarize Detection versus Correction? BTL -5 Evaluate
2 Define coding schemes. BTL -1 Remember
3 Explain the basic service set (BSS) and the extended service set (ESS). BTL -1 Remember
4 Can you classify the types of Errors? BTL -4 Analyze
5 Can you explain Framing? BTL -4 Analyze
6 How would you describe access point? BTL -1 Remember
7 Differentiate Byte stuffing and Bit stuffing. BTL -2 Understand
8 Can you explain frame format of Ethernet? BTL -4 Analyze
9 Illustrate the function of hop by hop flow control. BTL -3 Apply
10 Discuss the Unicast, Multicast, and Broadcast Addresses. BTL -2 Understand
11 Give the ARP packet format for mapping IP addresses into Ethernet BTL -2 Understand
addresses.
12 Summarize the PPP packet format. BTL -5 Evaluate
13 What examples can you find to illustrate? BTL -3 Apply
14 Show your understanding about payload. BTL -3 Apply
15 How would you design? BTL -6 Create
16 Describe Media Access Control. BTL -1 Remember
18 Draw the two types of networks of Bluetooth: piconet and scatternet. BTL -6 Create
19 Define Bluetooth. BTL -1 Remember
20 Differentiate forwarding and routing. BTL -2 Understand
PART B
a) Describe about services provided by the data-link layer. (7)
1 BTL -1 Remember
b) Explain how data-link layer into two sublayers(6)
a) Define three types of addresses.(6)
2 BTL -5 Evaluate
b) Explain about ARP operation?(7)
a) Describe the algorithm to calculate an 8-bit Fletcher
3 checksum(7) BTL -2 Understand
b) Write the algorithm to calculate an Adler checksum(6)
a) Write Cyclic Redundancy Check shows an example of a CRC
4 code.(7) BTL -2 Understand
b) Explain and solve CRC division using polynomials(6)
Write the Procedure & Algorithm to calculate the traditional
5 BTL -1 Remember
checksum(13)
Describe in detail about central concepts in coding for error BTL -2 Understand
6
control. (13)
Classify in detail about High-level Data Link Control and the
7 BTL -3 Apply
types of frames. (13)
a) Explain the services Provided by PPP (7)
8 b) Define PPP. Describe the details with neat BTL -4 Analyze
diagram.(6)
Explain random-access methods ALOHA,CSMA,CSMA/CD &
9 BTL -4 Analyze
CSMA/CA. (13)
1 Describe the design procedure for Simple, Stop-and-Wait, Go-
BTL -1 Remember
0 Back-N, and Selective-Repeat.(13)
1 a) Quote the Services Provided by Telephone Networks.(7)
BTL -1 Remember
1 b) Draw and explain the architecture of a SONET system(6)
a) How would you demonstrate your understanding of problems
about Ethernet LAN? (7)
12 BTL -3 Apply
b) Explain in detail about collision avoidance in Wi Fi (802.11).
(6)
a) What is common ETHERNET implementation? Discuss about
1
the sub layer. (7) BTL -5 Evaluate
3
b) Explain and differentiate FDDI and Ethernet. (6)
1 How would you describe about Bluetooth and develop with neat
BTL -6 Create
4 sketch about its architecture? (13)
PART C
With the neat sketches, formulate and explain the working
1 BTL -6 Create
principle of CRC with an example. (15)
Consider sending a 3500-byte datagram that has arrived at a
router R1 that needs to be sent over a link that has an MTU size
of 1000 bytes to R2. Then it has to traverse a link with as MTU
2 of 600 bytes. Let the identification number of the original BTL -4 Analyze
datagram be 465. How many fragments are delivered at the
destination? Analyze the parameters associated with each of these
fragments. (15)
Summarize the size of an ARP packet when the protocol is IPv4
3 BTL -5 Evaluate
and the hardware is Ethernet? (15)
Use IEEE 802.3 and IEEE 802.11 to generalize the differences
4 BTL -6 Create
between wired and wireless LANS. (15)
UNIT III
PART A
1 Write about Forwarding and Routing. BTL -1 Remember
2 How would you describe packetizing? BTL -1 Remember
3 Can you summarize the two different classes of routing protocol? BTL -5 Evaluate
4 How would you describe distance vector routing? BTL -1 Remember
5 In what way would you rank convergence? BTL -1 Remember
6 Explain count to infinity problem. BTL -4 Analyze
7 Interpret about split horizon with poison reverse. BTL -4 Analyze
8 Define Split horizon. BTL -1 Remember
9 Discuss about RIP. BTL -2 Understand
1 Explain Link State Routing. BTL -4 Analyze
0
1 Can you discover the sketch of IPv6 Packet Header? BTL -3 Apply
1
1 Compose the OSPF header format. BTL -6 Create
2
1 Examine Reliable Flooding. BTL -3 Apply
3
1 Explain Load Balancing. BTL -3 Apply
4
1 Generalize about Switching. BTL -6 Create
5
1 Express in your own words about Line Rate. BTL -2 Understand
6
1 Can you differentiate IPv4 and IPv6? BTL -2 Understand
7
1 What examples can you find to demonstrate compute delay for the
BTL -5 Evaluate
8 packet?
1 How would you define your understanding of Multicast? BTL -1 Remember
9
2 Based on what you know, generalize the term Network Address
BTL -2 Understand
0 Translation.
PART B
a) Describe in detail about Switching and Forwarding.(7)
1 b) Describe in detail about concept of connection-oriented BTL -1 Remember
service.(6)
Explain the concept to include the role of IP addresses in BTL -5 Evaluate
2
forwarding(13)
a) How would you demonstrate the challenges in inter-domain
routing? (7)
3 BTL -3 BTL -3
b) How would you summarize the services expected from the
network layer? (6)
a) Describe in detail about RIP. (7)
4 BTL -2 BTL -2
b) Discuss about sub-netting. (6)
a) Can you discuss in detail what is happening in link state? (7)
5 BTL -1 BTL -1
b) What is internet multicasting? Explain in details.(6)
a) With a neat diagram explain distance vector routing protocol.
(7)
6 BTL -3 BTL -3
b) Demonstrate the working of Protocol Independent Multicast
(PIM) in detail. (6)
BTL -
7 Discuss Internet Control Message Protocol version 4 (13) Understand
2
a) Describe in detail about reliable flooding. (6)
9 b) Can you substitute an alternative protocol for PIM? Justify your BTL -1 BTL -1
answer. (7)
Generalize and explain about Multicast address. (7)
1
Explain the RIP algorithm with a sample example of your choice. BTL -5 BTL -5
0
(6)
1 a) Discuss the IP addressing methods. (7)
BTL -4 BTL -4
1 b) Explain about ipv6? Compare ipv4 and ipv6. (6)
1 Discuss about unicast routing algorithms (13) BTL -2 Understand
2
1 Define and describe Classfull Addressing and Classless BTL -1 Remember
3 Addressing (13)
1 Develop with example how to measure the performance of a BTL -6 Create
4 network (13)
PART C
Analyze how the protocol Independent multicast protocols scale
1 well in environments where a relative small proportion of BTL -4 Analyze
routers want to receive traffic for certain group? (15)
With the neat sketches generalize the algorithm of link state
2 BTL -6 Create
routing and explain the same. (15)
Consider hosts A and B have been assigned the same IP address
on the same Ethernet, on which ARP is used B starts up after A.
3 BTL -5 Evaluate
What will happens to A’s existing connections? Explain how’
self –ARP might help with is problem. (15)
Why subnetting is necessary? With suitable example, develop the
4 BTL -6 Create
concept of subneting in class B network. (15)
UNIT IV
PART A
1 How would you describe the header format of UDP? BTL -1 Remember
2 Discuss Process-Process communication. BTL -2 Understand
3 Summarize IP addresses versus port numbers BTL -5 Evaluate
4 What ideas can you point out that TCP is a reliable byte stream BTL -1 Remember
protocol?
5 How would you describe the header format of TCP? BTL -1 Remember
6 Can you list the three ways of handshake? BTL -1 Remember
7 Measure the performance of TCP State Transition Control. BTL -4 Analyze
8 Express nagle’s algorithm. BTL -2 Understand
9 What would you infer from the term RTT? BTL -1 Remember
1 Explain what is happening in Congestion Control. BTL -4 Analyze
0
1 Demonstrate RED. BTL -3 Apply
1
1 Develop the value or importance of Congestion Window. BTL -6 Create
2
1 Apply your understanding of AIMD. BTL -3 Apply
3
1 Discover the processes involved in Slow Start. BTL -3 Apply
4
1 Combine your opinion about integrated service. BTL -6 Create
5
1 What examples can you infer in Quality of service approaches? BTL -4 Analyze
6
1 Discuss SCTP several types of chunks? BTL -2 Understand
7
1 Based on what you know, summarize the term Differentiated BTL -5 Evaluate
8 service?
1 Can you interpret the reason behind assured forwarding? BTL -2 Understand
9
PART B
a) How would you develop the operation of TCP with neat sketch
1 on it? (7) BTL -6 Create
b) Explain in detail about sliding window protocol. (6)
a) Illustrate in detail about UDP header format with neat sketch.
(7)
2 BTL -3 Apply
b) Describe in detail about UDP message queue technique with
neat sketch. (6)
a) How would you describe UDP and TCP? (7)
3 b) Will you state or interpret in your own words about error BTL -1 Remember
control in TCP and UDP with an example? (6)
a) Explain in detail about the three way handshake protocol for
4 connection establishment in TCP. (7) BTL -4 Analyze
b) Describe in detail about reliable flooding. (6)
Explain the flow control mechanism and derive eight segments are
5 BTL -5 Evaluate
exchanged between the client and server. (13)
How is congestion controlled? Explain in detail about congestion
6 BTL -5 Evaluate
control mechanisms in transport layer. (13)
a) How would you summarize TCP congestion control like AIMD
Slow start Fast transmit and fast recovery?(7)
b) With TCPs slow start and AIMD for congestion control, show
7 BTL -2 Understand
how the window size will vary for a transmission where every
5th packet is lost. Assume an advertised window size of 50
MSS. (6)
8 Explain three versions of TCP: Taho TCP, Reno TCP, and New BTL -1 Remember
Reno TCP
9 Discuss the TCP state machines and the transition diagrams (13) BTL -2 Understand
Based on what you know, illustrate the general features of SCTP?
10 BTL -3 Apply
(13)
Summarize the services offered by SCTP to the application-layer
11 BTL -2 Understand
processes (13)
a) Explain the principles of concession control in TCP.(7)
12 b) Explain the following TCP heater and Adaptive flow BTL -4 Analyze
control.(6)
How is congestion controlled? Explain in detail about TCP’s
13 BTL -1 Remember
general policy for handling congestion. (13)
Define UDP. Discuss the operation of UDP. Explain UDP
14 BTL -1 Remember
checksum with an example. (13)
PART C
Explain the adaptive transmission mechanism and how it has
1 evolved time as the Internet community has gained more BTL -4 Analyze
experience using TCP. (15)
Generalize each field of the format of the TCP packet header.
2 Specify the justification for having variable field lengths for the BTL -6 Create
fields in the TCP header. (15)
Explain about UDP and TCP features with neat diagrammatic
3 BTL -5 Evaluate
representation. (15)
Describe with examples the three mechanisms by which congestion
4 BTL -6 Create
control is formulated in TCP. (15)
UNIT V
PART A
1 Define Hypertext and hypermedia. BTL -1 Remember
2 Can you list the five types of HTTP result codes? BTL -1 Remember
3 How would you express URL? BTL -2 Understand
4 Define Persistent and Non-persistent connections. BTL -1 Remember
5 Can you list the SMTP commands? BTL -1 Remember
6 Can you point-out the format of an e-mail? BTL -4 Analyze
7 Differentiate IMAP and POP. BTL -4 Analyze
8 Tell what would happen when you try to open a URL? BTL -1 Remember
9 Can you summarize some FTP commands? BTL -2 Understand
10 Explain some responses in FTP. BTL -4 Analyze
11 How would you discover MIME types and subtypes? BTL -3 Apply
12 How would you generalize SSH components? BTL -6 Create
13 How would you apply your understanding of namespace? BTL -3 Apply
14 What information would you use to examine the view of DNS? BTL -3 Apply
15 Develop web-based mail. BTL -6 Create
16 Describe the protocol used for e-mail security. BTL -2 Understand
17 Give name-address resolution. BTL -2 Understand
18 How would you explain the message format of SMTP? BTL -5 Evaluate
19 Tabulate security of DNS? BTL -1 Remember
20 Based on what you know, discuss DNS? BTL -2 Understand
PART B
1 Describe in detail about Traditional applications.(7) BTL -6 Create
What approach would you used to formulate network management
protocol? (6)
2 What elements would you use to demonstrate the MIME type? BTL -3 Apply
Explain in detail. (13)
3 Summarize the request message format of HTTP.(7) BTL -5 Evaluate
Summarize the response message format of HTTP.(6)
4 Describe in detail about the following in Electronic mail. BTL -1 Remember
i) Message format (5)
ii) Message transfer (4)
iii) Mail reader (4)

5 a) Summarize how SMTP transfers message from one host to BTL -5 Evaluate
another host with suitable illustration.(7)
b) Can you associate the functions performed by DNS? Give
example. (6)
6 a) Point-out the short notes on DNS. (7) BTL -4 Analyze
b) Write short notes on FTP. (6)
7 a) Discuss the advantage of DNS. (7) BTL -1 Remember
b) Write notes on URLS. (6)
8 How S-MIME provide better security for E-Mail? Discuss in BTL -2 Understand
detail. (13)
9 a) Explain Telnet in detail. (7) BTL -1 Remember
b) Illustrate the role of POP3 in electronic mail applications.
Explain
in detail. (6)
10 a) Discuss name-address resolution in detail. BTL -2 Understand
(7)
b) Discuss various types of resolution in
detail. (6)
11 a) Can you substitute an alternative protocol for IMAP? Justify BTL -2 Understand
your answer. (7)
b) Describe in detail about the WSDL in web services. (6)
12 Explain how FTP have a message format for exchanging BTL -4 Analyze
commands and responses during control connection? (13)
13 a) Describe the elements of network management in detail. BTL -1 Remember
(7)
b) Explain the operation of SNMP protocol in detail. (6)
PART C
1 Analyze the message format and the message transfer and the
underlying protocol involved in the working of the electronic mail. BTL -4 Analyze
(15)
2 Generalize how SMTP protocol is used in E-mail applications? (15) BTL -6 Create
3 Explain in detail about web service architecture. (15) BTL -5 Evaluate
4 Generalize the structure of HTTP server receives a request message
from an HTTP client, how does the server know when all headers BTL -6 Create
have arrived and the body of the message is to follow? (15)

You might also like