Question Bank
Question Bank
Unit IV (CO-4)
1. Explain leaky bucket algorithm and compare it with token bucket algorithm. (BTL-2)
2. Sketch and explain TCP segment header. (BTL-3) (University QUESTION)
3. Compare connection oriented and connection less services. (BTL-4)
4. Discuss slow start, additive increase and multiplicative decrease with example. (BTL-2)
5. Discuss various types of TCP timers. (BTL-2) (University QUESTION)
6. Compare TCP and UDP. (BTL-4) (University QUESTION)
7. Define term silly window syndrome and discuss possible solutions to overcome its
effects. (BTL-1,2)
8. Sketch TCP state machine and explain its structure. (BTL-3)
9. Discuss TCP Congestion Control and Congestion Avoidance. (BTL-2)
10. Explain congestion and causes of congestion. (BTL-2)
11. Discuss token bucket algorithm. (BTL-2)
12. Discuss User Datagram Protocol with header format. BTL-2)
13. What is congestion and what are its causes? Explain Token bucket algorithm for
congestion control. (BTL-1,2) (University QUESTION)
14. Explain client-server communication architecture. (BTL-2) (University QUESTION)
15. Why do HTTP, FTP, SMTP and POP3 run on top of TCP rather than on UDP? Give
reason. (BTL-4) (University QUESTION)
16. Explain the TCP connection establishment with relevant diagram. (BTL-2) (University
QUESTION)
17. Compare TCP header and UDP header. List the fields in the TCP header that are missing
from UDP header. Give reason for their absence. (BTL-2,4)
18. What is difference between open-loop congestion control and closed-loop congestion
control? (BTL-2)
19. What is traffic shaping? Name two methods to shape traffic. (BTL-1)
Unit V (CO-5)
1. Consider five source symbols of a discrete memory less source their probabilities as
shown. Follow the Huffman's algorithm to find the code words for each message: (BTL-
3) (University QUESTION)
m1 m2 m3 m4 m5
0.4 0.2 0.2 0.1 0.1
2. What is compression? List different compression algorithms. Why adaptive Huffman is
used? (BTL-1)
3. Explain LZW compression algorithm with example. (BTL-2)
4. Discuss image compression. (BTL-2)
5. What is remote login? How does it work? Compare Telnet and SSH (BTL-1,4)
6. Describe lossy compression methods. Where we used lossy compression algorithms?
(BTL-1) (University QUESTION)
7. Describe Huffman encoding procedure with example. (BTL-1)
8. Explain the non-persistent and persistent connections in HTTP. (BTL-2)
9. Show the different types of Multiplexing techniques. (BTL-3)
10. Explain in brief about application layer. (BTL-2)
11. State the problems and applications of client server paradigm. (BTL-1)
12. State the merits, demerits and application of P2P paradigm. (BTL-1)
13. What is FTP? Explain the communication in FTP. (BTL-1)
14. What is domain name system? How does it work? Explain resolution process. (BTL-1)
15. Construct Huffman code for the given symbols {x1, x2…x8} with probabilities P(x)=
{0.07, 0.08, 0.04, 0.26, 0.14, 0.09, 0.07, 0.25}. Find the coding efficiency. (BTL-6)
(University QUESTION)
16. Use RLE method of compression to compress the following data:
Data: AAAACCBBBDDDDDEFF (BTL-3,6) (University QUESTION)
Unit VI (CO-6)
1. How could you apply VLANs to improve network security in a large organization?
2. How could you use VLANs to optimize network performance by reducing broadcast
traffic?
3. How do you determine the appropriate network topology for an organization's needs,
such as a bus, star, mesh, or hybrid topology?
4. Can you apply VPN technology to provide remote access to corporate resources for
employees working from home?
5. Can you design a VLAN configuration that separates different departments in an
organization and allows them to communicate with each other?
6. How could you configure a VPN to secure communication between two branch offices of
an organization over the Internet?
7. How could you use VPNs to allow users to access resources located in a different
geographic region with secure and private communication?