Module-1
Short
1. In a digital transmission, the sender clock is 0.2 percent faster than the receiver clock.
How many extra bits per second does the sender send if the data rate is 1 Mbps?
2. A signal has four data levels with a pulse duration of 1 ms. calculate the pulse rate and
bit rate
3. Define a DC component and its effect on digital transmission.
4. Suppose a computer sends a packet at the transport layer to another computer
somewhere in the Internet. There is no process with the destination port address
running at the destination computer. What will happen?
5. What is the maximum number of characters or symbols that can be represented by
Unicode?
6. If the data link layer can detect errors between hops, why do you think we need another
checking mechanism at the transport layer?
7. A periodic signal has a bandwidth of 20 Hz. The highest frequency is 60 Hz. What is
the lowest frequency? Draw the spectrum if the signal contains all frequencies of the
same amplitude.
8. The period of a signal is 100 ms. What is its frequency in kilohertz?
9. In a noiseless channel with a bandwidth of 9000 hz transmitting a signal with two signal
levels. Calculate the bit rate?
10. If the bandwidth of the channel is 5 Kbps, how long does it take to send a frame of
100,000 bits out of this device?
11. For 5 devices in a network, what is the number of cable links required for a mesh and
star topology?
12. A digital signal has 9 levels. How many bits are needed per level?
13. If a periodic signal is decomposed into five sine waves with frequencies of 100, 300,
500, 700, and 900 Hz, what is its bandwidth?
Medium
1. A signal travels from point A to point B. At point A, the signal power is 250 W. At
point B, the power is 150 W. What is the attenuation in decibels?
2. We have a channel with a 1-MHz bandwidth. The SNR for this channel is 63. What are
the appropriate bit rate and signal level?
3. Show the Differential Manchester encoding for the bit pattern given
below.
(i) 01001100
(ii) 10110011
4. Draw the encoded signal for the NRZ-L and NRZ-I Scheme of the following bits;
1101101001
5. The given digital signal is encoded using NRZ-Invert. What is digital data? Assume the
first bit is 0.
14.
Match the following to one or more layers of the OSI model:
a. Reliable process-to-process message delivery
b. Route selection
c. Defines frames
d. Provides user services such as e-mail and file transfer
e. Transmission of bit stream across the physical medium
Long
1. low-pass signal is sampled with a bandwidth of 400 kHz using 1024 levels of
quantization.
a. Calculate the bit rate of the digitized signal.
b. Calculate the SNRdB for this signal.
c. Calculate the PCM bandwidth of this signal.
2. What is the role of Network layer and Datalink layer in OSI Reference Model? Why
IP in Network layer is purposely made connection less and why?
3. Explain the TCP/IP model with suitable diagram and discuss the function of each layer.
4. Draw the resulting signal using the B8ZS scrambling technique on the bit sequence
111000000000010101. Show the violations in the Bi-polar AMI scheme
5. Why does a datagram network need only end-to-end addressing during the data transfer
phase, but no addressing during the setup and teardown phases? Why does a virtual-
circuit network need addresses during all three phases?
6. What is the need for Analog-to-Analog modulation? Describe all the possible
modulation techniques?
7. A periodic signal is decomposed into five sign waves with frequencies of 100, 300,
500, 700 and 900 Hz. What is the bandwidth of signal? Draw the spectrum assuming
all components have a maximum amplitude of 10 volts.
8. Explain the Frequency Division Multiplexing technique. How does it differ from Time
Division Multiplexing?
9. Consider a source computer (S) transmitting a file of size 106 bits to a destination
computer (D) over a network of two routers (R1and R2) and three links (L1,L2, and
L3). L1 connects S to R1; L2 connects R1 to R2; and L3 connects R2 to D. Let each
link be of length 100 km. Assume signals travel over each link at a speed of 108 meters
per second. Assume that the link bandwidth on each link is 1 Mbps. Let the file be
broken down into 1000 packets each of size 1000 bits. Find the total sum of
transmission and propagation time for transmitting the file from S to D?
10. For each of the following four networks, discuss the consequences if a connection fails.
a. Five devices arranged in a mesh topology
b. Five devices arranged in a star topology (not counting the hub)
c. Five devices arranged in a bus topology
d. Five devices arranged in a ring topology
11. We need to download text documents at the rate of 100 pages per second. Each page
contains an average of 24 lines with 80 Unicode characters. What is the required bit
rate of the channel?
12. A nonperiodic composite signal has a bandwidth of 200 kHz, with a middle frequency
of 140 kHz and peak amplitude of 20 V. The two extreme frequencies have an
amplitude of 0. Draw the frequency domain of the signal.
Module-2
Short
1. What is the sender and receiver window size of STOP-and-WAIT ARQ protocol?
2. Using 5-bit sequence numbers, what is the maximum size of the sender and receiver
windows for Go-Back-N ARQ protocol.
3. Explain the reason for moving from the Stop-and-Wait ARQ Protocol to the Go-Back-
N ARQ Protocol.
4. Define piggybacking and its usefulness.
5. what are the 2 major drawbacks of 2-Dimentional parity check mechanism?
6. What is the codeword for a 6-bit dataword 101101, if simple parity check (even-parity)
error detection technique is applied?
7. What is bit stuffing? Bit stuff the following data:
←0001111101111110011
Medium
1. Difference between CSMA and CSMA/CD.
2. The timer of a system using the Stop-and-Wait ARQ Protocol has a time-out of 6 ms.
Draw the flow diagram for four frames if the round trip delay is 4 ms. Assume that, if
the first frame (frame 0) is lost.
3. Explain the flow operation of STOP-WAIT ARQ protocol to handle the lost frame and
acknowledgement with suitable diagram.
4. Suppose that a message 1001 1100 1010 0011 is transmitted using Internet
Checksum(4-bit word). What is the value of the checksum?
Long
1. Given an account of the frame format of I-frame and S-frame in HDLC protocol,
describing the function of each field.
2. Describe the Stop-and-Wait flow control mechanism. How does it work, and what are
its advantages and limitations in ensuring reliable data transfer
3. Compare and contrast CSMA, CSMA/CD, and CSMA/CA. Discuss the advantages,
disadvantages, and typical use cases of each protocol in different network
environments.
4. Discuss the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
protocol. How does it differ from CSMA/CD in handling collisions and ensuring
channel access?
5. Explain the working flow of CSMA/CD and CSMA/CA protocols with flow chart.
6. What is CSMA/CD (Carrier Sense Multiple Access with Collision Detection)?
Describe the working of CSMA/CD and explain how collision detection is managed.
7. Explain the concept of multiplexing in communication systems. Describe the key
differences between Time Division Multiplexing (TDM) and Frequency Division
Multiplexing (FDM). Provide detailed explanations of how each technique works, their
advantages, and the types of applications they are used for.
8. Define channelization and explain three protocols in this category with suitable
example.
9. Compare and contrast the Go-Back-N ARQ Protocol with Selective-Repeat ARQ
Protocol.
10. A channel has a bit rate of 4 kbps and one-way propagation delay of 20 ms. The channel
uses stop and wait protocol. The transmission time of the acknowledgement frame is
negligible. To get a channel efficiency of at least 50%, what should be the minimum
frame size.
11. Derive the expression for Utilization and Throughput for Stop and Wait ARQ protocol.
Using this calculate the Utilization and Throughput for the system having bandwidth
of 1.2 Mbps, packet size is 1 KB and round-trip time is 50 ms.
12. For a Hamming code, we need a dataword of at least 7 bits. Calculate the values of k
and n that satisfy this requirement.
13. Calculate the 8 bit checksum for the data unit 10011001111000100010010010000100 .
14. Consider the message M= 1010001101, find the cyclic redundancy check (CRC) for
this message using divisor polynomial x5+x4+x2+1
15. Consider the cyclic redundancy check (CRC) based error detecting scheme having
the generator polynomial X3+X+1. Suppose the message m4m3m2m1m0 = 11000 is to
be transmitted. Check bits c2c1c0 are appended at the end of the message by the
transmitter using the CRC scheme. The transmitted bit string is denoted by
m4m3m2m1m0c2c1c0. Calculate the value of the check bits sequence c2c1c0.
16. Given a remainder of 111 for the data unit of 10110011 and a divisor of 1001, is there
an error in the data unit?
Module-3
Short
1. How can you find the first IP, last IP and number of nodes in a network, if the mask is
given as a 32-bit IP sequence?
2. What are the range of private Ips for class A and class B?
3. The value of HLEN in an IPv4 datagram is 7. How many option bytes are present?
4. Given a fragmented datagram (in IPv4) with an offset of 120, how can you
determine the first and last byte numbers?
5. Expand the address 0:15::1:12:1213 to its original.
6. In a block of addresses, we know the IP address of one host is 182.44.82.16/26. What
are the first address (network address) and the last address in this block?
7. An IPv4 packet has arrived with the first 8 bits as shown: 01000010, The receiver
discards the packet. Why?
8. Show the original (unabbreviated) form of the following IPv6 addresses.
i) 0: 1234::3
ii) 0::0
Medium
1. Find the range of addresses in the following blocks.
a. 123.56.77.32/29
b. 200.17.21.128/27
c. 17.34.16.0/23
2. Write the following masks in slash notation (/n).
a. 255.255.255.0
b. 255.0.0.0
c. 255.255.224.0
3. In a block of addresses, we know the IP address of one host is 182.44.82.16/26. What
are the first address (network address) and the last address in this block?
4. Suppose a router receives an IP packet containing 600 data bytes and has to forward
the packet to a network with maximum transmission unit(MTU) of 200 bytes. Assume
that IP header is 20 bytes long. What are fragment offset values for divided packets?
5. What is a mask in IPv4 addressing? What is a default mask in IPv4 addressing?
6. Why RIP uses UDP instead of TCP?
7. A packet has arrived in which the offset value is 100, the value of HLEN is 5, and the
value of the total length field is 100. What are the numbers of the first byte and the last
byte?
Long
1. Differentiate between Link state routing and Distance vector routing.
2. Explain the working of link state and distance vector routing protocol with suitable
example.
3. Explain IPv4 datagram header format and importance of each field with suitable
diagram.
4. An ISP is granted a block of addresses starting with 190.100.0.0/16. The ISP needs to
distribute these addresses to three groups of customers as follows:
1. The first group has 64 customers; each need 256 addresses.
2. The second group has 128 customers; each need 128 addresses.
3. The third group has 128 customers; each need 64 addresses.
5. Design the subblocks and give the slash notation for each subblock. Find out how many
addresses are still available after these allocations.
6. An organization is granted a block of addresses with the beginning address
14.24.74.0/24. The organization needs to have 3 subblocks of addresses to use in its
three subnets: one subblock of 10 addresses, one subblock of 60 addresses, and one
subblock of 120 addresses. Design the subblock and allocate the address for each
subblock.
7. An ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP wants to
distribute these blocks to 2600 customers as follows.
a. The first group has 200 medium-size businesses; each need 128 addresses.
b. The second group has 400 small businesses; each need 16 addresses.
c. The third group has 2000 households; each need 4 addresses.
Design the subblocks and give the slash notation for each subblock. Find out
how many addresses are still available after these allocations.
8. An organization is granted the block 16.0.0.0/8. The administrator wants to create 500
fixed-length subnets.
a. Find the subnet mask.
b. Find the number of addresses in each subnet.
c. Find the first and last addresses in subnet 1.
d. Find the first and last addresses in subnet 500.
9. Generate the shortest path tree for the given topology using the link-state routing
protocol, taking E as the root node.
Module-4
Short
1. Define a Socket? What role does it play in data delivery across multiple networks?
2. What is the significance of "Sequence number" and "Acknowledgement number" field
in a TCP segment.
3. In TCP, if the value of HLEN is 0111, how many bytes of option is included in the
segment?
4. TCP connection is transferring a file of 5000 bytes. The first byte is numbered 1O,001.
What are the sequence numbers for each segment if data are sent in five segments, each
carrying 1000 bytes?
5. list the flag used in TCP header?
6. The transport layer creates the connection between source and destination. What are the
three events involved in the connection?
7. What ideas can you point out that TCP is a reliable byte stream protocol?
8. The part of TCP header dump (contents) iis given n hexadecimal format; E293 0017
00000001 00000000 5002 07FF. What is the destination port number?
9. Given a DUMP of a UDP header in hexadecimal format 06 32 00 0D 00 1C E2 17. Find
the Length of user datagram?
10. What are the types of port numbers used in transport layer?
11. What are the four aspects related to the reliable delivery of data?
12. What is the difference between network layer delivery and the transport layer delivery?
Medium
1. The following is a dump of a UDP header in hexadecimal format.
0632000D001CE217
a. What is the source port number?
b. What is the destination port number?
c. What is the total length of the user datagram?
d. What is the length of the data?
2. Differentiate among UDP and TCP.
3. Explain the TCP connection management with suitable example.
4. What is UDP? What is maximum and minimum size of a UDP datagram. Also discuss
the use of UDP.
5. Explain in detail about the three-way handshake protocol for connection establishment
in TCP.
6. What are the three numbering systems adopted by TCP to track a segment?
Long
1. Compare the TCP header and the UDP header. List the fields in the TCP header that
are missing from UDP header.
2. What are the services provided by the UDP and explain the header format of UDP with
significance of each field.
3. What role does ICMP plays for an IP packet? What are the various types of ICMP
packets that are sent back to the sender?
4. What are services provided by UDP? The following is the content of a UDP header in
hexadecimal format. CB84000D001C001C
a. What is the source port number?
b. What is the destination port number?
c. What is the total length of the user datagram?
d. What is the length of the data?
e. Is the packet directed from a client to a server or vice versa?
f. What is the client process?
5. The following is the content of a TCP header in hexadecimal format.
04720017 00000001 00001000 400207FF 0000000F
a. What is the source port number?
b. What is the destination port number?
c. What the sequence number?
d. What is the acknowledgment number?
e. What is the length of the header?
f. What is the type of the segment?
g. What is the window size?
6. Briefly explain the "Three-way handshaking" process in a TCP connection.
7. What are the services provided by the TCP and explain the header format of TCP with
significance of each field.
Module-5
Short
1. Identify the correct order in which the following actions take place in an interaction
between a web browser and a web server.
a. The web browser requests a webpage using HTTP.
b. The web browser establishes a TCP connection with the webserver.
c. The web server sends the requested webpage using HTTP.
d. The web browser resolves the domain name using DNS.
2. Consider different activities related to email:
m1: Send an email from a email client to an email server
m2: Download an email from mailbox server to a email client
m3: Checking email in a web browser
What are the application-layer protocols used in each activity?
3. What are the three FTP transmission modes?
4. What is an advantage of a hierarchical name space over a flat name space for a system
the size of the Internet?
5. Determine which of the following is an FQDN and which is a PQDN.
a. mil.
b. edu.
c. xxx.yyy.net
d. zzz.yyy.xxx.edu
6. What is an advantage of a hierarchical name space over a flat name space for a
system the size of the Internet?
7. Determine which of the following is an FQDN and which is a PQDN.
a. xxx.yyy.net
b. zzz.yyy.xxx.edu
8. If a DNS domain name is voyager.fhda.edu, how many labels are involved here? How
many levels of hierarchy?
9. If a DNS domain name is voyager.fhda.edu, how many labels are involved here? How
many levels of hierarchy?
Medium
1. What is a proxy server and how is it related to HTTP?
2. What is the difference between an active document and a dynamic document?
3. Briefly explain the functions of FTP? What are the default port numbers used by FTP?
4. Explain the Multipurpose Internet Mail Extension (MIME). How does MIME enhance
SMTP.
5. Explain how SMTP can handle transfer of videos and images? Also, explain the
advantages of IMAP4 over POP3 mail access protocols.
6. Why is an application such as POP needed for electronic messaging?
7. How does MIME enhance SMTP?
8. What is domain space? Explain different domain space with suitable example
Long
1. With the help of a diagram, explain the working of HTTP request and response from a
Client-Server communication perspective. Why HTTP is a stateless protocol?
2. Explain the architecture of the Domain Name System (DNS) to map the domain name
to IP -address using the recursive method.
3. Explain the Email communication architecture using POP3 and IMAP with a suitable
diagram.
4. Explain how does e-mail reaches to destination. Explain in brief SMTP emphasizing
the role and function of User Agent (UA) and Mail Transfer Agent (MTA).
5. Explain the email communication architecture, When the sender and the receiver of an
e-mail are on different mail servers.
6. Explain the working of electronic mail. How SMTP used in email applications