0% found this document useful (0 votes)
31 views3 pages

Important Question For Final Exam DCCN

The document outlines a series of questions related to data communication and networking, including CRC calculations, IP addressing, subnetting, network components, and protocols. It covers topics such as network performance metrics, error detection techniques, and various access protocols. Additionally, it discusses the OSI model and the functions of different layers in networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views3 pages

Important Question For Final Exam DCCN

The document outlines a series of questions related to data communication and networking, including CRC calculations, IP addressing, subnetting, network components, and protocols. It covers topics such as network performance metrics, error detection techniques, and various access protocols. Additionally, it discusses the OSI model and the functions of different layers in networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Question:

Given:

• Data: 101011

• Generator Polynomial (G): 1001


Perform the Cyclic Redundancy Check (CRC) calculation to determine the remainder (R).

For an IP address 192.168.1.10 with subnet mask 255.255.255.0:

Find Network ID and Broadcast Address

Given: Network: 192.168.1.0/24


Task: Divide the network into 4 subnets. Determine the following:
1. Number of Subnets

2. Number of Hosts per Subnet

3. Range of Each Subnet:

o Network ID

o Broadcast Address

o Usable Hosts

Data Communication and Networking Final Exam Questions

Basic Concepts:

1. What are the key components of a Data Communication system? Explain each
component in detail.

2. Discuss the major components of a Local Area Network (LAN).

3. Explain the concept of Network Topology and compare its various types (e.g., Bus,
Star, Ring, Mesh, and Hybrid).

Computer Networks:

4. Describe three key characteristics of a Computer Network.

5. Explain the three types of Data Flow (Simplex, Half-Duplex, Full-Duplex) with
examples.
6. Discuss the elements of Protocols and their significance in networking.

Addressing:

7. Compare and contrast IP Address, MAC Address, and Port Address.

Switching Techniques:
8. Explain the different types of Switching techniques used in networking.

OSI Model:

9. Briefly describe the OSI (Open Systems Interconnection) Reference Model and its
seven layers.

10. Important Question: Explain the role of the Physical Layer in networking.

11. Important Question: What are the key functions of the Data Link Layer in node-to-
node communication?

Data Link Layer:

12. What is Framing? Explain how it works, its types, and various framing approaches.

13. Discuss the HDLC (High-Level Data Link Control) Frame Format and the types of
HDLC frames.

14. Explain Bit Stuffing with an example.

15. Discuss the BISYNC (Binary Synchronous Communication Protocol).

16. Explain the DDCMP (Digital Data Communication Message Protocol).

17. Describe the Point-to-Point Protocol (PPP) and its significance in networking.
Error Detection:

18. Explain in detail the different Error Detection techniques with examples.

19. Given the example 10011001111000100010010010000100 and a checksum, explain


how error detection is performed.

20. Describe the Cyclic Redundancy Check (CRC) and how it is used for error detection.

Network Performance:

21. What are the three key metrics used to measure network performance? Explain them.

Protocols:

22. Explain the Stop-and-Wait Protocol, its working, and its major problems.

23. Describe the Go-Back-N ARQ protocol and its functionality.


24. Explain the Selective Repeat ARQ protocol in detail.
IP Addressing:

25. Discuss the five classes of IP addresses (A, B, C, D, and E) and compare them in
detail.

26. What is a Subnet Mask? Explain its purpose.

27. What is a Subnet, and why is it used in networking?

Random Access Protocols:

28. Explain the ALOHA Random Access Protocol and its two types (Pure ALOHA and
Slotted ALOHA).

29. Describe the CSMA (Carrier Sense Multiple Access) protocol and its modes.
30. Explain the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) protocol.

Controlled Access Protocols:

31. Discuss Controlled Access Protocols and their three types: Reservation, Polling, and
Token Passing.

Channelization Protocols:

32. Explain Channelization Protocols and their three types:

o FDMA (Frequency Division Multiple Access)

o TDMA (Time Division Multiple Access)

o CDMA (Code Division Multiple Access)

You might also like