0% found this document useful (0 votes)
11 views10 pages

CN QB

The document is a comprehensive question bank for a Computer Networking course, organized into five units. Each unit contains a variety of questions covering topics such as network protocols, data link layer functions, routing, transport layer services, and network security principles. The questions are designed to assess understanding of key concepts and applications in computer networking.

Uploaded by

rkawadkar2025
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views10 pages

CN QB

The document is a comprehensive question bank for a Computer Networking course, organized into five units. Each unit contains a variety of questions covering topics such as network protocols, data link layer functions, routing, transport layer services, and network security principles. The questions are designed to assess understanding of key concepts and applications in computer networking.

Uploaded by

rkawadkar2025
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Unitwise Question Bank CN (UNIT-I)

S.N. Question Unit No


1 Differentiate between Service & Protocol 1
2 List Various Applications of Computer Network 1
3 Define i) Throughput ii) Delay iii) Packet loss rate iv)noise 1
4 Describe the functions of ISO-OSI reference model with diagram 1
5 Design IEEE 802.11 standared and its architecure 1
6 Discuss Cellular Network with neat diagram 1
7 compare TCP/IP and OSI reference model. 1
8 Explan Cellular Network 1
9 Explain Reliable data transfer 1
10 List advantages of Computer Network 1
11 Sketch and label any four network topologies. 1
12 Sketch and explain TCP/IP reference model 1
13 Describe components of Wireless Network. 1
14 Define Simplex , Half Duplex and Full duplex mode of data transmission. 1
15 Briefly describe the function of the network core in the Internet. 1
16 Explain why protocols are needed? 1
17 Define Computer Network and Generalize LAN, MAN, WAN 1
What is propagation delay in a packet-switched network? Also tell What is
18 1
packet loss and how does it occur?
Discuss how mobility is managed in cellular networks, focusing on the
19 1
concepts of handoff and roaming.
20 What is the purpose of mobility management in cellular networks? 1
Discuss the role of client-server architecture in the network edge and how it
21 1
differs from peer-to-peer networks.
Describe the difference between circuit switching and packet switching in the
22
network core, providing examples of where each is used.
Explain how propagation delay, transmission delay, and processing delay
23 1
affect the overall delay in packet-switched networks.
Compare and contrast the characteristics of WiFi (802.11) and cellular
24 1
networks in terms of bandwidth, range, and mobility support.

Explain the operation of the 802.11 protocol in WiFi networks and how it
25 1
manages multiple devices connecting to the same access point
Unitwise Question Bank CN (UNIT-II)
S.N. Question Unit No
1 Compute the checksum for 10011001 11111010 00100111 11100100 2
2 Compute the CRC code for data block 101100 with the divisor 1101 2
3 Summarize various functions of Data Link Layer. 2
4 Illustrate parity check method with an example. 2
5 Explain Hamming Distance with example 2
6 Describe Checksum with respect to Computer Networking. 2
7 Discuss Data Center Networking 2
8 Solve CRC code for data block 10111100 with divisor 11001 2
9 Solve CRC code for data block 101100 with divisor 1100 2
Implement CRC using the following data and finally give the received
framedata
10 2
P(X)=X7+X5+X4+ X2+X1+X0
G(X)=X5+X4+X1+X0
What are the key components of data center networking, and how do
11 2
they interact to support large-scale data processing?
12 Describe the process of encapsulation in the link layer. 2

13 What are the differences between error detection and error correction? 2
Explain how the Cyclic Redundancy Check (CRC) is used for error
14 2
detection in the link layer.
How does the Hamming code work for error correction, and what is its
15 2
limitation?
What are the key differences between Time Division Multiple Access
16 2
(TDMA) and Frequency Division Multiple Access (FDMA)?
Explain the Carrier Sense Multiple Access with Collision Detection
17 2
(CSMA/CD) protocol and its application in Ethernet networks.
What challenges are associated with wireless multiple access protocols,
18 and how does Carrier Sense Multiple Access with Collision Avoidance 2
(CSMA/CA) address them?
19 Describe the basic operation of a switch in a local area network. 2
What are the differences between a hub and a switch, and why is a switch
20 2
preferred in modern LANs?
How does VLAN (Virtual LAN) technology enhance network security and
21 2
management within a switched LAN?
Explain the concept of link virtualization and its significance in modern
22 2
networking.
How does Multiprotocol Label Switching (MPLS) facilitate link
23 2
virtualization in large-scale networks
24 What is the basic principle behind the ALOHA protocol, and how does it 2
handle data transmission
Differentiate between Pure in ALOHA
a sharedand
medium
Slotted ALOHA. How do their
25 efficiencies compare? 2

26 Explain how the concept of collision affects the performance of the 2


ALOHA protocol. What strategies does ALOHA use to manage collisions?
What is the Sliding Window Protocol, and how does it improve the
27 2
efficiency of data transmission in computer networks?
Explain the difference between Go-Back-N and Selective Repeat in the
28 2
context of the Sliding Window Protocol.
How does the size of the window in the Sliding Window Protocol impact
29 the performance of data transmission? What factors should be 2
considered when choosing the window size?

30 What role do sequence numbers play in the Sliding Window Protocol, and 2
how are they used to track the status of transmitted data packets?
Unitwise Question Bank CN (UNIT-III)
S.N. Question Unit No
1 How do you describe Access point and framming 3
2 Explain ARP packet format 3
3 Explain and solve CRC division using polynomial 3

4 write the procedure & algorithm to calculate traditional checksum 3


Describe the design procedure for Simple , stop and wait, go back
5 n, and selective repeate 3
6 Quote services provoded by telephone network 3
7 Explain following protocol ISP, BGP,ICMP 3
8 Explain following protocol ,SNMP,OSPF,SMTP 3
What is the range of Class A and Class B, IP addresses in computer
9 networking. 3
An address is given 73.22.17.25 find the number of address in the
10 block , the first address and the last address 3
11 Classify IPV4 and IPV6 with example 3
Elaborate the classification of IP address in brief . Also explain
12 Classless Addressing 3
Find net-id and host id of followinh IP address
13 i) 114.34.2.8 ii)132.56.8.6 iii)208.34.54.12 iv)251.34.98.5 3
14 Write Short note on ICMP,OSPF, 3
15 Describe the functioning of Router in Network Layer. 3
16 Classify ARP and RARP 3
What are the key functions of the network layer in the Internet
protocol stack? How does it differ from the data link and transport 3
17 layers in terms of responsibilities?
Explain the concept of packet forwarding and routing in the
context of the network layer. How do they interact to ensure data 3
18 delivery across the Internet?
Describe the key components of a router. How do these
components contribute to the process of forwarding packets in a 3
19 network?
Explain the role of the forwarding table inside a router. How is the
forwarding decision made based on the information in the 3
20 forwarding table?
Compare and contrast IPv4 and IPv6 in terms of addressing,
header structure, and overall capabilities. Why was IPv6 3
21 introduced, and what are its advantages?
Compare link-state and distance-vector routing algorithms. 3
22
What is Dijkstra’s algorithm, and how is it used to compute
shortest paths in link-state routing protocols? Provide an example 3
23 to illustrate the process.
Explain the operation of the OSPF (Open Shortest Path First)
3
24 protocol.
What is the Border Gateway Protocol (BGP), and how does it
3
25 manage inter-AS routing?
Explain the role of the Internet Control Message Protocol (ICMP).
3
How does ICMP assist in network diagnostics and error reporting,
26
What is the Simple Network Management Protocol (SNMP), and
how is it used for network management? Discuss its key 3
27 components and operations.
Unitwise Question Bank CN (UNIT-IV)
S.N. Question Unit No
1 Write application of Peer to Peer Network 4
2 Define Multiplexing and Demultiplexing 4
Explain Various transport service primitives connection-oriented
4
3 connection less network in detail
4 Distinguish between TCP and UDP 4
5 List all principles of Network Application in detail 4
6 Write Short Note on i) Video streaming ii)DNS 4
7 Explain in brief TCP congestion, 4
Explain various transport service primitives for connection less and
4
8 connection oriented networks in detail.
Explain the primary services provided by the transport layer in the
Internet protocol stack. How does the transport layer differ from the 4
9 network layer in terms of functionality?
Discuss the key differences between connection-oriented and
connectionless transport services. Provide examples of protocols that 4
10 implement each service.
What is multiplexing and demultiplexing in the context of transport-
layer services? How do they contribute to the delivery of data to the 4
11 correct application at the destination?

Explain how multiplexing is achieved in UDP and TCP. How does the 4
12 transport layer use port numbers to enable this process?

Describe the key characteristics of the User Datagram Protocol (UDP). 4


13 What are its advantages and disadvantages compared to TCP?
In what types of applications is UDP preferred over TCP? Provide
examples and explain why connectionless communication is suitable for 4
14 these applications.
What are the core principles of reliable data transfer? Discuss
mechanisms such as error detection, acknowledgments, and 4
15 retransmissions in this context.
How do flow control and error control contribute to reliable data
4
16 transfer in transport-layer protocols like TCP?
Explain the three-way handshake process used by TCP to establish a
4
17 connection.
Describe how TCP implements flow control through the sliding window
4
18 mechanism.
19 What is congestion control in TCP, and why is it necessary? 4
Discuss the difference between congestion control and flow control in
4
20 TCP.

Explain the client-server model in network applications. How does it 4


21 apply to common Internet applications like web browsing and email?
How does the Domain Name System (DNS) work? Describe the steps
4
22 involved in resolving a domain name into an IP address.
4
23 Describe the Hypertext Transfer Protocol (HTTP) and its key features.
Unitwise Question Bank CN (UNIT-V)
S.N. Question Unit No

Explain the fundamental principles of cryptography, including


5
confidentiality, integrity, and authentication. How do these principles
1 help in securing network communications?
Describe the difference between symmetric and asymmetric
cryptography. What are the advantages and disadvantages of each 5
2 approach in network security?
What is message integrity, and why is it critical in network
communications? How do digital signatures help ensure message 5
3 integrity?
4 Explain how digital signatures work. 5
5
5 What is the role of cryptographic hash functions in network security?

Explain how cryptographic hash functions are used in both message 5


6 integrity and password protection in network security.
7 Explain working of Cryptographic Hash Functions, 5
What is end-point authentication, and why is it important in secure
5
8 communications?
5
9 Discuss the mechanisms used to secure email communications.

How do firewalls and intrusion detection systems contribute to the 5


10 protection of a network from external threats?
11 Explain how IPsec ensures security at the network layer. 5
What are the security challenges associated with Wireless LANs
5
12 (WLANs)
Discuss the role of firewalls and intrusion detection systems (IDS) in
5
13 operational security.
14 Elaborate Network Security 5
15 Explain Term Cryptograpgy, Encryption, Decryption 5
16 Explain IP security architecture in detail 5
17 Explain VPN with dia ,Also Risk in VPN 5
18 Explain Messgage Integrity and digital Signatures 5
19 Discuss Firewall and Intrusion Detection System. 5
20 Explain end point Authentication. 5
21 Elaborate Substitution Cipher Technique with example. 5
22 Explain gidital signatue with its advantage and limitations 5
23 Discuss different sustitution methods used in cryptograpy. 5

You might also like