0% found this document useful (0 votes)
6 views13 pages

Communication Networks QB

The document is a question bank for the V Semester course 'Communication Networks' at SRM Valliammai Engineering College, detailing various topics related to data communications, network protocols, and error detection techniques. It includes questions categorized into Part A, Part B, and Part C, covering fundamentals, media access, logical addressing, and routing. The questions are designed to assess students' understanding and application of communication network concepts as per the 2019 regulation for the academic year 2024-2025.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views13 pages

Communication Networks QB

The document is a question bank for the V Semester course 'Communication Networks' at SRM Valliammai Engineering College, detailing various topics related to data communications, network protocols, and error detection techniques. It includes questions categorized into Part A, Part B, and Part C, covering fundamentals, media access, logical addressing, and routing. The questions are designed to assess students' understanding and application of communication network concepts as per the 2019 regulation for the academic year 2024-2025.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

SRM VALLIAMMAI ENGINEERING COLLEGE

(An Autonomous Institution)


SRM Nagar, Kattankulathur – 603 203

DEPARTMENT OF

ELECTRONICS AND COMMUNICATION ENGINEERING

QUESTION BANK

V SEMESTER
1906502 COMMUNICATION NETWORKS

Regulation – 2019

Academic Year 2024 – 2025 (ODD)

Prepared by

Dr. C.Amali, Associate Professor/ECE


Dr. S. R. Preethi, Associate Professor /ECE
Mr. D. Murugesan, Assistant Professor (Sel.G)/ECE

SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 1 of 13


SRM VALLIAMMAI ENGINEERING COLLEGE
(An Autonomous Institution)
SRM Nagar, Kattankulathur – 603 203.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

QUESTION BANK
SUBJECT : 1906502 COMMUNICATION NETWORKS
SEM / YEAR : V SEMESTER / III YEAR

UNIT I -FUNDAMENTALS & LINK LAYER


Overview of Data Communications- Networks – Building Network and its types– Overview of Internet -
Protocol Layering - OSI Model – Physical Layer – Overview of Data and Signals - introduction to Data Link
Layer - Link layer Addressing- Error Detection and Correction
PARTA
Q. Questions BT Course
No Level Outcome
1. Define Computer Network. BTL 1 CO 1
2. Outline the fundamental characteristics of data communication system. BTL 2 CO 1
3. List the criteria necessary for an effective and efficient network. BTL 1 CO 1
4. Sketch the four basic network topologies. BTL 2 CO 1
5. State the function of WAN. BTL 1 CO 1
6. Interpret the responsibilities of data link layer. BTL 2 CO 1
7. Compare the packet-switched and circuit-switched networks. BTL 2 CO 1
8. What is an Internet? BTL 1 CO 1
9. Write about Protocol layering. BTL 1 CO 1
10. Identify the purpose of computer networks. BTL 2 CO 1
11. Write about the seven layers of OSI model. BTL 1 CO 1
12. Express the role of LLC sub layer in data link layer? BTL 2 CO 1
13. Differentiate between half duplex and full duplex. BTL 1 CO 1
14. Analyze the flow control and error control. BTL 2 CO 1
15. Distinguish between Baseband transmission and Broadband transmission. BTL 1 CO 1
16. Mention the responsibilities of Physical layer. BTL 2 CO 1
17. Define analog and digital signals. BTL 1 CO 1
18. Distinguish the difference between a port address, a logical address and a CO 1
BTL 2
physical address.
19. Illustrate error detection and correction. CO 1
BTL 1
20. Consider that the data word to be transmitted is 100100 and key is 1101. CO 1
BTL 2
Determine parity bits for the given data.
21. Interpret the term checksum. BTL 1 CO 1

SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 2 of 13


22. Categorize the necessary criteria for an effective and efficient network. BTL 2 CO 1
23. Interpret the purpose of Data Link layer? BTL 1 CO 1
24. Explain how error detection and correction is done? BTL 2 CO 1

PART-B
Define data communications. Describe the five components of data (13) CO 1
1. communications system with necessary diagrams. BTL 3

Write brief note on the following: CO 1


(i) Network criteria (5)
2. (4)
(ii) Physical structures
(4) BTL 4
(iii) Physical topology
(13) CO 1
3. What are the types of networks? Explain with necessary diagrams. BTL 3
Explain about data and signals and name three types of (13) CO 1
4. BTL 4
transmission impairment.
Find the minimum Hamming distance of the coding scheme in
Table

5. BTL 3

(13) CO 1

Illustrate the mechanism of simple parity check code with your own (13)
6. example. BTL 4 CO 1

7. Interpret the process of two-dimensional parity check with real CO 1


(13)
time example. BTL 4
8. What kind of arithmetic is used to add data items in checksum (13) CO 1
calculation, explain with an example. BTL 3

9. Given the data word 1010011110 and the divisor 10111, CO 1


(i) generate the code word at the sender site (using binary (5)
division).
(ii) Show the checking of the code word at the receiver site (4)
BTL 4
(Assume no error).
(iii) Show the checking of the code word at the receiver site
(Include error). (4)
10. How can errors be detected by using block coding? Analyze the (13) CO 1
process of error detection and correction in block coding. BTL 3
11. Inspect the responsibilities and concerns of physical layer with (13) CO 1
neat diagram. BTL 4

SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 3 of 13


(13) CO 1
12. How would you categorize the levels of addresses used in an
internet employing the TCP/IP protocols? BTL 4

Draw the structure of CRC encoder and decoder and explain its (13) CO 1
13. principle and operation. BTL 4
14. Describe in detail about the Forward Error Correction techniques. (13) CO 1
BTL 3
15. (i)We need a dataword of at least 7 bits. Calculate values of k and (6) CO 1
n that satisfy this requirement
BTL 4
(ii)A code scheme has a Hamming distance dmin == 4. What is (7)
the error detection and correction capability of this scheme?
16. Draw the OSI model and describe the responsibilities of each (13) CO 1
layer in the model. BTL 3
17. Elaborate the error detection and correction technique with (13) CO 1
suitable example. BTL 3
PART – C
1. Describe the layered architecture of OSI model and assess the (15) CO 1
BTL 3
functions of each layer.
2. For each of the following four networks, discuss the consequences if a (15)
connection fails.
(i) Five devices arranged in a mesh topology
(ii) Five devices arranged in a star topology (not counting the hub) BTL 4 CO 1
(iii) Five devices arranged in a bus topology
(iv) Five devices arranged in a ring topology
3. (i) How do you find the minimum distance for linear block codes? (5)
(ii) Evaluate the performance of any two linear block codes with your CO 1
(10) BTL 3
own example.
4. In order to transmit the message M = 1 1 1 0 1 1 with divisor bit (15) CO 1
as C= 1 1 0 1 whose polynomial is given by C(x) = x3+x2+1,
Formulate the message that should be transmitted using BTL 4
polynomial long division and predict the occurrence of errors in
the receiver.
Determine the propagation time and the transmission time for a (15) CO 1
5. 2.5-kbyte message (an e-mail) if the bandwidth of the network
is 1 Gbps? Assume that the distance between the sender and the BTL 3
receiver is 12,000 km and that light travels at 2.4 x 10 8 m/s.

UNIT II - MEDIA ACCESS & INTERNETWORKING


Overview of Data link Control and Media access control - Ethernet (802.3) - Wireless LANs – Available Protocols –
Bluetooth – Bluetooth Low Energy – WiFi – Low PAN–Zigbee - Network layer services – Packet Switching.

PART – A
Q. Questions BT Course
No Level Outcome
1. Mention the functions of data link layer. BTL 1 CO 2
2. Draw the Ethernet frame format. BTL 1 CO 2
SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 4 of 13
3. What is the need of escape character? BTL 2 CO 2
4. Compare flow control and error control. BTL 1 CO 2
5. State the working principle of stop-and-wait protocol. BTL 1 CO 2
6. Write the function of piggybacking. BTL 1 CO 2

7. Distinguish between fixed-size framing and variable-size framing. CO 2


BTL 2
8. How HDLC frame types differ from one another? CO 2
BTL 2
9. Illustrate the Media access control. BTL 1 CO 2
10. Summarize the different Ethernet generations. BTL 2 CO 2
11. Identify the goals of Fast Ethernet. BTL 2 CO 2
12. List out the advantages of WLAN. BTL 2 CO 2
13. Define total delay in network layer services. BTL 1 CO 2
14. Write about Piconet and Scatternet. BTL 2 CO 2
15. What are the applications of Bluetooth? BTL 1 CO 2
16. Differentiate between basic service set and extended service set. BTL 1 CO 2
Interpret the role of 6LoWPAN in network layer. BTL 2 CO 2
17.
18. Find the three different device types of Zigbee device. BTL 1 CO 2
19. Categorize the types of packet switching. BTL 2 CO 2
20. Sketch the subfields in IEEE 802.11 control frames. BTL 1 CO 2
21. Enumerate the difference between Fast Ethernet and Gigabit Ethernet. BTL 1 CO 2
22. Express the purpose of Network Interface Card? BTL 2 CO 2
23. What is the most command kinds of Base band 802.3 LAN. BTL 1 CO 2
24. Write the types of stations is HDLC. BTL 2 CO 2

PART – B
Explain the different frames and configuration of HDLC (13) CO 2
1. protocol. BTL 3

Describe the working principle of stop and wait and sliding (13) CO 2
2. BTL 4
window mechanism with an example of your own.
What is CSMA/CD? Explain how it detects collisions with suitable (13) BTL 3 CO 2
3.
diagrams?
Write an algorithm of CSMA/CD with real time example and (13) CO 2
4. BTL 4
explain its functionality.
(13) BTL 4 CO 2
5. Discuss about CSMA/CA and explain its working principle.

6. Analyze RTS/CTS protocol with a real time example. (13) BTL 4 CO 2

(13) CO 2
7. Explain Ethernet standards with relevant examples. BTL 4

8. Analyze the characteristics of fast Ethernet and Gigabit Ethernet. (13) BTL 3 CO 2

Illustrate an architecture and MAC layers of IEEE 802.11 with (13) CO 2


BTL 3
9. necessary diagrams.
10. Draw an architecture diagram for 6LowPAN technology and explain (13) BTL 4 CO 2
SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 5 of 13
its layers.
Discuss the working principle of Zigbee protocol with an CO 2
11. architecture diagram. (13) BTL 3

CO 2
Interpret the design of Go-Back-N Automatic Repeat Request (13)
12. BTL 4
protocol with flow diagram.

Identify the need for network layer and show the functionality of (13) CO 2
13. BTL 3
the Network layer at the source, router, and destination.
Explain the concept of datagram forwarding and virtual circuit (13) CO 2
14. BTL 3
network with an example.
(13) CO 2
Describe about IP fragmentation and reassembly. BTL 3
15.
(13) CO 2
Explain the control frames and addressing mechanisms in
16. BTL 3
IEEE802.11 with necessary diagram.
Analyze the flow and delivery of data in Selective Repeat ARQ (13) CO 2
17. BTL 4
Protocol.
PART- C

Compare and contrast byte-stuffing and bit-stuffing. Which (15) CO 2


1. technique is used in byte-oriented protocols and bit-oriented BTL 4
protocols? Justify your answer.
(i) Assess the two types of networks in Bluetooth architecture. (7)
2. (ii) Show the functions of Bluetooth layers. (8) BTL 3 CO 2
Explain the design of Stop-and-WaitARQ Protocol with Sender- (15) CO 2
3. site and Receiver-site algorithm. BTL 3

Discuss in detail about the common WiFi standards and types. (15) CO 2
Tabulate the Wifi characteristics and differences between the
4. BTL 4
standards.

Analyze the functionality of Zigbee protocol and also discuss about (15) CO 2
5. its types and limitations. BTL 4

UNIT III - LOGICAL ADDRESSING AND ROUTING


Logical addressing: IPv4, IPv6 addresses, Internet Protocol: IPv4, IPv6 - Address mapping –DHCP, ICMP, IGMP,
Routing - Unicast Routing – Algorithms – Protocols – Multicast Routing and its basics – Overview of Intradomain
and interdomain protocols.

BT Course
Q. Questions
No Level Outcome
1. Write the purpose of Routing. BTL 3 CO 3
2. What do you mean by Unicast routing? BTL 4 CO 3
3. Interpret the algorithm of Least-Cost routing. BTL 3 CO 3
4. Define distance-vector routing. BTL 3 CO 3
SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 6 of 13
5. Express the Bellman-Ford equation. BTL3 CO 3

6. Point out the function of Autonomous system. BTL 4 CO 3

Examine Global routing protocol. CO 3


7. BTL 4
8. Summarize the concepts of RIP. BTL 3 CO 3
CO 3
9. How does OSPF routing protocol work? BTL 4
Which is faster IPv4 or IPv6? CO 3
10. BTL 3
11. Express the benefits of Open Shortest Path First (OSPF) Protocol. BTL 4 CO 3

12. Differentiate Inter domain and Intra domain routing. BTL 4 CO 3

13. State the concept of Multicast routing. BTL 3 CO 3

14. List the applications of Multicasting. BTL 4 CO 3


15. Why IPv6 is preferred than IPv4? BTL 3 CO 3
16. Distinguish between RIP and OSPF. BTL 4 CO 3
17. Classify the destination address in IPv6. BTL 3 CO 3
18. Identify the three packets in the DHCP process. BTL 4 CO 3

19. Find the type of the following destination addresses:


a. 4A:30:10:21:1O:1A
BTL3 CO 3
b. 47:20:1B:2E:08:EE
c. FF:FF:FF:FF:FF:FF
20. Which protocol is used for mapping of logical address into physical CO 3
BTL 3
address?
21. What is ICMP? BTL 4 CO 3
22. Mention the function of IGMP? BTL 3 CO 3
23. What is an IPv4 and its characteristics? BTL 4 CO 3
24. What are the metrics used in determining the best path for a routing protocol? BTL 4 CO 3
PART – B
1. Describe the flow of Distance Vector Routing Algorithm with necessary (13)
diagrams. BTL 3 CO 3

2. (i) Sketch the format of IPv4 datagram header. (7)


(ii) Find the Net id and the Host id of the following IP addresses. (6)
a. 114.34.2.8 BTL 3 CO 3
b. 132.56.8.6
c. 208.34.54.12
3. Identify the Link state routing algorithm for the given network and (13)
tabulate the steps for building routing table for node D. BTL 4 CO 3

SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 7 of 13


4. What is reliable flooding and explain how routing takes place in link (13) CO 3
BTL 3
state routing?
5. Explain in detail about RIP with packet format and example network. (13) BTL 4 CO 3
(i) Discuss about the format of BGPv4 update message. (7) CO 3
6. (ii) Express the types of Autonomous System (AS) in internet. (6) BTL 4
Describe different Datagram approaches. Also explain the advantages (13) CO 3
7. of LSR over DVR. List the limitations of Link State Routing BTL 3
Algorithm.
Discuss the message types of Internet Control Message Protocol and (13) CO 3
8. BTL 4
High light the purpose of error reporting messages.
Construct the header format of IPv6 and discuss each field in detail. (13) CO 3
9. BTL 3
Write a brief note on Mapping of Logical to Physical Address and (13) CO 3
10 Show the packet format of ARP. BTL 3

Illustrate the packet format of Dynamic Host Configuration Protocol (13) CO 3


11. (DHCP) and Explain how DHCP sever dynamically assigns IP address to BTL 4
a host.
Analyze the operation of Protocol Independent Multicast (PIM) with neat (13) CO 3
12. BTL 4
diagram.
Interpret the DVMRP algorithm with a simple example of your (13) CO 3
13.
choice. BTL 3
(13) CO 3
14. Draw the model of interdomain routing and explain the working of BTL 4
Border Gateway Protocol.
(13) CO 3
15 Explain in details about IP addressing methods. BTL 4

Describe in detail about Internet Group Management Protocol (IGMP) (13) CO 3


16
with packet format. BTL 3
(i) Differentiate between Link-state and Distance-vector routing? (7) CO 3
17 (ii) Explain IPv6 datagram format with suitable diagram (6) BTL 3
PART – C
Enumerate the operation of hierarchically structured OSPF protocol (15)
1. with header format and link state advertisement format. BTL 3 CO 3

SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 8 of 13


For the given network, find the global distance vector table when
(i) Each node knows only the distances to its immediate neighbors.
(ii) Each node has reported information it had in the preceding step (i) to
its immediate neighbors.
(iii) step (ii)is repeated.

2. CO 3
(15) BTL 4

(i) Illustrate the classes in classful addressing and define the application (15) CO 3
of each class with an example.
(ii) Find the class,net id and host id of the following IP addresses. BTL 4
a. 208.34.54.12
3.
b. 238.34.2.1
c. 114.34.2.8
d. 129.14.6.8

Explain the operation and message format of Internet Group (15) BTL 3 CO 3
4. Management Protocol (IGMP) with an example.
5. Describe about Link-state routing and routers. (15) BTL 4 CO 3

UNIT IV - TRANSPORT LAYER


Introduction to Transport layer –Protocols- User Datagram Protocols (UDP) and Transmission Control
Protocols (TCP) –Services – Features – TCP Connection – State Transition Diagram – Flow, Error and
Congestion Control - Congestion avoidance (DECbit, RED) – QoS – Application requirements.
PART-A
Questions BT Course
Q.
No Level Outcome
1. What is Transport layer? BTL 1 CO 4
2. Differentiate Flow control and Congestion control. BTL 2 CO 4
3. Write about the Power of Network. BTL 1 CO 4
4. Point out the responsibilities of error control in transport layer. BTL 2 CO 4
5. Explain Socket Address. BTL 2 CO 4
6. Distinguish between UDP and TCP BTL 1 CO 4
7. Summarize Stop-and-Wait protocol and Go-Back-N protocol. BTL 2 CO 4
8. Draw the TCP Header format. BTL 2 CO 4
9. Compare RSVP and ATM signaling. BTL 1 CO 4
SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 9 of 13
10. State the features of TCP. BTL 1 CO 4
11. Construct the Three-way handshaking with an example. BTL 2 CO 4
12. Mention the approaches to improve the QoS. BTL 2 CO 4
13. Write about SYN Flooding attack. BTL 1 CO 4
14. Name the general policies for handling congestion. BTL 1 CO 4
15. Assess the ways to deal with congestion. BTL 1 CO 4
16. Write the concept of RED. BTL 2 CO 4

17. Illustrate the services provided by UDP. BTL 2 CO 4


18. List the Quality of Service parameters of Transport layer. BTL 1 CO 4
19. Identify the ports used for UDP. BTL 2 CO 4
20. What is Slow start? BTL 1 CO 4

21. Mention the two categories of QoS attributes? BTL 2 CO 4

22. Compare the service point address, logical address and physical address? BTL 1 CO 4

23. What are the services provided by Transport layer protocol? BTL 2 CO 4

24. Define QoS. BTL 1 CO 4

PART – B
Write short notes on: (4)
1. (i) Process-to-Process Communication (5) BTL 3
(ii) Addressing (4) CO 4
(iii) Encapsulation and De capsulation
Summarize the following: (7) CO 4
2. (i) Stop-and-Wait Protocol (6) BTL 4
(ii) Go-Back-N Protocol
3. Illustrate the services provided by Transport layer protocol. (13) BTL 3 CO 4
4. Describe the working principle of TCP congestion control. (13) BTL 3 CO 4
Explain the services offered by TCP to the process at the application layer. (13)
5. BTL 4 CO 4

6. Analyze the TCP connection with its Three-Way Handshaking. (13) BTL 4 CO 4
Examine the State Transition Diagram for TCP with neat diagrams. CO 4
7. (13) BTL 3
8. Manipulate the flow control mechanism of TCP with necessary illustrations. BTL 3 CO 4
(13)
(i) With neat sketches, evaluate the retransmission techniques in detail. (7)
9.
(ii) Discuss the events and transitions about the TCP state transition BTL 4 CO 4
diagrams. (6)
10. Elaborate on TCP connection Management using neat diagrams. (13) BTL 3 CO 4
Write in detail the principle of establishment of QoS through differentiated (13)
11. BTL 3 CO 4
services.
12. Examine the concept of congestion avoidance in TCP. (13) BTL 4 CO 4
13. Illustrate the principle of flow control mechanism with an example. (13) CO 4
BTL 4
14. (i) Differentiate between UDP and (7) BTL 3 CO 4

SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 10 of 13


TCP. (6)
(7)
(ii) Explain the various Queuing Disciplines.
15. Define UDP. Discuss the operations of UDP. Explain UDP (13) BTL 4 CO 4
checksum with one example.
16. Explain congestion avoidance using random early detection in (13)
BTL 3 CO 4
transport layer with an example.
17. Discuss about the TCP Congestion control mechanisms. Also (13) BTL 4 CO 4
differentiate these mechanisms.
PART – C
(i) Draw the format of TCP packet header and explain each (10)
of its field.
1. BTL 3 CO 4
(ii) Justify the allocation of variable field length for the fields (5)
in the TCP header.
How is congestion controlled? Deduct various congestion (15) BTL3 CO 4
2. control techniques in transport layer.
Evaluate the services and Applications in User Datagram (15) BTL 4
3. CO 4
protocol.
Enumerate the following:
4. (i) Flow control (8)
(ii) Error control (7) BTL 4 CO 4

(i) Explain the services offered by TCP to process at the


application layer. (8)
(ii) Describe the token bucket mechanism for congestion control. BTL 2 CO 4
5. (7)
With which other technique is token bucket usually combined to
achieve complete flow control? What problems in the simpler
approach are addressed by using a token bucket mechanism?

UNIT V - APPLICATION LAYER


Application Layer Paradigms – Client Server Programming – World Wide Web and HTTP - DNS-
-Electronic Mail (SMTP, POP3, IMAP, MIME) – Introduction to Peer to Peer Networks – Need for
Cryptography and Network Security – Firewalls.
BT
Q.No Questions Course
Level Outcome
1. Define Application layer protocol. BTL 1 CO 5
2. Distinguish between network applications and application-layer protocol. BTL 2 CO 5
3. Mention the limitations of SMTP. BTL 1 CO 5
4. Write the name of components used in e-mail system. BTL 1 CO 5
5. Illustrate the features of IMAP. BTL 2 CO 5
6. Why DNS Resolver bootstrap the domain name lookup process? BTL 2 CO 5
7. Explain the function of User Agent. BTL 2 CO 5
8. Compare HTTP with persistent and Non-persistent Connection. BTL 1 CO 5

9. List the types of documents in WWW. BTL 2 CO 5

SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 11 of 13


10. What is MIME? BTL 1 CO 5

11. Write the features of HTTP. BTL 2 CO 5

12. Asses the Application Programming Interface. BTL 1 CO 5

13. Analyze the security goals in network security. BTL 2 CO 5

14. How will you recognize the P2P networks? BTL 1 CO 5

15. Draw the general block diagram of cryptography. BTL 1 CO 5

16. Explain the classification of cipher. BTL 2 CO 5

17. Summarize the applications of RSA. BTL 2 CO 5

18. What is POP3 and IMAP4? BTL 1 CO 5

19. Express the classification of firewalls. BTL 2 CO 5

20. Describe the Pretty Good Privacy for E-mail security. BTL 1 CO 5

21. What is WWW and SMTP? BTL 1 CO 5

22. Mention the different levels in domain name space. BTL 2 CO 5

23. Draw a diagram that illustrate tunneling strategy. BTL 1 CO 5

24. What is a URL, web browser and rlogin? BTL 2 CO 5

PART – B
1. How would you transfer the message using Simple Mail Transfer Protocol? (13) BTL 3 CO 5
Write short notes on (7)
2. (i). Web services (6) BTL 4 CO 5
(ii) SNMP
3. With appropriate diagram describe DNS and MIME. (13) BTL 3 CO 5
4. Analyze the architecture and services of an E-mail system. (13) BTL 3 CO 5
(13)
Sketch the model of IMAP state transition diagram and explain its features. BTL 4 CO 5
5.
Illustrate the various steps involved in the use of non- persistent (13)
6.
connection of HTTP. Also Draw the general format of a HTTP request BTL 4 CO 5
message and a response message.
Explain the difference between POP-3 and IMAP-4 with relevant points.
7. (13) BTL 3 CO 5
(13)
Describe the message format, the message transfer and the underlying BTL 3 CO 5
8. protocol involved in the working of an electronic mail.
(13)
9. Evaluate the model for network security with neat diagram. BTL 3 CO 5
10. Explain the role of a DNS on a computer network, including its (13) BTL 4 CO 5
involvement in the process of a User accessing a webpage.

11. Describe the encryption and decryption method used in DES. (13) BTL 4 CO 5

SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 12 of 13


12. Explain in detail about the AES with neat diagram. (13) BTL 4 CO 5
13. Summarize the Diffie-Helman Cryptosystem. (13) BTL 3 CO 5
14. Examine WSDL in web services. (13) BTL 3 CO 5
15. Explain the Domain Name Service protocol with an example (13) CO 5
BTL 4
16. Differentiate between message authentication and entity (13) BTL 4 CO 5
authentication.
17. Write your understanding on File Transfer Protocol with suitable (13)
BTL 2 CO 5
justification.
PARTC

1. Explain how SMTP Protocol is used in E-mail applications. (15) BTL 3 CO 5


2. Summarize the following in detail:
(i) SMTP (5)
(5) BTL 3 CO 5
(ii) MIME (5)
(iii) POP3

3. Discuss the Data Encryption Standard with neat diagram. (15) BTL 4 CO 5

4. Write the firewall and its types with neat diagram. (15) BTL 4 CO 5

5. Explain in details how electronic mail application is carried out in a network. (15) CO 5
BTL 4
Also explain the protocols used in this application.

SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 13 of 13

You might also like