Communication Networks QB
Communication Networks QB
DEPARTMENT OF
QUESTION BANK
V SEMESTER
1906502 COMMUNICATION NETWORKS
Regulation – 2019
Prepared by
QUESTION BANK
SUBJECT : 1906502 COMMUNICATION NETWORKS
SEM / YEAR : V SEMESTER / III YEAR
PART-B
Define data communications. Describe the five components of data (13) CO 1
1. communications system with necessary diagrams. BTL 3
5. BTL 3
(13) CO 1
Illustrate the mechanism of simple parity check code with your own (13)
6. example. BTL 4 CO 1
Draw the structure of CRC encoder and decoder and explain its (13) CO 1
13. principle and operation. BTL 4
14. Describe in detail about the Forward Error Correction techniques. (13) CO 1
BTL 3
15. (i)We need a dataword of at least 7 bits. Calculate values of k and (6) CO 1
n that satisfy this requirement
BTL 4
(ii)A code scheme has a Hamming distance dmin == 4. What is (7)
the error detection and correction capability of this scheme?
16. Draw the OSI model and describe the responsibilities of each (13) CO 1
layer in the model. BTL 3
17. Elaborate the error detection and correction technique with (13) CO 1
suitable example. BTL 3
PART – C
1. Describe the layered architecture of OSI model and assess the (15) CO 1
BTL 3
functions of each layer.
2. For each of the following four networks, discuss the consequences if a (15)
connection fails.
(i) Five devices arranged in a mesh topology
(ii) Five devices arranged in a star topology (not counting the hub) BTL 4 CO 1
(iii) Five devices arranged in a bus topology
(iv) Five devices arranged in a ring topology
3. (i) How do you find the minimum distance for linear block codes? (5)
(ii) Evaluate the performance of any two linear block codes with your CO 1
(10) BTL 3
own example.
4. In order to transmit the message M = 1 1 1 0 1 1 with divisor bit (15) CO 1
as C= 1 1 0 1 whose polynomial is given by C(x) = x3+x2+1,
Formulate the message that should be transmitted using BTL 4
polynomial long division and predict the occurrence of errors in
the receiver.
Determine the propagation time and the transmission time for a (15) CO 1
5. 2.5-kbyte message (an e-mail) if the bandwidth of the network
is 1 Gbps? Assume that the distance between the sender and the BTL 3
receiver is 12,000 km and that light travels at 2.4 x 10 8 m/s.
PART – A
Q. Questions BT Course
No Level Outcome
1. Mention the functions of data link layer. BTL 1 CO 2
2. Draw the Ethernet frame format. BTL 1 CO 2
SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 4 of 13
3. What is the need of escape character? BTL 2 CO 2
4. Compare flow control and error control. BTL 1 CO 2
5. State the working principle of stop-and-wait protocol. BTL 1 CO 2
6. Write the function of piggybacking. BTL 1 CO 2
PART – B
Explain the different frames and configuration of HDLC (13) CO 2
1. protocol. BTL 3
Describe the working principle of stop and wait and sliding (13) CO 2
2. BTL 4
window mechanism with an example of your own.
What is CSMA/CD? Explain how it detects collisions with suitable (13) BTL 3 CO 2
3.
diagrams?
Write an algorithm of CSMA/CD with real time example and (13) CO 2
4. BTL 4
explain its functionality.
(13) BTL 4 CO 2
5. Discuss about CSMA/CA and explain its working principle.
(13) CO 2
7. Explain Ethernet standards with relevant examples. BTL 4
8. Analyze the characteristics of fast Ethernet and Gigabit Ethernet. (13) BTL 3 CO 2
CO 2
Interpret the design of Go-Back-N Automatic Repeat Request (13)
12. BTL 4
protocol with flow diagram.
Identify the need for network layer and show the functionality of (13) CO 2
13. BTL 3
the Network layer at the source, router, and destination.
Explain the concept of datagram forwarding and virtual circuit (13) CO 2
14. BTL 3
network with an example.
(13) CO 2
Describe about IP fragmentation and reassembly. BTL 3
15.
(13) CO 2
Explain the control frames and addressing mechanisms in
16. BTL 3
IEEE802.11 with necessary diagram.
Analyze the flow and delivery of data in Selective Repeat ARQ (13) CO 2
17. BTL 4
Protocol.
PART- C
Discuss in detail about the common WiFi standards and types. (15) CO 2
Tabulate the Wifi characteristics and differences between the
4. BTL 4
standards.
Analyze the functionality of Zigbee protocol and also discuss about (15) CO 2
5. its types and limitations. BTL 4
BT Course
Q. Questions
No Level Outcome
1. Write the purpose of Routing. BTL 3 CO 3
2. What do you mean by Unicast routing? BTL 4 CO 3
3. Interpret the algorithm of Least-Cost routing. BTL 3 CO 3
4. Define distance-vector routing. BTL 3 CO 3
SRM VEC/ECE/1906502-CN/2024-25 ODD SEMESTER Page 6 of 13
5. Express the Bellman-Ford equation. BTL3 CO 3
2. CO 3
(15) BTL 4
(i) Illustrate the classes in classful addressing and define the application (15) CO 3
of each class with an example.
(ii) Find the class,net id and host id of the following IP addresses. BTL 4
a. 208.34.54.12
3.
b. 238.34.2.1
c. 114.34.2.8
d. 129.14.6.8
Explain the operation and message format of Internet Group (15) BTL 3 CO 3
4. Management Protocol (IGMP) with an example.
5. Describe about Link-state routing and routers. (15) BTL 4 CO 3
22. Compare the service point address, logical address and physical address? BTL 1 CO 4
23. What are the services provided by Transport layer protocol? BTL 2 CO 4
PART – B
Write short notes on: (4)
1. (i) Process-to-Process Communication (5) BTL 3
(ii) Addressing (4) CO 4
(iii) Encapsulation and De capsulation
Summarize the following: (7) CO 4
2. (i) Stop-and-Wait Protocol (6) BTL 4
(ii) Go-Back-N Protocol
3. Illustrate the services provided by Transport layer protocol. (13) BTL 3 CO 4
4. Describe the working principle of TCP congestion control. (13) BTL 3 CO 4
Explain the services offered by TCP to the process at the application layer. (13)
5. BTL 4 CO 4
6. Analyze the TCP connection with its Three-Way Handshaking. (13) BTL 4 CO 4
Examine the State Transition Diagram for TCP with neat diagrams. CO 4
7. (13) BTL 3
8. Manipulate the flow control mechanism of TCP with necessary illustrations. BTL 3 CO 4
(13)
(i) With neat sketches, evaluate the retransmission techniques in detail. (7)
9.
(ii) Discuss the events and transitions about the TCP state transition BTL 4 CO 4
diagrams. (6)
10. Elaborate on TCP connection Management using neat diagrams. (13) BTL 3 CO 4
Write in detail the principle of establishment of QoS through differentiated (13)
11. BTL 3 CO 4
services.
12. Examine the concept of congestion avoidance in TCP. (13) BTL 4 CO 4
13. Illustrate the principle of flow control mechanism with an example. (13) CO 4
BTL 4
14. (i) Differentiate between UDP and (7) BTL 3 CO 4
20. Describe the Pretty Good Privacy for E-mail security. BTL 1 CO 5
PART – B
1. How would you transfer the message using Simple Mail Transfer Protocol? (13) BTL 3 CO 5
Write short notes on (7)
2. (i). Web services (6) BTL 4 CO 5
(ii) SNMP
3. With appropriate diagram describe DNS and MIME. (13) BTL 3 CO 5
4. Analyze the architecture and services of an E-mail system. (13) BTL 3 CO 5
(13)
Sketch the model of IMAP state transition diagram and explain its features. BTL 4 CO 5
5.
Illustrate the various steps involved in the use of non- persistent (13)
6.
connection of HTTP. Also Draw the general format of a HTTP request BTL 4 CO 5
message and a response message.
Explain the difference between POP-3 and IMAP-4 with relevant points.
7. (13) BTL 3 CO 5
(13)
Describe the message format, the message transfer and the underlying BTL 3 CO 5
8. protocol involved in the working of an electronic mail.
(13)
9. Evaluate the model for network security with neat diagram. BTL 3 CO 5
10. Explain the role of a DNS on a computer network, including its (13) BTL 4 CO 5
involvement in the process of a User accessing a webpage.
11. Describe the encryption and decryption method used in DES. (13) BTL 4 CO 5
3. Discuss the Data Encryption Standard with neat diagram. (15) BTL 4 CO 5
4. Write the firewall and its types with neat diagram. (15) BTL 4 CO 5
5. Explain in details how electronic mail application is carried out in a network. (15) CO 5
BTL 4
Also explain the protocols used in this application.