Ec 8551 Communication Networks: Q. No Questions BT Level Competence

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

www.padeepz.

net

SUBJECT : EC 8551 COMMUNICATION NETWORKS

t
SEM / YEAR : V Semester / III Year

ne
UNIT I -FUNDAMENTALS & LINK LAYER
Overview of Data Communications- Networks – Building Network and its types– Overview of Internet - Protocol
Layering - OSI Mode – Physical Layer – Overview of Data and Signals - introduction to Data Link Layer - Link layer
Addressing- Error Detection and Correction
PART A

.
Q. Questions BT Competence

pz
No Level
1. Point out the fundamental characteristics of data communication system. BTL 2 Understanding
2. Name the criteria necessary for an effective and efficient network. BTL 1 Remembering
3. Show the four basic network topologies. BTL 3 Applying
4.
5.
6.
ee
Define WAN.
Give an advantages and disadvantages of Bus topology.
Compare the packet-switched and circuit-switched networks.
BTL 1
BTL 2
BTL 5
Remembering
Understanding
Evaluating
7. What is an Internet? BTL 1 Remembering
8. Write about Protocol layering.
ad
BTL 1 Remembering
9. Generalize the Open System. BTL 2 Understanding
10. List the layers of the OSI model. BTL 1 Analyzing
11. Differentiate between Transport layer and Network layer. BTL 3 Applying
12. Write about analog and digital signals. BTL 4 Analyzing
.p

13. Distinguish between baseband transmission and broadband transmission. BTL 1 Remembering
14. Mention the functions of data-link layer. BTL 2 Understanding
15. Analyze the flow and error control. BTL 4 Remembering
w

16. Classify the types of addresses in link-layer protocol. BTL 4 Analyzing


17. Illustrate error detection and correction? BTL 3 Applying
18. Summarize types of error. BTL 5 Evaluating
19. Generalize the term checksum. BTL 6 Creating
w

20. Formulate the minimum Hamming distance. BTL 6 Creating


w

www.padeepz.net
www.padeepz.net
PART – B
1. Describe in detail about the Data Communication. (13) BTL 1 Remembering
Write short notes on
(i) Network Criteria (3)
2. (ii) Physical Structures (4) BTL 1 Remembering
(iii) Physical Topology (6)
Define the following network topologies with an advantage.

t
(i) Bus topology (3)

ne
3. (ii) Ring topology (3) BTL 1 Remembering
(iii) Star topology (3)
(iv) Mesh topology (4)
State the following networks in detail.
(i) LAN (3)
4. (ii) MAN (3) BTL 1 Remembering

.
(iii) WAN (4)

pz
(iv) PAN (3)
5. Discuss about the Internet standards and Administration. (13) BTL 2 Understanding
Summarize the following:
6. (i) Principles of Protocol layering. (7) BTL 2 Understanding
(ii) Layers in TCP/IP protocol. (6)
7.
8.
9.
ee
Express the various layers and functions of OSI model.
Illustrate the Transmission of digital signals.
Examine the Transmission impairment and Data rate limits.
(13) BTL 2 Understanding
(13) BTL 3 Applying
(13) BTL 3 Applying
(i) Analyze the Services provided by data-link layer. (7)
10. BTL 3 Analyzing
(ii) Classify the types of address in link layer. (6)
ad
11. Explain the Address Resolution Protocol with an example. (13) BTL 4 Analyzing
Analyze the cyclic codes to find its capabilities by using polynomials.
12. BTL 4 Analyzing
(13)
Evaluate the following:
13. (i) Hardware Implementation of Cyclic codes (7) BTL 5 Evaluating
.p

(ii) Checksum (6)


14. Construct the Forward Error Correction techniques. (13) BTL 6 Creating
PART - C
1. Generalize the various network topologies and its applications. (15) BTL 6 Creating
w

2. Develop the OSI model and explain its layers with neat sketch. (15) BTL 6 Creating
3. Summarize the following
(i) Data link layer (8)
BTL 5 Evaluating
w

(ii) Link Layer Addressing (7)


(iii)
4. Design a cyclic code with its polynomials and its analysis. (15) BTL 5 Evaluating
w

UNIT II - MEDIA ACCESS & INTERNETWORKING


Overview of Data link Control and Media access control - Ethernet (802.3) - Wireless LANs – Available
Protocols – Bluetooth – Bluetooth Low Energy – WiFi – 6LowPAN–Zigbee - Network layer services – Packet
Switching – IPV4 Address – Network layer protocols ( IP, ICMP, Mobile IP)
PART – A
Q. No Questions BT Competence
Level

www.padeepz.net
www.padeepz.net
1. Mention the functions of data link layer. BTL 1 Remembering
2. Draw the Ethernet frame format. BTL 3 Applying
3. What is the need of escape character? BTL 1 Remembering
4. Compare flow and error control. BTL 5 Evaluating
5. Describe stop-and-wait protocol. BTL 1 Remembering
6. State piggybacking. BTL 1 Remembering

t
7. Distinguish between fixed-size framing and variable-size framing. BTL 2 Understanding

ne
8. Analyze the HDLC frame types differ from one another. BTL 4 Analyzing
9. Illustrate the Media access control. BTL 3 Applying
10. Summarize the different Ethernet generations. BTL 2 Understanding
11. Discuss the goals of Fast Ethernet. BTL 2 Understanding

.
12. Point out the advantages of WLAN. BTL 4 Analyzing

pz
13. Write about total delay in network layer services. BTL 1 Remembering
14. Explain about piconet and scatternet. BTL 2 Understanding
15. Define Bluetooth. BTL 1 Remembering
16. Differentiate between basic service set and extended service set. BTL 4 Analyzing

17.

18.
ee
Examine the open-loop Congestion control and closed loop Congestion
control.
Evaluate IPv4.
BTL 3

BTL 5
Applying

Evaluating
19. Compose the Security issues in IP protocol. BTL 6 Creating
20. Develop the protocol to overcome the deficiencies in IP. BTL 6 Creating
ad
PART – B
Describe the following in detail:
1. (i) Framing (7)
BTL 1 Remembering
(ii) Flow and Error control (6)
Write Briefly on
.p

2. (i) Simple protocol and (7) BTL 1 Remembering


(ii) Stop-and-Wait Protocol in data link layer. (6)
What is CSMA/CD? How does it works? (6)
3. List out the various types of frames. (7) BTL 1 Remembering
w

State the CSMA/CA and its working. (10)


4. BTL 1 Remembering
Identify the various transfer modes in HDLC. (3)
5. Construct the Packet switching with its two different approaches. (13) BTL 6 Creating
w

(i) Compare the various Ethernet standards. (7)


6. BTL 4 Analyzing
(ii) Infer the WLAN. (6)
7. Analyze the IPv4 Addressing. (13) BTL 4 Analyzing
w

8. Explain in detail about the architecture of Bluetooth and its layers. (13) BTL 2 Understanding
Summarize the following:
9. (i) Wifi (7) BTL 2 Understanding
(ii) Zigbee (6)
Illustrate the following terms
10. (i) Routing and Forwarding (7) BTL 2 Understanding
(ii) Services provided by Network layer (6)
11. Demonstrate the Internet Protocol (IP) (13) BTL 3 Applying

www.padeepz.net
www.padeepz.net
12. Interpret the ICMPv4 and its Debugging tools. (13) BTL 3 Applying
(i) Evaluate the addressing in Mobile IP. (7)
13.
(ii) Assess the Inefficiency in Mobile IP. (6) BTL 5 Evaluating

14. Analyze the various Phases in Mobile IP. (13) BTL 4 Analyzing
PART ‐ C
1. Compose controlled access methods with packet formats. (15) BTL 6 Creating

t
2. Evaluate the following with neat sketch.

ne
(i) Bluetooth (5)
BTL 5 Evaluating
(ii) WiFi (5)
(iii) Zigbee (5)
3. Validate the network layer protocols and its types. (15) BTL 5 Evaluating
Compile IPv4 addresses with classful and classless addressing

.
4.
formats. (15) BTL 6 Creating

pz
UNIT III - ROUTING
Routing - Unicast Routing – Algorithms – Protocols – Multicast Routing and its basics – Overview of
Intradomain and interdomain protocols – Overview of IPv6 Addressing – Transition from IPv4 to IPv6.

Q.No

1.
ee
Discuss about Routing.
PART A
Questions BT
Level
BTL 2
Competence

Understanding
2. What do you mean by Unicast routing? BTL 1 Remembering
3. Illustrate Least-Cost routing. BTL3 Applying
ad
4. Explain distance-vector routing. BTL 1 Remembering
5. Evaluate Bellman-Ford equation. BTL 5 Evaluating
6. Define Autonomous system. BTL 1 Remembering

7. Examine Global routing protocol. BTL 1 Remembering


.p

8. Summarize RIP. BTL 2 Understanding


9. Analyze the performance of OSPF. BTL 4 Analyzing

10. Manipulate the Dijkstra Algorithm. BTL 3 Applying


w

11. Outline the benefits of Open Shortest Path First (OSPF) Protocol. BTL 2 Understanding
12. Compare Interdomain and Intradomain routing. BTL 4 Analyzing
BTL 1 Remembering
w

13. State Multicast routing.


14. Generalize the applications of Multicasting. BTL 2 Understanding
15. Why IPv6 is preferred than IPv4? BTL 1 Remembering
Distinguish between RIP and OSPF.
w

16. BTL 4 Analyzing


17. Classify the destination address in IPv6. BTL 3 Applying
18. Justify the strategies in transition from IPv4 to IPv6. BTL 5 Evaluating
19. Develop a Global unicast address block. BTL 6 Creating
20. Integrate the compatible address and mapped address. BTL 6 Creating
PART – B

www.padeepz.net
www.padeepz.net
1. (i) What is meant by the Distance Vector Routing Algorithm? (7)
BTL 1 Remembering
(ii) List the limitations of Distance Vector Routing Algorithm. (6)
2. Define Unicast routing and its Internet structure with neat diagram. (13) BTL 1 Remembering
(i) Write note on the Border Gateway Protocol with neat diagram. (8)
3. BTL 1 Remembering
(ii) Draw the BGP-4 update packet format. (5)
4. Define multicasting and explain in detail about multicast address. (13) BTL 1 Remembering
Summarize the different Datagram approaches. Also show the

t
5. advantages of LSR over DVR. List the limitations of Link State BTL 2 Understanding

ne
Routing Algorithm. (13)
6. Summarize the DVMRP and its algorithm. (13) BTL 2 Understanding
Explain the Protocol Independent Multicast (PIM) and its various
7. BTL 2 Understanding
working modes. (13)
Describe about RIP. Explain in detail about RIP and OSPF with

.
8. diagrams. List the difference between them. (13) BTL 3 Applying

pz
9. Discuss in detail about the IPv6 Protocol. (13) BTL 3 Applying
(i) Examine Distance Vector Multicast Routing protocol. (8)
(ii) Simplify the metrics and their calculation method. (5) BTL 4 Analyzing
10.

11.
ee
(i) Explain the internet multicasting. Explain in detail.
(ii) Find the IPv6 header details and explain them.
Analyze the following in IPv6 Addressing.
(7)
(6) BTL 4 Analyzing

(i) Autoconfiguration (6) BTL 4 Analyzing


12.
(ii) Renumbering (7)
ad
Interpret the RIP algorithm with a simple example of your choice
13. BTL 5 Evaluating
(13)
Elaborate in detail about the transition from IPv4 to IPv6. (13)
14. BTL 6 Creating
PART ‐ C
Discuss in detail the operation of hierarchically structured OSPF
.p

1. protocol by considering a suitable network. (15) BTL 6 Creating

(i) Evaluate the working of Protocol Independent Multicast (PIM) in


2. detail. (8) BTL 5 Evaluating
(ii) Outline the need of DVMRP. (7)
w

Elaborate in detail about the Address Space and Address Space


3. Allocation and IPv6 addressing. (15) BTL 5 Evaluating
Develop the transition from IPv4 to IPv6 with its strategies and uses.
w

4. (15) BTL 6 Creating

UNIT IV - TRANSPORT LAYER


w

Introduction to Transport layer –Protocols- User Datagram Protocols (UDP) and Transmission Control
Protocols (TCP) –Services – Features – TCP Connection – State Transition Diagram – Flow, Error and
Congestion Control - Congestion avoidance (DEC bit, RED) – QoS – Application requirements.

BT
Q.No Questions Competence
Level

www.padeepz.net
www.padeepz.net
1. What is Transport layer? BTL 1 Remembering
2. Differentiate Flow control and Congestion control. BTL 4 Analyzing
3. Examine the buffers used in transport layer services. BTL 3 Applying
4. Show the responsibilities of error control in transport layer. BTL 3 Applying
5. Explain Socket Address. BTL 2 Understanding
6. Distinguish between UDP and TCP BTL 4 Analyzing

t
7. Summarize Stop-and-wait protocol and Go-Back-N protocol. BTL 2 Understanding
Draw the TCP header format. BTL 3 Applying

ne
8.
9. Compare and contrast UDP, TCP, and SCTP. BTL 4 Analyzing
10. State the features of TCP. BTL 1 Remembering
11. Construct the three-way handshaking with an example. BTL 6 Creating
12. Give the approaches to improve the QoS. BTL 5 Evaluating

.
13. Write about SYN Flooding attack. BTL 1 Remembering
Name the general policies for handling congestion.

pz
14. BTL 1 Remembering
15. Evaluate the ways to deal with congestion. BTL 5 Evaluating
16. Compose RED. BTL 6 Creating
17. Illustrate the services provided by UDP. BTL 2 Understanding
18. List the Quality of Service parameters of Transport layer.
ee BTL 1 Remembering
19. Express the ports used for UDP. BTL 2 Understanding
20. Define slow start. BTL 1 Remembering
PART – B
Write short notes on:
1.
ad
(i) Process-to-process communication (4)
(ii) Addressing (5) BTL 1 Remembering
(iii) Encapsulation and Decapsulation (4)
Summarize the following:
2. (i) Stop-and-Wait Protocol (7) BTL 2 Understanding
(ii) Go-Back-N Protocol (6)
.p

3. Show the services provided by transport layer protocol. (13) BTL 3 Applying
4. Describe the working principle of TCP congestion control. (13) BTL 1 Remembering
Explain the services offered by TCP to the process at the application
w

5.
layer. (13) BTL 2 Understanding
6. Analyze the TCP connection with its Three-Way Handshaking. (13) BTL 4 Analyzing
Examine the State Transition Diagram for TCP. (13)
w

7. BTL 1 Remembering
8. Manipulate the flow control mechanism for TCP (13) BTL 3 Applying
(i) With neat sketches, evaluate the retransmission techniques in
w

detail. (6)
9. BTL 5 Evaluating
(ii) Criticize the events and transitions about the TCP state transition
diagrams. (7)
10. Elaborate on TCP connection Management using neat diagrams. (13) BTL 6 Creating

11. Write in detail the principle of establishment of QoS through


BTL 1 Remembering
Differentiated services. (13)
12. Examine the concept of congestion avoidance in TCP. (13) BTL 4 Analyzing

www.padeepz.net
www.padeepz.net
Illustrate the principle of flow control mechanism with an example.
13. BTL 2 Understanding
(13)
BTL 3 Applying
(i)Differentiate between UDP and TCP. (4)
14. (ii)Explain the various Queuing Disciplines. (9) BTL 4 Analyzing
PART C
(i) Draw the format of TCP packet header and explain
1. each of its field. (10)

t
(ii) Justify the allocation of variable field length for the fields BTL 6 Creating

ne
in the TCP header. (5)
How is congestion controlled? Deduct various congestion control
2. techniques in transport layer. (15) BTL 6 Creating

3. Evaluate the services and Applications in User Datagram Protocol. (15) BTL 5 Evaluating

.
4. Elaborate the following:
(i) Flow control (8)

pz
BTL 5 Evaluating
(ii) Error control (7)

ee UNIT V - APPLICATION LAYER


Application Layer Paradigms – Client Server Programming – World Wide Web and HTTP - DNS- -
Electronic Mail (SMTP, POP3, IMAP, MIME) – Introduction to Peer to Peer Networks – Need for
Cryptography and Network Security – Firewalls.
BT
Q.No Questions Competence
Level
ad
1. Define Application layer protocol. BTL 1 Remembering
2. Distinguish between network applications and application-layer protocol. BTL 4 Analyzing
3. Mention the limitations of SMTP. BTL 3 Applying
4. Write the name of components used in e-mail system. BTL 1 Remembering
5. Illustrate the features of IMAP. BTL 2 Understanding
.p

6. Why DNS Resolver bootstrap the domain name lookup process? BTL 3 Applying
7. Explain the function of User Agent. BTL 2 Understanding
8. Compare HTTP with persistent and Non-persistent Connection. BTL 4 Analyzing
w

9. Evaluate the types of documents in www. BTL 5 Evaluating


10. What is MIME? BTL 1 Remembering
w

11. Compose the features of HTTP. BTL 6 Creating


12. Criticize the Application Programming Interface. BTL 5 Evaluating
w

13. Analyze the security goals in network security. BTL 4 Analyzing

14. How will you recognize the P2P networks? BTL 1 Remembering

15. Draw the general block diagram of cryptography. BTL 3 Applying

16. Explain the classification of cipher. BTL 6 Creating


17. Summarize the applications of RSA. BTL 2 Understanding

www.padeepz.net
www.padeepz.net
18. Expand POP3 and IMAP4. BTL 1 Remembering

19. Express the classification of firewalls. BTL 2 Understanding


20. Construct the Pretty Good Privacy for E-mail security. BTL 1 Remembering
PART – B
(i) How would you transfer the message using Simple Mail Transfer
1. Protocol? (7)

t
(ii) Explain the final delivery of email to the end user using POP3. BTL 1 Remembering

ne
(6)
Write short notes on
2. (i). Web services (6) BTL 2 Understanding
(ii) SNMP (7)
With appropriate diagram describe
(i) DNS (7)

.
3. BTL 3 Applying
(ii) MIME (6)

pz
(i) Discuss in detail about HTTP with neat diagram. (7)
4. (ii) With relevant examples discuss how the domain space is divided. BTL 1 Remembering
(6)
(i) Prepare a model of IMAP state transition diagram. (7)
5. ee BTL 2 Understanding
(ii) Outline the salient features of the SMTP protocol. (6)
(i) Illustrate the various steps involved in the use of non- persistent
6. connection of HTTP. (5)
(ii) Draw & explain the general format of a HTTP request message and BTL 4 Analyzing
a response message. (8)
ad
(i) Define MIME with neat a diagram. (5)
7. BTL 1 Remembering
(ii) Give the comparison between POP-3 and IMAP-4. (8)
(i) Describe the message format, the message transfer and the BTL 3 Applying
8. underlying protocol involved in the working of an electronic mail.
(6) Analyzing
.p

(ii) Analyze the architecture and services of an E-mail system. (7) BTL 4

9. Evaluate the model for network security with neat diagram. (13) BTL 5 Evaluating
10. (i) Generalize the Traditional application in computer networks. (6)
w

(ii) Explain the role of a DNS on a computer network, including its BTL 6 Creating
involvement in the process of a User accessing a web page. (7)
11. Examine the encryption and decryption method used in DES. (13) BTL 1 Remembering
w

12. Explain in detail about the AES with neat diagram. (13) BTL 4 Analyzing

13. Summarize the Diffie-Helman Cryptosystem. (13) BTL 2 Understanding


w

(i) Identify the following terms; BTL 3 Applying


14. SMTP, HTTP, DNS, SNMP (4*2 = 8)
(ii) Examine WSDL in web services. (5) BTL 4 Analyzing
PART C
(i) Demonstrate how SMTP Protocol is used in E-mail applications.
1. (7) BTL 5 Evaluating
(ii) How would you elaborate Hypertext Transfer Protocol with an
example? (8)

www.padeepz.net
www.padeepz.net
Construct the following: BTL 5 Evaluating
2. (i) SMTP (5)
(ii)MIME (5)
(iii)POP3 (5)
3. Design the Data Encryption Standard with neat diagram. (15) BTL 6 Creating

Compose the firewall and its types with neat diagram. (15) BTL 6 Creating
4.

t
. ne
pz
ee
ad
.p
w
w
w

www.padeepz.net

You might also like