Professional Documents
Culture Documents
Narayana Engineering College::Nellore
Narayana Engineering College::Nellore
COLLEGE::NELLORE
Permanently affiliated to JNTUA Ananthapuramu,
Approved by AICTE,
Accorded ‘A’ grade by Govt. of AP, Recognized by UGC
2(f) & 12(B),
ISO 9001:2015 certified Institution, Approved with ‘A+’ Grade by NAAC
Course Details
Class: Fourth Year, B. Tech Semester: I Year: 2020-21
Course Title: DATA COMMUNICATIONS & NETWORKING Course Code: 15A04704 Batch: 2017-21
Program/Dept.: ECE Coordinator: Dr K .S.SAGAR REDDY Credits: 3
Regulation: R-15 Section: A,B
2 MARKS QUESTIONS
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
Unit -1
1. 1 1 Differentiate simplex and duplex communication system. (Reg-Nov-2018) 1 3 2
Simplex mode:
In simplex mode, Sender can send the data but that sender can’t receive the
data. It is a unidirectional communication.
Full duplex mode:
In full duplex mode, Sender can send the data and also can receive the data
simultaneously. It is two-way directional communication simultaneously.
7. 1 7 What is ARPANET ? 1 2 2
The ARPANET (short for Advanced Research Projects Agency
Network) was the first wide-area packet-switching network with distributed
control and one of the first networks to implement the TCP/IP protocol
suite. Both technologies became the technical foundation of the Internet.
9. 1 9 Define ISP? 1 3 2
Internet Service Provider (ISP) Definition - What does Internet Service
Provider (ISP) mean? An Internet service provider (ISP) is a company that
provides customers with Internet access. Data may be transmitted using
several technologies, including dial-up, DSL, cable modem, wireless or
dedicated high-speed interconnects.
10. 1 10 Define Protocol? 1 1 2
a set of rules governing the exchange or transmission of data between devices.
11. 1 11 Define OSI Model 1 2 2
The Open Systems Interconnection (OSI) model is a conceptual
model created by the International Organization for Standardization which
enables diverse communication systems to communicate using standard
protocols. In plain English, the OSI provides a standard for different
computer systems to be able to communicate with each other.
ii. Multimode: In this mode, the numerous beams from the light source
travel through the core in several paths.Single mode: In this mode, the fiber
along with the extremely small diameter which limits the beams to the few
angles, which causes almost horizontal beam.
Unit -II
21. 2 1 Define flow control. 2 3 2
Flow control is the management of data flow between computers
or devices or between nodes in a network so that the data can be
handled at an efficient pace. Too much data arriving before a device can
handle it causes data overflow, meaning the data is either lost or must be
retransmitted.
38. 2 18 What are the two sublayers of the data link layer? 2 1 2
The data link layer has two sublayers: logical link control (LLC) and
media access control (MAC). The uppermost sublayer, LLC,
multiplexes protocols running at the top of data link layer, and optionally
provides flow control,
39. 2 19 Define HDLC? 2 3 2
HDLC (High-level Data Link Control) is a group of protocol s or rules
for transmitting data between network points (sometimes called node s). In
HDLC, data is organized into a unit (called a frame) and sent across a
network to a destination that verifies its successful arrival.
40. 2 20 Define PPP? 2 1 2
Computer Engineering Computer Network MCA Point - to - Point
Protocol (PPP) is a communication protocol of the data link layer that is
used to transmit multiprotocol data between two directly connected (point-
to-point) computers. It is a byte - oriented protocol that is widely used in
broadband communications having heavy loads and high speeds.
Unit –III
41. 3 1 What do you mean by multiple access? 3 3 2
Multiple access is a technique that lets multiple mobile users share
the allotted spectrum in the most effective manner. Since the
spectrum is limited, the sharing is necessary to improve the overall capacity
over a geographical area.
Classless on the other hand, allows the use of variable length subnet masks, or
VLSM, because subnet mask information is included with routing updates. You can
have a mixture of different subnet masks in the same routing domain:
- 10.1.0.0/19
- 10.2.0.0/20
- 172.16.8.0/21
- 172.16.16.0/24
64. 4 4 Give the advantages of hierarchical routing? 4 1 2
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
It decreases the complexity of network topology, increases routing efficiency, and
causes much less congestion because of fewer routing advertisements. With
hierarchical routing, only core routers connected to the backbone are aware of all
routes.
65. 4 5 Define IPV6 addressing? 4 3 2
An Internet Protocol Version 6 address (IPv6 address) is a numerical label that is
used to identify a network interface of a computer or a network node
participating in an IPv6 computer network. ... In contrast to IPv4, which defined an
IP address as a 32-bit value, IPv6 addresses have a size of 128 bits.
66. 4 6 Write about congestion control algorithms? 4 3 2
Congestion control is a network layer issue, and is thus concerned with what
happens when there is more data in the network than can be sent with
reasonable packet delays, no lost packets, etc. Flow control is a local, congestion
control is global.
Congestion occurs when bandwidth is insufficient and network data traffic
exceeds capacity. Data packet loss from congestion is partially countered by
aggressive network protocol retransmission, which maintains a network
congestion state after reducing the initial data load
67. 4 7 Write any two Approaches to Congestion Control? 4 1 2
open loop congestion control –Retransmission Policy,Window Policy,Discarding
Policy,Acknowledgment Policy,Admission Policy are All the policies are adopted to
prevent congestion before it happens in the network.
Closed Loop Congestion Control:Backpressure,Choke Packet Technique,Implicit
Signaling ,Explicit Signaling
68. 4 8 Write two Design Issues in the network layer? 4 2 2
The network layer design issues :
1) Store and formed packet switching.
2) Service provided to the transport layer.
3) Implementation of connectionless service.
4) Implementation of connection-oriented source.
5) Comparison of virtual circuit and datagram submits.
69. 4 9 What are the advantages of IPV6 and IPV6 datagram format? 4 1 2
But an increased number of IT addresses isn't the only advantage of IPv6 over
IPv4. In honor of World IPv6 Day, here are six more good reasons to make sure
your hardware, software, and services support IPv6. IPv6 reduces the size of
routing tables and makes routing more efficient and hierarchical
70. 4 10 Compare broadcast and multicast routings. 4 3 2
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
72. 4 12 give an example the shortest path routing algorithms used in computer 4 3 2
networks.?
Shortest path routing. Shortest path routing refers to the process of finding paths
through a network that have a minimum of distance or other cost metric. Routing
of data packets on the Internet is an example involving millions of routers in a
complex, worldwide, multilevel network
73. 4 13 Define the open loop congestion control? 4 2 2
Open loop congestion control policies are applied to prevent congestion before it
happens. The congestion control is handled either by the source or the
destination. Policies adopted by open loop congestion control – Retransmission
Policy : It is the policy in which retransmission of the packets are taken care.
74. 4 14 List out any two policies that affect congestion at transport, network and data link 4 1 2
layers?
UNIT-V
81. 5 1 Why is UDP faster than TCP? 5 2 2
UDP is faster than TCP, and the simple reason is because its nonexistent
acknowledge packet (ACK) that permits a continuous packet stream, instead of TCP
that acknowledges a set of packets, calculated by using the TCP window size and
round-trip time (RTT)
82. 5 2 What is symmetric key signatures? 5 2 2
An encryption system in which the sender and receiver of a message share a single,
common key that is used to encrypt and decrypt the message. ... Symmetric-key
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
cryptography is sometimes called secret-key cryptography. The most popular
symmetric-key system is the Data Encryption Standard (DES).
83. 5 3 Define RSA technique with suitable example. 5 1 2
RSA (Ron Rivest Adi Shamir, and Len Adleman founded RSA as an independent
company in 1982)
RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means
that it works on two different keys i.e. Public Key and Private Key. As the name
describes that the Public Key is given to everyone and Private key is kept private
84. 5 4 What are the two disadvantages of cipher feedback mode? 5 2 2
1] CFB is less efficient than CBC or ECB.
2] In CFB, the patterns at the block level are not preserved.
3] In CFB there are some security issues like eve can add some ciphertext block to
the end of the ciphertext stream.
4] In CFB mode, more than one message can be encrypted with the same key, but
the value of the IV should be changed for each message. This means that Alice
needs to use a different IV each time she sends a message.
5] There is some error propagation.
85. 5 5 What is technique used in the public key cryptographic algorithms. 5 1 2
Public key algorithms are fundamental security ingredients in cryptosystems,
applications and protocols. Some public key algorithms provide key distribution and
secrecy (e.g., Diffie–Hellman key exchange), some provide digital signatures (e.g.,
Digital Signature Algorithm), and some provide both (e.g., RSA).
86. 5 6 What is Connection Management Modeling in TCP? 5 2 2
TCP is a unicast connection-oriented protocol. Before either end can send data to
the other, a connection must be established between them. ... Because of its
management of connection state (information about the connection kept by both
endpoints), TCP is a considerably more complicated protocol than UDP
87. 5 7 What is Congestion control in TCP? 5 2 2
TCP Congestion Control techniques prevent congestion or help mitigate the
congestion after it occurs. Unlike the sliding window (rwnd) used in the flow
control mechanism and maintained by the receiver, TCP uses the congestion
window (cwnd) maintained by the sender.
88. 5 8 Draw each field in the UDP header? 5 1 2
a.Mono-alphabetic Cipher –
In mono-alphabetic ciphers, each symbol in plain-text (eg; ‘o’ in ‘follow’) is
mapped to one cipher-text symbol. No matter how many times a symbol occurs in
the plain-text, it will correspond to the same cipher-text symbol.
b.Poly-alphabetic Cipher –
In poly-alphabetic ciphers, every symbol in plain-text is mapped to a different
cipher-text symbol regardless of its occurrence. Every different occurrence of a
symbol has different mapping to a cipher-text.
2. Transposition Cipher:
The transposition cipher does not deal with substitution of one symbol with
another. It focuses on changing the position of the symbol in the plain-text. A
symbol in the first position in plain-text may occur in fifth position in cipher-text.
93. 5 13 Define DES algorithm? 5 1 2
DES key length and brute-force attacks. The Data Encryption Standard is a block
cipher, meaning a cryptographic key and algorithm are applied to a block of data
simultaneously rather than one bit at a time. To encrypt a plaintext message, DES
groups it into 64-bit blocks.
94. 5 14 define RSA algorithm? 5 1 2
RSA (Ron Rivest Adi Shamir, and Len Adleman founded RSA as an independent
company in 1982)
RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means
that it works on two different keys i.e. Public Key and Private Key. As the name
describes that the Public Key is given to everyone and Private key is kept private
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
95. 5 15 What are two advantages of security services? 5 2 2
The purpose of network security, quite simply, is to protect the network and its
component parts from unauthorized access and misuse. Networks are vulnerable
because of their inherent.
characteristic of facilitating remote access
Denial of service and distributed denial of service attacks.
96. 5 16 Define message confidentiality using symmetric-keys? 5 2 2
Confidentiality can be achieved through Symmetric Key Encryption (SE). In the
following sections we will study about symmetric key encryption schemes and
their properties. ... Encryption: A randomized algorithm that takes a plaintext m
and the key K as an input, and produces the cipher text c as the output
97. 5 17 What is message integrity and authentication ? 5 2 2
message integrity. The validity of a transmitted message. Message integrity
means that a message has not been tampered with or altered. The most common
approach is to use a hash function that combines all the bytes in the message with
a secret key and produces a message digest that is difficult to reverse.
In cryptography, a message authentication code (MAC), sometimes known as a
tag, is a short piece of information used to authenticate a message—in other
words, to confirm that the message came from the stated sender (its authenticity)
and has not been changed.
98. 5 18 Define Digital Signatures? 5 2 2
A digital signature guarantees the authenticity of an electronic document or
message in digital communication and uses encryption techniques to provide
proof of original and unmodified documentation.
Digital signatures are used in e-commerce, software distribution, financial
transactions and other situations that rely on forgery or tampering detection
techniques.
A digital signature is also known as an electronic signature
99. 5 19 What is asymmetric-key cryptography? 5 2 2
Asymmetric cryptography, also known as public key cryptography, uses public and
private keys to encrypt and decrypt data. The keys are simply large numbers that
have been paired together but are not identical (asymmetric). One key in the pair
can be shared with everyone; it is called the public key. The other key in the pair is
kept secret; it is called the private key. Either of the keys can be used to encrypt a
message; the opposite key from the one used to encrypt the message is used for
decryption.
100. 5 20 Define the services of SCTP? 5 2 2
SCTP provides uses Process-to-Process Communication and also uses all well-
known ports in the TCP space and also some extra port numbers. 2. Multiple
Streams: TCP is a stream-oriented protocol. ... SCTP allows multi stream service in
each connection, which is called association in SCTP terminology