Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

NARAYANA ENGINEERING

COLLEGE::NELLORE
Permanently affiliated to JNTUA Ananthapuramu,
Approved by AICTE,
Accorded ‘A’ grade by Govt. of AP, Recognized by UGC
2(f) & 12(B),
ISO 9001:2015 certified Institution, Approved with ‘A+’ Grade by NAAC

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING


2 Mark Questions and Answers

 Course Details
Class: Fourth Year, B. Tech Semester: I Year: 2020-21
Course Title: DATA COMMUNICATIONS & NETWORKING Course Code: 15A04704 Batch: 2017-21
Program/Dept.: ECE Coordinator: Dr K .S.SAGAR REDDY Credits: 3
Regulation: R-15 Section: A,B
2 MARKS QUESTIONS

Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
Unit -1
1. 1 1 Differentiate simplex and duplex communication system. (Reg-Nov-2018) 1 3 2
Simplex mode:
In simplex mode, Sender can send the data but that sender can’t receive the
data. It is a unidirectional communication.
Full duplex mode:
In full duplex mode, Sender can send the data and also can receive the data
simultaneously. It is two-way directional communication simultaneously.

2. 1 2 Define Data Communication. 1 1 2


Message. The message is the data or information to be communicated. It
may consist of text, number, pictures, sound,...
• Sender. Sender is a device that sends message. The message can
consist of text, numbers, pictures etc. it is also called...
• Receiver. Receiver is a device that receives message. It is also
called sink. The receiver can be computer, printer or...
• Medium. Medium is the physical path that connects sender and
receiver. It is used to transmit data. The medium can be a

3. 1 3 What is fundamental purpose of data communications 1 2 2


Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
The fundamental purpose of data communications is to exchange
information between user's computers, terminals and
applications programs.
4. 1 4 List the types of data communication 1 1 2
Simplex,half duplex,full duplex,serial communications
5. 1 5 Define the terms data and information. 1 3 2
Data usually refers to raw data or unprocessed data. It is the basic form of data,
data that hasn’t been analyzed or processed in any manner. Once the data is
analyzed, it is considered as information. Information is "knowledge communicated
or received concerning a particular fact or circumstance."

6. 1 6 Give the components of data communication. 1 1 2


The five major components of a data communication system are a Message, a Sender, a
Receiver, a Transmission Medium and Protocol.

7. 1 7 What is ARPANET ? 1 2 2
The ARPANET (short for Advanced Research Projects Agency
Network) was the first wide-area packet-switching network with distributed
control and one of the first networks to implement the TCP/IP protocol
suite. Both technologies became the technical foundation of the Internet.

8. 1 8 What is the TCP IP protocol? 1 1 2


The TCP/IP model consists of five layers: the application layer, transport
layer, network layer, data link layer and physical layer.

9. 1 9 Define ISP? 1 3 2
Internet Service Provider (ISP) Definition - What does Internet Service
Provider (ISP) mean? An Internet service provider (ISP) is a company that
provides customers with Internet access. Data may be transmitted using
several technologies, including dial-up, DSL, cable modem, wireless or
dedicated high-speed interconnects.
10. 1 10 Define Protocol? 1 1 2
a set of rules governing the exchange or transmission of data between devices.
11. 1 11 Define OSI Model 1 2 2
The Open Systems Interconnection (OSI) model is a conceptual
model created by the International Organization for Standardization which
enables diverse communication systems to communicate using standard
protocols. In plain English, the OSI provides a standard for different
computer systems to be able to communicate with each other.

12. 1 12 What is encapsulation? 1 1 2


the process of enclosing a message or signal in a set of codes which allow
transfer across networks.
13. 1 13 What is function of Physical Layer? 1 3 2
Physical layer is the actual carrier of information between computers
• It is the most important layer, as communication between
computers cannot happen without a physical layer
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
• Data is actually carried between every adjacent node
(computers/routers) by transmission of electromagnetic/optical signals
at the physical layer over wired/wireless media

14. 1 14 define the types of addresses present in TCP/IP . 1 1 2


Internet Addresses. The Internet Protocol (IP) uses a 32-bit, two-part
address field. ... The two parts of an Internet...
• Subnet Addresses. Subnet addressing allows an autonomous
system made up of multiple networks to share the same Internet...
• Broadcast Addresses. The TCP/IP can send data to all hosts on a
local network or to all hosts on all directly connected...
• Local Loopback Addresses. The Internet Protocol defines the
special network address, 127.0.0.1, as a local loopback...

15. 1 15 what are the classes of transmission media. 1 2 2


There are two types of transmission media :
• Guided
• Unguided Guided Media :
• Unshielded Twisted Pair (UTP)
• Shielded Twisted Pair
• Coaxial Cable
• Optical Fiber Two-wire Open Lines The simplest transmission
media is a two-wire transmission line. ...
• Radio Transmission

16. 1 16 what is the purpose of cladding in an optical fiber? 1 1 2


Purpose of cladding in an optical fiber: It is necessary to keep the light
reflecting in core instead of being refracted, because we need it to pass
on to destination from source. And when light enters from denser material
into less dense material the cladding so it changes its angel, it reflects back
the light in core.

17. 1 17 what is difference between omnidirectional wave and unidirectional waves? 1 3 2


As adjectives the difference between unidirectional and omnidirectional is
that unidirectional is pertaining to only one direction, eg: where all
component parts are aligned in the same direction in space while
omnidirectional is in every direction, especially of an antenna capable of
transmitting or receiving signals in all directions, or of a microphone
capable of detecting sound from all directions.

18. 1 18 what is peer to peer process in computer network? 1 1 2


A peer-to-peer (P2P) network is group of computers, each of which
acts as a node for sharing files within the group. Instead of having a central
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
server to act as a shared drive, each computer acts as the server for the
files stored upon it.

19. 1 19 Why are standards needed in computer networks? 1 2 2


Networking standards ensure the interoperability of networking
technologies by defining the rules of communication among networked
devices. Networking standards exist to help ensure products of different
vendors are able to work together in a network without risk of
incompatibility.
20. 1 20 Discuss the mode for propagating light along optical channels. 1 1 2
There exist two modes for propagating light all along the optical channels:
i. Multimodeii. Single mode

ii. Multimode: In this mode, the numerous beams from the light source
travel through the core in several paths.Single mode: In this mode, the fiber
along with the extremely small diameter which limits the beams to the few
angles, which causes almost horizontal beam.

Unit -II
21. 2 1 Define flow control. 2 3 2
Flow control is the management of data flow between computers
or devices or between nodes in a network so that the data can be
handled at an efficient pace. Too much data arriving before a device can
handle it causes data overflow, meaning the data is either lost or must be
retransmitted.

22. 2 2 What is a virtual circuit? 2 1 2


Working of Virtual Circuit: In the first step a medium is set up between the
two end nodes. Resources are reserved for the transmission of packets.
• Congestion Control in Virtual Circuit: Once the congestion is
detected in virtual circuit network, closed-loop techniques is used. No
new connections are established when the congestion is detected.
• Advantages of Virtual Circuit: Packets are delivered to the receiver
in the same order sent by the sender. Virtual circuit is a reliable network
circuit.

23. 2 3 What are data grams? 2 2 2


A datagram is a basic transfer unit associated with a packet-switched network.
Datagrams are typically structured in header and payload sections. Datagrams
provide a connectionless communication service across a packet-switched network.
The delivery, arrival time, and order of arrival of datagrams need not be guaranteed
by the network.
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
24. 2 4 what function of circuit switching? 2 1 2
Circuit switching is a method of implementing a telecommunications
network in which two network nodes establish a dedicated
communications channel (circuit) through the network before
the nodes may communicate. The circuit guarantees the full
bandwidth of the channel and remains connected for the duration of the
communication session.

25. 2 5 What is virtual Circuit network? 2 3 2


A virtual circuit ( VC) is a means of transporting data over a packet
switched computer network in such a way that it appears as though
there is a dedicated physical layer link between the source and destination
end systems of this data. The term virtual circuit is synonymous with virtual
connection and virtual channel.

26. 2 6 What are the types of errors in the networks? 2 3 2


errors shows the number of errors that occurred while transmitting packets
due to carrier errors (duplex mismatch, faulty cable), fifo errors, heartbeat
errors, and window errors.
27. 2 7 Define minimum hamming distance ? 2 1 2
In a set of strings of equal lengths, the minimum Hamming distance is
the smallest Hamming distance between all possible pairs of
strings in that set. Suppose there are four strings 010, 011, 101 and
111. 010 ⊕ 011 = 001, d (010, 011) = 1. 010 ⊕ 101 = 111, d (010, 101) = 3.

28. 2 8 Define Linear block codes? 2 2 2


Linear block coders are a group of block coders that follow a special set
of rules when choosing which set of outputs to use. The rules are
as follows, using a (6,3) code for illustrative purposes:
29. 2 9 List out the advantages and disadvantages of Packet switching. 2 1 2
Following are the benefits or advantages of Packet switching type: ➨As
packets contain maximum length, they can be stored in the main memory
itself and not disk.This reduces access delay.Moreover packet size is fixed
and hence network will have improved delay characteristics as no
longmessages are available in the queue. As switching devices do not
require massive secondary storage, costs are minimized to great
extent.Hence packet switching is very cost effective technique.
This switching offers disadvantages too, which are listed below: 1. As the
movement of packets is not synchronous in this switching, it may not be
suitable in communication applications like voice calls; while circuit switching is
highly suitable for voice calls 2. Packets don’t move in an organized way,
sequence numbers should be provided to identify each packet; circuit switching
gives the highest priority for the channel to give the best experience to the
users
30. 2 10 Why is the wastage of resources more in circuit switching than compared to 2 3 2
packet switching?
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
Circuit switching is a switching method in which a dedicated communication path
in physical form between two stations within a network is established, maintained
and terminated for each communication session. It has basically three phases as
circuit establishment, data transfer and circuit disconnect.
Once the connection is established, the data transfer is transparent. The main
feature of such a connection is that it provides a fixed data rate channel and both
subscribers must operate at this rate, It is considered inefficient compared to
packet switching because channel capacity is completely dedicated for duration of
connection. If there is no data at any moment of time, channel capacity goes
wasted. Moreover, setting up of connection takes time.
Ordinary voice phone service is circuit-switched. The telephone company reserves
a specific physical path to the number you are calling for the duration of your call.
During that time, no one else can use the physical lines involved.

31. 2 11 What is error detection and correction? 2 1 2


Error detection is the discovery of errors, resulting from noise or other
deficiencies, while in transit from the transmitter to the receiver. Error
correction is the discovery of errors, as well as the rehabilitation of the
original, error-free data. Whenever a message is communicated, it may get
jumbled by noise, or data may get altered.

32. 2 12 define cyclic code? 2 3 2


In coding theory, a cyclic code is a block code, where the circular shifts of
each codeword gives another word that belongs to the code. They are
error-correcting codes that have algebraic properties that are convenient
for efficient error detection and correction .

33. 2 13 Define Framing ? 2 2 2


Framing is a point-to-point connection between two computers or
devices consists of a wire in which data is transmitted as a stream of bits.
However, these bits must be framed into discernible blocks of information.
Framing is a function of the data link layer.
34. 2 14 What is function of data link layer? 2 1 2
Data link layer receives the data from the network layer & divide it into
manageable units called frames.
• It then provides the addressing information by adding header to
each frame. ...
• It provides flow control mechanism to ensure that sender is not
sending the data at the speed that the receiver cannot process.

35. 2 15 What are the issues in data link layer? 2 3 2


Data Link Layer Design Issues
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
• Services to the Network Layer. In the OSI Model, each layer uses
the services of the layer below it and provides services to the layer
above it.
• Framing. The data link layer encapsulates each data packet from
the network layer into frames that are then transmitted.

36. 2 16 What is error control in data link layer? 2 1 2


Detection of Error − Transmission error, if any, is detected by either the
sender or the receiver.
• Acknowledgment − acknowledgment may be positive or negative.
• Positive ACK − On receiving a correct frame, the receiver sends a
positive acknowledge.

37. 2 17 What is access control in data link layer? 2 2 2


The medium access control (MAC) is a sublayer of the data link
layer of the open system interconnections (OSI) reference
model for data transmission. It is responsible for flow control and
multiplexing for transmission medium. It controls the transmission of data
packets via remotely shared channels. It sends data over the network
interface card.

38. 2 18 What are the two sublayers of the data link layer? 2 1 2
The data link layer has two sublayers: logical link control (LLC) and
media access control (MAC). The uppermost sublayer, LLC,
multiplexes protocols running at the top of data link layer, and optionally
provides flow control,
39. 2 19 Define HDLC? 2 3 2
HDLC (High-level Data Link Control) is a group of protocol s or rules
for transmitting data between network points (sometimes called node s). In
HDLC, data is organized into a unit (called a frame) and sent across a
network to a destination that verifies its successful arrival.
40. 2 20 Define PPP? 2 1 2
Computer Engineering Computer Network MCA Point - to - Point
Protocol (PPP) is a communication protocol of the data link layer that is
used to transmit multiprotocol data between two directly connected (point-
to-point) computers. It is a byte - oriented protocol that is widely used in
broadband communications having heavy loads and high speeds.

Unit –III
41. 3 1 What do you mean by multiple access? 3 3 2
Multiple access is a technique that lets multiple mobile users share
the allotted spectrum in the most effective manner. Since the
spectrum is limited, the sharing is necessary to improve the overall capacity
over a geographical area.

42. 3 2 What is CSMA protocol in networking? 3 1 2


Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
Short for carrier sense multiple access/collision detection, CSMA/CD is
a MAC (media access control) protocol. It defines how network
devices respond when two devices attempt to use a data channel
simultaneously and encounter a data collision.
43. 3 3 What is channelization in data communication? 3 2 2
Channelization is a multiple-access method in which the available
bandwidth of a link is shared in time, frequency, or through code, between
different stations. The three channelization protocols are FDMA, TDMA,
and CDMA. The Frequency-Division Multiple Access (FDMA):

44. 3 4 What is CSMA CD in networking? 3 1 2


Short for carrier sense multiple access/collision detection, CSMA/CD is
a MAC (media access control) protocol. It defines how network
devices respond when two devices attempt to use a data channel
simultaneously and encounter a data collision. The CSMA/CD rules define
how long the device should wait if a collision occurs.

45. 3 5 What is mean by random access protocols? 3 3 2


Random Access Protocols in DCN: In random access or contention
methods, no station is superior to another station and none is
assigned the control over another. No station permits, or does not
permit, another station to send.
46. 3 6 What is LAN in networks? 3 3 2
A local-area network (LAN) is a computer network that spans a relatively small area.
Most often, a LAN is confined to a single room, building or group of buildings,
however, one LAN can be connected to other LANs over any distance via telephone
lines and radio waves.

47. 3 7 What is ETHERNET 3 1 2


Ethernet is a standard communication protocol embedded in software
and hardware devices. It is used for building a local area network. The local
area network is a computer network that interconnects a group of
computers and shares the information through cables or wires.
48. 3 8 Which is faster Gigabit Ethernet or Fast Ethernet? 3 2 2
The main difference between fast ethernet and gigabit ethernet is the
contradicting speed where fast ethernet provides at maximum 100 Mbps of
data transmission speed whereas gigabit ethernet offers high-speed
data transmission up to 1 Gbps.

49. 3 9 What is the difference between Ethernet and Fast Ethernet? 3 1 2


The simplest of difference between them is their speed. An Ethernet,
which is working at the speed of 100 Mbps, is known as Fast Ethernet
while the one which is operating at 1000 Mbps is known as Gigabit
Ethernet. This is the basis of why they are named differently even when
they both use the same bandwidths and modes such as half and duplex.
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
50. 3 10 Which is the fastest Ethernet standard? 3 3 2
far the most common. Fast Ethernet was introduced in 1995 as the IEEE
802.3u standard and remained the fastest version of Ethernet for three
years before the introduction of Gigabit Ethernet.
51. 3 11 What is Gigabit Ethernet port used for?
Gigabit Ethernet is a version of the Ethernet technology broadly used in
local area networks (LANs) for transmitting Ethernet frames at 1
Gbps. It is used as a backbone in many networks, particularly those of
large organizations. Gigabit Ethernet is an extension to the preceding 10
Mbps and 100 Mbps 802.3 Ethernet standards.

52. 3 12 What is 802.11 mean? 3 3 2


802.11 is an evolving family of specifications for wireless local area
networks ( WLANs) developed by a working group of the Institute of
Electrical and Electronics Engineers ( IEEE ). There are several
specifications in the family and new ones are occasionally added.
53. 3 13 What is the difference between Bluetooth and wireless? 3 2 2
The main difference is that Bluetooth is primarily used to connect devices without
using cables, while Wi-Fi provides high-speed access to the internet. Bluetooth is a
wireless technology standard that is used to exchange data over short distances
(less than 30 feet), usually between personal mobile devices
54. 3 14 What is L2cap? 3 1 2
The Logical Link Control and Adaptation Layer Protocol (L2CAP) is layered over the
Baseband Protocol and resides in the data link layer. L2CAP provides connection-
oriented and connectionless data services to upper layer protocols with protocol
multiplexing capability, segmentation and reassembly operation, and group
abstractions. L2CAP permits higher level protocols and applications to transmit
and receive L2CAP data packets up to 64 kilobytes in length.
55. 3 15 What is the meaning of FDMA? 3 3 2
Frequency division multiple access (FDMA) is a channel access method used in
multiple-access protocols as a channelization protocol. FDMA gives users an
individual allocation of one or several frequency bands, or channels. It is
particularly commonplace in satellite communication.
56. 3 16 What is the difference between TDMA and FDMA? 3 1 2
In FDMA, a particular bandwidth (e.g. 6.25 kHz) at a particular frequency (e.g.
150.000 MHz) is used to define a channel. This is the way channels have been
allocated in analog land mobile radios (LMR) for decades. All information is
contained in the channel – compressed to the smallest frequency footprint.
Analog radio bandwidth has recently shrunk from 25 kHz to 12.5 kHz, which is
about the limit for analog technology without seriously degrading radio voice
quality. With digital technology, channel bandwidth can be compressed to a
spectrum-efficient 6.25 kHz by using vocoders and error correction.
In regard to TDMA and digital technology, the 12.5 kHz channel bandwidth is
maintained. The RF spectrum efficiency is achieved when two voice channels
share time to create a 6.25 kHz equivalency. TDMA technology is possible only by
using intelligent infrastructure to make and control the time slots.
57. 3 17 What is MAC network? 3 2 2
A media access control address (MAC address) of a device is a unique identifier
assigned to a network interface controller (NIC) for communications at the data
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
link layer of a network segment. MAC addresses are used as a network address for
most IEEE 802 network technologies, including Ethernet and Wi-Fi.
58. 3 18 Define Random access protocol CDMA? 3 1 2
Many terminals communicate to a single base station over a common channel.
Fixed multiple access methods (TDMA, FDMA, CDMA) become inefficient when
the traffic is bursty.
Random Access Protocols work better for many users, where each user only
occasionally sends a message
59. 3 19 Define Bluetooth base band layer? 3 3 2
The Baseband is the physical layer of the Bluetooth. It manages physical channels
and links apart from other services like error correction, data whitening, hop
selection and Bluetooth security. The Baseband layer lies on top of the Bluetooth
radio layer in the bluetooth stack.
60. 3 20 What is the difference between CSMA CD and CSMA CA? 3 1 2
Another difference between CSMA CD and CSMA CA is where they are typically
used. CSMA CD is used mostly in wired installations because it is possible to
detect whether a collision has occurred. ... 3.CSMA CD is typically used in wired
networks while CSMA CA is used in wireless networks

61. 4 1 Define distance vector routing algorithm with example? 4 3 2


A distance-vector routing protocol in data networks determines the best route for
data packets based on distance. Distance-vector routing protocols measure the
distance by the number of routers a packet has to pass, one router counts as one
hop.
62. 4 2 Define Link State routing algorithm with example? 4 1 2
Link state routing is a complex routing technique in which each router shares
information with other routers about the reachability of other networks and the
metric to reach the other networks in order to determine the best path. Routing is
the process of moving packets across a network from one host to a another.
63. 4 3 Give two differences between classful and classless addressing in IPV4? 2 2
Classful is based on the default Class A,B or C networks.

- Class A: 0 - 127 with a mask of 255.0.0.0 (/8)


- Class B: 128 - 191 with a mask of 255.255.0.0 (/16)
- Class C: 192 - 223 with a mask of 255.255.255.0 (/24)
All devices in the same routing domain must use the same subnet mask. Since
routers running a classful routing protocol do not include subnet mask
information with routing updates, the router assumes either its own subnet mask,
or defaults to the classful subnet mask.

Classless on the other hand, allows the use of variable length subnet masks, or
VLSM, because subnet mask information is included with routing updates. You can
have a mixture of different subnet masks in the same routing domain:
- 10.1.0.0/19
- 10.2.0.0/20
- 172.16.8.0/21
- 172.16.16.0/24
64. 4 4 Give the advantages of hierarchical routing? 4 1 2
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
It decreases the complexity of network topology, increases routing efficiency, and
causes much less congestion because of fewer routing advertisements. With
hierarchical routing, only core routers connected to the backbone are aware of all
routes.
65. 4 5 Define IPV6 addressing? 4 3 2
An Internet Protocol Version 6 address (IPv6 address) is a numerical label that is
used to identify a network interface of a computer or a network node
participating in an IPv6 computer network. ... In contrast to IPv4, which defined an
IP address as a 32-bit value, IPv6 addresses have a size of 128 bits.
66. 4 6 Write about congestion control algorithms? 4 3 2
Congestion control is a network layer issue, and is thus concerned with what
happens when there is more data in the network than can be sent with
reasonable packet delays, no lost packets, etc. Flow control is a local, congestion
control is global.
Congestion occurs when bandwidth is insufficient and network data traffic
exceeds capacity. Data packet loss from congestion is partially countered by
aggressive network protocol retransmission, which maintains a network
congestion state after reducing the initial data load
67. 4 7 Write any two Approaches to Congestion Control? 4 1 2
open loop congestion control –Retransmission Policy,Window Policy,Discarding
Policy,Acknowledgment Policy,Admission Policy are All the policies are adopted to
prevent congestion before it happens in the network.
Closed Loop Congestion Control:Backpressure,Choke Packet Technique,Implicit
Signaling ,Explicit Signaling
68. 4 8 Write two Design Issues in the network layer? 4 2 2
The network layer design issues :
1) Store and formed packet switching.
2) Service provided to the transport layer.
3) Implementation of connectionless service.
4) Implementation of connection-oriented source.
5) Comparison of virtual circuit and datagram submits.
69. 4 9 What are the advantages of IPV6 and IPV6 datagram format? 4 1 2
But an increased number of IT addresses isn't the only advantage of IPv6 over
IPv4. In honor of World IPv6 Day, here are six more good reasons to make sure
your hardware, software, and services support IPv6. IPv6 reduces the size of
routing tables and makes routing more efficient and hierarchical
70. 4 10 Compare broadcast and multicast routings. 4 3 2
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:

71. 4 11 Define IPv4 header? 4 1 2

72. 4 12 give an example the shortest path routing algorithms used in computer 4 3 2
networks.?
Shortest path routing. Shortest path routing refers to the process of finding paths
through a network that have a minimum of distance or other cost metric. Routing
of data packets on the Internet is an example involving millions of routers in a
complex, worldwide, multilevel network
73. 4 13 Define the open loop congestion control? 4 2 2
Open loop congestion control policies are applied to prevent congestion before it
happens. The congestion control is handled either by the source or the
destination. Policies adopted by open loop congestion control – Retransmission
Policy : It is the policy in which retransmission of the packets are taken care.
74. 4 14 List out any two policies that affect congestion at transport, network and data link 4 1 2
layers?

Policies adopted by open loop congestion control –Retransmission Policy,Window


Policy,Discarding Policy,Acknowledgment Policy,Admission Policy are All the
policies are adopted to prevent congestion before it happens in the network.
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:

Closed Loop Congestion Control:Backpressure,Choke Packet Technique,Implicit


Signaling ,Explicit Signaling
75. 4 15 What is differences between Hardware Addressing and IP Addressing 4 3 2
Stands for "Media Access Control Address," and no, it is not related Apple
Macintosh computers. A MAC address is a hardware identification number that
uniquely identifies each device on a network. ... For this reason, MAC addresses
are made up of six two-digit hexadecimal numbers, separated by colons.

An Internet Protocol address (IP address) is a numerical label assigned to each


device connected to a computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host or network
interface identification and location addressing.
76. 4 16 Define closed loop congestion control? 4 1 2
Closed Loop Congestion Control. Closed loop congestion control technique is used
to treat or alleviate congestion after it happens. Several techniques are used by
different protocols; some of them are: Backpressure : Backpressure is a technique
in which a congested node stop receiving packet from upstream node.
77. 4 17 What is Hardware Addressing ? 4 2 2
Stands for "Media Access Control Address," and no, it is not related Apple
Macintosh computers. A MAC address is a hardware identification number that
uniquely identifies each device on a network. ... For this reason, MAC addresses
are made up of six two-digit hexadecimal numbers, separated by colons.
78. 4 18 Define IP Addressing? 4 1 2
An Internet Protocol address (IP address) is a numerical label assigned to each
device connected to a computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host or network
interface identification and location addressing.
79. 4 19 What is Network Address Translation (NAT) 4 3 2
It enables private IP networks that use unregistered IP addresses to connect to the
Internet. NAT operates on a router, usually connecting two networks together, and
translates the private (not globally unique) addresses in the internal network into
legal addresses, before packets are forwarded to another network
80. 4 20 Define Load Shedding? 4 1 2
Load Shedding is a technique used in information systems, especially web
services, to avoid overloading the system and making it unavailable for all users.
The idea is to ignore some requests rather than crashing a system and making it
fail to serve any request.

UNIT-V
81. 5 1 Why is UDP faster than TCP? 5 2 2
UDP is faster than TCP, and the simple reason is because its nonexistent
acknowledge packet (ACK) that permits a continuous packet stream, instead of TCP
that acknowledges a set of packets, calculated by using the TCP window size and
round-trip time (RTT)
82. 5 2 What is symmetric key signatures? 5 2 2
An encryption system in which the sender and receiver of a message share a single,
common key that is used to encrypt and decrypt the message. ... Symmetric-key
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
cryptography is sometimes called secret-key cryptography. The most popular
symmetric-key system is the Data Encryption Standard (DES).
83. 5 3 Define RSA technique with suitable example. 5 1 2
RSA (Ron Rivest Adi Shamir, and Len Adleman founded RSA as an independent
company in 1982)
RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means
that it works on two different keys i.e. Public Key and Private Key. As the name
describes that the Public Key is given to everyone and Private key is kept private
84. 5 4 What are the two disadvantages of cipher feedback mode? 5 2 2
1] CFB is less efficient than CBC or ECB.
2] In CFB, the patterns at the block level are not preserved.
3] In CFB there are some security issues like eve can add some ciphertext block to
the end of the ciphertext stream.
4] In CFB mode, more than one message can be encrypted with the same key, but
the value of the IV should be changed for each message. This means that Alice
needs to use a different IV each time she sends a message.
5] There is some error propagation.
85. 5 5 What is technique used in the public key cryptographic algorithms. 5 1 2
Public key algorithms are fundamental security ingredients in cryptosystems,
applications and protocols. Some public key algorithms provide key distribution and
secrecy (e.g., Diffie–Hellman key exchange), some provide digital signatures (e.g.,
Digital Signature Algorithm), and some provide both (e.g., RSA).
86. 5 6 What is Connection Management Modeling in TCP? 5 2 2
TCP is a unicast connection-oriented protocol. Before either end can send data to
the other, a connection must be established between them. ... Because of its
management of connection state (information about the connection kept by both
endpoints), TCP is a considerably more complicated protocol than UDP
87. 5 7 What is Congestion control in TCP? 5 2 2
TCP Congestion Control techniques prevent congestion or help mitigate the
congestion after it occurs. Unlike the sliding window (rwnd) used in the flow
control mechanism and maintained by the receiver, TCP uses the congestion
window (cwnd) maintained by the sender.
88. 5 8 Draw each field in the UDP header? 5 1 2

89. 5 9 Write any two differences between TCP and UDP? 5 2 2


TCP is a more complex protocol than UDP which makes it a tad bit harder to spoof,
but these complications are rarely a serious obstacle. TCP is "more reliable" than
UDP,
UDP segments can get lost without a trace or arrive in the wrong order.
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
90. 5 10 Describe any two Design Goals of ATM Networks? 5 2 2
 Dynamic bandwidth for bursty traffic meeting application needs and
delivering high utilization of networking resources; most applications are or can be
viewed as inherently bursty, for example voice is bursty, as both parties are neither
speaking at once nor all the time; video is bursty, as the amount of motion and
required resolution varies over time.
• Smaller header with respect to the data to make the efficient use of bandwidth.
• Can handle Mixed network traffic very efficiently: Variety of packet sizes makes
traffic unpredictable. All network equipments should incorporate elaborate
software systems to manage the various sizes of packets. ATM handles these
problems efficiently with the fixed size cell.
• Cell network: All data is loaded into identical cells that can be transmitted with
complete predictability and uniformity.
91. 5 11 what is symmetric-key 5 2 2
An encryption system in which the sender and receiver of a message share a
single, common key that is used to encrypt and decrypt the message. ...
Symmetric-key cryptography is sometimes called secret-key cryptography. The
most popular symmetric-key system is the Data Encryption Standard (DES).
92. 5 12 What is traditional ciphers? 5 2 2
The two types of traditional symmetric ciphers are Substitution Cipher and
Transposition Cipher. The following flowchart categories the the traditional
ciphers:
1. Substitution Cipher:
Substitution Ciphers are further divided into Mono-alphabetic Cipher and Poly-
alphabetic Cipher.

a.Mono-alphabetic Cipher –
In mono-alphabetic ciphers, each symbol in plain-text (eg; ‘o’ in ‘follow’) is
mapped to one cipher-text symbol. No matter how many times a symbol occurs in
the plain-text, it will correspond to the same cipher-text symbol.
b.Poly-alphabetic Cipher –
In poly-alphabetic ciphers, every symbol in plain-text is mapped to a different
cipher-text symbol regardless of its occurrence. Every different occurrence of a
symbol has different mapping to a cipher-text.
2. Transposition Cipher:
The transposition cipher does not deal with substitution of one symbol with
another. It focuses on changing the position of the symbol in the plain-text. A
symbol in the first position in plain-text may occur in fifth position in cipher-text.
93. 5 13 Define DES algorithm? 5 1 2
DES key length and brute-force attacks. The Data Encryption Standard is a block
cipher, meaning a cryptographic key and algorithm are applied to a block of data
simultaneously rather than one bit at a time. To encrypt a plaintext message, DES
groups it into 64-bit blocks.
94. 5 14 define RSA algorithm? 5 1 2
RSA (Ron Rivest Adi Shamir, and Len Adleman founded RSA as an independent
company in 1982)
RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means
that it works on two different keys i.e. Public Key and Private Key. As the name
describes that the Public Key is given to everyone and Private key is kept private
Questio Topic Learning Outcomes/ Question Bank/ MCQ/ Lab Experiments/ Tutorial Task
TLO. Unit Marks
n Labels to the right indicate: CO=Course Outcome, BL=BLOOMS level. CO BL
No: No: per Q
No On completion of the Lecture/ Tutorial/ Lab on a topic, students must be able to:
95. 5 15 What are two advantages of security services? 5 2 2
The purpose of network security, quite simply, is to protect the network and its
component parts from unauthorized access and misuse. Networks are vulnerable
because of their inherent.
characteristic of facilitating remote access
Denial of service and distributed denial of service attacks.
96. 5 16 Define message confidentiality using symmetric-keys? 5 2 2
Confidentiality can be achieved through Symmetric Key Encryption (SE). In the
following sections we will study about symmetric key encryption schemes and
their properties. ... Encryption: A randomized algorithm that takes a plaintext m
and the key K as an input, and produces the cipher text c as the output
97. 5 17 What is message integrity and authentication ? 5 2 2
message integrity. The validity of a transmitted message. Message integrity
means that a message has not been tampered with or altered. The most common
approach is to use a hash function that combines all the bytes in the message with
a secret key and produces a message digest that is difficult to reverse.
In cryptography, a message authentication code (MAC), sometimes known as a
tag, is a short piece of information used to authenticate a message—in other
words, to confirm that the message came from the stated sender (its authenticity)
and has not been changed.
98. 5 18 Define Digital Signatures? 5 2 2
A digital signature guarantees the authenticity of an electronic document or
message in digital communication and uses encryption techniques to provide
proof of original and unmodified documentation.
Digital signatures are used in e-commerce, software distribution, financial
transactions and other situations that rely on forgery or tampering detection
techniques.
A digital signature is also known as an electronic signature
99. 5 19 What is asymmetric-key cryptography? 5 2 2
Asymmetric cryptography, also known as public key cryptography, uses public and
private keys to encrypt and decrypt data. The keys are simply large numbers that
have been paired together but are not identical (asymmetric). One key in the pair
can be shared with everyone; it is called the public key. The other key in the pair is
kept secret; it is called the private key. Either of the keys can be used to encrypt a
message; the opposite key from the one used to encrypt the message is used for
decryption.
100. 5 20 Define the services of SCTP? 5 2 2
SCTP provides uses Process-to-Process Communication and also uses all well-
known ports in the TCP space and also some extra port numbers. 2. Multiple
Streams: TCP is a stream-oriented protocol. ... SCTP allows multi stream service in
each connection, which is called association in SCTP terminology

You might also like