Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

2

VALLIAMMAI ENGNIEERING COLLEGE


SRM Nagar, Kattankulathur – 603203.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
QUESTION BANK

SUBJECT: CS6551 – COMPUTER NETWORKS

SEM / YEAR: IV/ II

UNIT I - FUNDAMENTALS & LINK LAYER

Building a network – Requirements – Layering and protocols – Internet Architecture –


Network software – Performance ; Link layer Services – Framing – Error Detection –
Flow control
PART A
S.
QUESTIONS LEVEL COMPETENCE
NO
1 Describe computer networks. BTL -1 Remember
What differentiates a computer network from other types of
2 BTL -1 Remember
networks?
3 Differentiate Internetworking and Intranetworking? BTL -5 Evaluate
4 How would you describe routing? BTL -1 Remember
5 Can you list three general classes of failure? BTL -1 Remember
In what way would you summarize circuit switched and
6 BTL -4 Analyze
packet switched networks?
7 Summarize router and gateway. BTL -4 Analyze
8 Compare and contrast Unicast, Multicast, and Broadcast. BTL -1 Remember
9 Define protocol. BTL -2 Analyze
Can you interpret what is happening in synchronous time
10 BTL -4 Analyze
division multiplexing?
11 How would you describe Multiplexing and Demultip lexing? BTL -3 Apply
12 Compare LAN, WAN and MAN. BTL -6 Create
How would you illustrate the basic idea behind error
13 BTL -3 Apply
detection?
14 Discuss about socket. BTL -3 Apply
What would happen if the acknowledgement to the original
15 BTL -6 Create
packet is lost? Draw the timeline for this scenario.
16 Demonstrate your understanding of character stuffing. BTL -2 Understand
17 How would you formulate Shanon’s Theorem? BTL -2 Evaluate
Solve How many bits of data in a transcontinental channel with
18 a one-way latency of 50ms and a bandwidth of 45Mbps can BTL -5 Evaluate
hold?
How would you summarize Manchester encoding? Draw the
19 BTL -1 Remember
NRZ encoding for the bit stream 0010111101000010.
20 Can you discriminate bandwidth and latency? BTL -2 Understand
3

PART B
i. How would you summarize the challenges faced in
building a network? (7)
1 BTL -1 Remember
ii. Explain in detail about internet architecture with neat
diagram? (6)
i. Examine OSI architecture with neat diagram. (7)
2 ii. Evaluate and explain about your understanding about BTL -5 Evaluate
network software. (6)
i. Explain in detail about sockets. (7)
3 ii. Summarize about performance of computer BTL -3 Apply
network.(6)
Will you state and describe in your own words about a model
4 BTL -2 Understand
for Two – Dimensional parity?(13)
i. Write a note on any two physical links.(7)
5 ii. Based on what you learn develop a model for Internet BTL -1 Remember
Checksum Algorithm. (6)
i. How would you illustrate your view of Cyclic
Redundancy Check? (7)
6 ii. BTL -2 Understand
Obtain the 4 bit CRC code for the data bit sequence
10011011100 using the polynomial x4+x2+1. (6)
i. Write short notes on Reliable transmission. (7)
7 BTL -3 Apply
ii. Write short notes on Framing. (6)
8 Explain in detail about Stop-and-wait protocol. (13) BTL -5 Evaluate
i. Describe Sliding Window Protocol in detail. (7)
9 ii. How frame order and flow control is achieved using BTL -1 Remember
the data link layer? (6)
Explain the following encoding schemes with examples.
i. NRZ (4)
10 BTL -2 Understand
ii. NRZI (4)
iii. Manchester (5)
11 Describe how bit stuffing works in HDLC Protocol. (13) BTL -4 Analyze
i. Discuss the issues in the data link layer. (7)
12 BTL -4 Analyze
ii. Discuss the issues in the transport layer. (6)
13 Explain in detail the error-detecting codes. (13) BTL -1 Remember
i. Draw the OSI network architecture and explain the
14 functionalities of each layer in detail. (7) BTL -6 Create
ii. Describe any one technique used for error detection.(6)
PART C
Given a remainder of 111, a data unit of 10110011 and a divisor
1 of 1001 is there an error in the data develop a justification for BTL -6 Create
your answer with necessary principles. (15)
Consider a bus LAN with a number of equally spaced stations
with a data rate of 9 Mbps and a bus length of 1 km. what is the
mean time to send a frame of 500 bits to another station,
measured from the beginning of transmission to the end of
2 BTL -4 Analyze
reception? Assume a propagation speed of 150 m/s. if two
stations begin to monitor and transmit at the same time, analyze
how long does it need to wait before an interference is noticed?
(15)
4

Suppose we want to transmit the message 11001001 and protect


it from errors using the polynomial X3+1.Use polynomial long
3 BTL -5 Evaluate
division to assess and determine the message that should be
transmitted. (15)
Formulate CRC using polynomial long division method for
4 BTL -6 Create
the following data: M(x) = 10011010 C(x) = 1101. (15)

UNIT II - MEDIA ACCESS & INTERNET WORKING

Media access control – Ethernet (802.3) – Wireless LAN’ s – 802.11 – Bluetooth –


Switching and bridging – Basic Internetworking (IP, CIDR, ARP, DHCP,ICMP )
PART A
1 Describe Media Access Control. BTL -1 Remember
2 How would you describe repeater? BTL -1 Remember
3 How will you summarize an Ethernet Adaptor? BTL -5 Evaluate
4 Define Exponential backoff. BTL -1 Remember
5 Define Bluetooth. BTL -1 Remember
6 Can you classify the steps of Scanning? BTL -4 Analyze
7 Can you explain what Piconet is? BTL -4 Analyze
8 How would you describe access point? BTL -1 Remember
9 Differentiate switching and bridging. BTL -2 Understand
10 Can you explain virtual circuit switching? BTL -4 Analyze
11 Illustrate the function of hop by hop flow control. BTL -3 Apply
12 How will you develop a virtual private network? BTL -6 Create
13 What examples can you find to illustrate tunneling? BTL -3 Apply
14 Show your understanding about payload. BTL -3 Apply
How would you design Class A, Class B and Class C of IP
15 BTL -6 Create
addresses?
16 Discuss the scaling concerns that the CIDR addresses. BTL -2 Understand
Give the ARP packet format for mapping IP addresses into
17 BTL -2 Understand
Ethernet addresses.
18 Summarize the DHCP packet format. BTL -5 Evaluate
19 How would you define ICMP? BTL -1 Remember
20 Differentiate forwarding and routing. BTL -2 Understand
PART B
i. How will you describe the Physical properties of
Ethernet (802.3)? Detail your answer with neat
1 illustration? (7) BTL -1 Remember
ii. Describe in detail about access protocols in IEEE802.3
Ethernet. (6)
i. How would you demonstrate your understanding of
problems about Ethernet LAN? (7)
2 BTL -5 Evaluate
ii. Explain in detail about collision avoidance in Wi‐Fi
(802.11). (6)
How would you describe about Bluetooth and explain with
3 BTL -2 Understand
neat sketch about its architecture? (13)
5

i. Explain Switching and Bridging with neat diagram. (7)


4 ii. How would you differentiate Switching and Bridging? BTL -2 Understand
(6)
i. Summarize your understanding about virtual Circuit
switching. (7)
5 ii. Given the comparison between different wireless BTL -1 Remember
technologies. Enumerates 802.11 protocol stacks in
detail. (6)
Explain in detail about the service model and global addressing
6 BTL -2 Understand
of Internet Protocol. (13)
Explain in detail about datagram forwarding and subnetting in
7 BTL -3 Apply
IP. (13)
i. Explain the functions of MAC layer present in IEEE
8 802.11 with necessary diagrams. (7) BTL -4 Analyze
ii. Define ARP. Describe the details with neat diagram.(6)
i. Will you state and summarize in your own words about
CIDR. (7)
9 BTL -1 Remember
ii. Evaluate the working DHCP protocol with its header
format. (6)
10 Based on what you learn develop a model of ICMP? (13) BTL -3 Apply
i. Describe the CSMA/CD protocol and comment on its
11 performance for medium access. (7) BTL -4 Analyze
ii. Write short notes on FDDI, Bridges and switches.(6)
i. Discuss the design procedure to build wireless LAN
network. (7)
12 BTL -1 Remember
ii. Describe how MAC Protocol operators on a token ring.
(6)
i. What is common ETHERNET implementation?
13 Discuss about the sub layer. (7) BTL -5 Evaluate
ii. Explain and differentiate FDDI and Ethernet. (6)
i. Generalize about Transparent bridges, MACA and
14 MACAW. (7) BTL -6 Create
ii. Generalize about DHCP and ICMP. (6)
PART C
With the neat sketches, formulate and explain the working
1 BTL -6 Create
principle of simple bridges. (15)
Consider sending a 3500-byte datagram that has arrived at a
router R1 that needs to be sent over a link that has an MTU size
of 1000 bytes to R2. Then it has to traverse a link with as MTU
2 of 600 bytes. Let the identification number of the original BTL -4 Analyze
datagram be 465. How many fragments are delivered at the
destination? Analyze the parameters associated with each of
these fragments. (15)
Summarize the token access mechanism used in FDDI
3 BTL -5 Evaluate
networks. (15)
Use IEEE 802.3 and IEEE 802.11 to generalize the differences
4 BTL -6 Create
between wired and wireless LANS. (15)
6

UNIT III – ROUTING

Routing (RIP, OSPF, metrics) – Switch basics – Global Internet (Areas, BGP, IPv6),
Multicast – addresses – multicast routing (DVMRP, PIM)
PART A
1 Compare and contrast Forwarding and Routing. BTL -1 Remember
2 How would you describe Interior Gateway Protocol (IGP)? BTL -1 Remember
Can you differentiate the two different classes of routing
3 BTL -5 Evaluate
protocol?
4 How would you describe distance vector routing? BTL -1 Remember
5 In what way would you rank convergence? BTL -1 Remember
6 Define count to infinity problem. BTL -4 Analyze
7 Interpret about split horizon with poison reverse. BTL -4 Analyze
8 Define Split horizon. BTL -1 Remember
9 Discuss about RIP. BTL -2 Understand
10 Define Link State Routing. BTL -4 Analyze
11 Can you infer the sketch of IPv6 Packet Header? BTL -3 Apply
12 Give the OSPF header format. BTL -6 Create
13 Define Reliable Flooding. BTL -3 Apply
14 Explain Load Balancing. BTL -3 Apply
15 Illustrate about Switching. BTL -6 Create
16 Write in your own words about Line Rate. BTL -2 Understand
17 Can you compare IPv4 and IPv6? BTL -2 Understand
What examples can you find to demonstrate compute delay for
18 BTL -5 Evaluate
the packet?
19 How would you show your understanding of Multicast? BTL -1 Remember
Based on what you know, generalize the term Network Address
20 BTL -2 Understand
Translation.
PART B
i. Describe in detail about Switching and Forwarding.(7)
1 ii. Can you substitute an alternative protocol for PIM? BTL -1 Remember
Justify your answer. (6)
i. Apply your understanding about Packet format of
IPv6.(7)
2 BTL -5 Evaluate
ii. Apply your understanding about Global Unicast
Addresses of IPv6. (6)
i. How would you summarize the challenges in inter
domain routing? (7)
3 BTL -3 Apply
ii. How would you summarize the basics of BGP and
common AS relationship and policies? (6)
i. Describe in detail about RIP. (7)
4 BTL -2 Understand
ii. Discuss about subnetting. (6)
i. Can you discuss in detail what is happening in link
5 state? (7) BTL -1 Remember
ii. What is internet multicasting? Explain in details.(6)
i. With a neat diagram explain distance vector routing
6 BTL -3 Apply
protocol. (7)
7

ii. Explain the working of Protocol Independent Multicast


(PIM) in detail. (6)
i. Examine the elements used in defining the Multicast.
Explain in detail. (7)
7 BTL -2 Understand
ii. Apply your understanding about Multicast Addresses.
(6)
i. Point out the function of DVMRP? Narrate in detail.(7)
8 ii. Describe in detail the operation of OSPF protocol by BTL -4 Analyze
considering a suitable network. (6)
9 Describe in detail about reliable flooding. (13) BTL -1 Remember
i. Generalize and explain about Multicast address. (7)
10 ii. Explain the RIP algorithm with a sample example of BTL -5 Evaluate
your choice. (6)
i. Discuss the IP addressing methods. (7)
11 BTL -4 Analyze
ii. Explain about ipv6? Compare ipv4 and ipv6. (6)
i. Write short notes on ARP. (7)
12 BTL -2 Understand
ii. Differentiate ARP and RAPP. (6)
Compare and contrast different types switching
13 BTL -1 Remember
methodologies. (13)
Describe with example how CIDR addresses the two scaling
14 BTL -6 Create
concerns in the internet? (13)
PART C
Analyze how the protocol Independent multicast protocols
1 scale well in environments where a relative small proportion of BTL -4 Analyze
routers want to receive traffic for certain group? (15)
With the neat sketches generalize the algorithm of link state
2 BTL -6 Create
routing and explain the same. (15)
Consider hosts A and B have been assigned the same IP address
on the same Ethernet, on which ARP is used B starts up after A.
3 BTL -5 Evaluate
What will happens to A’s existing connections? Explain how’
self –ARP might help with is problem. (15)
Why subnetting is necessary? With suitable example, develop
4 BTL -6 Create
the concept of subneting in class B network. (15)

UNIT IV - TRANSPORT LAYER

Overview of Transport layer – UDP – Reliable byte stream (TCP) – Connection


management – Flow control – Retransmission – TCP Congestion control – Congestion
avoidance (DECbit, RED) – QoS – Application requirements.
PART A
1 How would you describe the header format of UDP? BTL -1 Remember
What ideas can you point out that TCP is a reliable byte stream
2 BTL -1 Remember
protocol?
3 Differentiate UDP and TCP. BTL -5 Evaluate
4 How would you describe the header format of TCP? BTL -1 Remember
5 Can you list the three ways of handshake? BTL -1 Remember
6 Measure the performance of TCP State Transition Control. BTL -4 Analyze
7 Define nagle’s algorithm. BTL -2 Understand
8 What would you infer from the term RTT? BTL -1 Remember
8

9 Define Estimated RTT. BTL -2 Understand


10 Summarize what is happening in Congestion Control. BTL -4 Analyze
11 Define RED. BTL -3 Apply
12 Analyze the value or importance of Congestion Window. BTL -6 Create
13 Apply your understanding of AIMD. BTL -3 Apply
14 Give the processes involved in Slow Start. BTL -3 Apply
15 Combine your opinion about integrated service. BTL -6 Create
What examples can you find to demonstrate Quality of service
16 BTL -4 Analyze
approaches?
17 How would you show your understanding of admission control? BTL -2 Understand
Based on what you know, generalize the term Differentiated
18 BTL -5 Evaluate
service?
19 How would you summarize Expedited forwarding? BTL -1 Remember
20 Can you assess the reason behind assured forwarding? BTL -2 Understand
PART B
i. How would you describe the operation of TCP with
1 neat sketch on it? (7) BTL -6 Create
ii. Explain in detail about sliding window protocol. (6)
i. Describe in detail about UDP header format with neat
sketch. (7)
2 BTL -3 Apply
ii. Describe in detail about UDP message queue technique
with neat sketch. (6)
i. How would you differentiate UDP and TCP? (7)
3 ii. Will you state or interpret in your own words about BTL -1 Remember
flow control in TCP and UDP with an example? (6)
i. Describe in detail about the three way handshake
4 protocol for connection establishment in TCP. (7) BTL -4 Analyze
ii. Describe in detail about reliable flooding. (6)
i. Discuss the Random early Detection mechanism and
derive the expression for drop probability. (7)
5 BTL -5 Evaluate
ii. Explain the differentiated services operation of QoS in
detail. (6)
How is congestion controlled? Explain in detail about
6 BTL -5 Evaluate
congestion control mechanisms in transport layer. (13)
i. How would you summarize TCP congestion control
like AIMD Slow start Fast transmit and fast
recovery?(7)
7 ii. With TCPs slow start and AIMD for congestion control, BTL -2 Understand
show how the window size will vary for a transmission
where every 5th packet is lost. Assume an advertised
window size of 50 MSS. (6)
i. Explain in detail about congestion avoidance in TCP
like DEC-bit. (7)
8 BTL -1 Remember
ii. Explain in detail about Source based congestion
avoidance (6)
i. Why TCP does use an adaptive retransmission and
describes its mechanism? (7)
9 BTL -2 Understand
ii. Describe how reliable and ordered delivery is achieved
through TCP? (6)
9

Based on what you know, generalize the term differentiated


10 BTL -3 Apply
services? (13)
What conclusions can you draw in analyzing RSVP protocol?
11 BTL -2 Understand
Support your answer with a neat sketch. (13)
i. Explain the principles of concession control in TCP.(7)
12 ii. Explain the following TCP heater and Adaptive flow BTL -4 Analyze
control.(6)
How is congestion controlled? Explain in details the TCP
13 BTL -1 Remember
congestion control. (13)
Define UDP. Discuss the operation of UDP. Explain UDP
14 BTL -1 Remember
checksum with an example. (13)
PART C
Explain the adaptive transmission mechanism and how it has
1 evolved time as the Internet community has gained more BTL -4 Analyze
experience using TCP. (15)
Generalize each field of the format of the TCP packet header.
2 Specify the justification for having variable field lengths for the BTL -6 Create
fields in the TCP header. (15)
Explain about UDP and TCP features with neat diagrammatic
3 BTL -5 Evaluate
representation. (15)
Describe with examples the three mechanisms by which
4 BTL -6 Create
congestion control is formulated in TCP. (15)

UNIT V - APPLICATION LAYER

Traditional applications -Electronic Mail (SMTP, POP3, IMAP, MIME) – HTTP – Web
Services – DNS – SNMP
PART A
1 How would you describe the message format of SMTP? BTL -1 Remember
2 Can you list the five types of HTTP result codes? BTL -1 Remember
3 How would you rank the hierarchy of name servers? BTL -5 Understand
4 Analyze the value or importance of SNMP. BTL -1 Remember
5 Can you list the three basic pieces of MIME? BTL -1 Remember
Can you interpret what is happening in the state transition of
6 BTL -4 Analyze
IMAP?
7 Differentiate IMAP and SMTP. BTL -4 Analyze
8 Test what would happen when you try to open a URL? BTL -1 Remember
9 Can you summarize what is happening in TCP connection? BTL -2 Understand
10 Explain Management Information Box. BTL -4 Analyze
11 How would you describe a Web Service? BTL -3 Apply
12 How would you summarize SOAP message structure? BTL -6 Create
13 How would you apply your understanding of WSDL? BTL -3 Apply
What information would you use to generalize the view that
14 BTL -3 Apply
SIP is an application-layer protocol?
15 Define Routing overlay. BTL -6 Create
16 Illustrate the protocol used for simple mail exchange. BTL -2 Understand
17 Define name resolution. BTL -2 Understand
10

18 Compare GET and SET in SNMP. BTL -5 Evaluate


19 Demonstrate B2B integration with example? BTL -1 Remember
Based on what you know, generalize the term Message
20 BTL -2 Understand
Exchange Pattern?
PART B
i. Describe in detail about Traditional applications.(7)
1 ii. What approach would you used to demonstrate BTL -6 Create
network management protocol? (6)
What elements would you use to demonstrate the MIME
2 BTL -3 Apply
type? Explain in detail. (13)
i. Summarize the request message format of HTTP.(7)
3 BTL -5 Evaluate
ii. Summarize the response message format of HTTP.(6)
Describe in detail about the following in Electronic mail.
i. Message format (5)
4 BTL -1 Remember
ii. Message transfer (4)
iii. Mail reader (4)
i. Summarize how SMTP transfers message from one
host to another host with suitable illustration.(7)
5 BTL -5 Evaluate
ii. Can you associate the functions performed by DNS?
Give example. (6)
i. Write short notes on DNS. (7)
6 BTL -4 Analyze
ii. Write short notes on FTP. (6)
i. Discuss the advantage of DNS. (7)
7 BTL -1 Remember
ii. Write notes on URLS. (6)
How S-MIME provide better security for E-Mail? Discuss in
8 BTL -2 Understand
detail. (13)
i. Explain Telnet in detail. (7)
9 ii. Illustrate the role of POP3 in electronic mail BTL -1 Remember
applications. Explain in detail. (6)
10 Describe in detail about SOAP in web services. (13) BTL -3 Apply
Discuss the functions of SNMP in detail. (7)
11 BTL -2 Understand
Discuss various versions of SNMP in detail. (6)
i. Can you substitute an alternative protocol for IMAP?
12 Justify your answer. (7) BTL -2 Understand
ii. Describe in detail about the WSDL in web services. (6)
13 Analyze the RSA algorithm with illustration. (13) BTL -4 Analyze
i. Explain the elements of network management in detail.
14 (7) BTL -1 Remember
ii. Explain the operation of SNMP protocol in detail. (6)
PART C
Analyze the message format and the message transfer and the
1 underlying protocol involved in the working of the electronic BTL -4 Analyze
mail. (15)
Generalize how SMTP protocol is used in E-mail
2 BTL -6 Create
applications? (15)
3 Explain in detail about web service architecture. (15) BTL -5 Evaluate
Generalize the structure of data encryption standard list
4 BTL -6 Create
various security services. (15)

You might also like