CN Question Bank

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

BHARATI VIDYAPEETH (DEEMED TO BE UNIVERSITY)

COLLEGE OF ENGINEERING, PUNE


B.Tech CSBS SEM-VI
Subject-Computer Networks
UNIT 1

1. Explain various types of network based on size with diagram.


(Also differentiate in tabular form)
2. Explain different types of topology with diagram.
3. Explain working of Hub, Switch bridge and Routers in detail with diagram.
4. Explain in detail OSI reference model with diagram.
5. Classify various types of transmission media with diagram.
6. Describe Ethernet cabling in detail.
7. Describe the following concepts in detail: –
i. Twisted Pair Cable
ii. Coaxial cable
iii. Optic Fiber Cable
8. Explain fiber optic modes of propagation with diagram.
9. Explain different network devices with diagram? (also comparison in
tabular form)
10. Explain in detail with diagram: Wired LAN, Wireless LAN, Virtual LAN

UNIT 2

1. Explain the various error detection and correction Mechanisms used in


computer network
2. Discuss about
i. GO BACK N ARQ
ii. Selective repeat ARQ
iii. Stop and wait protocol
3. Explain sliding window protocol in detail. Compare and contrast the
GO BACK-N ARQ protocol with selective repeat ARQ.
4. Explain about the Carrier Sense Multiple Access Protocols?
5. Describe in detail with diagram about-
i. CSMS/CD
ii. CSMA/CA
6. Describe sliding window protocol using Go back n.
7. Explain various error detection and correction methods in detail.
8. Explain the working of CRC in detail.
9. A bit stream 10011101 is transmitted using the standard CRC method.
The generator polynomial is x3+1
i. What is the actual bit string transmitted?
ii. Suppose the third bit from the left is inverted during
transmission. How will receiver detect this error?
10.A bit stream 1101011011 is transmitted using the standard CRC
method. The generator polynomial is x4+x+1. What is the actual bit
string transmitted?
11.A bit stream 1001101 is transmitted using hamming code. Show the
actual bit string transmitted. Suppose 7th bit from left is inverted during
transmission show that this error is detected and corrected at the
receivers end.

UNIT 3

1. List the difference between circuit switching and Packet switching.


2. Explain circuit switching and packet switching in detail.
3. Compare IPV6 and IPV4. Draw and explain IPV6 header format.
4. Draw and explain IPv6 header. Explain significance of extension header.
5. Explain in detail:
a. ARP
b. RARP
c. BOOTP
6. Write note on DHCP.
7. Explain routing protocols RIP and BGP with diagram.
8. Explain path vector routing. Discuss its advantages over distance vector
routing.
9. Explain different Unicast Routing Protocol.
10.Explain in detail Unicast Routing Protocols:
a. Distance Vector Routing (RIP)
b. Link State Routing (OSPF)
c. Path Vector Routing (BGP)
UNIT 4
1. Explain DNS. Explain DNS message format. Also explain its various
resource records with one example.
2. Explain with diagram:
1) TELNET
2) Email
3) Bluetooth
4) Firewall
5) DNS
3. Explain FTP. Can we specify file transfer in a webpage? Explain with the
help of suitable example. Explain any four FTP commands.
4. Explain HTTP in detail. Explain HTTP request and reply message.
5. Explain in detail : SNMP
6. Explain SNMP in detail. Why SNMP needed in Computer network.
Explain any four SNMP commands.

UNIT 5
1. Explain Multiplexing in detail. Explain any 2 types of multiplexing in
brief with its application.
2. Write a note on FDM.
3. What is Frequency division multiplexing? How does it work? How does
it different from WDM and TDM.
4. Write a note on WDM.
5. Explain TDM in detail.
6. Explain spread spectrum in detail.
7. What is spread spectrum. Explain different spread spectrum techniques
with its advantages.
8. Write a note on FHSS.
9. Write a note on DSSS.

UNIT 6
1. Explain in detail E-mail Security.
2. Write a note on E-Mail Security Services
3. Explain in detail directory services and network management.
4. Explain various components of cryptography.
5. Explain different cryptographic techniques used in Computer network.
Explain the following cryptographic techniques used in Computer
networks.
6. Differentiate symmetric and asymmetric encryption?
7. Explain about OSI Security architecture model with neat diagram.

You might also like