Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

University questions

Unit-3
1. Explain the need for ICMP with a suitable example.
2. An ISP is granted a block of addresses starting with
150.80.0.0/16.the ISP wants to distribute these blocks to
2600 customers as follows
i)The first group has 200 medium size businesses;each
need 128 addresses.
ii)The second group has 400 small businesses;each need
16 addresses.
iii) The third group has 2000 households ;each need 4
addresses.
Design the sub blocks and give the slash notation for
each sub block.Find out how many addresses are still
available after these allocations.

3. . An ISP is granted a block of addresses starting with


190.100.0.0/16.The ISP needs to distribute these
addresses to 3 groups of customers as follows:
a)Group 1 has 64 customers each needs 256 addresses.
b)Group 2 has 128 customers each needs 128 addresses.
c)Group 3 has 128 customers each needs 64 addresses.
Design the sub blocks and give the slash notation for
each sub block.how many addresses are still available
after these allocations?
4. Differentiate circuit switching and packtet switching
with suitable application example.
5. Illustrate IPV4 header format and compare with IPv6.
6. change the following IPv4 addresses from dotted-
decimal notation to binary notation.
i)111.56.45.78
ii)221.34.7.82
7. An ISP is granted a block of addresses starting with
201.101.0.0/16(65,536 addresses).The ISP needs to
distribute these addresses to two groups of customers as
follows:
i)The 1 group has 64 customers;each customer needs 256
addresses.
ii) The 2 group has 128 customers;each customer needs
64 addresses.
8. Explain the working of address Resolution protocol
with an example.
9.i) outline IPv4 classful and classless addressing with
examples.
ii) Assume that you are given a network ID
165.121.0.0.you are responsible for creating subnets on
the network and each subnet must provide at least 900
host IDs.What subnet mask meets the requirement for
the minimum number of host IDs and provides the
greatest number of subsets?
10. Discuss the mechanism involved in IPV6
addressing.also compare IPV4 with IPV6.
11. Discuss in detail about packet switching techniques
with its suitable example.
12. Describe the error reporting using ICMP protocol.
How dose Trace route program makes use of ICMP to
determine the name and addresses of the routers
between source and destination?
13. Explain the strategies involved in transition of Ipv4 to
Ipv6 in detail with neat sketch.
14. Describe circuit-switching and packet-switching with
an example.
UNIT-4:

1. Differentiate Distance Vector Routing and Link State


Routing.Discuss how these routing techniques work.
2. Explain the multicast routing DVMRP in detail.
3. What are the different routing algorithms?List out
their pros and cons.
4. Explain What is Distance Vector Routing and
Demonstrate how distance table gives routing table.
5. Explain when is multicasting used and explain how it
differs from unicasting.
6. In a network,the weights are given by link-state
packets and contain information such as the
routers,traffic costs.find the shortest path from node
F to all others.
A

4 2 2
1 C 3 B
F
3 4
1 5 2
D
3 E 4 G

7. Outline Distance Vector Routing with an example and


relevant Diagrams.
8. Explain the working mechanism of routing information
protocol.
9. Define multicasting and explain in detail about
multicast address.give example.

UNIT-V BIG QUESTIONS

1.Explain the error detection method used in computer


networks.
2.i) Compare and contrast guided and unguided media
for transmission.
ii)One channel with bit rate of 190kbps and another with
a bit rate of 180kbps are to be multiplexed using TDM
with no synchronization bits.
a) What is the size of the frame in bits?
b) What is the data rate?
3. Explain in detail about the error and flow control
mechanisms employed at data link layer.
4.i) A message that is to be transmitted is represented by
the polonomial M(x)=x5+ x4+x with a generating prime
polonomial G(x)= x3+ x2+1.Generatena 3 bit CRC code,c(x)
which is to be appended to M(x).
5. Discuss the effectiveness of selective repeat
ARQ(Automatic repeat request) among the sliding
window protocols.
6. Illustrate the working of CRC code with C(7,4) where
n=7,k=4 codeword-1001110
Give the division in the CRC decoder for two cases.
(i) Data word accepted (ii) Dataword Discarded
7. What is wireless communication? List out some
wireless technologies available. Compare the
characteristics of the various wireless 802.11
standards.
8. Explain the architecture of IEEE 802.11 wireless LAN.
9. Explain the operation of Go-Back-N protocol.

You might also like