Professional Documents
Culture Documents
Question Bank
Question Bank
2. Distinguish between TCP/IP and OSI reference models. Which model is more popular
and why?
3. Define topology and explain the advantages and disadvantages of Bus, Star and Ring
topologies.
7. Explain the working of transport, session, presentation and physical layer of OSI model
given by IEEE.
8. Describe the various technologies (each in brief) that can be used to form a LAN.
9. Discuss the TCP/IP protocol suit on the basis of protocol layering principle.
10. Draw the layer diagram of TCP/IP protocol suit and explain it briefly.
11. List the various layers of OSI model. Briefly explain the working of each of them.
14. What are the two reasons for using layered protocols?
15. An aloha network user 19.2 kbps channel for sending message packets of 100 bit long
size. Calculate the maximum throughput for pure AlOHA network.
16. Calculate the CRC for 10-bit sequence 1010011110. The generator polynomial is x3+x+1.
18. Sketch the Manchester and differential Manchester encoding for the bit stream:
0001110101
19. Describe the working and cooperation of data link layer for IEEE OSI model.
20. What are the different types of error detection methods? Explain the CRC error detection
technique using generator polynomial x4+x3+1 and data 11100011.
22. Two neighboring nodes A and B uses sliding window protocol with 3 bit sequence
number. As the AQR
After A send frame 0,1,2 and receive ACK from B for 0 and 1.
23. Describe with the help of suitable diagram the Go-back-N continuous RQ error control
scheme.
24. A series of 8-bit message blocks(frames) is to be transmitted across a data ling using a
CRC for error detection. A generator polynomial of 11001 is to be used. Use an example
to illustrate the following:
25. A string 01111 011111 0111111 0 need to be transmitted at the data link layer. What is
the sring actually transmitted after bit stuffing?
26. Sketch the Manchester encoding for the bit stream 0001110101.
27. Discriminate between the send window and receive window for link and how are they
related with
28. A stop and wait protocol uses a 100 kbps satellite link which employs a round-trip
propagation delay of 250 ms approximately. Find out the percentage of time the sender Is
blocked to wait for acknowledgement, if the frame size is 1000 bits.
29. What is hamming code? Explain the working with suitable example.
30. A channel has a bit rate of 4 kbps and propagation delay of 20 msce. What will be the
size of frame range so that stop and wait give an efficiency of at least 50%?
31. What are the problems faced by the pipelining over an unreliable communication
channel? How these problems are overcome?
32. How much min. bandwidth is required to digitally transmit an analog stream which is
generated at 50kHz after Manchester encoding?
33. Discuss different carrier sense protocols. How they are different than collision-free
protocols?
34. Describe the access method used by Ethernet (IEEE) network, and the cable and
connectors used by Ethernet network.
36. Discuss the advantages and disadvantages of FDDI and Ethernet LAN technologies.
37. An Aloha network user 19.2kbps channel for sending message packets of 100bit long
size. Calculate the
38. Prove that the throughput of network using slotted Aloha can be given as S=Ge-G Where
G is load and S is throughput.
39. Why is the channel throughput double in slotted ALOHA compare to pure ALOHA?
40. How do connection-free protocols differ from connection-orinted protocols? Discuss any
one protocol of connection-free category.
41. How bridge is different form repeater? What are the advantages and disadvantages of
each? State with reason whether an LAN can be extended to any size by increasing the
number of repeater or not?
42. How FDDI ring can be used as a back bone to connect LANs and computers? Also
discuss the FDDI cabling in brief.
43. Compare the delay of pure ALOHA and slotted ALOHA at low band width.
46. What is the band rate of standard 10Mbps 802.3 LAN? Explain your answer.
48. An ATM user uses a token bucket scheme for traffic shaping. A new token is put into
bucket every 5μs. What is the maximum sustainable net data rate (excluding header bits).
49. Differentiate between static and dynamic routing with their pros and con. Give example
of some routing protocols used in both type of routing.
51. What is count to infinity problem? How it can be solved using the split horizon
algorithm? What are its limitations?
52. Why the leaky bucket algorithm allow just one packet per tick irrespective of packet size?
53. Why the reassembly of packet is done at destination instead of intermediate system in
internet?
i. Multicast addressing
57. What is fragmentation? Why do we need it? Discuss pross and cons of transparent and
non-transparent fragmentation.
59. What are the limitations of leaky bucket algorithm? How these are overcome?
60. What do you understand by internetworking? Discuss the parameter on which network
differ.
63. Convert the IP address whose hexadecimal representation is C22F15B2 to doted decimal
notation.
64. A class B N/W on the internet has a subnet mask of 255.255.240.0. What is the maximum
number of hosts per subnet?
65. Why do we need subnet mask? Perform the sub netting of the following:
IP address :160.111.xx
Amount of subnets: 6.
66. Give the brief introduction of IPv6 and IPv4 addressing with example and draw the
format figure of IPv6 datagram.
68. Explain how do ARP and RARP map IP addresses onto data link layer such as Ethernet?
69. Sketch the IP header neatly and explain the function of each field. List major differences
between IPv4 and IPv6.
70. With the aid of an example, explain why sub netting was introduces. Hence state the
meaning of a subnet router and an address mask. What is the maximum number of hosts
which a n/w on internet having a subnet mask of 255.255.240.0 can handle?
71. What are the deficiencies of IPv4? How IPv6 was modified to overcome these
deficiencies? What are the advantages of using IPv6?
74. What are the problems encountered the releasing a connection in transport layer? Give
some solution applicable to it.
75. Write a short note on 3 way handshake. Discuss different QoS parameters of transport
layer.
76. Discuss the working and major difference between TCP and IP.
77. Discuss close, blind, listen and accept procedures used in socket implementation.
78. Describe at least 4 major tasks performed by the TCP in favor of network application.
79. Discuss the RCP design and implementation issues.
80. With the aid of a time sequence diagram, explain how logical connection between 2 TCP
entities is established using 3 way hand shake procedure. Include in your diagram the
socket primitives at both client and server side that trigger the sending of each segment.
Also explain how the initial sequence number in each direction is selected?
81. Explain the transport service primitives. What do you understand by term: “3 way
handshake”? Explain the problem which is solved by the 3 way handshake.
82. Explain the TCP segment header. Also discuss the TCP connection management.
83. Explain the protocol of transport layer design for multimedia application.
85. What are the different frames types used in MPEG? Discuss in brief.
86. What is the need of data compression in multimedia? Explain different steps of JPEG
compression.
87. Write an algorithm used in encrypting data over the network expert RSA.
89. Generate the public key and private key for the following numbers using RSA algorithm
93. Show the working of the RSA algorithm with suitable example.
94. What is the procedure for compressing data using run-length encoding?
i. POP3
ii. IMAP
c. Mention the DNS message format for query and reply messages.
103. Explain why DNS is required with internet and describe its main functional parts.
In relation to DNS, explain why hierarchical naming structure is used instead of a flat
structure?
105. When a web page is sent out, they are prefixed by MIME headers. Why?
107. What is the difference between static and dynamic web pages?