Sie sind auf Seite 1von 7

08.

703 COMPUTER NETWORKS Question Bank Module 1


1. 2. 3. 4. What are the uses of Computer Networks? Compare LAN, WAN and MAN with the help of diagrams Distinguish between interface, service and protocols. List two ways in which the OSI reference model and TCP/IP reference model are the same. Also list two ways in which they differ. 5. Explain the frame format of PPP Ans: PPP Data Frame Flag: delimiter (framing) Address: ignored. (historical) Control: ignored. (historical) Protocol: upper layer protocol to which frame delivered (e.g., PPP-LCP, IP, IPCP, etc) info: upper layer data being carried check: cyclic redundancy check for error detection

6. Explain Manchester encoding and differential Manchester encoding with an example. 7. Explain Sliding window protocols. 8. Explain the various framing methods in data link layer with example for each. 9. What are the design issues for layers in network software? 10. How bit and byte stuffing done in DLL?

Bit Stuffing

(a) The original data.(b) The data as they appear on the line. (a zero after five consecutive ones) (c) The data as they are stored in receivers memory after destuffing. 11. Explain TCP/IP reference model. 12. What are the goals of layered protocol? Describe OSI model in brief.
NEED FOR LAYERING Allows Complex problems are decomposed in to small manageable units. Implementation details of the layer are abstracted. Separation of implementation and specification Layers are work as one by sharing the services provided by each other. Layering allows reuse functionality i.e., lower layers implement common once. Provide framework to implement multiple specific protocols per layer

13. Explain in detail High Level Data Link Control (HDLC) protocol architecture. 14. Compare Go-BackN, SelectiveRepeat in terms of storage and bandwidth requirements. 15. Compare connection oriented communications and connectionless communication 16. Explain the use of hamming code to correct burst error with example. 17. Explain any one DLL error correction codes. 18. How does the protocol using go-back-N efficiently make use of the long round trip delay? 19. Explain the different types of frames used in HDLC. Ans: There are three different classes of frames used in HDLC Unnumbered frames, used in link setup and disconnection, and hence do not contain ACK. Information frames, which carry actual information.

Supervisory frames, which are used for error and flow control purposes and hence contain send and receive sequence numbers

20. Sketch the Manchester encoding for the bit stream-0001110101. Ans.

21. Describe various network transmission media. 22. Explain the various functions performed by data link layer. 23. How can sliding window protocols perform flow control in a network? 24. Mention key advantages and disadvantages of stop-and-wait ARQ technique? 25. What is piggybacking? What is its advantage? 26. How the inefficiency of Stop-and-Wait protocol is overcome in sliding window protocol? 27. The following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG:01111110; ESC: 11100000 Show the bit sequence transmitted (in binary) for the four-character frame: A B ESC FLAG when each of the following framing methods are used: a. Character count. b. Flag bytes with byte stuffing. c. Starting and ending flag bytes, with bit stuffing. Ans: (a) 00000100 01000111 11100011 11100000 01111110 (b) 01111110 01000111 11100011 11100000 11100000 11100000 01111110 01111110 (c) 01111110 01000111 110100011 111000000 011111010 01111110

28. Compare virtual circuits and datagrams 29. Differentiate circuit switching, packet switching and virtual circuit. 30. For a k-bit numbering scheme, what is the range of sequence numbers used in sliding window protocol? 31. In what way selective-repeat is better than go-back-N ARQ technique? 32. Mention key advantages and disadvantages of stop-and-wait ARQ technique? Ans: Advantages of stop-and-wait ARQ are: a. Simple to implement

b. Frame numbering is modulo-2, i.e. only 1 bit is required. The main disadvantage of stop-and-wait ARQ is that when the propagation delay is long, it is extremely inefficient

33. Why is flow control needed? 34. Explain broadcasting, multicasting and unicasting. 35. What does negotiation mean when discussing network protocols? Give an example. 36. A channel has a bit rate of 4 kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of at least 50 percent? 37. In what situation Stop-and-Wait protocol works efficiently? 38. Frames of 1000 bits are sent over a 1-Mbps channel using a geostationary satellite whose propagation time from the earth is 270 msec. Acknowledgements are always piggybacked onto data frames. The headers are very short. Three-bit sequence numbers are used. What is the maximum achievable channel utilization for a. Stop-and-wait. b. Go-Back-N c. Selective Repeat solution: Let t = 0 denote the start of transmission. At t = 1 msec, the first frame has been fully transmitted. At t = 271 msec, the first frame has fully arrived. At t = 272 msec, the frame acknowledging the first one has been fully sent. At t = 542 msec, the acknowledgement-bearing frame has fully arrived. Thus, the cycle is 542 msec. A total of k frames are sent in 542 msec, for an efficiency of k/542. Hence (a) k = 1, efficiency = 1/542 = 0.18% (b) k = 7, efficiency = 7/542 = 1.29% (c) k = 4, efficiency = 4/542 = 0.74%

Module 2
1. What are the functions of media access control sublayer? 2. What is the difference between simple bridge and transparent bridge. 3. Why is that a valid frame in 802.3 should have a minimum frame length of 64 bytes? Or 4. Why do you require a limit on the minimum size of Ethernet frame? Ans: When Node A begins transmitting, the signal must propagate the network length. In the worst-case collision scenario, Node B begins to transmit just before the signal for Node As frame reaches it. The collision signal of Node A and Node Bs frame must travel back to Node A for Node A to detect that a collision has occurred.

The time it takes for a signal to propagate from one end of the network to the other is known as the propagation delay. In this worst-case collision scenario, the time that it takes for Node A to detect that its frame has been collided with is twice the propagation delay. Node As frame must travel all the way to Node B, and then the collision signal must travel all the way from Node B back to Node A. This time is known as the slot time. An Ethernet node must be transmitting a frame for the slot time for a collision with that frame to be detected. This is the reason for the minimum Ethernet frame size. The propagation delay for this maximum-extent Ethernet network is 28.8 s. Therefore, the slot time is 57.6 s. To transmit for 57.6 s with a 10 Mbps bit rate, an Ethernet node must transmit 576 bits. Therefore, the entire Ethernet frame, including the Preamble field, must be a minimum size of 576 bits, or 72 bytes long. Subtracting the Preamble (8 bytes), Source Address (6 bytes), Destination Address (6 bytes), EtherType (2 bytes), and FCS (4 bytes) fields, the minimum Ethernet payload size is 46 bytes.(Dgm)Explain different flow control techniques used in data link layer.

5. Explain priority classes in token passing bus network IEEE 802.4. 6. Explain the working and significance of the wire center. 7. Explain monitor functions in IEEE 802.5 Token passing LAN. 8. Compare the maintenance functions in IEEE 802.4 and IEEE 802.5 LANs 9. What are the different types of cabling supported by Ethernet standard? 10. What is the difference between bridge and a router? 11. Explain 802.3, 802.4, and 802.5. 12. Compare 802.3, 802.4 and 802.5 IEEE standards. 13. What are high speed LANs? Describe briefly the various types of high speed LANs used in computer communication networking. 14. Write down the differences between hub and a repeater. 15. Differentiate active hub and passive hub. 16. What are the different types of bridges? 17. How is backward learning implemented in transparent bridges. 18. Mention the advantages and disadvantages of a transparent bridge. 19. What is the advantage of token passing protocol over CSMA/CD protocol? Ans: Advantage of token passing protocol over CSMA/CD protocol:

The CSMA/CD is not a deterministic protocol. A packet may be delivered after many (up to 15) collisions leading to long variable delay. An unfortunate packet may not get delivered at all. This feature makes CSMA/CD protocol unsuitable for real-time applications. On the other hand, token passing protocol is a deterministic approach, which allows a packet to be delivered within a known time frame. It also allows priority to be assigned to packets. These are the two key advantages of token passing protocol over CSMA/CD protocol. 20. Compare and contrast Distance vector routing and Link state Routing protocol 21. Briefly explain shortest path routing 22. Briefly explain Leaky Bucket and Token Bucket Algorithms 23. Explain RIP and OSPF. 24. What is count to infinity problem? Explain. 25. Explain packet routing for mobile hosts. 26. What is QoS in internetworking? Explain some methods to improve QoS. 27. What are the most popular routing algorithms? Describe each in detail. 28. What is high speed LANs? Describe briefly the various types of high speed LANs used in computer communication networking. 29. Compare Virtual Circuits and datagrams. 30. Explain MPLS.

Module 3
1. Discuss how the limitations of IPV4 are handled in IPV6? Discuss how these two networks communicate each other. 2. Explain different IP address formats. 3. Explain IPV6 addressing. Compare IPV6 AND IPV4 packet formats What is tunnelling? 4. Explain TCP header Layout. 5. With the help of a diagram explain how connection is established in TCP? 6. Write short notes on the following internet control Protocols

1)ICMP 2)ARP 3)RARP. 7. Explain exterior routing gateway protocol briefly. 8. What are the roles played by the IGMP protocol? 9. What are the following acronyms MIME, SNMP and WWW stand for? Explain their uses and state the strength and weakness of each of them. 10. Explain DLL in internet and VoIP. 11. What is Classful and classless addressing? 12. Compare and Contrast the two TCP/IP transport protocols,TCP and UDP in terms of demultiplexing,flow control and reliability. 13. Briefly explain any three application layer protocols. 14. Explain the component of SNMP management model. 15. Describe the protocols used in Electronic Mail. 16. Discuss about the DNS. How the resource records are managed in the system. 17. What is Subnetting? Mention its advantages.

Das könnte Ihnen auch gefallen