You are on page 1of 5

Tutorial – 1

1. What are computers? Give advantage of using computer networks.

2. What are the factors on which speed of a network depends?

3. Identify the five components of data communication systems

4. What are the four basic topologies in terms of line configuration?

5. What is an internet?

6. Draw hybrid topologies with a star backbone and four ring networks.

7. When a party makes a local telephone call to another party,is this a point to point or
multipoint connection? Explain your answer.

8. You have two computer connected by an Ethernet hub at home.Is this a LAN, a MAN
or a WAN ?explain your reason . What bare two type of line configuration?

9. Why are standards needed?

Tutorial – 2

1. What are reference models? Discuss all reference models?

2. Compare and contrast TCP/IP and OSI reference model.

3. Discuss why layering is essential in reference model. Discuss its pros and cons.

4. Define the following terms: SAP, SUBNET, PROTOCOL SERVICES, and PDU.

5 What is the difference between a port address, a logical address, and streams?

6. Define the following terms: Signals, frames, packets, segments,and streams.

7. Discuss the criticism of OSI reference model.

TUTORIAL-3

1. Write briefly about FSK,ASK,PSK.


2. Discuss shannon and nyquist theorem.
3. Draw the wave for the following bit stream using the codes.
(a) Manchester
(b) Differential manchester
(c) AMIA
(d)Unipolar NRZ
4.Discuss the advantages and disadvantages of the coding schemes.
5.If a bandwidth of a channel is 8 kbps how long does it to send a frame of 200000 bits out of the
device?
6.A signal has passed through 3 casaded amplifires ,each with a 5db gain ,How muich signal is
amplified.
7. Explain the difference betweet bit rate and baud rate .What will be the baud rate and bit rate of
the device if device propagates 300 signals/sec with 2 bits/signl.
8.What is teh maximum date rate of a channel with bandwidth of 300khz if we use 4 levels of
digital signals.
9.Calculate the bau rate for given Bit rate and type of modulation
(a) 4000bps FSK
(b) 6000bpsASK
(c) 8000bpsQPSK
(d) 72000bps64-qam
10.draw the constellation diagram for the 64QAM
11. what is the advantage of QAM over ASK and PSK?
12. Design 3 stage 200*200 switch with k=4 and n=20?
13.A constellation diagram consist of eight equally spaced points on a circle .If the bit rate is 4800
bits,
what is the baud rate .

Tutorial - 4
1. Explain the following terms
(a) Pipelining (b) Piggybacking

2.Discuss the protocols of Noisy channels


3.Compare and contrast Flow control and error control
4.Compare and contrast Bit oriented and byte oriented protocols
5.Discuss the windo size for the following protocols.
(a) Go back ARQ (b) Selective repeat

6.What would be correct CRC code for the data word 110101010 using the generator ploynomial
x2+x+1
7.Explain the characteristics that a good polynomial generator need in CRC error chekcs
8.Find the minimum hamming distance for the following cases
(a) Detection of two errors
(b)Correction of two errors
(c)Detection of 3 errors or correction of 2 errors

9.Construct the hamming code for the following bit stream 11010111
10.Explain the frame format of HDCL protocol
11.Data stream consisting of 101001101 is to be transmitted .Generate a hamming code for it
.Include a single bit error at any bit position of the received code and detect it using hamming
algorithm.

Tutorialc 5
1.Compare and contrast random access protocols with channelizing protocols.

2. What is bridge? When is it useed?How is a ridge configured ? what are the software an d
hardware components?
3.100 stations on a pure aloha network share ! mbps channel.If frames are 1000bit long find the
throughput if station is sending 10 frame per second.

4.Anetwork using CSMA/CD has bandwidth of 10 mbps.If maximum propagation time is 25.6
microseconds,what is he minimum size of the frame?

5.Create a system of 3 lans with four bridges B1-B4 connects LAN1 and LAN2, B2 connects
LAN1 and LAN3, B3 connects LAN2 and LAN3, B$ connects LAN1,2 and LAN3 .
Choose B1 as the root bridge.Show the forwarding and bloking ports after applying the spanning
tree procedure.
6.Justify the statement slotted aloha achieves double efficiency then pure aloha.
7. Explain binary exponential back off algorithm.

TUTORIAL-6
1. Explain IEEE802.3 MAC frame with neat diagram?
2. How does the Ethernet address 1A:3B:4C:6D:2E:1F appear n the line in binary.

3. What is the purpose of NIC?

4. Compare the following standard Ethernet implementation in terms of media, maximum length,
and line 10base 5, 10baseF, 10baseT, 100baseTX and 100baseFX.
5. If an Ethernet destination address 05:02:03:04:05. What is the type of address, unicast,
multicast or broadcast?
6. Compare Token ring and IEEE 802.5
7. Ethernet frames must be at least 64bytes long, why? How is it possible to maintain the frame
size in fast Ethernet?
8. Find expression for token rotation time (TRT) in token passing ring.
9. A large tone ring has 100 stations & a token rotation time of 40 msec. The token holding time is
10msec.what is the max. achievable efficiency of the ring.
10. Suppose there is heavy traffic on both a CSMA/CD LAN and a token ring LAN. A station of
which system is more likely to wait longer to send a frame? Why?

TUTORIAL-7
1.Change the following IP address from Binary notation to the dotted decimal notation

(a) 01111111 11110000 01100111 11111001


(b)10101111 11000111 11111000 00011101

2.Find the class of the following IP address


(a) 273.142.2.11
(b)208.35.54.12
(c)129.14.6.8
(d) 114.34.2.8

3.Find the Net ID and Host ID of the following IP address


(a) 117.34.3.8
(b) 132.57.8.6

4.List 3 transition strategies to move from IPV4 to IPV6


5.What is the purpose of subnetting in IP addressing ?How masking is related to subnetting .

6.The value of total length field in an IPV4 datagram is 36, and the value of header field is 5. How
may bytes of data s the packet carrying .
7. Find out why two securuity protocol are there in IPV6
8. Change the following IPV4 multicast address to Ethernet multicast address. How may of them
specify the same Ethernet address.
(a)224.17.72.8
(b)235.16.72.8
(c)237.19.6.88
(d)224.82.12.8

9. A router has following RIP routing Table

Net 1 5 B
Net 2 1 C
Net 3 2 F
Net 4 4 G

What would be the contents of table if router received the following RIP message from router C

Net 1 2
Net 2 2
Net 3 4
Net 4 8

10. What is the mechanism of stip and wait sliding window protocol ?

Tutorial – 8

1. Compare and contrast link state & distance vector routing algorithms.
2. Explain three way handshaking in TCP.
3. In what situations would synchronization points be largely unnecessary and important?
4. What is the translation method recommended by OSI model?
5. What are the two methods of encryption/decryption methods? What is the main difference
between the categories?
6. Using Dijkastra's algorithm computes the shortest path from E to all other network node

A 2 D 4 E
` F

B 1 C 1
AB = 1, BD = 3, DC = 2, DF = 2, EF = 3

7. For private key and public key encryption, discuss the key and their ownership.
8. Discuss the term reciprocity in relation to RSA algorithm.
9. Encrypt the following message using the monoalphabetics substitution with key=4
THIS IS A GOOD EXAMPLE
10. Encrypt the following message using the monoalphabetics substitution with key=4
IRGVCTXMSR MW JYR
11. Encrypt and decrypt the message "BE" using the RSA algorithm with pairs kp=3 and ks=11
and use N=15
Tutorial - 9
1.To understand the secuiry of the RSA algorithm , find Ks if Kp=7 and N=187
2.Encrypt the following bit pattern using ghe exclusive OR operation and the given kay .
(a) Plain text : 1001111111100001
(b) Key : 1000111110001111
3.What are the advangages of a mulitpoint connection over a point to point connection .
4.For n devices in a network , what is the number f cable links required for a mesh , ring bus and
star topology ?
5.What is the differnce in a central and secondary hub ? What is the difference between a pssive
and active hub ?
6.Explain CSMA/CD and its use . What part of 802 project use CSMA/CD
7.Why are two buess needed in DQDB?
8.How are slots generated in DQDB?
9. What is the advntage of implementing DQDB in ring configuraton?

Tutorial - 10

1.What is telemetry , what are different types of telemetry systems.


2.What is M, AM ,PM telemetry define their functioning and secify modulator , demodulator.
3.What are the problems associated with telemetry systems.
4. Drew IP data gram format and explain every field .
5.What is the subnet maks ?
6.Describe 10base5, 10 baseT and 10 baseF and explain their characteristic.
7.What are networking & internet working devices.
8.List functions of various types.
(a) Repeater
(b) Bridges
(c) Routers
(d) Gateways

9.What are the differences between switches and bridges.


10.What is distance vector routing what are different routing alogorithms.
11. What are the different types of services provided by ISDN
12.What are the different types of channel in an ISDN
13.Define Functional grouping , give specify action of NT1,NT2,TE1,TE2.
14.Give functions of different layers of ISDN
15.What is BROAD BAND ISDN.