Sie sind auf Seite 1von 12

2m:

Unit 1:

1. What are the components of data communication?


2. Define block coding.
3. Group the OSI Layers by Function.
4. Determine the maximum length of the cable (in km) for transmitting data at a rate of 500
Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the
cable to be 2,00,000 km/s.
5. For n devices in a network, what is the number of cable links required for a mesh and ring
topology
6. Encode the following bits 0010111101000010 using NRZ and Manchester.
7. State in which layer of ISO/OSI the following scenario occurs.
Providing independence from different data representation
Ensuring reliable transmission of data
8. What are header and trailers and how do they get added and removed?
9. For n devices in a network, what is the number of cable links required for a mesh and ring
topology.
10. Why wires are twisted in case of twisted pair of transmission medium?
11. Assume 6 devices are arranged in a mesh topology. How many cables are needed?
12. Mention A,B,C network topologies from the given diagram,

13. Encode the following bits 0010111101000010 using NRZ-L and Manchester.
14. Define socket. Which layer is responsible for Process to process communication?
15. Draw TCP/IP layer diagram.
Unit 2:

1. What is hamming distance for each of the following code words:


D(10000,00000) , D(11111,11111)
2. What is Bluetooth?
3. Expand ICMP and write the function.
4. Mention the categories of flow control.
5. What is the Hamming distance between 001111 and 010011?
6. Distinguish Token ring, Token bus and FDDI
7. When a switch is said to be congested?
8. Why switching is used and what kind of switching is used in jio networks?
9. Compare and contrast flow control and Error control.
10. Mention the technology names relevant to the IEEE projects:
802.4 , 802.5 802.11 802.15.1 , 802.16 , 802.3ae-2002
11. Define the type of the following destination addresses:
4A:30:10:21:1O:1A
47:20:1B:2E:08:EE
FF:FF:FF:FF:FF:FF
12. How can a parity bit detect a damaged data unit?
13. Why switching is used and what kind of switching is used in jio networks?
14. How is switch different from a hub?
15. What is the difference between port address, logical address and physical address?
16. Assuming there is no noise in a medium of B = 4KHz, determine channel capacity for the
encoding level 4.
17. Explain the purpose of Repeater? In which layer of ISO/OSI model it is used?
18. What are the various random access methods?
19. What is the significance of NAV in CSMA/CA?
20. A signal is carrying data in which one data element is encoded as two signal element. If the
bit rate is 100kbps,What is the average value of the Baud rate if C is between 0 and 1.
21. A Pure ALOHA network transmits 200 bits frame on a shared channel of 200kbps. What is
the requirement to make this frame collision free?
22. A system can download at the rate of 100 pages per second. Assume each page has 24 lines
and each line has 80 characters. Calculate the minimum bandwidth Requirement.
23. Draw Finite State Machine diagram for stop & wait protocol ARQ.
24. Write down the possibility for retransmitting the information in Stop & wait ARQ.
25. Draw the ISO-OSI layered architecture for Wireless LAN.
26. Compare Token Ring and FDDI.
27. Listout the steps for designing a local Area Network.
28. How does source quench help to integrate flow control in IP packet transmission?
29. What is the significance of SDN?
30. Find out the Hamming distance for each of the following codewords:
(a) d (10101, 10010)
(b) d (0000, 0000)
31. How does a single-bit error differ from a burst error?
32. Compare the data rates for the evolution of Ethernet.
33. In multiple-secondary communication, who uses the even-numbered slots and who uses
the odd-numbered slots?
34. List the three traditional switching methods. What are the most common today?
Unit 3:

1. What are the metrics used by routing protocol?


2. If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the
maximum number of hosts per subnet? 
3. Calculate the network address and find the host address for 192.168.100.154/27
4. Suppose host 161.115.144.19/16 wants to send a message to host 161.115.144.120/16. What
is the minimum number of routers the packets have to pass through? How is this
determined?
5. Find class of the address: 11000001 10000011 00011011 11111111
6. Mention the ipv4 address range which is used for research and small organization
7. In the IPv4 addressing format, what is the number of networks allowed under Class C
addresses?
8. If a class B network on the Internet has a subnet mask of 255.255.248.0, What is the
maximum number of hosts per subnet?
9. A computer (D) over a network of two routers (R1 and R2) and three links (L1, L2 and L3).
L1 connects S to R1;L2 connects R1 to R2; and L3 connects R2 to D. Let each link be of
length 100km. Assume signals travel over each link at a speed of 10^8 meters per second.
Assume that the link bandwidth on each link is 1Mbps. Let the file be broken down into
1000 packets each of size 1000 bits. Find the total sum of transmission and propagation
delays in transmitting the file from S to D?
10. Draw Finite State Machine diagram for DHCP.
11. Calculate the HLEN (in IPv4) value if the total length is 1200 bytes, 1176 of which is
data from the upper layer.
12. Find the class of the following IP addresses and change it from dotted-decimal notation to
binary notation
(a) 172.16.0.4
(b) 23.34.54.16
13. If a router has 20 entries in its group table, should it send 20 different queries periodically
or just one? Explain your answer.
14. Is the size of the ARP packet fixed? Explain
Unit 4:

1. What do you meant by slow start in TCP congestion?


2. How does transport layer perform duplication control?
3. What are the features of TCP Protocol?
4. Differentiate congestion control and flow control?
5. Mention the services provided by transport layer protocols?

Unit 5 :

1. What are the groups of HTTP header?


2. Mention the different levels in Domain Name System.
3. Anarkali digitally signs a message and sends it to Salim. Which key is Required for
Verification of the signature by Salim.
4. Why is HTTP protocol called as a stateless protocol?
5. Differentiate Symmetric Key and Asymmetric Key.
6. “DNS can use the services of UDP or TCP using port 53”. Discuss when UDP is used and
when TCP is used.
7. What is the name of the protocol that provides security for E-mail?
16 m:

Unit 1:

1. Discuss the transmission media in detail based on the bandwidth, attenuation factors in
data communication.
2. Assume if you want to transfer Rs.5Lakh from www.onlinesbi.com to the person x
account. What are the layers it has to cross in the reference model, Mention the task of
each layer in detail.
3. Give the purpose of layering? Explain the Layered architecture of ISO/OSI model in
detail?
4. At what layer of the OSI model would you associate the following?
ICMP
UDP
Hub
Manchester Encoding

5. Define line coding. Describe RZ, NRZ-L, Manchester encoding, Differential Manchester
encoding by applying on the information sequence 101011100.
6. A company X is implementing a Local Area Network with a bandwidth of 100 Mbps. A
company requires high fault tolerance, highly secured and collision free Network. The
down time should not exceed 1m sec. Draw the Network diagram for minimum of 20
machines and Justify the cable, topology selection etcl..,
7. A 2 km long brodcast LAN has 107 bps bandwidth and uses CSMA/CD. The signal
travels along the wire at 2 X108 m/s. What is the Minimum packet size that can be used
on this network?
8. The telephone regional offices needs to be connected to every other regional office.
Which topology do you prefer for it and why?
Unit 2:

1. Obtain the 4-bit CRC code word for the data bit sequence 10011011100 (Leftmost bit is
the least significant) using the generator polynomial X^4+X^2+1
2. A computer network uses polynomial over GF(2) for error checking with 8 bits as
information bits and uses x3 + x + 1 as the generator polynomial to generate the check
bits. How the message 01011011 is transmitted in this network?

3. Compare the Ethernet architecture with Token ring


4. Explain briefly about Wifi and Wimax
5. Write a short notes on the following a) FDDI b) SDN
6. Discuss the various protocols used for Error controlling mechanism for the noisy
channels.
7. Explain in detail about IEEE 802.11 and its architecture.
8. A computer network uses polynomial over GF(2) for error checking with 8 bits as
information bits and uses x3 + x + 1 as the generator polynomial to generate the check
bits. In this network, how the message 01011011 is transmitted?
9. Determine the single error correction code for the BCD number 1001 using even parity
message 1001 (4 bits) and if a code was received as 0010001 Check if the received code
is correct or not, if not correct it.
10. Find the transmission of message is error free using CRC generator (1001) for the
message 10000110 is correct or not.
11. Mention the switching methods done in physical, datalink and network layer in detail.
12. Identify the Ethernet standard which has the speed of 100 mbps and about IEEE standard
802.3Z.
13. Given the dataword 10100011010 and the divisor 10111,

i. show the generation of the codeword at the sender site (using binary division)

ii. Show the checking of the codeword at the receiver site (assume no error)

14. Design a high speed wireless Network which can cover 10 km to 40 km range. The
Network should support high bandwidth and interoperability for mobile and Fixed users.
Draw the architecture diagram and compare with WiFi .
15. A company likes to transfer a huge block of data from System A to System D where the
systems are placed in two different regions. Which transmission protocol is suitable for
establishing a link between two systems and Justify.

16. A bit stream 10011101 is transmitted using the standard CRC method. The generator
polynomial is x3 + 1. Show the actual bit string transmitted. Suppose the third bit from
the left is inverted during transmission. Show that this error is detected at the receivers
end.
17. i) Draw and explain sliding window concept.
ii) How do you define sender and receiver window size in sliding window protocol?
ii) Analyze if the sender window size is less than 2m.
18. State the difference between Sliding window and Stop and Wait Protocol
Unit 3:

1. Explain Link state routing with an example.


2. Discuss in detail about various aspects of IPV6
3. An ISP is granted a block of addresses starting with 120.60.4.0/22. The ISP wants to
distribute these blocks to 100 organizations with each organization receiving just eight
addresses. Design the sub blocks and give the slash notation for each sub block. Find out
how many addresses are still available after these allocations.
4. Distinguish IPv4 and IPv6
5. Consider the following Host IP Address
Host A: 216.14.55.137
Host B: 123.1.1.15
Host C: 150.127.221.224
For each of the addresses indicate the following.
1.Class of address
2. Network Address
3. Default Subnet mask
4. Broadcast Address

9. An organization is granted the block 130.56.0.0/16. The administrator wants to create


1024 subnets.
a. Find the subnet mask
b. Find the number of addresses in each subnet
c. Find the first and last addresses in subnet 1
d. Find the first and last addresses in subnet 1024
10. Why classless Addressing is used? Compare it with Classful Addressing.
11. Consider the network shown in the figure.
Using distance vector routing:

Show the data that node A will receive on the first iteration of the algorithm.
Show the routing table for node A after the first iteration of the algorithm has been
completed
12. An ISP is granted a block of addresses starting with 120.60.4.0/22. The ISP wants to
distribute these blocks to 100 organizations with each organization receiving just eight
addresses. Design the sub blocks and give the slash notation for each sub block. Find out
how many addresses are still available after these allocations.
13. Why classless Addressing is used? Compare it with Classful Addressing.
14. calculate the checksum for the following IPv4 packet:
i. HVER – 4
ii. HLEN – 4
iii. Total length – 16
iv. Identification – 1
v. TTL – 4
vi. Protocol – 15
vii. Source IP address – 16.32.12.9
viii. Destination IP address – 20.14.8.2

13. Analyze the given IP packet and prove that received IP packet is not corrupted.

14. An ISP is granted a block of addresses starting with 190.100.0.0/16 (65,536 addresses). The
ISP needs to distribute these addresses to three groups of customers as follows:
a. The first group has 64 customers; each needs 256 addresses.
b. The second group has 128 customers; each needs 128 addresses.
c. The third group has 128 customers; each needs 64 addresses.
Design the subblocks and find out how many addresses are still available after these
allocations.
15. If your organization is designing a Local Area Network what kind of addressing you will
prefer, 32 bit addressing or 128 bit addressing discuss in detail.

Unit 4:

1. Explain in detail about Sliding window protocol, Go-back N and selective repeat
protocol.
2. Explain in detail about three way handshaking mechanisms in TCP? Which system call
results in the sending of SYN packets?
3. Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD)
algorithm where the window size at the start of the slow start phase is 2 MSS and the
threshold at the start of the first transmission is 8 MSS. Assume that a timeout occurs
during the fifth transmission. Find the congestion window size at the end of the tenth
transmission.
4. Write short notes on congestion control in TCP.

Unit 5 :

1. In RSA, give two prime numbers, p=19,q=23 find n and Ǿ. Choose e=5 and try to find d.
such that e and d meet the criteria.
2. Explain the role of DNS on a computer network.
3. Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP
address of the HTTP server is initially unknown. What transport and application layer
protocols besides HTTP are needed in this scenario?
4. Assume that Bob uses an e-mail client (mail reader) such as Outlook to send an e-mail to
Alice who uses a Web-based e-mail account (such as Hotmail). The IP address of Alice’s
mail server is initially unknown to Bob’s mail server. List all the transport and
application layer protocols that are involved from the time when Bob sends the e-mail to
the time when Alice reads it. Clearly indicate in which part of the transfer of the e-mail
these transport/application layer protocols are used. Explain each one in detail.
5. How Domain Name Sever works? Explain in detail.
6. Explain the working of Firewalls. Discuss in detail with neat diagram.
7. Which transport layer protocol supports the following applications?
1. Real Time Multimedia
2. E-mail Explain in detail.
8. Explain the methods used in socket programming.
9. Explain the message transfer using simple mail transfer protocol.
10. Explain the final delivery of email to the end user using POP3.
11. Explain the working of Firewalls. Discuss in detail with neat diagram.

Das könnte Ihnen auch gefallen