Computer Network Imp Questions

  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Computer Network Imp Questions as PDF for free.

More details

  • Words: 980
  • Pages: 4
DRONACHARYA COLLEGE OF ENGG GR. NOIDA COMPUTER NETWORK

Subject Code : TCS-602

CSE/IT VIth

1. a) Explain OSI reference model. Clearly indicate function of each layer. Compare OSI model with TCP/IP protocol suite. Write merit and demerits of both,. b) Explain topology of computer networks. Define categories of network. c) Differentiate between bit rate and baud-rate . A modem constellation diagram has data point at coordinate : (1,1), (1,-1),(-1,1) and (-1,-1). How many bps can modem with these parameters achieve at 1200 baud? 2. (a) What is the role of transmission media in network. Explain guided & unguided media. Also write details of fiber optical cable used. (b) Differentiate message, circuit & packet switching. Explain services ,architecture and use of ISDN. (c) (c). I n a certain communication channel, the signal power is 100W and the noise power is 10W. In order to send information at the rate of 10 Kbps, what is required bandwidth? 3 (a) What do you mean by character & bit stuffing. Give examples. Why minimum size of frame is required in a LAN? (b) Explain HDLC, SDLC, BSC, SLIP, LCP, NCP protocols. (c) For data 0001110101 draw Manchester & diff. man. Coding. 4. (a) The codeword is received as 1100 1001 01011. Check whether there are errors in the received code word, if the divisor is 10101.(The divisor corresponds to the generator polynomial). (b) A seven bit hamming code is received as 1110101. What is the correct code? (c) Write the steps to compute the checksum in CRC code. Calculate CRC for the frame 110101011 and the generator polynomial =x4+x+1 & write the transmitted frame.

5. (a) A bit stream 10011101 is transmitted using the standard CRC method . The generator polynomial is x3+1. Show the actual bit string transmitted. Suppose the third bit from left is inverted during transmission .Show that the error is detected at the receiver’s end. (b) A bit string 0111101111101111110 , needs to be transmitted at the data link layer. What is the string actually transmitted after bit stuffing. (c) A channel has a bit rate of 4 kbps & propagation delay of 20 msec. For what range of frame sizes does stop and wait gives an efficiency of at least 50%. 6. (a) What is need of min. frame size ? If it is 64 bytes then calculate the loss of bandwidth for 100 Mbps Ethernet Network? (b) Fast Ethernet has the same 64 bytes min. frame size but can get bits out ten times faster. How is it possible to maintain the same min. frame size? How much bandwidth loss will occur in this case? (c) Why is the channel throughput doubled in slotted ALOHA compared to pure ALOHA? 7. (a) Explain CRC generator. Explain hamming code with an example. (b) Explain sliding window protocol & piggybacking with suitable example. 8. (a) Derive formula for pure & slotted ALOHA. (b) Explain CSMA/CD & collision free protocols. (c) Compare 802.3, 802.4, 802.5. Explain types of bridges. 9. (a) Explain distance vector routing with an example. Compare with Dijkstra algorithm. (b) A computer on a 6-Mbps network is regulated by token bucket. Token bucket filled at a rate of 1 Mbps. It is initially filled to a capacity with 8 megabits. How long can computer transmit at the full 6 Mbps?

10. (a) Explain congestion control & prevention methods. (b) An ATM network uses a token bucket scheme for traffic shaping. A new token is put into bucket every 5 microsec. What is the max. sustainable net data rate(excluding the header bits)? 11. (a) Explain use of tunneling & functioning of firewalls. (b) Explain ARP, RARP, IPv4 & IPv6 with their frame format. Explain IPv4 & IPv6 addresses .Compare both. 12. (a) Explain special addresses used in IPv4 . Explain quality of services w.r.t. transport layer. (b) Explain transport layer primitives & Berkely Unix primitives. (c) Show by calculations how many network each IP address class can have with one example. 13. (a) Explain three way handshake protocols. (b) Explain TCP & UDP protocols. (c) A class B network on internet has a subnet mask of 255.255.240.0. What is the max. no. of hosts per subnet? 14. (a) Explain silly window syndrome, Jacobson and Nangle algorithm. (b) Perform the subnetting of the following IP address 160.111.X.X. Original subnet mask is 255.255.0.0 , number of subnets 6(six) 15. (a) Explain multimedia , JPEG, MPEG. (b) Explain DNS , SMTP, MIME, FTP, TFTP. (c) How do contention-free protocols differ from contention-oriented protocols? Discuss any one protocol of contention –free category.

16. (a) Explain delivery protocols,X.25, Frame relay, Jitter control & ATM. (b) Explain URL, WWW, HTTP & WAP. 17. (a) Explain wireless LAN, Novell netware & FDDI.. (b) How is bridge different from a repeater? What are the advantage and disadvantages of each? State with reason whether an LAN can be extended to any size by increasing the number of repeaters or not? 18. (a) Explain flooding, count to infinity problem & split horizon problem. (b) Explain leaky bucket & token bucket algorithm suitable diagram. 19. (a) A company is granted a site address 201.70.64.0.The company needs six subnets. Design the subnets. (b) What is count-to-infinity problem? How is it addressed in link state routing protocol? For following subnet, distance vector routing is used and the vectors that have just come in to route C: from B(5,0,8,12,6,2); from D:(16,12,6,0,9,10); and from E:(7,6,3,9,0,4). The measured delays to B,D,and E are 6,3, and 5 respectively. What is C’s new routing table? Give both the outgoing line to use and the expected delay? 20. (a) An IP packet has arrived with the first few hexadecimal digits as shown below: 45000028000100000102………………… How many hops can this packet travel before being dropped? The data belong to which upper layer protocol? (b) Explain DES , Triple DES & RSA with suitable examples .Compare Secret and Public key algorithms.

Related Documents

Imp Questions
June 2020 34
Computer Network
May 2020 19
Computer Network
June 2020 26
Computer Network
July 2020 24
Computer Network
June 2020 35