This document contains a summary of the topics covered in 5 units of the Computer Networks course along with related questions. It covers definitions and concepts in computer networks like topologies, protocols, OSI model, TCP/IP model and various networking standards. The questions range from short answer type to explanations of networking concepts and protocols. This appears to be a study guide for students to prepare for their exam on the key concepts taught in the Computer Networks course.
1. KGISL INSTITUTE OF TECHNOLOGY-KITE
Dept. of Computer Science and Engg.
SUBJECT: COMPUTER NETWORKS
CLASS: BE-CSE-V-Semester
UNIT-1
PART A
1. Define computer network.
2. What are the three criteria necessary for an effective and efficient
network?
3. What are the three fundamental characteristics determine the
effectiveness of the data communication system?
4. What is IEEE 802.4 Standard?
5. Why are protocols needed?
6. Why are standards needed?
7. For n devices in a network, what is the number of cable links required for
a mesh and ring topology?
8. What is main purpose of the second ring in the FDDI protocol?
9. Distinguish between peer-to-peer relationship and a primary-secondary
relationship.
10. Assume 6 devices are arranged in a mesh topology. How many cables are
needed? How many ports are needed for each device?
11. Group the OSI layers by function.
12. What are header and trailers and how do they get added and removed?
13. The transport layer creates a communication between the source and
destination. What are the three events involved in a connection?
14. What are network support layers and user support layers?
15. Difference between network layer delivery and transport layer delivery.
KGiSL institute of technology page 1
2. 16. What are the difference between service point address, logical, address
and physical address?
17. Name some services provided by application layer.
18. List the two types of data frames in FDDI.
19. State the purpose of layering in networks?
20. At which level of OSI model does repeaters, bridges, routers and
gateways operate?
21. State the difference between token ring and FDDI.
22. Define Jitter.
23. What is multicast? What is the difference between unicast and
multicast?
24. Differentiate between Logical address and Physical address.
25. With the example explain half duplex communication.
26. Difference between random access and controlled access.
PART-B
1. Explain the OSI-ISO model I of computer with neat diagram. (16)
2. a. With relevant examples differentiate between simplex, half duplex
and full duplex communication. (4)
b. List the three main functions performed by the data link layer of the
ISO OSI model. (4)
c. Explain the working of carrier sense multiple access protocol. (8)
3. (i)Explain in detail the network topologies. (10)
(ii) Explain different components of computer network. (6)
4. Discuss in detail about standard ETHERNET. (8)
5. Discuss in detail about Gigabit Ethernet and fast Ethernet (8)
6. Explain in detail about controlled access. (8)
7. Discuss in detail about wireless LAN and different wireless LAN standards.
(8)
8. Explain in detail about TCP/IP model. (16)
9. a.Discuss in detail about CSMA/CD and its persistence methods. (10)
KGiSL institute of technology page 2
3. b. Explain the categories of network. (6)
10. a .Explain about ALOHA and Slotted ALOHA protocol. (8)
b. Discuss how CSMA/CA protocol used to access the medium. (8)
UNIT-2
PART A
1. What are the responsibilities of data link layer?
2. Mention the types of errors.
3. What is redundancy?
4. List out the available error detection methods.
5. Write short notes on VRC and LRC.
6. Write short notes on CRC.
7. What is hamming distance?
8. What are the Flow control with noise free protocol
9. Write short notes on CRC generator and checker.
10. What is the purpose of hamming code?
11. How Stop and Wait protocol provide Flow control.
12. Define flow control.
13. What is the size of sliding window used in Go-Back-N and selective
repeat protocol?
14. Give the structure of encoder and decoder in error correction.
15. Assume a Go-Back-N protocol is used with a window size of 4 and that
the ACK for packet 2 get lost. Show the events until packet 2 is
acknowledged at the sender side.
16. What is the necessity of flow control?
17. What is the use of sliding window?
18. What do you mean by Automatic Repeat Request (ARQ)?
19. What is a transparent bridge?
20. What is piggy bagging?
KGiSL institute of technology page 3
4. 21. List the frame types in HDLC.
22. Difference between GO-BACK-n and selective repeat ARQ.
23. Write the difference between bridge and routers.
24. What are the Forward and blocking ports?
25. What is the use of spanning tree bridges.
PART B
1. Write short notes on GO Back N ARQ
2. Write short notes on Selective Repeat ARQ with timing diagram.
3. (i).Explain CRC with an example. (8)
(i).Explain LRC and VRC with example. (8)
3. (i).What are hamming codes? Explain with an example. (10)
(ii).Explain Stop and Wait ARQ. (6)
4. Explain HDLC in detail. (16)
5. What is the size of sliding window for different error control
protocols? And reason for that.
6. Briefly discuss different Flow control and Error control protocols.
7. (i).Define bridge. Explain the various issues in constructing the
spanning tree bridges. (12)
(ii).Define transparent and source routing bridge. (4)
8. Discuss in detail about Flow control with error free protocols.
9. What is piggy bagging? Explain the operation of piggy bagging.
10. Briefly discuss in detail about Error detection and correction
techniques.
UNIT III
PART-A
1. What are the network support layers and the user support layers?
2. List the advantages of cyclic codes.
3. Identify the source port number and destination port number from the
following dump of a UDP header in hexadecimal format.
06 32 00 OD 00 1C E2 17
KGiSL institute of technology page 4
5. 4. Define Fragmentation offset
5. Write the difference between bridge and routers.
6. What are headers and trailers and how do they get added and removed?
7. What are the responsibilities of network layer?
8. What is a virtual circuit?
9. What are datagrams?
11. What is meant by switched virtual circuit?
12. What is meant by Permanent virtual circuit?
13. Define Routers.
14. What is meant by hop count?
15. How can the routing be classified?
16. What is time-to-live or packet lifetime?
17. What is meant by brouter?
18. Write the keys for understanding the distance vector routing.
19. Write the keys for understanding the link state routing.
20. How the packet cost referred in distance vector and link state routing?
21. Find the error if any the following IP address.
a. 111.56.045.78
b. 75.45.301.14
22. Where the routing table is maintained also state the purpose of
maintaining a routing table.
23. What is subnetting?
24. What is a subnet mask? Explain with an example.
25. List out the attributes in distance vector routing table.
26. What is the subnet work address if the destination address is
200.45.34.56 and the subnet mask is 255.255.240.0.?
PART-B
1. Find the class of each IP address given suitable explanation.
i. 227.12.14.87
ii. 193.14.56.22
KGiSL institute of technology page 5
6. iii. 14.23.120.8
iv. 252.5.15.111
v. 134.11.78.56
vi. 000 000 00 1111 0000 11111111 00110011
vii. 10000000 1111 0000 11111111 00110011
2. State the major difference between Vector Routing and link state
routing.
3. What are the limitations of distance vector routing?
4. Explain IP addressing method.
5. Explain Distance vector routing protocol in detail with example.
6. Explain Link State Routing protocol with example.
7. Explain Dijikstra’s algorithm and explain how to construct a shortest
path tree.
8. Discuss RIP and OSPF protocol.
9. Discuss about router and its architecture.
10. Explain how to address a network by using IPV4.
UNIT -IV
PART A
1. What are the services provided by transport layer protocol?
2. What is the difference between network service and transport service?
3. List some of the Quality of service parameters of transport layer.
4. What is the purpose of sequence control?
5. How transport layer performs Duplication control?
6. What is the methods to improve QoS?
7. What is traffic shaping? Name two methods of shape traffic?
8. What is the use of sequence numbers?
9. What determine the sender Window size in TCP
10. What is Traffic descriptor?
11. What is the methods to improve QoS?
KGiSL institute of technology page 6
7. 12. What is necessity of flow control
13. What is multicast? What is the difference between unicast and
multicast?
14. What are the two multiplexing strategies used in transport layer?
15. Why transport layer extends host to delivery to process
16. State why telnet uses network virtual terminal?
17. What is the service provided by TCP?
18. Difference between UDP and TCP.
19. What are the four aspects related to the reliable delivery of data?
20. What is meant by segment?
21. The transport layer creates the connection between source and
destination.
22. What are the three events involved in the connection?
23. Why the congestion occurs in network?
24. What is the purpose of Domain Name System?
25. Discuss the three main division of the domain name space.
26. Discuss the TCP connections needed in FTP.
27. Discuss the basic model of FTP.
28. What is the function of SMTP?
29. What is the difference between a user agent (UA) and a mail transfer
agent (MTA)?
30. How does MIME enhance SMTP?
31. Give the format of HTTP request message.
32. Give the format of HTTP response message.
33. Write down the three types of WWW documents.
34. What is the purpose of HTML.
KGiSL institute of technology page 7
8. PART B
1. Explain a congestion control algorithm. (16)
2. Explain the duties of Transport layer. (8)
3. Explain the various fields of TCP header with the help of a neat diagram.
(16)
4. Explain the various steps that are followed in releasing a TCP connection.
(16)
5. Discuss about congestion control in frame relay. (16)
6. With neat architecture, explain TCP in detail. (16)
7. Discuss how multiplexing and demultiplexing is done in the transport
layer. (8)
8. Explain in detail the mechanism in transport layer for controlling
congestion. (8)
9. Explain UDP in detail. (16)
10. Explain leaky bucket and token bucket algorithm. (16)
11. Explain in detail the File transfer protocol . (8)
12. Discuss the features of HTTP and also discuss how HTTP works. (16)
13. Explain DNS with reference to its components and working. (16)
14. Write short notes on SMTP. (8)
UNIT-V
PART-A
1. What are storage area networks?
2. Difference between peer to peer and host to host network.
3. What are overlay networks?
4. Define Adhoc networks.
5. Difference between wired and wireless networks.
6. What are optical networks?
7. What is clustering?
KGiSL institute of technology page 8
9. 8. Define Hierarchical routing.
9. What are cluster heads?
10. List out the network simulators.
11. What are the applications of Adhoc network?
12. What is sensor network?
13. What is access point?
14. What are the applications of Overlay networks?
15. Draw an overlay mesh network.
16. Difference between Overlay and network layer multicast.
17. Write sensor node characteristics and application.
18.List the benefits of P2P network.
19. Discuss the characteristics of P2P network.
20.Distinguish between structured and unstructured P2P network.
21.Give examples for P2P network.
22.List out the benefits of storage area network.
23.Discuss the advantages of wireless network.
24. List of the components of SAN.
25.Define Flooding.
PART-B
1. Explain the working procedure in wireless sensor network.
2. Distinguish between Adhoc and Infrastructure network.
3. Write short notes on overlay networks.
4. Explain in detail about storage area networks.
5. Explain in detail about optical network.
6. Explain the hardware components present in a Sensor node. (8)
7. Explain the architecture of P2P network with neat sketch.
8. Compare client server architecture with P2P architecture. (8)
9. Explain the characteristics and advantages of Optical networks. (8)
10. Discuss the merits and demerits of wireless network. (8)
KGiSL institute of technology page 9