SlideShare a Scribd company logo
1.Define Network.
    2.What are the layers in OSI Reference model?
    3.Define bandwidth and latency.
    4.List the various encoding systems
    5.What are the bit-oriented protocols in framing
    6. What is a transceiver
    7.What is WI-Max?
   8.What is the Bluetooth technology?




1. Define Network.




What are the five important components of data communication?

List two advantages of layering principle in computer networks.

   With the example explain half duplex communication.

Mention any two functions of session layer.
Name four topologies of computer networks.
Suggest two points to improve the performance of network.
With the example explain half duplex communication.
Define protocol.
Differentiate guided and unguided media?
What is the Null modem?
Define Topology.
Define standards.
What are the design factors for transmission media?
Difference between Guided media and Un guided media.
Define line Coading.
What are the most popular modems?
Define network.
What are the criteria for networks?
What is DSL.




                                PART-B
                                16 ARKS
. Explain the OSI-ISO model I of computer with neat
            diagram.(16)
            . Distinguish between Point to Point links and multi-point
            links with relevant diagram.(16)
            . (i)Compare connections oriented and connection less
            service.(8)
            (ii)Differentiate Guided media and Un Guided media. (8)
            . Write shot notes on
            a. TCP/IP protocol suite (4)
            b. Networks model (4)
            c. datagram network (4)
            d. Virtual circuit network (4)
            . Perform a comparative study between the ISO-OSI model
            and TCP/IP reference model. (16)
            6. Explain how cable TV used for data transfer?
            . Explain different switched Networks.




PART A



  2. Define Network.

     Collection of nodes that communicate with each other and also share resources.

     Interconnected collection of autonomous computers.

 2. What are the layers in OSI Reference model?
Open system Interconnection model has seven layers:

   Physical, Data Link, Network, Transport, Session, Presentation and Application layers

3. Define bandwidth and latency.

   Throughput and delay.

4. List the various encoding systems
                Manchester
                NRZ
5. Compare sentinel-oriented approach with byte-counting approach in framing.

   Uses a sentinel character at the end and contains the total size of the data.

6. What are the bit-oriented protocols in framing?
               HDLC
               SONET
7. What is the use of checksum algorithm?

   Add all the words that are transmitted and then transmits the result of the sum.

8. What is ARQ? What are the various ARQ algorithms?
                Stop-and Wait
                Sliding Window
9. What is a transceiver?

   A device attached to the tap and detects when the line is idle

10. What is the Bluetooth technology?

   Used for short-range communication between mobile phones, PDAs, etc

11. What is the hidden node and exposed node problems

   Occurs in wireless networks and has to be avoided.

12. What is WI-Max?

   It is a MAN with the maximum length of 30 miles.

13. What is a learning bridge?

   A bridge that adapts according to the traffic in the network.
PART B



  14. Describe the various data framing approaches used in networks.
  15. Explain the error detection mechanisms.
  16. Write short notes on
         1. Ethernet
         2. Token Ring
         3. Wireless
  17. Explain the various bridges.



UNIT II



PART A

  1. What is an internetwork?

     Network of networks

  2. Why is fragmentation and reassembly used?

     In an internetwork different component networks support different packet sizes

  3. What is the use of ARP and RARP?

     Address resolution by looking up a server from an IP address

  4. When is a DHCPDISCOVER message sent?

     A newly booted or attached host sends this message to a special IP address that is a
     broadcast address.

  5. What is ICMP?

     Internet Control Message Protocol defines a collection of error messages.

  6. What are virtual networks and tunnels?

     A virtual circuit is used to provide a private path between two systems leading to a VPN.
     This is called a tunnel.
7. Define routing?

      Routing finds routes for internet packets so that the delay is less and it is also efficient.

   8. List the various routing algorithms.
                   Distance vector routing
                   Link state routing
                   OSPF
   9. What is subnetting?

      Provides an elegantly simple way to reduce the total number of network numbers that are
      assigned

   10. Define CIDR?

      Classless Interdomain routing addresses the scaling concerns of large tables and network
      numbers

   11. What are the advantages of IPV6 ver IP v4?
                   Support for real-time services
                   Security support
                   Autoconfiguration
                   Enhanced Routing functionality




PART B



   12. Write in detail about the format and working of IP.
   13. Write short notes on
          1. DHCP
          2. ICMP
          3. ARP
   14. Descibe the various routing algorithms in detail.
   15. With suitable example explain the process of subnetting.



UNIT III



PART A
1. Compare UDP and TCP.

     It is a transport protocol that provides host-to-host communication

  2. Why is TCP called reliable protocol?

     It guarantees reliable, in-order delivery of a stream of bytes.

  3. What is a three-way handshake?

     Involves the exchange of three messages between the client and server and is used to
     establish and terminate a connection.

  4. What is silly window syndrome?

     The strategy of aggressively taking advantage of any available window leads to silly
     window syndrome.

  5. List out the various TCP congestion control mechanisms.
                  Additive Increase/ Multiplicative Decrease
                  Slow Start
                  Fast Retransmit and Recovery




  6. What are the congestion avoidance mechanisms available in TCP?
                 DECBit
                 Random Early Detection
                 Source-based congestion avoidance
  7. What are the two common queuing algorithms?
                 FIFO Queuing
                 Fair Queuing
  8. Differentiate flow control and congestion control.

     Managing resources and managing bandwidth



PART B



  9. Draw the state transition diagram and explain the working of TCP.
  10. Describe in detail the TCP Congestion control methods.
11. Explain the various Congestion avoidance methods in TCP.
  12. Write short notes on
         1. FIFO queuing
         2. Fair queuing



UNIT IV



PART A



  1. What is the use of data compression?

     Due to limited bandwidth and large size of data, compression is used

  2. What are the 2 types of compression techniques?

     Lossless and lossy compression.

  3. List out the lossless compression algorithms.
                  Run length encoding
                  Differential Pulse code modulation
                  Dictionary-based methods
  4. What are the frame types in MPEG?
                  I Frames (intrapicture)
                  P Frames (predicted picture)
                  B frames (Bidirectional predicted picture)
  5. What is the format used for image compression?

     Joint Photographic Experts Group

  6. How is audio compression done?

     MP3 standard can be used to compress the audio portion of data.

  7. What is the principle of ciphers?

     Sender applies encryption to convert data to ciphertext and receiver applies decryption to
     get back the data.

  8. What are symmetric key ciphers?
Both participants in a communication share the same key.

  9. What are public-key ciphers?

     Uses a pair of related keys- one for encryption and another for decryption.

  10. What is a certification authority?

     Is an entity claimed to be trustworthy for verifying identities and issuing public key
     certificates.

  11. What is Kerberos?

     Is an authentication system based on Needham-Schroeder protocol and specialized for
     client-server environments.

  12. What is the use of Diffie-Hellman key agreement?

     Establishes a session key without using any predistributed keys.

  13. What is the use of PGP?

     Widely-used approach for providing security for electronic mail.

  14. Where is SSH used?

     Used to provide a remote login service to replace Telnet.

  15. How is transport layer security provided?

     Using TLS, SSTP and HTTPS.

  16. What is IPSec?

     It is a framework for providing all the security services for IP.

  17. What is a firewall?

     A firewall is a system that is the sole point of connectivity between the protected site and
     the rest of the network.



PART B
18. Write in detail about the cryptographic techniques used in networks.
  19. Write short notes on
         1. PGP
         2. Diffie-Hellman key agreement
  20. Describe in detail about transport layer security.



UNIT V

PART A



  1. What is the naming system used in internet?

     The Domain Naming system is used to overcome the problem of naming hosts in the
           internet.

  2. What are the contents of a resource record in name servers?

     It contains the fields (Name, Value, Type, Class, TTL)

  3. What is HTTP?

  Hypertext transfer protocol used to transfer HTML pages from web servers to browsers.

  3. What is the use of SNMP?

     SNMP is a specialized request/reply protocol that supports two kinds of request
     messages: GET and SET.

  4. What are WSDL and SOAP in web services?

  They are frameworks for specifying and implementing application and transport protocols
  respectively.

  5. What are the various possible multimedia protocols supported by internet?

     RTP, RSVP, SDP, SIP and H.323.

  6. What are overlay networks?

     Overlay is a logical network implemented on top of a physical network.
PART B



    7. Explain DNS with suitable example and diagrams.
    8. Describe how web services are used.
    9. Explain the various multimedia applications.
    10. Write short notes on
           1. SNMP
           2. FTP
           3. Overlay networks




    Prepared By Approved By

5

More Related Content

DOCX
Networking questions
TXT
Networks faq
PPTX
CCNA question and answer
PDF
Computer Network Interview Questions
PDF
Operating system Interview Questions
PDF
Fpga implemented multichannel hdlc transceiver
PDF
Question bank cn2
PPT
Ex 1 chapter05-network-layer-tony_chen
Networking questions
Networks faq
CCNA question and answer
Computer Network Interview Questions
Operating system Interview Questions
Fpga implemented multichannel hdlc transceiver
Question bank cn2
Ex 1 chapter05-network-layer-tony_chen

What's hot (20)

DOCX
MC0087 Internal Assignment (SMU)
PPTX
Ccna interview questions
DOCX
Ccna ccnp interview question 1
PDF
Data communication assignment 1
PPT
Data Link Layer
DOCX
100 network question and answers
PDF
Internet of things protocols for resource constrained applications
PDF
AODV protocol
PPT
Networking
PPTX
Point To Point Protocol
PPTX
Lecture 04
DOCX
Internet protocol
PDF
Routing Protocols in Zigbee Based networks: A Survey
PPTX
Internet Protocols
PPTX
ETE405-lec7.pptx
PPT
Ipv6up
PPT
Study and analysis vurnerability of aodv protocol
PPTX
Network layer u3
PDF
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
MC0087 Internal Assignment (SMU)
Ccna interview questions
Ccna ccnp interview question 1
Data communication assignment 1
Data Link Layer
100 network question and answers
Internet of things protocols for resource constrained applications
AODV protocol
Networking
Point To Point Protocol
Lecture 04
Internet protocol
Routing Protocols in Zigbee Based networks: A Survey
Internet Protocols
ETE405-lec7.pptx
Ipv6up
Study and analysis vurnerability of aodv protocol
Network layer u3
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Ad

Viewers also liked (8)

PPT
модуль 1 обитатели луга
PPT
модуль 2 обитатели леса
PPT
модуль 1 обитатели луга новый
PPT
Весялуха
PPT
модуль 3 обитатели водоёма
PPT
Музыкальные инструменты белорусов
модуль 1 обитатели луга
модуль 2 обитатели леса
модуль 1 обитатели луга новый
Весялуха
модуль 3 обитатели водоёма
Музыкальные инструменты белорусов
Ad

Similar to Unit 1 qb (20)

DOCX
Important 16 marks questions
DOC
COMPUTER NETWORKS - SHORT NOTES
DOCX
Cn v-sem
PDF
2 Marks Questions And Answers MC1628 TCP IP Protocol Suite
PDF
data communication and network models two marks with answers
DOCX
Networkin new
PPTX
Chapter 1 overview-stij3053 - Network Design
PPT
VOICE
DOC
Computer network suggestion
DOC
Ccna exploration exams
DOCX
Computer network solution
PPTX
LIS3353 SP12 Week 11
PDF
Data Communications and Networking By Behrouz A.Forouzan1-2.pdf
PPTX
Computer networks unit i
PPT
5. telecomm & network security
PDF
4. Communication and Network Security
PDF
Communication Networks 2 marks q &answers
PDF
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
Important 16 marks questions
COMPUTER NETWORKS - SHORT NOTES
Cn v-sem
2 Marks Questions And Answers MC1628 TCP IP Protocol Suite
data communication and network models two marks with answers
Networkin new
Chapter 1 overview-stij3053 - Network Design
VOICE
Computer network suggestion
Ccna exploration exams
Computer network solution
LIS3353 SP12 Week 11
Data Communications and Networking By Behrouz A.Forouzan1-2.pdf
Computer networks unit i
5. telecomm & network security
4. Communication and Network Security
Communication Networks 2 marks q &answers
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www

Unit 1 qb

  • 1. 1.Define Network. 2.What are the layers in OSI Reference model? 3.Define bandwidth and latency. 4.List the various encoding systems 5.What are the bit-oriented protocols in framing 6. What is a transceiver 7.What is WI-Max? 8.What is the Bluetooth technology? 1. Define Network. What are the five important components of data communication? List two advantages of layering principle in computer networks. With the example explain half duplex communication. Mention any two functions of session layer.
  • 2. Name four topologies of computer networks. Suggest two points to improve the performance of network. With the example explain half duplex communication. Define protocol. Differentiate guided and unguided media? What is the Null modem? Define Topology. Define standards. What are the design factors for transmission media? Difference between Guided media and Un guided media. Define line Coading. What are the most popular modems? Define network. What are the criteria for networks? What is DSL. PART-B 16 ARKS
  • 3. . Explain the OSI-ISO model I of computer with neat diagram.(16) . Distinguish between Point to Point links and multi-point links with relevant diagram.(16) . (i)Compare connections oriented and connection less service.(8) (ii)Differentiate Guided media and Un Guided media. (8) . Write shot notes on a. TCP/IP protocol suite (4) b. Networks model (4) c. datagram network (4) d. Virtual circuit network (4) . Perform a comparative study between the ISO-OSI model and TCP/IP reference model. (16) 6. Explain how cable TV used for data transfer? . Explain different switched Networks. PART A 2. Define Network. Collection of nodes that communicate with each other and also share resources. Interconnected collection of autonomous computers. 2. What are the layers in OSI Reference model?
  • 4. Open system Interconnection model has seven layers: Physical, Data Link, Network, Transport, Session, Presentation and Application layers 3. Define bandwidth and latency. Throughput and delay. 4. List the various encoding systems  Manchester  NRZ 5. Compare sentinel-oriented approach with byte-counting approach in framing. Uses a sentinel character at the end and contains the total size of the data. 6. What are the bit-oriented protocols in framing?  HDLC  SONET 7. What is the use of checksum algorithm? Add all the words that are transmitted and then transmits the result of the sum. 8. What is ARQ? What are the various ARQ algorithms?  Stop-and Wait  Sliding Window 9. What is a transceiver? A device attached to the tap and detects when the line is idle 10. What is the Bluetooth technology? Used for short-range communication between mobile phones, PDAs, etc 11. What is the hidden node and exposed node problems Occurs in wireless networks and has to be avoided. 12. What is WI-Max? It is a MAN with the maximum length of 30 miles. 13. What is a learning bridge? A bridge that adapts according to the traffic in the network.
  • 5. PART B 14. Describe the various data framing approaches used in networks. 15. Explain the error detection mechanisms. 16. Write short notes on 1. Ethernet 2. Token Ring 3. Wireless 17. Explain the various bridges. UNIT II PART A 1. What is an internetwork? Network of networks 2. Why is fragmentation and reassembly used? In an internetwork different component networks support different packet sizes 3. What is the use of ARP and RARP? Address resolution by looking up a server from an IP address 4. When is a DHCPDISCOVER message sent? A newly booted or attached host sends this message to a special IP address that is a broadcast address. 5. What is ICMP? Internet Control Message Protocol defines a collection of error messages. 6. What are virtual networks and tunnels? A virtual circuit is used to provide a private path between two systems leading to a VPN. This is called a tunnel.
  • 6. 7. Define routing? Routing finds routes for internet packets so that the delay is less and it is also efficient. 8. List the various routing algorithms.  Distance vector routing  Link state routing  OSPF 9. What is subnetting? Provides an elegantly simple way to reduce the total number of network numbers that are assigned 10. Define CIDR? Classless Interdomain routing addresses the scaling concerns of large tables and network numbers 11. What are the advantages of IPV6 ver IP v4?  Support for real-time services  Security support  Autoconfiguration  Enhanced Routing functionality PART B 12. Write in detail about the format and working of IP. 13. Write short notes on 1. DHCP 2. ICMP 3. ARP 14. Descibe the various routing algorithms in detail. 15. With suitable example explain the process of subnetting. UNIT III PART A
  • 7. 1. Compare UDP and TCP. It is a transport protocol that provides host-to-host communication 2. Why is TCP called reliable protocol? It guarantees reliable, in-order delivery of a stream of bytes. 3. What is a three-way handshake? Involves the exchange of three messages between the client and server and is used to establish and terminate a connection. 4. What is silly window syndrome? The strategy of aggressively taking advantage of any available window leads to silly window syndrome. 5. List out the various TCP congestion control mechanisms.  Additive Increase/ Multiplicative Decrease  Slow Start  Fast Retransmit and Recovery 6. What are the congestion avoidance mechanisms available in TCP?  DECBit  Random Early Detection  Source-based congestion avoidance 7. What are the two common queuing algorithms?  FIFO Queuing  Fair Queuing 8. Differentiate flow control and congestion control. Managing resources and managing bandwidth PART B 9. Draw the state transition diagram and explain the working of TCP. 10. Describe in detail the TCP Congestion control methods.
  • 8. 11. Explain the various Congestion avoidance methods in TCP. 12. Write short notes on 1. FIFO queuing 2. Fair queuing UNIT IV PART A 1. What is the use of data compression? Due to limited bandwidth and large size of data, compression is used 2. What are the 2 types of compression techniques? Lossless and lossy compression. 3. List out the lossless compression algorithms.  Run length encoding  Differential Pulse code modulation  Dictionary-based methods 4. What are the frame types in MPEG?  I Frames (intrapicture)  P Frames (predicted picture)  B frames (Bidirectional predicted picture) 5. What is the format used for image compression? Joint Photographic Experts Group 6. How is audio compression done? MP3 standard can be used to compress the audio portion of data. 7. What is the principle of ciphers? Sender applies encryption to convert data to ciphertext and receiver applies decryption to get back the data. 8. What are symmetric key ciphers?
  • 9. Both participants in a communication share the same key. 9. What are public-key ciphers? Uses a pair of related keys- one for encryption and another for decryption. 10. What is a certification authority? Is an entity claimed to be trustworthy for verifying identities and issuing public key certificates. 11. What is Kerberos? Is an authentication system based on Needham-Schroeder protocol and specialized for client-server environments. 12. What is the use of Diffie-Hellman key agreement? Establishes a session key without using any predistributed keys. 13. What is the use of PGP? Widely-used approach for providing security for electronic mail. 14. Where is SSH used? Used to provide a remote login service to replace Telnet. 15. How is transport layer security provided? Using TLS, SSTP and HTTPS. 16. What is IPSec? It is a framework for providing all the security services for IP. 17. What is a firewall? A firewall is a system that is the sole point of connectivity between the protected site and the rest of the network. PART B
  • 10. 18. Write in detail about the cryptographic techniques used in networks. 19. Write short notes on 1. PGP 2. Diffie-Hellman key agreement 20. Describe in detail about transport layer security. UNIT V PART A 1. What is the naming system used in internet? The Domain Naming system is used to overcome the problem of naming hosts in the internet. 2. What are the contents of a resource record in name servers? It contains the fields (Name, Value, Type, Class, TTL) 3. What is HTTP? Hypertext transfer protocol used to transfer HTML pages from web servers to browsers. 3. What is the use of SNMP? SNMP is a specialized request/reply protocol that supports two kinds of request messages: GET and SET. 4. What are WSDL and SOAP in web services? They are frameworks for specifying and implementing application and transport protocols respectively. 5. What are the various possible multimedia protocols supported by internet? RTP, RSVP, SDP, SIP and H.323. 6. What are overlay networks? Overlay is a logical network implemented on top of a physical network.
  • 11. PART B 7. Explain DNS with suitable example and diagrams. 8. Describe how web services are used. 9. Explain the various multimedia applications. 10. Write short notes on 1. SNMP 2. FTP 3. Overlay networks Prepared By Approved By 5