Académique Documents
Professionnel Documents
Culture Documents
UNIT-II
1.a. Discuss the design issues of Data Link Layer (DLL)?
b. Identify and list the services offered by Data Link Layer to the Network Layer.
2. Demonstrate Framing.
3. Consider the Data: 1001101 and answer the following:
i) Calculate the number of redundancy bits required ii) Determine the positions
of various data bits and redundancy bits.
iii) Determine the values of
redundant bits.
4.a. How to calculate Checksum? Explain with an example.
b. What is checksum?
5. Demonstrate CRC with suitable example.
6. Given are: G(X)= x^3 +x+1 and M(x) = x^3 +1. Determine the message to
be send.
7.a. What is flow control? Why is it essential at the data link layer? Mention few
techniques for the same?
b. Demonstrate the Go-Back-N protocol
8. Explain one bit sliding window protocol
9. Discuss the Stop and Wait protocol
10.a. Illustrate Static channel allocation scheme in LANs and MANs.
b. Illustrate Dynamic channel allocation scheme in LANs and MANs.
11.a. Demonstrate CSMA/CD protocol in detail.
b. List the most common types of Ethernet cabling.
12.a. Discuss Switched Ethernet in detail.
b. Illustrate Fast Ethernet.
13.a. Why a single organization must end up with multiple LANs?
b. Demonstrate the spanning tree bridges.
14. Given are: G(X)= x^3 +x and M(x) = x^5+ x^3 +x^2+1. Determine the
message to be send.
15. Illustrate the framing techniques in detail.
Unit-III
1.a. Identify and list out the issues while designing the services provided to the
Transport Layer from the Network Layer.
b. Write the difference between Virtual Circuits and Datagram Subnets.
2. Discuss the shortest path routing algorithm with an example.
3. Consider the following subnet and construct the new routing table for node J
using Distance Vector Routing Algorithm. Delay: JA-8, JI-10, JH-12, JK-6 and
routing tables for A,I,H and K are as follow
(ii) Multicast
7.a. List out all the categories of the Congestion Control Algorithm.
b. Illustrate Congestion control policies.
8. Demonstrate the approaches to congestion management which are widely
used in ATM Networks.(Traffic Shaping)
9.a. Demonstrate leaky bucket algorithm
b. Discuss token bucket algorithm in detail.
10. How to control the congestion in virtual circuit subnets?
11.a. Discuss the Resource Reservation Protocol.
a connection.
6. Discuss the solutions for three army problem.
7. What is flow control? Discuss the methods for flow control in transport
layer.
8.a. Illustrate upward and downward multiplexing.
b. Discuss the different combinations of client server strategies in cash
recovery.
9.a. Explain the UDP frame format.
machine.
13.a. What does Nagles algorithm suggest?
b. Provide the solution for Silly Window Syndrome.
14. Discuss in detail about TCP connection establishment and connection
release.
15. Discuss the TCP connection management modelling techniques.
UNIT-V
1.a. What is the main goal of Domain Name system?
b. Illustrate DNS Name Space in detail.
2.a. What does a Resource Record consists of?
b. Explain the principal DNS Resource Record Types for Ipv4.
3.a. Why the DNS Name Space is divided into Zones?
b. How does a resolver looksup a remote name?
4.a. List the limitations of the first e-mail system.
b. Identify and illustrate the five basic functions of e-mail system.
5. Demonstrate the Architecture and Services of e-mail system.
6. Discuss the user agent in e-mail system.
7.a. Identify the problems with RFC822 Message Format.
b. Demonstrate MIME in detail.
8. Explain the SMTP protocol in detail.
9.a. Illustrate POP3
b. Discuss the delivery features of e-mail system.
10.a. Differentiate POP3 from IMAP
b. Discuss IMAP in detail
11.a. Draw the basic model of web and explain how the web works.
b. Define URL and Illustrate the parts of URL
12.a. Traceout the steps that occur when a client selects a link.
b. Discuss the solutions when a browser can not interpret a page.
13.a. List the steps that the server performs in response to client requests.
b. Discuss the techniques for building a faster server.
14. Explain DES algorithm in detail.
15. Demonstrate RSA algorithm with suitable example.
Bit questions- unit-1
Define computer networks
How a computer network is differ from distributed system?
List the goals of networks for organizations
What is client server model?
How the networks are useful to the people?
What are two types of transmission technologies?
What is broadcasting?
What is multicasting?
What does the point to point networks consists of?
Define LAN.
Define MAN.
Define WAN.
What is packet switched subnet?
List of possible topologies for a point to point subnet in WAN
Define internetworking.
What is meant by a protocol?
What is network architecture?
Define protocol stack.
What is simplex communication?
List the different phases when connection oriented services is used to transfer in Data Link Lay
Write the methods which are stated to identify start and end of each frame.
Define Byte stuffing.
State even parity with an example.
What is checksum?
What is selective repeat?
Define Flow control.
Define Hamming distance.
What is Stop and Wait protocol?
What is piggybacking?
Define pipelining.
What is Bit stuffing?
Unit-3
Why the Network Layer/ Transport Layer interface is important?
What are the main goals considered while designing the Network layer services?
Define virtual circuit.
Define Datagrams.
What is the purpose of Routing Algorithm?
How the routing Algorithms are classified?
Define optimality principle.
What is flow based Routing?
List the five parts in the Link state Algorithm.
How to measure the line cost in link state algorithm?
Unit-4
What is the main goal of Transport layer?
Define Transport entity.
Draw the logical relationship between network layer, transport layer & application layer.
The transport layer service is so similar to network layer service. Why are there two distinct la
List the five primitives for a simple transport protocol
Unit-5
Define resolver.
List the two categories of top level domains.
List any four top level generic domains.
What does the domain name .Pro indicate?
How to create new domain?
What does a resource record consist of?
Mention any four DNS resource records
What does CNAME resource record indicate?
Why do we partition the DNS name space into zones?
Identify the two subsystems in email system.
Write the usage of user agents in email system.
Write the usage of message transfer agents in email system.
Write the applications of mailing list.
Mention the purpose of composition function
What is the purpose of transfer function?
List the fields in the RFC822 header
Identify the purpose of SMTP
Write the three states of pop3 protocol in sequence
What does a mail box consists of?
Define browser
Define hyper links
What is persistent cookie?
What is non persistent cookie?
List the built in HTTP request methods
Write any two helper applications.
What is Encryption?
What is Decryption?
What is cipher?
Classify cryptographic algorithms based on the number of keys