Subject Name: Computer Network Subject Code:
|
|
- Posy Hawkins
- 5 years ago
- Views:
Transcription
1 L.J. Institute of Engineering & Technology Semester: IV (206) Subject Name: Computer Network Subject Code: Faculty: Ms. Khushbu Shah Chapter Introduction to computer networks and Internet Sr. Marks No Topic: Understanding of network and Internet, The network edge, The network core SHORT QUESTION In a...topology, if there are n devices in a network, each device has n- ports for cables. A) Mesh B) Star C) Bus D) Ring Ans: A 2 The...layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation Ans:B 3 What is the transmission rate of Ethernet LANs? 4 The method of communication in which transaction takes place in both directions, but only in one direction at a time, is called? A) Simplex B) Four wire circuit C) Full duplex D) Half-duplex Ans:D 5 What are the IEEE standards for LAN, WAN, MAN? 6 What are the Advantages of STAR Topology? DESCRIPTIVE QUESTION What is botnet? Explain in brief.(dec-205) 2 2 Explain Advantages and Usage of Network (Old_Nov-20) 5 3 Give ways to establish effective and Efficient network (Old_Nov-20) 5 4 Give differences between connection oriented and connectionless services.?(old_dec_205) Explain connection oriented and connectionless services. Also differentiate both. (old_may-205) 5 Explain following network topologies with advantages and disadvantages. (old_dec_205). Bus 2. Star 3. Ring 4. Mesh 6 What is topology? Give different type of topology and its use. (Old_Nov-20) 4 Explain :LAN, WAN and internet (old_june-204) 4, Explain the terms : LAN, MAN, WAN, Internet (Old_Nov-20) Topic:2 Understanding of Delay, Loss and Throughput in the packet-switching network SHORT QUESTION Differentiate Packet Switching and Circuit Switching DESCRIPTIVE QUESTION Explain following terms: (May-205) 8 ) Processing Delay 2) Queuing Delay 3) Transmission Delay 4) Propagation Delay 2 Explain following terms: (Dec-205) 6 Computer Network (24009) Page
2 L.J. Institute of Engineering & Technology Semester: IV (206) ) Processing Delay 2) Transmission Delay 3) Propagation Delay Topic:3 protocols layers and their service model, History of the computer network SHORT QUESTION Define the term Protocol. 2 Briefly explain functions of physical layer 2 3 Briefly explain functions of session layer and presentation layer 2 4 What is the size of physical address and logical address? 2 5 IP is responsible for communication while TCP is responsible for communication. A. host-to-host; process-to-process B. process-to-process; host-to-host C. Process-to-process; network-to-network D. none of the above Ans: A DESCRIPTIVE QUESTION Draw the layered architecture of OSI reference model and write the at least two services provided by 6 each layer of the model.(may-205) 2 What are the five layers in the Internet protocol stack? What are the principal responsibilities of each of 6 these layers? (Dec-205) 3 Enlist seven layers of OSI reference model. Discuss advantages of layered approach? (old_dec_205) 4 Draw the OSI reference model. Explain the functionality of each layer in brief. Draw diagram (old_may-205) (old_nov-204) Draw diagram of OSI reference model? What are the benefits of layering approach in OSI model? (old_nov-204) What is OSI model? Draw Diagram and Explain Physical, Data link and Network layer with its functions.(old_nov-20), 5 5 List difference between OSI and TCP/IP model (old_may-203) 6 Which of the OSI layers handles each of the following : (Old_Dec-200) -Determine which route through the subnet to use. -Dividing the transmitted bit stream into frames. -Encryption and compression of the information. -Flow control between source and destination node. 4 Chapter-2 Application Layer Topic: Principles of computer applications, Web and HTTP, SHORT QUESTION True or false? to 5 A user requests a Web page that consists of some text and three images. For this page, the client will send one request message and receive four response messages. 2 Two distinct Web pages (for example, and can be sent over the same persistent connection 3 With nonpersistent connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages. 4 HTTP response messages never have an empty message body. 5 The Date: header in the HTTP response message indicates when the object in the response was last modified 6 Application layer protocol defines a) types of messages exchanged b) message format, syntax and semantics c) rules for when and how processes send and respond to messages d) all of the mentioned Ans: D Computer Network (24009) Page 2
3 L.J. Institute of Engineering & Technology Semester: IV (206) When displaying a web page, the application layer uses the a) HTTP protocol b) FTP protocol c) SMTP protocol Ans: A 8... is an electronic mail protocol with both client and server functions. A. SMTP B. MIME C. POP D. TCP Ans: C 9 What is the difference between HTTP GET and POST method? 0 Define Cookies 2 Define URL 2 2 What is need of MIME? 2 DESCRIPTIVE QUESTION What is HTTP? Differentiate its persistent and non-persistent types with request-response behavior of 6 HTTP.(Dec-205) 2 Explain the concept of Cookies and its components with suitable example.(dec-205) 8 3 Consider the following HTTP message and answer the following questions: (May-205) 6 ) Does browser request a non-persistent or a persistent connection? 2) Which is the (complete) URL of the document requested by the user? 3) Which HTML method is used to retrieve the requested URL? 4 Write a note on HTTP. (old_dec_205) (old_may-205) Write note on following : HTTP and MIME (old_nov-205) 5 Explain WWW and HTTP (Old_Nov-20) 5 6 Describe the built in HTTP request methods. (Old_June-202) Explain the high-level view of Internet system and its major components.(dec-205) 8 8 Explain the working of electronic mail protocols SMTP, IMAP and POP3 in brief with suitable 8 diagram. (May-205) 9 List and explain major functionalities provided by service (old_may-205) 0 Explain the basic functions of the system. (Old_Jan-203) systems contain which two subsystems? Write the five basic functions provided by system. (Old_June-202) 2 What is ? How it works? Which protocol it uses? (Old_Nov-20) 4 3 Explain the architectural overview of the world wide web. (Old_Jan-203) 4 Explain Any two Application Layer Protocol (Old_June_204) 5 Explain the architecture and services. Write short note on POP3 and MIME.(Old_Dec_200) Topic:2 DNS, Socket programming with TCP and UDP SHORT QUESTION DNS can obtain the... of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum Computer Network (24009) Page 3
4 L.J. Institute of Engineering & Technology Semester: IV (206) Ans: B 2 Which one of the following allows client to update their DNS entry as their IP address change? a) dynamic DNS b) mail transfer agent c) authoritative name server Ans: A 3 A DNS client is called a) DNS updater b) DNS resolver c) DNS handler Ans:B 4... store resource records and information about the domain tree structure and attempt to resolve received client queries. A. Domain namespace B. DNS Names C. Name servers D. Resolvers Ans:C 5 Briefly describe different type of namespaces of DNS DESCRIPTIVE QUESTION Why distributed database design is more preferred over centralized design to implement DNS in the 8 Internet? Justify. Also explain the way of DNS servers to handle the recursive DNS query using suitable diagram.(may-205) 2 What is the need of Domain name service? Explain DNS architecture. (old_dec_205) Explain Domain Name System (Old_Jan-203) 3 What is DNS? How resource records are maintained in DNS? (old_may-205) 4 What is the role of Domain Name Server (DNS) in Internet? Explain the hierarchy of various domain names. (old_nov-204) 5 Explain : DNS and its use. (old_june-204),5 Explain : DNS and its advantages (Old_Nov-20) Explain DNS in detail with example.(old_june-20) How does DNS works?(old_dec-200) Chapter-3 Transport Layer Topic: Introduction and transport layer services, Multiplexing and Demultiplexing A communication device that combines transmissions from several I/O devices into one line is a A) Concentrator B) Modifier C) Multiplexer D) Full duplex file Ans: C 2 Which one of the following is a transport layer protocol used in internet? a) TCP b) UDP c) both (a) and (b) Ans:C 3 List different transport service primitives Discuss transport layer multiplexing and Demultiplexing concept.(dec-205) 2 Explain rdt2.0 with FSM diagram.(dec-205) 3 Enlist services provided by transport layer. What is socket? Explain its importance at transport layer Computer Network (24009) Page 4
5 L.J. Institute of Engineering & Technology Semester: IV (206) protocols (old_nov-204) 4 Explain the basic five service primitives of the transport layer protocol. (Old_Jan-203) 5 Explain connection establishment and connection release in Transport protocols. (Old_June-202) 6 Explain crash recovery of transport protocol.(old_june-20) 4 Write about elements of transport layer () connection establishment (2) connection release. (Old_June-20) Topic:2 Connection less transport (UDP) UDP packets have fixed-size header of... bytes. A. 6 B. 8 C. 32 D. 64 Ans: B 2 A port address in UDP is bits long A. 8 B. 6 B. 32 D.Any of above Ans:6 Explain Connectionless Transport protocol UDP with popular Internet applications.(dec-205) 2 Suppose a process in Host C has a UDP socket with port number 689. Suppose both Host A and Host 4 B each send a UDP segment to Host C with destination port number 689. Will both of these segments be directed to the same socket at Host C? If so, how will the process at Host C know that these two segments originated from two different hosts? (May-205) 3 Discuss the working principle of UDP (Old_May-203) Topic:3 Principles of reliable data transfer, Connection oriented transport (TCP) True or false? Host A is sending Host B a large file over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknowledgments to Host A because Host B cannot piggyback the acknowledgments on data. 2 The size of the TCP rwnd never changes throughout the duration of the connection. 3 Suppose Host A is sending Host B a large file over a TCP connection. The number of unacknowledged bytes that A sends cannot exceed the size of the receive buffer. 4 d. Suppose Host A is sending a large file to Host B over a TCP connection. If the sequence number for a segment of this connection is m, then the sequence number for the subsequent segment will necessarily be m +. 5 The TCP segment has a field in its header for rwnd. 6 Suppose that the last SampleRTT in a TCP connection is equal to sec. The current value of Timeout Suppose Host A sends one segment with sequence number 38 and 4 bytes of data over a TCP connection to Host B. In this same segment the acknowledgment number is necessarily 42 8 TCP groups a number of bytes together into a packet called a... A. user datagram B. segment C. datagram D. packet Ans: B 9 In..., the sender sends one frame, stops until it receives confirmation from the receiver, and then sends the next frame. A. stop and wait protocol B. simplest protocol C. sliding window protocol D. High level Data Link Control Protocol(HDLC) Ans: A 0 The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called a) piggybacking b) cyclic redundancy check Computer Network (24009) Page 5
6 L.J. Institute of Engineering & Technology Semester: IV (206) c) fletcher s checksum Ans: A Transmission control protocol is a) connection oriented protocol b) uses a three way handshake to establish a connection c) recievs data from application as a single stream d) all of the mentioned Ans:D 2 A is a TCP name for a transport service access point. a) port b) pipe c) node Ans:A 3 Communication in TCP is. A. Simplex B. Half-duplex C. Full duplex D. None of above Ans: C. 4 The inclusion of the checksum in the TCP segment is. A. Optional B. Mandatory C. at the discretion of the application program D. None of above 5 control regulates the amount of data a source can send before receiving an acknowledgment from the destination. A. Error B. Flow C. Congestion D. None of above Ans: B 6 What is pipelining? What is use of sequence number in sliding window protocol? 8 What is use of timer in sliding window protocol? 9 Give examples for which connection oriented service is best. Explain the TCP Segment structure and justify the importance of its field values. (May-205) 2 How many packets overhead while doing the data communication using TCP? Draw the TCP 6 connection establishment and termination process with diagram.(may-205) 3 Consider sending real-time voice from Host A to Host B over a packet-switched network (VoIP). Host 4 A converts analog voice to a digital 64 kbps bit stream on the fly. Host A then groups the bits into 56- byte packets. There is one link between Hosts A and B; its Transmission rate is 2Mbps and its propagation delay is 0 msec. As soon as Host A gathers a packet, it sends it to Host B. As soon as Host B receives an entire packet, it converts the packet s bits to an analog signal. How much time elapses from the time a bit is created (from the original analog signal at Host A) until the bit is decoded (as part of the analog signal at Host B)? 4 Write a short note on sliding window protocols..(old_dec-205)(old_june-204) Describe the working of sliding window protocol. Also explain the piggybacking phenomenon. (old_may-205) 5 How pipeline approach improves the overall sender utilization time? Explain Go-Back-N pipeline 6 approach in transport layer. (May-205) 6 Explain following (old_dec-205) - Piggy backing - Selective Repeat and Go back N Explain a protocol Using Go Back N strategy using pipelining and (old_jan-203) Computer Network (24009) Page 6
7 L.J. Institute of Engineering & Technology Semester: IV (206) show the scenario in the case of when receiver' window size is and when receiver' window size is large Explain Sliding window protocol using GO back to N.(old_Nov-20) 8 Explain the term piggybacking, sending window and receiving window. Explain One-Bit sliding window protocol. (old_june-202) (old_june_20) Explain the one bit sliding window protocol and go back n protocol. Write down the drawback of both the protocols(old_dec_200) 9 Compare: Simplex and Stop and Wait Protocol. (old_june-204) 0 Explain STOP and Wait Protocol (Old_Nov-20) Draw and explain TCP packet header. (old_dec-205) Explain Transmission Control Protocol with TCP header fields. (old_may-205) (Old_Jan-203) 2 Give differences between or Compare TCP and UDP (old_nov-204)(old_june-204) (Old_Nov- 3,5, 20) List the various duties of the transport layer and explain each in brief. Compare UDP and TCP (Old_Dec-200) 3 Discuss the working principle of TCP (Old_May-203) 4 Write about flow control and buffering mechanism in Transport protocols (Old_June-202) 5 Explain Stop and Wait ARQ in detail.(old_june-20) 6 Explain Utopia (Simplex) protocol.(old_june-20) 3 Topic:4 Congestion control State True or False. Consider congestion control in TCP. When the timer expires at the sender, the value of ssthresh is set to one half of its previous value. 2 Explain the term: Bandwidth (Old_Dec-200) 3 Explain the term: Jitter(Old_Dec-200)[ 4 Explain the term: Throughput (Old_Dec-200)[ 5 Explain the use of chock packet What do you mean by congestion and overflow? Explain the slow-start component of the TCP congestion-control algorithm. (May-205) 2 Give differences between (old_nov-204). Connection oriented versus Connection less services 2. Flow Control versus Congestion control 3 What is congestion? What are the reasons behind congestion? Explain choke packet mechanism for congestion control.(old_nov-204) 4 What is congestion? What are the reasons behind congestion? Explain choke packet mechanism for congestion control. (Old-Nov-204) 5 Discuss and list the congestion prevention policies at data link, network and transport layers that can affect the congestion. (old_jan-203) 6 Explain Load shedding and Jitter control strategies to handle the congestion. (old_jan-203) Explain the following techniques for achieving good quality of service. (old_june-202) (i) Traffic shaping (ii) Leaky bucket algorithm 8 Explain congestion control in Datagram subnets. Write about hop by hop choke packets scheme. (Old_June-202) 9 Explain Leaky Bucket and Token bucket algorithm in detail. (Old_June-20),3 Explain the leaky bucket algorithm.(old_dec-200) 0 Explain Jitter Control. (Old_June-20) 3 Explain various Quality of service parameters for transport layer. (Old_June-20) 3 2 What are the various congestion prevention policies at datalink, network and transport layer of the OSI?(Old_Dec-200) 4 Computer Network (24009) Page
8 L.J. Institute of Engineering & Technology Semester: IV (206) Chapter-4 Network Layer Topic: Introduction, Virtual and Datagram networks In virtual circuit network each packet contains a) full source and destination address b) a short VC number c) both (a) and (b) Ans:B 2 Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control Ans:D 3 The network layer protocol of internet is a) ethernet b) internet protocol c) hypertext transfer protocol Ans:B List difference between Transport layer and Network layer (Old_May-203) 2 Design issues of Network Layer. (Old_Nov-20) 3 Compare datagram subnet and virtual circuit subnet (Old_June-20)(Old_Dec-200) OR,4 Differentiate : Datagram subnet v/s virtual circuit subnet Topic:2 study of router, Routing algorithms, Broadcast and Multicast routing What is the difference between routing and forwarding? 2 Do routers have IP addresses? If so, how many? 3 Define Unicasting 4 Define Multicasting 5 Define broadcasting 6 What is Routing Protocol? 2 What is static and dynamic routing? 2 8 Which one of the following routing algorithm can be used for network layer design? a) shortest path algorithm b) distance vector routing c) link state routing d) all of the mentioned Ans: D 9 A subset of a network that includes all the routers but contains no loops is called a) spanning tree b) spider structure c) spider tree Ans:A 0 ICMP is primarily used for a) error and diagnostic functions b) addressing c) forwarding Ans:A What do you mean by adaptive routing algorithm? 2 Define Migrating host and roaming host in WLAN Computer Network (24009) Page 8
9 L.J. Institute of Engineering & Technology Semester: IV (206) 3 Which protocol implements Distance Vector Routing Algorithm? What is the main difference between forwarding and routing? Explain at least two forwarding techniques used by the router to switching to packets from input port to output port of the router.(dec- 205) (May-205) 2 Explain Link-State Routing algorithm. (Dec-205), 6 Explain the Link-State (LS) routing algorithm. (May-205) (old_jan-203) (old_june- 202)(old_June-20) 3 Explain Distance-Vector (DV) routing algorithm. 5, 6, (Dec-205) (May-205) (old_dec-205) (old_may-205) (old_june-04)(old_may_203)(old-nov- 20) 4 Explain shortest path routing with suitable example. (old_dec-205) (old_may-205)(old_nov-204) (Old_Nov-20) 5 Explain Hierarchical and Multi cast Routing. (old_june-204) 6 Explain Router and its use. (Old_June-204) 3. Write and explain statement of Optimality Principle with example. 2. Explain the word jitter control with suitable example. (old_nov-204) 8 Explain in detail OSPF (Old_May-204) Write about OSPF (open shortest path first). Which four classes of routers are distinguished by OSPF?(Old_June-202) 9 What is count-to-infinity problem? Explain it with example (old_jan-203) 0 Explain Multicasting (Old_Nov-20) 4 Explain distance vector routing. What is count to infinity problem? (Old_Nov-20) 2 What is the serious drawback of distance vector routing? explain it with 3 Example (Old_Dec-200) 3 Explain and compare distance vector routing and link state routing algorithm (Old_Dec-200) 4 Explain the following concepts : Tunneling, Network address translation and DHCP. (Old_Dec-200) 5 What is RPC? Draw and explain steps for RPC. (Old_May-205) 6 Explain the concept and need of tunneling with example. (Old_Nov-20)(Old_May-205) Topic:3 IP protocol and addressing in the Internet What is the 32-bit binary equivalent of the IP address ? 2... addresses use 2 bits for the and 8 bits for the portion of the IP address for TCP/IP network. 2 A. Class A B. Class B C. Class C D. Class D Ans:C 3 Find the netid and Hostid for the following. 2 ) ) ) ) Ans. ) 9, ) 90.3, 0.0 3) No netid no hosted because class E address 4) , 2 4 A port address in TCP/IP is...bits long. A. 32 B. 48 C. 6 D. 64 Ans: C 5 The 4 byte IP address consists of a) network address Computer Network (24009) Page 9
10 L.J. Institute of Engineering & Technology Semester: IV (206) b) host address c) both (a) and (b) Ans:C 6 What is the range of different IP Classes? What is the significance of HLAN in IP Header? Compare IPv4 and IPv6.(Dec-205),5 Compare the IPv4 and IPv6 header.(old_jan-203) (Old_Nov-20) 2 Explain IPv4 datagram format and importance of each filed. (May-205) 3 Consider a router that interconnects three subnets: Subnet, Subnet 2, and Subnet 3. Suppose all of the 4 interfaces in each of these three subnets are required to have the prefix 223../24. Also suppose that Subnet is required to support at least 60 interfaces, Subnet 2 is to support at least 90 interfaces, and Subnet 3 is to support at least 2 interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfy these constraints.(dec-205).(may-205) 4 Suppose datagrams are limited to,500 bytes (including header) between source Host A and 4 destination Host B. Assuming a 20-byte IP header, how many datagrams would be required to send an MP3 consisting of 5 million bytes? Explain how you computed your answer. (May-205).(Dec-205) 5 Explain following with respect to IP address. Also give proper examples of each. (old_nov-204). Structure of IPv4 address 2. Subnet mask 3. Default gateway 6 What is subnet? Explain various classes of IPv4 address with respect to bits reserved for host_id and net_id. Give example and ranges of each class of IPv4 address (old_nov-204) What is IP address? What is Subnet? Explain different IP address Classes. (Old_June-204) Explain the IP addressing scheme in detail. (Old_Jan-203) 8 Explain in detail IPv6 (Old_May-203) 9 Explain the Mobile-IP. (Old_Jan-203) 0 Explain : MAC address and IP address(old_nov-20) 5 Explain Fragmentation and its use (Old_June-204) 4 2 An organization is granted the block /24 The administrator wants to create 32 subnets Find the subnet mask. Find the number of addresses in each subnet Find first and last address in subnet. Find first and last address in subnet 32. (Old_Dec-200) 3 Draw IP headed and explain the each field of the header. Also explain the concept of fragmentation in detail.(old_dec-200) Chapter-5 Link Layer and Local Area Network Topic: Introduction and link layer services... is responsible for converting the higher level protocol address (IP addresses) to physical network addresses. A. Internet Protocol(IP) B. Internet Control Message Protocol(ICMP) C. Address Resolution Protocol(ARP) D. Bootstrap Protocol(BOOTP) Ans :C 2 Which one of the following task is not done by data link layer? a) framing b) error control c) flow control d) channel coding Ans: D 3 Which one of the following is a data link protocol? a) ethernet Computer Network (24009) Page 0
11 L.J. Institute of Engineering & Technology Semester: IV (206) b) point to point protocol c) HDLC d) all of the mentioned Ans:D 4 The different types of services provided by data link layer is/are... A. Unacknowledged connectionless service B. Acknowledged connectionless service C. Acknowledged connection oriented service D. All of the above. Ans: D 5... is the most sophisticated service provided by the data link layer to the network layer. The source and destination machines establish a connection before any data transfer takes place. A. Unacknowledged connectionless service B. Acknowledged connectionless service C. Acknowledged connection oriented service D. Unacknowledged connection oriented service Ans: C 6 The two main functions of the data link layer are A. hardware link control and media access control B. data link control and protocol access control C. data link control and media access control D. both a and c Ans: C If the bit string is subjected to bit stuffing, What output string will be transmitted? What is bit and byte stuffing? Explain with example. (Dec-205) 2 Explain ARP and justify why ARP query sent within a broadcast frame and ARP response sent within a frame with specific destination MAC address? (May-205) 3 What do you mean by framing? List various framing techniques and explain any two of them.(old_dec-205) (old_dec-200) What is a Frame? Explain the significance of stuffing. Explain bit stuffing with example. (old_may- 205) Enlist various framing techniques used in data link layer. Explain any one in detail with suitable example (old_nov-204) 4 Discuss Design Issues in Data link Layer. (Old_June-204)(Old_Nov-20), 5 5 Enlist various framing techniques used in data link layer. Explain any one in detail with suitable example (Old_Nov-204) 6 Explain the usage of following devices. Also discuss the OSI layer at which they are used. (old_nov- 204). Bridge 2. Repeater 3. Hub and Switch 4. Router 5. Gateway Differentiate : Router and Switch (Old_Nov-20) 4 8 What is Gateway? How it works? (Old_Nov-20) 4 9 Explain the working principle of bridges (Old_May-203) 0 What is the similarity and difference between switch and bridge. Also explain cut through switched.(old_june-202) Explain (i) spanning tree bridges (ii) Explain remote bridges. (Old_June_202) 2 Explain working principle of HDLC (Old_May-203) Explain HDLC. (Old_Nov_20) 3 Using Example explain flow control (Old_May-203) 4 Compare transparent bridge and source routing bridge (Old_June-20) Computer Network (24009) Page
12 L.J. Institute of Engineering & Technology Semester: IV (206) Topic:2 Error-detection and correction techniques What is hamming distance for each of the following codewards: 2 d(0000,00000) d(00,0000) d(,) d(000,00) Ans., 2, 0, 2 What are the types of Error? Explain in brief 2 3 When 2 or more bits in a data unit has been changed during the transmission, the error is called a) random error b) burst error c) inverted error Ans: B 4... is the process in which the receiver tries to guess the message by using redundant bits. A. Forward error correction B. Backward error correction C. Transmission D. Retransmission Ans:A 5 Error detection at the data link layer is achieved by? A. Bit stuffing B. Cyclic redundancy codes C. Hamming codes D. Equalization Ans: B 6 Data link protocol almost put CRC in a trailer rather than in a header. Why? 2 What is error control? Explain CRC with example.(old_dec-205) 2 What is the difference between error detection and correction? Explain any one error correction technique with suitable example.(old_nov-204) 3 Frame = 0 0, Generator = 0 0 Calculate CRC.(old_Nov-204) 4 4 What is cyclic redundancy check? Show the calculation polynomial code checksum for a frame 000 using the generator x4+x+. (Old_June-202) 5 Generate the CRC code for 000.The divisor is 00. Append CRC with data and check at 4 receiver side whether any error exists or not. (Old_June-20) 6 A bit stream 000 is transmitted using standard CRC method. The generator polynomial is x4+x+.show the actual bit string transmitted. Also Explain the error detecting and correcting code with example. (Old_Dec-200) Topic:3 Multiple access protocols, addressing Which one of the following is the multiple access protocol for channel access control? a) CSMA/CD b) CSMA/CA c) both (a) and (b) Ans:C 2 Define -Persistent and Non-Persistent CSMA 2 3 What is major drawback of single bit parity check method for error detection? What do you mean by random access protocols? Explain slotted ALOHA in brief (Dec-205) 4 2 Explain CSMA/CD Protocol(Dec-205) 4 3 Explain slotted ALOHA channel access technique. (May-205) Computer Network (24009) Page 2
13 L.J. Institute of Engineering & Technology Semester: IV (206) 4 What is ALOHA? Explain variants of ALOHA protocol.(old_nov-204) (Old_June-204) OR Explain ALOHA system. How slotted ALOHA works? Differentiate it with pure ALOHA. (old_may- 205) Write the functions of Media Access Control sub layer. And Compare pure ALOHA and slotted ALOHA. (Old_Dec-200) 5 Explain various versions of CSMA protocols (old_dec-205) 6 What is CSMA? Explain persistent and nonpersistent CSMA. (old_may-205) Explain CSMA and CSMA/CD protocols.(old_nov-204) 8 What is channel allocation? How CSMA helps to solve problem? (Old_June-204) 9 Explain the working principle of CSMA (Old_May-203) 0 Define (Old_June-202) 3 a) nonpersistent CSMA b) p-persistent CSMA. Why CSMA/CA is used for wireless network? Explain it.(old_june-202) 2 Explain wireless LAN protocol and explain hidden station and exposed station problem of it. What is the solutions to this problem. Explain.(Old_Dec-200) Topic:4 Ethernet, switches In an frame, what is the purpose of the preamble? A. It provides the cyclic redundancy check. B. It alerts and synchronises the destination network interface card. C. It indicates the length of the data field. Ans: B 2 Ethernet frame consists of a) MAC address b) IP address c) both (a) and (b) Ans: A 3 MAC address is of ) 24 bits b) 36 bits c) 42 bits d) 48 bits Ans:D 4 The maximum size of payload field in ethernet frame is a) 000 bytes b) 200 bytes c) 300 bytes d) 500 bytes Ans:D 5 Which access methodology does token ring employ? A. Modified token passing. B. Token passing. C. CSMA/CD. Ans:B 6 What is the minimum frame size of Ethernet? Difference between Hub and Switch 2 Explain Ethernet Frame structure. (Dec-205) 2 Explain the self-learning properties of link layer switches.(dec-205) Computer Network (24009) Page 3
14 L.J. Institute of Engineering & Technology Semester: IV (206) 3 What is Ethernet? Explain Fast ethernet and Gigabit Ethernet. (Old_June-204) 4 Which two different modes of operation are supported by Gigabit Ethernet? (Old_June-202) 5 Apply binary, Manchester and differential Manchester encoding on following bit pattern 00 (Old_Dec-205) 6 Explain switched Ethernet.(Old_June-202) 3 Compare : Ethernet and Fast Ethernet (Old_Nov-20) 5 8 Explain Different types of Switching methods with examples. (old_june-204) 9 Explain IEEE Standard in detail.(old_june_20) 0 Explain following terms with respect to Computer Network () Broadcasting (2) Bluetooth (3) Routing (4) Socket (5) IP Address (6) VLAN (Old_May-205) Write note on: Internet Control Message Protocol (ICMP), Bridge and Switches.(Old_Dec-200) Computer Network (24009) Page 4
RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY
RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationComputer Networks (Unit wise Questions)
Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies
More informationQUESTION BANK EVEN SEMESTER
Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff
More informationIntroduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...
Table of Contents Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet... 1 1.1 Computer Networks... 1 1.1.1 Advantages of Computer Networks... 2 1.1.2 Disadvantages of Computer
More informationSIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)
SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code : Computer Networks (16MC811) Year & Sem: II-MCA & I-Sem Course : MCA
More informationCS1302 / Computer Networks
CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?
More informationINSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Name Code Class Branch COMPUTER NETWORKS A50515 Year 2017 18 Coordinator
More informationSYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.
Contents i SYLLABUS osmania university UNIT - I CHAPTER - 1 : INTRODUCTION Data Communication, Network Topologies : LAN, WAN, MAN, Types : Bus, Star, Ring, Hybrid, Line Configurations, Reference Models
More informationBABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017
5 years Integrated M.Sc (IT) Semester 3 Question Bank 060010310 DSE4 Computer Networks Unit 1 Introduction Short Questions 1. State the term data with respect to computer network. 2. What is data communication?
More informationSolved MCQ of Computer networking. Set-1
Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of
More informationUNIVERSITY QUESTIONS
UNIVERSITY QUESTIONS UNIT 1: INTRODUCTION 1) Show the layer representation in the TCP/IP model and the OSI model and Explain. / Dec 12 2) With a neat diagram, explain the TCP/IP reference model, giving
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationBVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out
BVRIT HYDERABAD College of Engineering for Women Department of Information Technology Hand Out Subject Name: Prepared by: Computer Networks Dipali Pattanayak,Assistant Professor, IT Year and Sem, Department:
More informationQUESTION BANK UNIT-I
DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code: CS1302 Subject Name: Computer Networks Year/ Sem: III / V UNIT-I 1. What is multicast? What is the difference between unicast and multicast?
More informationKINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A
KINGS CS1302 / COMPUTER NETWORKS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE SUB.CODE : CS1302 BRANCH / YEAR / SEM: ECE / III / VI SUB.NAME : COMPUTER NETWORKS
More information3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge.
Code No: RR320503 Set No. 1 III B.Tech II Semester Supplimentary Examinations, Aug/Sep 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Name Code Class Branch COMPUTER NETWORKS A50515 Year 2016 17 Coordinator
More informationUNIT - IV Ques.4 Ques.5
Immediately write your Roll No Bharati Vidyapeeth s Institute of Computer Applications and Management A-4, Paschim Vihar, New Delhi-63. Second Internal Examination 2012-15 Paper Code: MCA207 Subject: Data
More informationUniversity of Southern California EE450: Introduction to Computer Networks
University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal
More information(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker
Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,
More informationCode No: RR Set No. 1
Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INFORMATION TECHNOLOGY TUTORIAL QUESTION BANK Course Name Course Code Class Branch COMPUTER NETWORKS AIT003 Year 2018 19
More informationFINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material
FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding
More information1. (a) With a neat diagram, explain the functionality of layers, protocols and interfaces.
Set No.1 III B.Tech. II Semester Supplementary Examinations, November/December -2005 COMPUTER NETWORKS ( Common to Computer Science & Engineering,Information Technology,Electronics & Control Engineering,Computer
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationComputer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationMODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:
BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT
More informationAssignment - 1 Chap. 1 Wired LAN s
Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how
More informationCOMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a
COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION Q-1(a) In half-duplex transmission, only one entity can send at a time; in a full-duplex transmission, both entities can send at the same time. (b)
More informationCode No: RR Set No. 1
Code No: RR410402 Set No. 1 1. (a) Write any four reasons for using layered protocols. (b) List two ways in which the OSI reference model and the TCP/IP reference model are the same and list in which they
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Course Name Course Code Class Branch COMPUTER NETWORKS AIT003 Year
More informationDepartment of Information Technology. CS6551 Computer Networks. Anna University - Two Mark Questions
Department of Information Technology CS6551 Computer Networks Anna University - Two Mark Questions 1. What are the functions of application layer? The application layer is the top-most layer of OSI model.
More informationCS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A
SHRI ANGALAMMAN COLLEGE OF ENGINEERING & TECHNOLOGY (An ISO 9001:2008 Certified Institution) SIRUGANOOR,TRICHY-621105. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS1302-COMPUTER NETWORKS Year/Sem:
More informationKINGS COLLEGE OF ENGINEERING
KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY ACADEMIC YEAR 2011-2012 / ODD SEMESTER QUESTION BANK SUB.CODE / NAME YEAR / SEM : CS1302 COMPUTER NETWORKS : III / V UNIT I DATA COMMUNICATION
More information3. (a) Explain WDMA protocol. (b) Explain wireless LAN protocol. [8+8]
Code No: RR410402 Set No. 1 1. (a) List two advantages and two disadvantages of having international standards for network, Protocols? (b) With a neat diagram, explain the functionality of layers, protocols
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationSpecial expressions, phrases, abbreviations and terms of Computer Networks
access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous
More informationQuestion 7: What are Asynchronous links?
Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:
More informationCOMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key
COMP 361 Computer Communications Networks all Semester 2003 inal Examination: Solution key Date: Dec 15, 2003, ime 8:30am - 11:30am, venue Rm 3007 Name: Student ID: Email: Instructions: 1. his examination
More informationSYED AMMAL ENGINEERING COLLEGE
QUESTION BANK UNIT 1 1. Define Networks. 2. Define Internetworking and Intranetworking. 3. What is router or gateway? 4. Define routing. 5. What are Unicast, Multicast, and Broadcast? 6. What is Multiplexing
More informationStudy Guide. Module Two
Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More informationSRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR
SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : BCA Semester /Year : EVEN / III Subject Name : Data
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document
More informationNetworking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ
Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking
More informationInstitute of Science and Technology 2067
2067 1. Explain the principles of application layer protocols. What do you mean by file transfer? What are the main relationship between transport layer and network layer? What are the transport layer
More informationTERM EXAMS CS610- COMPUTER NETWORKS
MUHAMMAD FAISAL MIT 4 th Semester Al-Barq Campus (VGJW01) Gujranwala faisalgrw123@gmail.com MEGA File Solved MCQ s For Final TERM EXAMS CS610- COMPUTER NETWORKS Question No: 1 ( Marks: 1 ) - Please choose
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationComputer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University
Computer Networks Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University 1 Lecture 0 Course Information Title: Computer Networks 2 Course
More informationB.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems
B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015
More informationVALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK UNIT 1
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK Year & Semester : II / IV Section : CSE Subject Code : CS6551 Subject Name
More informationFaculty of Science and IT Course title. Pre-requisite/corequisite
Faculty Course number Faculty of Science and IT 022242 Department Course title Computer Science Network Protocols Number of credit hours 3 Pre-requisite/corequisite Computer network Brief course description.
More informationChapter 4. The Medium Access Control Sublayer
Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and
More informationYour favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY
VISIT: Course Code : MCS-042 Course Title : Data Communication and Computer Network Assignment Number : MCA (4)/042/Assign/2014-15 Maximum Marks : 100 Weightage : 25% Last Dates for Submission : 15 th
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationROYAL INSTITUTE OF INFORMATION & MANAGEMENT
ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components
More informationApplication Layer Network Layer
Application Layer 1. What is job of Application Layer? 2. Which protocol is used at Application Layer? 3. What is DNS? How is works? 4. What protocols used is email? 5. Where to use SMTP protocol? 6. Where
More informationSHIRDI SAI ENGINEERING COLLEGE
SHIRDI SAI ENGINEERING COLLEGE SHIRDI SAI ENGINEERING COLLEGE SHIRDI SAI ENGINEERING COLLEGE SHIRDI SAI ENGINEERING COLLEGE USN SHIRDI SAI ENGG COLLEGE Seventh Semester D.E. Degree Examination,
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationB. P. PODDAR INSTITUTE OF MANAGEMENT & TECHNOLOGY DEPT OF ELEDTRONICS & COMMUNICATION ENGINEERING ACADEMIC YEAR: ODD SEMESTER
Sl No DEPT OF ELEDTRONICS & COMMUNICATION ENGINEERING COURSE SYLLABUS INCLUDING COURSE STRUCTUTRE Paper Theory Contact hours/week Cr. Pts Code 1 EC70C Computer Networks L T P TOTAL 0 0 Module I Overview
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationCS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network
CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network Question No: 1( M a r k s: 1 ) A ---------- Relies on the hardware manufacturer to assign a unique physical
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure
More informationComputer network questions for final exam preparation 21/08/2017
Computer network questions for final exam preparation 21/08/2017 Chapter 3 1. What does UDP provide in addition to IP? Answer: provides two services not provided by the IP layer. - It provides port numbers
More informationCS6551 COMPUTER NETWORKS QUESTION BANK UNIT 1 PART A
CS6551 COMPUTER NETWORKS QUESTION BANK UNIT 1 PART A 1. What are the different types of connections (direct links) available? 2. What metrics are used to assess the performance of a network? 3. What is
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationEE-311 Data Communication & Networks
National University of Computer & Emerging Sciences, Islamabad, Pakistan Name: Roll No: EE-311 Data Communication & Networks Summer 2007 Final Thursday, 2 nd August 2007 Total Time: 3 Hours Total Marks:
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationLast time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access
Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading
More informationData Communication & Networks Final Exam (Fall 2008) Page 1 / 13. Course Instructors: Engr. Waleed Ejaz. Marks Obtained Marks
Data Communication & Networks Final Exam (Fall 2008) Page 1 / 13 Data Communication & Networks Fall 2008 Semester FINAL Thursday, 4 th December 2008 Total Time: 180 Minutes Total Marks: 100 Roll Number
More informationSirindhorn International Institute of Technology Thammasat University
Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationNetwork Model. Why a Layered Model? All People Seem To Need Data Processing
Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation
More informationIntroduction to Open System Interconnection Reference Model
Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More informationCS 4453 Computer Networks Winter
CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session
More informationKing Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering
Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date
More informationInternet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer
Midterm Study Sheet Below is a list of topics that will be covered on the midterm exam. Some topics may have summaries to clarify the coverage of the topic during the lecture. Disclaimer: the list may
More informationVALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK Degree & Branch : B.E C.S.E. Year & Semester : II / IV Section : CSE 1 & 2
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005
ECS 152A Computer Networks Instructor: Liu Name: Student ID #: Final Exam: March 17, 2005 Duration: 120 Minutes 1. The exam is closed book. However, you may refer to one sheet of A4 paper (double sided)
More informationUNIT IV TRANSPORT LAYER
Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More informationand Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai
Data Communications and Networks Second Edition ACHYUT S GODBOLE Managing Director SoftExcel Services Limited, Mumbai ATUL KAHATE Senior Consultant Oracle Financial Services Software Limited, Pune Tata
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationOverview of Ethernet Networking
Overview of Ethernet Networking Renesas Electronics America Inc. 1/31/2011 Rev. 0.02 00000-A Agenda This course contains an overview of Ethernet technology and its advantages and limits. Contained in this
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationNo book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationExpected Time: 90 min PART-A Max Marks: 42
Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:
More information