You are on page 1of 5

MODULE 1

1. Discuss the uses of computer networks in home applications.


2. What are the different types of transmission technology widely used in computer
networks?
3. How are computer networks classified on the basis of physical size?
4. Define the terms layer, protocol and interface in network software. *
5. What are the OSI service primitives for connection-oriented service? *
6. List the different guided media for communication. Explain the cable type, connectors,
and application of each of them.
7. Differentiate between simplex, half-duplex, and full-duplex mode of communication with
diagrams. Give one example for each.
8. List out the key design issues that occur in Computer Networks (or) List the design issues
of layered network software.
9. Describe the ISO/OSI layered architecture with the help of a neat diagram ***
10. What are point to point and broadcast networks?
11. Compare TCP/IP Reference model and OSI Reference model.
12. Design issues of physical and network layer.
MODULE 2

1. Draw the different frame formats in HDLC


2. Describe error control and flow control in data link layer.
3. Demonstrate the significance of sequence numbers in stop and wait ARQ.
4. Discuss about Go-Back-N ARQ.
5. Explain the concept of sliding window protocols. Differentiate between one-bit sliding
window, selective repeat and go back N protocols
6. How is routing table differ from forwarding table.
7. A bit stream 10011101 is transmitted using the standard CRC method. The generator
polynomial is x3+1. Show the actual bit string transmitted.
8. What are the devices operating in data link layer and physical layer? Explain the function
of each of them.
9. Draw and explain IEEE 802.11 wireless LAN frame structure.
10. What is the transmission time of a packet sent by a station if the length of the packet is 1
million bytes and the bandwidth of the channel is 200 Kbps.
11. A bit string, 0111101111101111110, needs to be transmitted at the datalink layer. If the
flag used is 01111110, what is the string actually transmitted after bit stuffing?
12. Differentiate between normal and asynchronous balanced modes of operations in HDLC.
13. What are the reasons for using Layered Architecture in Computer Networks?
14. How collision is avoided in CSMA/CA? Describe the different strategies used for this. *
15. What is Binary exponential backoff algorithm? Explain its working
16. Draw and explain the frame format for Ethernet.
17. Write notes on IEEE 802.2 standard.
18. How does pure aloha and slotted aloha differ?
19. Distinguish between switches and bridges.
20. List the features of Gigabit Ethernet
MODULE 3

1. List the network layer functions.


2. State Optimality principle. What is a sink tree?
3. Consider the following subnet.

4. What is flooding? Describe any two situations where flooding is advantageous


5. What is meant by congestion in networks? How does it affect network performance?
Describe any five congestion control techniques for datagram networks.
6. Explain steps involved in Multicast routing.
7. Illustrate the packet routing process of mobile hosts.
8. Differentiate between Flooding and broadcasting
9. Explain count to infinity problem in distance vector routing.
10. A network on the Internet has a subnet mask of 255.255.240.0. what is the maximum
number of hosts it can handle?
11. List and explain any three closed loop congestion control techniques
12. Differentiate between static and dynamic routing
13. Explain distance vector routing with an example.
14. Discuss the common techniques used in computer networks to improve the QoS.
15. What is QoS? Explain any two methods to ensure QoS.
16. Explain the different steps in link state routing. *
17. Illustrate the working of leaky bucket algorithm with the help of diagram.
18. Compare Datagram network and Virtual Circuits network.
19. Build the routing table for node C in the given network using Link State Algorithm.
MODULE 4

1. Write short note on IP.


2. Describe the format of IPv4 datagram with the help of a diagram, highlighting the
significance of each field. *
3. What are port numbers, give its importance in computer communication?
4. What is internet multicasting? What is IGMP? Explain any three IGMP messages.
5. List the private IP address ranges of class A, B and C?
6. Draw and explain the datagram format for IPv6. ***
7. Explain the function of RARP. **
8. Define Subnetting. What are the advantages of Subnetting? Explain with an example
9. Differentiate between BOOTP and DHCP. *
10. Explain the importance of BOOTP.
11. Explain how routing is done using BGP *
12. What is the use of ARP? Explain ARP operation and packet format. **
13. Explain the role of ICMP.
14. List and explain the different types of error reporting messages used by ICMP.
15. How does BGP avoid count to infinity problem? *
16. Subnet the Class C IP Address 206.16.2.0 so that you have 30 subnets. What is the subnet
mask for the maximum number of hosts? How many hosts can each subnet have?
MODULE 5

1. Explain DNS message types. *


2. Describe the name-address resolution techniques used in DNS
3. Describe the operation and packet format of UDP. *
4. Write notes on MIME. *
5. What are the basic functions supported by an e-mail.
6. Distinguish between partially qualified and fully qualified domain names
7. Distinguish between TCP and UDP header format. *
8. Explain the three different phases in a TCP transmission with the help of diagrams.
9. Explain the File Transfer Protocol (FTP) and its features * *
10. List the components of SNMP? *
11. What do you mean by socket address
12. Illustrate silly window syndrome.

You might also like