You are on page 1of 7

M.A.

M SCHOOL OF ENGINEERING,TRICHY
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
ACADEMIC YEAR 2021-2022 (ODD)
EC 8551 – COMMUNICATION NETWORKS
QUESTION BANK
YEAR /SEM : III/VI
UNIT I -FUNDAMENTALS & LINK LAYER
Overview of Data Communications- Networks – Building Network and its types– Overview of Internet -
Protocol Layering - OSI Mode – Physical Layer – Overview of Data and Signals - introduction to Data Link
Layer - Link layer Addressing- Error Detection and Correction
PART A
Q. Questions BT Competence
No Level
1. Point out the fundamental characteristics of data communication system. BTL 2 Understanding
2. Name the criteria necessary for an effective and efficient network. BTL 1 Remembering
3. Show the four basic network topologies. BTL 3 Applying
4. Define WAN. BTL 1 Remembering
5. Give an advantages and disadvantages of Bus topology. BTL 2 Understanding
6. Compare the packet-switched and circuit-switched networks. BTL 5 Evaluating
7. What is an Internet? BTL 1 Remembering
8. Write about Protocol layering. BTL 1 Remembering
9. Generalize the Open System. BTL 2 Understanding
10. List the layers of the OSI model. BTL 1 Analyzing
11. Differentiate between Transport layer and Network layer. BTL 3 Applying
12. Write about analog and digital signals. BTL 4 Analyzing
13. Distinguish between baseband transmission and broadband BTL 1 Remembering
transmission.
14. Mention the functions of data-link layer. BTL 2 Understanding
15. Analyze the flow and error control. BTL 4 Remembering
16. Classify the types of addresses in link-layer protocol. BTL 4 Analyzing
17. Illustrate error detection and correction? BTL 3 Applying
18. Summarize types of error. BTL 5 Evaluating
19. Generalize the term checksum. BTL 6 Creating
20. Formulate the minimum Hamming distance. BTL 6 Creating
PART – B
1. Describe in detail about the Data Communication. (13) BTL 1 Remembering
Write short notes on
(i) Network Criteria (3)
2. (ii) Physical Structures (4) BTL 1 Remembering
(iii) Physical Topology (6)
Define the following network topologies with an advantage.
(i) Bus topology (3)
3. (ii) Ring topology (3) BTL 1 Remembering
(iii) Star topology (3)
(iv) Mesh topology (4)
State the following networks in detail.
(i) LAN (3)
4. (ii) MAN (3) BTL 1 Remembering
(iii) WAN (4)
(iv) PAN (3)
5. Discuss about the Internet standards and Administration. (13) BTL 2 Understanding
Summarize the following:
6. (i) Principles of Protocol layering. (7) BTL 2 Understanding
(ii) Layers in TCP/IP protocol. (6)
7. Express the various layers and functions of OSI model. (13) BTL 2 Understanding
8. Illustrate the Transmission of digital signals. (13) BTL 3 Applying
9. Examine the Transmission impairment and Data rate limits. (13) BTL 3 Applying
(i) Analyze the Services provided by data-link layer. (7)
10. BTL 3 Analyzing
(ii) Classify the types of address in link layer. (6)
11. Explain the Address Resolution Protocol with an example. (13) BTL 4 Analyzing
PART - C
1. Generalize the various network topologies and its applications. (15) BTL 6 Creating
2. Develop the OSI model and explain its layers with neat sketch. (15) BTL 6 Creating
3. Summarize the following
(i) Data link layer (8)
(7) BTL 5 Evaluating
(ii) Link Layer Addressing

4. Design a cyclic code with its polynomials and its analysis. (15) BTL 5 Evaluating
UNIT II - MEDIA ACCESS
UNIT III -&ROUTING
INTERNETWORKING
RoutingOverview
- Unicast of Data link
Routing Control and
– Algorithms Media access
– Protocols controlRouting
– Multicast - Ethernet
and(802.3) - Wireless
its basics LANsof– Available
– Overview
Protocols
Intradomain – Bluetoothprotocols
and interdomain – Bluetooth Low Energy
– Overview – WiFi
of IPv6 – 6LowPAN–Zigbee
Addressing - Network
– Transition from IPv4 to layer
IPv6. services –
Packet
Switching – IPV4 Address – Network layer protocols ( IP, ICMP, Mobile IP)
Questions PART – A BT Competence
Q.N
o Level
Q. No Questions BT Competence
1. Discuss about Routing. BTL 2 Level
Understanding
2. What do you mean by Unicast routing?
1. Mention the BTL 1 BTL
Remembering
1 Rememberin
3. Illustrate Least-Cost routing. functions of data BTL3 Applying
g
4. Explain distance-vector routing. link layer. BTL 1 Remembering
2. BTL 3 Applying
5. Evaluate Bellman-Ford equation. Draw the Ethernet BTL 5 Evaluating
frame format.
6. Define Autonomous system. BTL 1 Remembering
3. What is the need of escape character? BTL 1 Rememberin
7. Examine Global routing protocol. BTL 1 Remembering
g
8. Summarize
4. RIP. flow and error control.
Compare BTL 2 Understanding
BTL 5 Evaluating
9. Analyze the performance of OSPF. BTL 4 Analyzing
5. Describe stop-and-wait protocol. BTL 1 Rememberin
10. Manipulate the Dijkstra Algorithm. BTL 3 Applying
g
11. Outline the benefits of Open Shortest Path First (OSPF) Protocol. BTL 2 Understanding
BTL 1 Rememberin
6. State piggybacking.
12. Compare Interdomain and Intradomain routing. BTL 4 Analyzing
g
13. State Multicast
7. Distinguish routing.
between fixed-size framing and BTL 1 BTL 2 Understandin
Remembering
14. variable-size framing.
Generalize the applications of Multicasting. BTL 2 g
Understanding
15. 8. Analyze
Why IPv6 the HDLC
is preferred frame
than types differ from
IPv4? BTL 1 BTL 4 Analyzing
Remembering
16. one another.
Distinguish between RIP and OSPF. BTL 4 Analyzing
17. 9. Illustrate the Media access control. BTL 3 Applying
Classify the destination address in IPv6. BTL 3 Applying
18. Justify the strategies in transition from IPv4 to IPv6. BTL 5 Evaluating
10. Summarize the different Ethernet BTL 2 Understandin
19. Develop a Global unicast address block. BTL 6 Creating
generations. g
20. Integrate the compatible address and mapped address. BTL 6 BTL
Creating
11. Discuss the goals of Fast Ethernet. 2 Understandin
PART – B g
1. (i) What is meant by the Distance Vector Routing Algorithm? (7)
12. Point out the advantages of WLAN.
(ii) List the limitations of Distance Vector Routing Algorithm. (6) BTL 1 BTL 4 Analyzing
Remembering
2. Define Unicast routing and its Internet structure with neat diagram. (13) BTL 1 BTL
Remembering
1 Rememberin
13. Write about total delay in network layer
(i) Write note on the Border Gateway Protocol with neat diagram. (8)
services. g
3. BTL 1 Remembering
(ii) Draw the BGP-4 update packet format. (5) BTL 2 Understandin
14. Explain about piconet and scatternet.
4. Define multicasting and explain in detail about multicast address. BTL 1 g
Remembering
(13) BTL 1 Rememberin
15. Define Bluetooth.
Summarize the different Datagram approaches. Also show the g
5. advantages of LSR over DVR. List the limitations of Link State BTL 2 Understanding
16. Differentiate between basic service set and BTL 4 Analyzing
Routing Algorithm. (13)
extended service set.
6. Summarize the DVMRP and its algorithm. (13) BTL 2 Understanding
17. Examine the open-loop Congestion control
Explain the Protocol Independent Multicast (PIM) and its various BTL 3
7. and closed loop Congestion control. BTL 2 Understanding
Applying
working modes. (13)
18. Evaluate BTL 5 Evaluating
Describe about IPv4.
RIP. Explain in detail about RIP and OSPF with
8. diagrams. List the difference between them. (13) BTL 3 Applying
19. Compose the Security issues in IP protocol. BTL 6 Creating
9. Discuss in detail about the IPv6 Protocol. (13) BTL 3 Applying
(i) Examine
20. DevelopDistance VectortoMulticast
the protocol overcome Routing
the protocol. (8) BTL 6 Creating
(ii) Simplify
deficiencies in IP.and their calculation method.
the metrics (5) BTL 4 Analyzing
10.
PART – B
(i) Explain the internet
Describe multicasting.
the following in detail:Explain in detail. (7)
11. (ii) BTL 4 Analyzing
1. Find
(i)the IPv6 header details and explain them.
Framing (6) (7)
(ii) Flow and Error controlPART ‐ C (6) BTL 1 Remembering
UNIT IV - TRANSPORT LAYER
Introduction to Transport layer –Protocols- User Datagram Protocols (UDP) and Transmission Control
Protocols (TCP) –Services – Features – TCP Connection – State Transition Diagram – Flow, Error and
Congestion Control - Congestion avoidance (DEC bit, RED) – QoS – Application requirements.

BT
Q.No Questions Competence
Level
BTL 1
1. What is Transport layer? Rememberin
g
BTL 4
2. Differentiate Flow control and Congestion Analyzing
control.
BTL 3
3. Examine the buffers used in transport layer Applying
services.
BTL 3
4. Show the responsibilities of error control in Applying
transport layer.
BTL 2
5. Explain Socket Address. Understandin
g
BTL 4
6. Distinguish between UDP and TCP Analyzing
BTL 2
7. Summarize Stop-and-wait protocol and Go- Understandin
Back-N protocol. g
BTL 3
8. Draw the TCP header format. Applying
BTL 4
9. Compare and contrast UDP, TCP, and Analyzing
SCTP.
BTL 1
10. State the features of TCP. Rememberin
g
BTL 6
11. Construct the three-way handshaking with Creating
an example.
BTL 5
12. Give the approaches to improve the QoS. Evaluating
BTL 1
13. Write about SYN Flooding attack. Rememberin
g
BTL 1
14. Name the general policies for handling Rememberin
congestion. g
BTL 5
15. Evaluate the ways to deal with congestion. Evaluating
BTL 6
16. Compose RED. Creating
BTL 2
17. Illustrate the services provided by UDP. Understandin
g
BTL 1
18. List the Quality of Service parameters of Rememberin
Transport layer. g
BTL 2
19. Express the ports used for UDP. Understandin
g
BTL 1
20. Define slow start. Rememberin
g
PART – B
Write short notes on:
1. (4)
(i) Process-to-process communication
(5) BTL 1 Remembering
(ii) Addressing
(iii) Encapsulation and Decapsulation (4)
Summarize the following:
2. (i) Stop-and-Wait Protocol (7) BTL 2 Understanding
(ii) Go-Back-N Protocol (6)
3. Show the services provided by transport layer protocol. (13) BTL 3 Applying
4. Describe the working principle of TCP congestion control. (13) BTL 1 Remembering
Explain the services offered by TCP to the process at the application
5. BTL 2 Understanding
layer. (13)
6. Analyze the TCP connection with its Three-Way Handshaking. (13) BTL 4 Analyzing
Examine the State Transition Diagram for TCP. (13) BTL 1 Remembering
7.
8. Manipulate the flow control mechanism for TCP (13) BTL 3 Applying
(i) With neat sketches, evaluate the retransmission techniques in
detail. (6)
9. BTL 5 Evaluating
(ii) Criticize the events and transitions about the TCP state transition
diagrams. (7)
10. Elaborate on TCP connection Management using neat diagrams. BTL 6 Creating
(13)
PART C
(i) Draw the format of TCP packet header and explain
1. each of its field. (10)
(ii) Justify the allocation of variable field length for the fields BTL 6 Creating
in the TCP header. (5)
How is congestion controlled? Deduct various congestion control
2. techniques in transport layer. (15) BTL 6 Creating

3. Evaluate the services and Applications in User Datagram Protocol. (15) BTL 5 Evaluating
4. Elaborate the following:
(i) Flow control (8)
BTL 5 Evaluating
(ii) Error control (7)

UNIT V - APPLICATION LAYER


Application Layer Paradigms – Client Server Programming – World Wide Web and HTTP - DNS- -
Electronic Mail (SMTP, POP3, IMAP, MIME) – Introduction to Peer to Peer Networks – Need for
Cryptography and Network Security – Firewalls.
BT
Q.N Questions Competence
Level
o
1. Define Application layer protocol. BTL 1 Remembering
2. Distinguish between network applications and application-layer protocol. BTL 4 Analyzing
3. Mention the limitations of SMTP. BTL 3 Applying
4. Write the name of components used in e-mail system. BTL 1 Remembering
5. Illustrate the features of IMAP. BTL 2 Understanding
6. Why DNS Resolver bootstrap the domain name lookup process? BTL 3 Applying
7. Explain the function of User Agent. BTL 2 Understanding
8. Compare HTTP with persistent and Non-persistent Connection. BTL 4 Analyzing
9. Evaluate the types of documents in www. BTL 5 Evaluating
10. What is MIME? BTL 1 Remembering
11. Compose the features of HTTP. BTL 6 Creating
12. Criticize the Application Programming Interface. BTL 5 Evaluating
13. Analyze the security goals in network security. BTL 4 Analyzing
14. How will you recognize the P2P networks? BTL 1 Remembering
15. Draw the general block diagram of cryptography. BTL 3 Applying
16. Explain the classification of cipher. BTL 6 Creating
17. Summarize the applications of RSA. BTL 2 Understanding
18. Expand POP3 and IMAP4. BTL 1 Remembering
19. Express the classification of firewalls. BTL 2 Understanding
20. Construct the Pretty Good Privacy for E-mail security. BTL 1 Remembering
PART – B
(i) How would you transfer the message using Simple Mail Transfer
1. Protocol? (7)
(ii) Explain the final delivery of email to the end user using POP3. BTL 1 Remembering
(6)
Write short notes on
2. (i). Web services (6) BTL 2 Understanding
(ii) SNMP (7)
With appropriate diagram describe
3. (i) DNS (7) BTL 3 Applying
(ii) MIME (6)
(i) Discuss in detail about HTTP with neat diagram. (7)
4. (ii) With relevant examples discuss how the domain space is BTL 1 Remembering
divided.
(6)
5. (i) Prepare a model of IMAP state transition diagram. (7) BTL 2 Understanding
(ii) Outline the salient features of the SMTP protocol. (6)

(i) Illustrate the various steps involved in the use of non- persistent
6. connection of HTTP. (5)
(ii) Draw & explain the general format of a HTTP request message BTL 4 Analyzing
and a response message. (8)
(i) Define MIME with neat a diagram. (5)
7. BTL 1 Remembering
(ii) Give the comparison between POP-3 and IMAP-4. (8)
(i) Describe the message format, the message transfer and the Applying
underlying protocol involved in the working of an electronic mail. BTL 3
8.
(6)
BTL 4 Analyzing
(ii) Analyze the architecture and services of an E-mail system. (7)

9. Evaluate the model for network security with neat diagram. (13) BTL 5 Evaluating
10. (i) Generalize the Traditional application in computer networks. (6)
(ii)Explain the role of a DNS on a computer network, including its BTL 6 Creating
involvement in the process of a User accessing a web page. (7)
PART C
(i) Demonstrate how SMTP Protocol is used in E-mail applications.
1. (7) BTL 5 Evaluating
(ii) How would you elaborate Hypertext Transfer Protocol with an
example? (8)
Construct the following: BTL 5 Evaluating
2. (i) SMTP (5)
(ii) MIME (5)
(iii) POP3 (5)
3. Design the Data Encryption Standard with neat diagram. (15) BTL 6 Creating

You might also like