You are on page 1of 12

SUBJECT : EC 8551 COMMUNICATION NETWORKS

SEM / YEAR : V Semester / III Year

Q. UNIT I – NETWORK MODELS & DATALINK LAYER


No
PART-A
1. Point out the fundamental characteristics of data communication system.
2. Name the criteria necessary for an effective and efficient network.
3. Show the four basic network topologies.
4. Define WAN.
5. Give an advantages and disadvantages of Bus topology.
6. Compare the packet-switched and circuit-switched networks.
7. What is an Internet?
8. Write about Protocol layering.
9. Generalize the Open System.
10. List the layers of the OSI model.
11. Differentiate between Transport layer and Network layer.
12. Write about analog and digital signals.
13. Distinguish between baseband transmission and broadband transmission.
14. Mention the functions of data-link layer.
15. Analyze the flow and error control.
16. Classify the types of addresses in link-layer protocol.
17. Illustrate error detection and correction?
18. Summarize types of error.
19. Generalize the term checksum.
20. Formulate the minimum Hamming distance.
1. Describe in detail about the Data Communication. (13)
Write short notes on
(i) Network Criteria (3)
2. (ii) Physical Structures (4)
(iii) Physical Topology (6)
Define the following network topologies with an advantage.
(i) Bus topology (3)
3. (ii) Ring topology (3)
(iii) Star topology (3)
(iv) Mesh topology (4)
State the following networks in detail.
(i) LAN (3)
4. (ii) MAN (3)
(iii) WAN (4)
(iv) PAN (3)
5. Discuss about the Internet standards and Administration. (13)
Summarize the following:
6. (i) Principles of Protocol layering. (7)
(ii) Layers in TCP/IP protocol. (6)
7. Express the various layers and functions of OSI model. (13)
8. Illustrate the Transmission of digital signals. (13)
9. Examine the Transmission impairment and Data rate limits. (13)
(i) Analyze the Services provided by data-link layer. (7)
10.
(ii) Classify the types of address in link layer. (6)
11. Explain the Address Resolution Protocol with an example. (13)
Analyze the cyclic codes to find its capabilities by using polynomials.
12.
(13)
Evaluate the following:
13. (i) Hardware Implementation of Cyclic codes (7)
(ii) Checksum (6)
14. Construct the Forward Error Correction techniques. (13)
1. Generalize the various network topologies and its applications. (15)
2. Develop the OSI model and explain its layers with neat sketch. (15)
3. Summarize the following
(i) Data link layer (8)
(ii) Link Layer Addressing (7)

4. Design a cyclic code with its polynomials and its analysis. (15)
PART B
UNIT II – NETWORK LAYER PROTOCOLS
PART – A
1 Mention the functions of data link layer.
.
2 Draw the Ethernet frame format.
.
3 What is the need of escape character?
.
4 Compare flow and error control.
.
5 Describe stop-and-wait protocol.
.
6 State piggybacking.
.
7 Distinguish between fixed-size framing and variable-size framing.
.
8 Analyze the HDLC frame types differ from one another.
.
9 Illustrate the Media access control.
.
10. Summarize the different Ethernet generations.
11. Discuss the goals of Fast Ethernet.
12. Point out the advantages of WLAN.
13. Write about total delay in network layer services.
14. Explain about piconet and scatternet.
15. Define Bluetooth.
16. Differentiate between basic service set and extended service set.
Examine the open-loop Congestion control and closed loop Congestion control.
17.

18. Evaluate IPv4.


19. Compose the Security issues in IP protocol.
20. Develop the protocol to overcome the deficiencies in IP.
PART-B
Describe the following in detail:
1. (i) Framing (7)
(ii) Flow and Error control (6)
Write Briefly on
2. (i) Simple protocol and (7)
(ii) Stop-and-Wait Protocol in data link layer. (6)
What is CSMA/CD? How does it works? (6)
3. List out the various types of frames. (7)
State the CSMA/CA and its working. (10)
4.
Identify the various transfer modes in HDLC. (3)
5. Construct the Packet switching with its two different approaches. (13)
(i) Compare the various Ethernet standards. (7)
6.
(ii) Infer the WLAN. (6)
7. Analyze the IPv4 Addressing. (13)
8. Explain in detail about the architecture of Bluetooth and its layers. (13)
Illustrate the following terms
10 (i) Routing and Forwarding (7)
. (ii) Services provided by Network layer (6)
11 Demonstrate the Internet ProtOCOL (13)
.
UNIT III - TRANSPORT & APPLICATION LAYERS

1 What is Transport layer? BTL 1 Remembering


.
2 Differentiate Flow control and Congestion control. BTL 4 Analyzing
.
3 Examine the buffers used in transport layer services. BTL 3 Applying
.
4 Show the responsibilities of error control in transport layer. BTL 3 Applying
.
5 Explain Socket Address. BTL 2 Understanding
.
6 Distinguish between UDP and TCP BTL 4 Analyzing
.
7 Summarize Stop-and-wait protocol and Go-Back-N protocol. BTL 2 Understanding
.
8 Draw the TCP header format. BTL 3 Applying
.
9 Compare and contrast UDP, TCP, and SCTP. BTL 4 Analyzing
.
10 State the features of TCP. BTL 1 Remembering
.
11 Construct the three-way handshaking with an example. BTL 6 Creating
.
12 Give the approaches to improve the QoS. BTL 5 Evaluating
.
13 Write about SYN Flooding attack. BTL 1 Remembering
.
14 Name the general policies for handling congestion. BTL 1 Remembering
.
15 Evaluate the ways to deal with congestion. BTL 5 Evaluating
.
16. Compose RED. BTL 6 Creating
17 Illustrate the services provided by UDP. BTL 2 Understanding
.
18 List the Quality of Service parameters of Transport layer. BTL 1 Remembering
.
19 Express the ports used for UDP. BTL 2 Understanding
.
20 Define slow start. BTL 1 Remembering
.
PART
–B
Write short notes on:
1 (i) Process-to-process communication (4)
. (ii) Addressing (5) BTL 1 Remembering
(iii) Encapsulation and Decapsulation (4)
Summarize the following:
2 (i) Stop-and-Wait Protocol (7) BTL 2 Understanding
. (ii) Go-Back-N Protocol (6)
3. Show the services provided by transport layer protocol. (13) BTL 3 Applying
4. Describe the working principle of TCP congestion control. (13) BTL 1 Remembering
Explain the services offered by TCP to the process at the application
5.
layer. (13) BTL 2 Understanding
6. Analyze the TCP connection with its Three-Way Handshaking. (13) BTL 4 Analyzing

7. Examine the State Transition Diagram for TCP. (13) BTL 1 Remembering
8. Manipulate the flow control mechanism for TCP (13) BTL 3 Applying
(i) With neat sketches, evaluate the retransmission techniques in
detail. (6)
9. BTL 5 Evaluating
(ii) Criticize the events and transitions about the TCP state transition
diagrams. (7)
10. Elaborate on TCP connection Management using neat diagrams. (13) BTL 6 Creating

11. Write in detail the principle of establishment of QoS through BTL 1 Remembering
Differentiated services. (13)
12. Define congestion control of TCP. (13) BTL 4 Analyzing
t
18. Expand POP3 and IMAP4. BTL 1 Remembering
19. Express the classification of firewalls. BTL 2 Understanding
20. Construct the Pretty Good Privacy for E-mail security. BTL 1 Remembering
PART – B
(i) How would you transfer the message using Simple Mail Transfer
1. Protocol? (7)
(ii) Explain the final delivery of email to the end user using POP3. BTL 1 Remembering
(6)
Write short notes on
2. (i). Web services (6)
BTL 2 Understanding
(ii) SNMP (7)
With appropriate diagram describe
3. (i) DNS (7) BTL 3 Applying
(ii) MIME (6)
(i) Discuss in detail about HTTP with neat diagram. (7)
4. (ii) With relevant examples discuss how the domain space is BTL 1 Remembering
divided.
(6)
(i) Prepare a model of IMAP state transition diagram. (7)
5. BTL 2 Understanding
(ii) Outline the salient features of the SMTP protocol. (6)
(i) Illustrate the various steps involved in the use of non- persistent
6. connection of HTTP. (5)
(ii) Draw & explain the general format of a HTTP request message BTL 4 Analyzing
and a response message. (8)
(i) Define MIME with neat a diagram. (5)
7. BTL 1 Remembering
(ii) Give the comparison between POP-3 and IMAP-4. (8)
(i) Describe the message format, the message transfer and the Applying
BTL 3
8. underlying protocol involved in the working of an electronic
mail. Analyzing
(6) BTL 4
(ii) Analyze the architecture and services of an E-mail system. (7)
9. Evaluate the model for network security with neat diagram. (13) BTL 5 Evaluating
10. (i) Generalize the Traditional application in computer networks. (6)
(ii) Explain the role of a DNS on a computer network, including its BTL 6 Creating
involvement in the process of a User accessing a web page. (7)
11. Examine the encryption and decryption method used in DES. (13) BTL 1 Remembering
12. Explain in detail about the AES with neat diagram. (13) BTL 4 Analyzing

13. Summarize the Diffie-Helman Cryptosystem. (13) BTL 2 Understanding


(i) Identify the following terms; BTL 3 Applying
14. SMTP, HTTP, DNS, SNMP (4*2 = 8)
(ii) Examine WSDL in web services. (5) BTL 4 Analyzing
PART C
(i) Demonstratehow SMTP Protocol is used in E-mail applications.
1. (7) BTL 5 Evaluating
(ii) How would
example? you elaborate Hypertext
(8) Transfer Protocol with an
Construct the following: BTL 5 Evaluating
2. (i) SMTP (5)
(ii)MIME (5)
(iii)POP3 (5)
3. Design the Data Encryption Standard with neat diagram. (15) BTL 6 Creating

Compose the firewall and its types with neat diagram. (15) BTL 6 Creating
4.

www.AUNewsBlog.net

You might also like