You are on page 1of 28

VEL TECH MULTI TECH Dr.RANAGARAJANDr.

SAKUNTHALA ENGINEERING COLLEGE


(An Autonomous Institution)
DEG/BRANCH :B.Tech/B.E-CSBS/AIDS/CSE SUBJECT CODE : 191CS424
YEAR/SEM : II/IV SUBJECT NAME : COMPUTER NETWORKS

UNIT I – FUNDAMENTALS & LINK LAYERS

PART - A

S.NO QUESTIONS CO K
LEVEL LEVEL
1. Computer network is________ CO1.1 K1
a) Collection of hardware components and computers
b) Interconnected by communication channels
c) Sharing of resources and information
d) All of the above
2. is at technique that is used to send more than one call over a single CO1.1 K2
line.
a) Digital transmission
b) Infrared transmission
c) Digitizing
d) Multiplexing
3. Which is the network that provides high speed connectivity? GATE CO1.1 K2
a) Internetwork
b) WAN
c) LAN
d) MAN
4. Which of the following is/are protocols of application? CO1.2 K2
a) FTP
b)DNS
c)TELNET
d) All of the above
5. How many layers does OSI Reference Model has? CO1.2 K1
a) 4
b) 5
c) 6
d) 7
6. Which of these protocols given below uses UDP as transport protocol? CO1.2 K2
GATE
a) HTTP
b) TELNET
c) DNS
d) SMTP
7. The data link layer takes the packets from and CO1.2 K1
encapsulates them into frames for transmission.
a) Network layer
b) Physical layer
c) Transport layer
d) Application layer
8. How many layers are present in the Internet protocol stack(TCP/IP CO1.2 K1
model)?
a) 5
b) 7
c) 6
d) 10
9. Which of the following layers are an addition to OSI model when CO1.2 K2
compared with TCP IP model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer
10. A single channel is shared by multiple signals by_____. CO1.2 K1
a) Analog modulation
b) Digital modulation
c)Multiplexing
d) Phase modulation
11. In OSI model, when data is sent from device A to device B, the 5th layer CO1.2 K2
to receive data at B is_______.
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
12. Header of a frame generally contains___________. CO1.3 K1
a) Synchronization bytes
b) Addresses
c) Frame identifier
d) All of the above
13. Internetwork is made of five networks. Which are those? GATE CO1.3 K2
a) Four LANs and One MAN
b) Four LANs and One WAN
c) Three LANs and Two WAN
d) Four MANs and One WAN
14. The following primitives belongs to ___________Service. CO1.4 K2
Less, Connection, Receive, Send and Disconnect
a) Connection Oriented
b) Connectionless Oriented
c) Both a & b
d) None of the above
15. What do you mean by broadcasting in networking? CO1.4 K2
a) It means addressing a packet to all machine
b) It means addressing a packet to some machine
c) It means addressing a packet to particular machine
d) It means addressing a packet to except a particular machine
16. What is slot time for gigabit Ethernet? GATE CO1.5 K2
a) 0.612
b) 0.512
c) 0.412
d) 0.312
17. What are all the non-real time application to a data communication CO1.5 K2
network?
a) E-Mail
b) Letter
c) Distance education lectures
d)Teleconference
18. The stop-and-wait flow control method is the same as the sliding window CO1.6 K1
method with a window size of_____.
a) 0
b) 1
c)2
d) None of the above
19. Which function of the data link layer has error detection and handling? CO1.6 K2
a) Line discipline
b) Flow control
c) Error control
d) Session management
20. A receiver using stop-and-wait ARQ sends ACK frames CO1.6 K1
numbered______.
a) 0and1 only
b) Sequentially,beginningwith0
c) The frames are not numbered
d) Sequentially,beginningwith1
21. The technique used to rectify Go –Back N-ARQ is . CO1.6 K2
a) Line discipline
b) Flow Control
c) Error Control
d) Congestion control
22. A sender has a sliding window of size 15. The first 15 frames were sent. CO1.6 K2
How many frames are in the window now?
a) 0
b) 1
c) 14
d)15
23. In the sliding window method of flow control, the receiver window CO1.6 K2
____size when an ACK is sent.
a) Increases in
b) Decreases in
c) Doubles in
d) Remain sits original
24. Check sum is used for______. CO1.7 K1
a) Error correction
b) Error detection
c) Botha & b
d) None of the above
25. What is the purpose of “Parity Bits”? CO1.7 K2
a) Encryption of data
b) To transmit faster
c) To detect errors
d) To identify the user
26. How is error detection and correction done? CO1.7 K2
a) By passing it through equalizer
b) By passing it through filter
c) By amplifying it
d) By adding redundancy bits
27. _______coordinates that amount of data that can be sent before receiving CO1.8 K1
ACK.
a) Flow control
b) Error Control
c) Congestion control
d) Both a & b
28. The total is complemented and appended to the end of the original data CO1.8 K2
unit as redundancy bits. It is as called the_____ .
a) Checksum field
b) Frame field
c) HDLC field
d) Bi Text Book Buffering
29. _____in the data link layer is based on ARQ, which is the retransmission CO1.8 K2
of data.
a) Error control
b) Flow control
c) Congestion control
d) Both b & c
30. The message 11001001 is to be transmitted using the CRC polynomial CO1.8 K1
x^3 + 1 to protect it from errors. The message that should be
transmitted is______ GATE
a) 11001001011
b) 11001001000
c) 110010010011
d) 11001010

PART B

S.NO QUESTIONS CO K
LEVEL LEVEL
1. Which network is suitable for electronic mail? TEXT BOOK CO1.1 K1
2. How will you find out delay, throughput and bandwidth of the network? CO1.1 K3
TEXT BOOK
3. In network layered approach is used. Can it be done without layered CO1.1 K3
approach? Justify your answer. TEXT BOOK
4. Analyze the transmission of frame to anode. TEXT BOOK CO1.2 K4
5. Draw the internet architecture diagram neatly. GATE CO1.3 K4
6. What is the network, in which every computer is capable of playing the CO1.4 K3
role of client, server or both at the same time? GATE
7. A periodic signal has a bandwidth of 35Hz. The highest frequency is CO1.5 K4
50Hz. What is the lowest frequency? Draw the spectrum if the signal
contains all frequencies of the same amplitude. TEXT BOOK
8. A bi text book stuffing-based framing protocol uses an 8-bit delimiter CO1.5 K3
pattern of 01111110. If the output bit text book string after stuffing is
01111100101, then the input bi text book string GATE
9. Take the example of 1 Mbps error-free line, with the maximum frame CO1.7 K3
size of 1000 bits and new packets generated about 1 second apart
Timeout interval is 10 m/sec if the special acknowledgement timer were
eliminated, unnecessary timeout would occur. In the scenario, how any
times average message would have been transmitted? GATE
10. Suppose the block of 16 bits is to be sent using a checksum of 8 bits. CO1.8 K4
What operation takes place and find out whether it is corrupted or not?
10101001 00111001 GATE
11. Is the polynomial format useful to solve the concept mathematically? CO1.8 K4
If yes means solve this: X7+X5+X2+X+1. TEXT BOOK
12. Apply the CRC–generator method for the Data:100100 & CO1.8 K3
divisor:1101 TEXT BOOK
13. Station B needs to send a message consisting of 9 packets to Station C CO1.9 K4
using a sliding window (window size 3) and go-back-n error control
strategy. All packets are ready and immediately available for
transmission. If every 5th packet that B transmits gets lost (but no acks
from C ever get lost), then what is the number of packets that B will
transmit for sending the message to C? GATE

PART C

S.NO QUESTIONS CO K
LEVEL LEVEL
1. Electronic mail replaces snail mail? E-mail is the forwarding of electronic CO1.1 K3
files to an electronic post office for the recipient to pick up. Analyze.
CASE STUDY
2. Write about the physical topology and it’s types with the neat diagram. CO1.2 K1
TEXT
BOOK
3. Illustrate the OSI architecture with neat diagram. Compare OSI model CO1.3 K4
with TCP/IP model. Analyze why lesser layer in TCP/IP than OSI.
GATE
4. Explain briefly about Internet architecture model with neat sketch. CO1.3 K1
TEXT BOOK
5. What is the bandwidth of a signal that can be decomposed into five sine CO1.5 K4
waves with frequencies at 0,20,50,100 and 200Hz? All peak amplitudes
are the same. Draw the bandwidth diagram. TEXT BOOK
6. Discuss the following functions applied for error detection with suitable CO1.8 K3
example.
I. Parity Check (6 marks)
II. Cyclic Redundancy Check (6marks) TEXT BOOK
7. Is the polynomial format useful to solve the concept mathematically? CO1.8 K4
If yes means solve this: The message 11001001 is to be transmitted using
the CRC polynomial x^3 + 1 to protect it from errors. The message that
should be transmitted and Why? Otherwise give the explanation.
GATE
8. Apply stop and wait protocol for error control with neat sketch. CO1.9 K3
TEXT BOOK
6
9. A link has a transmission speed of 10 bits/sec. It uses data packets of size CO1.9 K3
1000 bytes each. Assume that the acknowledgement has negligible
transmission delay, and that its propagation delay is the same as the data
propagation delay. Also assume that the processing delays at the nodes
are negligible. The efficiency of the stop-and-wait protocol in this setup
is exactly 25%. Find the value of the one-way propagation delay (in
milliseconds). GATE
10. Discuss flow control and error control with suitable example and neat CO1.9 K2
diagram. CASE STUDY
UNIT II -MEDIA ACCESS & BASIC INTERNETWORKING

PART - A

S.NO QUESTIONS CO K
LEVEL LEVEL
1. After the kth consecutive collision, each colliding station waits for a CO2.1 K2
random time chosen from the interval.
a) (0 to 2k) x RTT
b) (0 to 2k-1) x RTT
c) (0 to 2k-1) x Maximum Propagation delay
d) (0 to 2k-1) x Maximum Propagation delay
2. Hardware address is known as CO2.1 K1
a) MAC address
b) IP Address
c) Network Interface Card
d) Address Resolution Protocol
3. What translates IP address into MAC address? CO2.1 K1
a) Organizationally Unique Identifier
b) Address Resolution Protocol
c) Network Interface Card
d) Burned In Address
4. The original IEEE 802 MAC address comes from CO2.1 K2
a) MAC address
b) IP address
c) Ethernet address
d) Http
5. Consider a CSMA/CD network that transmits data at a rate of 100 Mbps CO2.1 K2
(108 bits second) over a 1 km(kilometer) cable with no repeaters. If the
minimum frame size required for this network is 1250 bytes, what is the
signal speed (km/sec) in the cable? GATE -2015
a) 8000
b) 10000
c) 16000
d) 20000
6. A and B are the only two stations on Ethernet. Each has a steady queue CO2.2 K2
of frames to send. Both A and B attempts to transmit a frame, collide and
A wins first back off race. At the end of this successful transmission by
A, both A and B attempt to transmit and collide. The probability that A
wins the second back off race is
a) 0.5
b) 0.625
c) 0.75
d) 1.0
7. What is start frame delimiter (SFD) in Ethernet frame? CO2.2 K1
a) 10101010
b) 10101011
c) 00000000
d) 11111111
8. In an Ethernet local area network, which one of the following statements CO2.2 K2
is TRUE? GATE -2016.
a) A station stops to sense the channel once it starts transmitting a frame.
b) The purpose of the jamming signal is to pad the frames that are smaller
than the minimum frame size.
c) A station continues to transmit the packet even after the collision is
detected.
d) The exponential back off mechanism reduces the probability of
collision on
retransmissions.
9. An Ethernet frame that is less than the IEEE 802.3 minimum length of CO2.2 K1
64 octets is called
a) Short frame
b) Runt frame
c) Mini frame
d) Man frame
10. A point-to-point protocol over Ethernet is a network protocol for __ CO2.2 K2
a) Encapsulating PPP frames inside Ethernet frames
b) Encapsulating ethernet frames inside PPP frames
c) For security of Ethernet frames
d) For security of PPP frames

11. An interconnected collection of piconet is called CO2.3 K1


a) Scatter net
b) Micronet
c) Mininet
d) Multinet
12. Which multiple access technique is used by IEEE 802.11 standard for CO2.4 K1
wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD
13. Which layer in the IEEE 802.11 protocol stack has the function of flow CO2.4 K1
control and error control?
a) Physical Layer
b) Logic Link Control Layer
c) Medium Access Layer
d)None of the mentioned
14. For the IEEE 802.11 MAC protocol for wireless communication, which CO2.4 K2
of the following statements is/are TRUE? GATE – 2016
I. At least three non-overlapping channels are available for transmissions.
II. The RTS-CTS mechanism is used for collision detection.
III. unicast frames are ACK ed.
a) All I,II and III
b) I and III only
c) II and III only
d) II only
15. In a Piconet, there can be up to parked nodes in the network. CO2.5 K2
a) 63
b) 127
c) 255
d) 189
16. Bluetooth is the wireless technology for CO2.5 K2
a) Local area network
b) Personal area network
c) Metropolitan area network
d) Wide area network
17. Unauthorized access of information from a wireless device through a CO2.5 K2
Bluetooth connection is called
a) Blue making
b) Blue snarfing
c) Blue string
d) Blue scoping
18. Bluetooth supports CO2.5 K1
a) Point-to-point connections
b) Point-to-multipoint connection
c) Both point-to-point connections and point-to-multipoint connection
d) Multipoint to point connection
19. In a Piconet, there can be up to parked nodes in the network. CO2.5 K2
a) 63
b) 127
c) 255
d) 189
20. A local telephone network is an example of a network. CO2.6 K2
a)Packet switched
b)Circuit switched
c)Bit switched
d)Line switched
21. What are the Methods to move data through a network of links and CO2.6 K1
switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
d) Packet switching and Circuit switching
22. The DHCP server CO2.7 K1
a) Maintains a database of available IP addresses
b) Maintains the information about client configuration parameters
c) Grants a IP address when receives a request from a client
d) All of the mentioned
23. What is DHCP snooping? CO2.7 K1
a) Techniques applied to ensure the security of an existing DHCP
infrastructure
b) Encryption of the DHCP server requests
c) Algorithm for DHCP
d) None of the mentioned
24. Internet Control Message Protocol (ICMP) has been designed to CO2.7 K1
compensate
a) Error-reporting
b) Error-correction
c) Host and management queries
d) All of the mentioned
25. When a router cannot route a datagram or host cannot deliver a datagram, CO2.7 K1
the datagram is discarded and the router or the host sends a message back
to the source host that initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
26. Two machines can use the timestamp request and timestamp replay CO2.7 K2
messages to determine the needed for an IP datagram to travel
between them.
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source
27. In a simple echo-request message, the value of the sum is 01010000 CO2.7 K2
01011100. Then, value of checksum is
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011
28. ARP never routes at nodes? CO2.7 K1
a) Single
b) Dual
c) Networking
d) Internetworking
29. ARP message size is depending upon? CO2.7 K1
a) Link Layer Address Size
b) Network layer Address Size
c) Transport Layer Address Size
d) Both A & B
30. Operating system issues an announcement at the time of startup? CO2.7 K1
a)Address Resolution Protocol
b)File Transfer Protocol
c)User datagram Protocol
d)Transmission Control Protocol

PART – B

S.NO QUESTIONS CO K
LEVEL LEVEL
1. Do you need a multiple access protocol while using the 1ocal loop of CO2.1 K4
the telephone company to access the Internet? Why?
2. Differentiate between 802.3 and switched LAN CO2.2 K2
3. Design a 100base-T4 in fast ethernet. CO2.2 K3
4. How is the preamble field different from the SFD field? CO2.2 K1
5. Compare the data rates for standard ethernet and fast ethernet. CO2.2 K2
6. What are the four prominent wireless technologies? CO2.2 K1
7. How do you design the WLAN with various network components and CO2.3 K2
give few examples.
8. Mention the wireless LAN technology needs to overcome anumber of CO2.3 K3
inherent
limitations and challenges.
9. Why is collision detection more complex in wireless networks than in CO2.3 K4
wired networks such as Ethernet?
10. As a mobile node gets farther and farther away from a base station, CO2.4 K4
what are two actions that the base stations could take to ensure that the
loss probability of a transmitter frame does not increase?
11. Design the scatternet of Bluetooth architecture. CO2.5 K3
12. How much time a bluetooth one-slot frame is used for the hopping CO2.5 K4
mechanism? What about a three-slot frame and a five-slot frame?
13. Compare switching and bridging. CO2.6 K2
14. How can you distinguish between a multicast addressing of IPv4 and CO2.7 K2
IPv6?
15. Change the following IP addresses from dotted-decimal notation to CO2.7 K3
binary notation.
a. 114.34.2.8
b.129.14.6.8
16. How would you design Class A, Class B and Class C of IP? CO2.7 K2
17. When is ICMP redirect message used? CO2.7 K4
18. Write the scope of the ARP. CO2.7 K2
19. Draw the sketch of IPv4 packet header. CO2.7 K3

PART – C

S.NO QUESTIONS CO K
LEVEL LEVEL
1. Which layer of OSI is broken down into MAC and LLC sub layers? CO2.1 K3
Design the Ethernet Logical Relationship of ISO Model with roles and
responsibilities of MAC and LLC.
2. Illustrate the ethernet 802.3 with various standards involved in it. CO2.2 K2
3. Consider that N ethernet stations, all trying to send at the same time, CO2.2 K4
require N/2 slot time s to sort out who transmits next. Assuming the
average packet size is 5 slot times, express the available bandwidth as a
function of N.
4. If an ethernet destination address is 07:01:02:03:04:05, what is the type of CO2.3 K4
the address (unicast, multicast, or broadcast)?
5. Suppose an 802.11b station is configured to always reserve the channel CO2.4 K4
with the RTS/CTS sequence. Suppose the station suddenly wants to
transmit 1000 bytes of data, and all other stations are idle at this time. As
a function of SIFS and DIFS, and ignoring propagation delay and
assuming no bit errors, calculate the time required to transmit the frame
and receive the acknowledgement.
6. Illustrate the Bluetooth architecture with protocol stack. CO2.5 K2
7. Suppose a 10 Mbps Ethernet hub (repeater) is replaced by a 10 Mbps CO2.6 K4
switch, in an environment where all traffic is between a single server and
N clients. Because all traffic must still traverse the server switch link.
Nominally there is no improvement in bandwidth.
• Would you expect any improvement in bandwidth? If so, Why?
• What other advantages and drawbacks might a switch offer versus a
hub?
8. Disset the following: (i) Switches and Bridges. CO2.6 K2
(ii) How does a Bridge come to learn on which port
the various hosts reside? Explain with examples.
9. Write about the IP service model, packet format, fragmentation and CO2.7 K2
reassembly.
10. Show and describe the ARP packet format for mapping IP Addresses into CO2.7 K3
Ethernet Addresses.
11. Analyze with example how CIDR addresses the two scaling concern in CO2.7 K4
the internet.
UNIT – III ROUTING
PART –A
QUESTIONS CO K
SL.NO
LEVEL LEVEL
A _________ is a device that forwards data that is not explicitly CO3.1 K1
destined to it.
A. Hub
1.
B. Switch
C. Router
D. All of the above
There exists ________forms of routing protocols. CO3.1 K2
A. 1
2. B. 2
C. 3
D. 4
Routing protocols can be divided in ________ categories. CO3.1 K1
A. 2
3. B. 3
C. 4
D. 5
RIP stands for __________. CO3.1 K2
A. Routing Information Path Next Generation
4. B. Routing Interior Protocol Next Generation
C. Routing Information Protocol Next Gateway
D. Routing Information Protocol Next Generation
A __________ distributes routing information between two different CO3.2 K1
autonomous systems or organization.
A. Interior Routing Protocol
5.
B. Exterior Routing Protocol
C. Link-State Routing Protocol
D. Distance Vector Routing Protocol
________ is an upgraded implementation of ICMP to accommodate CO3.2 K2
IPv6 requirements.
A. ICMPv6
6.
B. DHCPv6
C. DNS
D. None of the above
Which type of Ethernet framing is used for TCP/IP and DEC net? CO3.2 K2
A. Ethernet 802.3
7. B. Ethernet 802.2
C. Ethernet II
D. Ethernet SNAP
Which NetWare protocol works on layer 3–network layer—of the CO3.2 K2
8.
OSI model?
A. IPX
B. NCP
C. SPX
D. NetBIOS
Which NetWare protocol provides link-state routing? CO3.2 K2
A. RIP
9. B. SAP
C. NCP
D. NLSP
A Distance Vector router running distance vector protocol CO3.2 K1
advertises its connected routes and learns new routes from its
neighbor’s.
10. A. Yes
B. No
C. Can be yes or no
D. Cannot say
In computer networking the term ...........refers to selecting paths in a CO3.3 K2
computer network along which to send data.
A. routing
11.
B. inter-networking
C. internal organization
D. congestion control
Routing algorithms do not base their routing decisions on CO3.3 K1
measurements or estimates of the current traffic and topology.
A. Static or Non-adaptive
12.
B. Static or adaptive
C. Dynamic or Non-adaptive
D. Dynamic or adaptive
Routing algorithm in contrast change their routing decisions to CO3.3 K2
reflect changes in topology and usually the traffic as well.
A. Static or Non-adaptive
13.
B. Static or adaptive
C. Dynamic or Non-adaptive
D. Dynamic or adaptive
............is an identifier for either the IPV6 extension header CO3.3 K2
immediately following the IPV6 header or an upper layer protocol,
such as ICMPv6, TCP or UDP?
14. A. Source Address
B. Destination Address
C. Next Header
D. Hop Limit
An OSPF router receives an LSA, the router checks its sequence CO3.3 K1
number, and this number matches the sequence number of the LSA
that the receiving router already has. What does the receiving router
do with the LSA?
15.
A. Ignores the LSA
B. Adds it to the database
C. Sends newer LSU update to source router
D. Floods the LSA to the other routers
An OSPF router receives an LSA. The router checks its sequence CO3.3 K1
16. number and finds that this number is higher than the sequence
number it already has. Which two tasks does the router perform with
the LSA?
A. Ignores the LSA
B. Adds it to the database
C. Sends newer LSU update to source router
D. Floods the LSA to the other routers
An OSPF router receives an LSA. The router checks its sequence CO3.3 K1
number and finds that this number is lower than the sequence
number it already has. What does the router do with the LSA?
17. A. Ignores the LSA
B. Adds it to the database
C. Sends newer LSU update to source router
D. Floods the LSA to the other routers
In which of the following switching methods, the message is divided CO3.4 K2
into small packets?
A. Message switching
18.
B. Packet switching
C. Virtual switching
D. None of the these
Which of the following switch methods creates a point-to-point CO3.4 K2
physical connection between two or more computers?
A. Message switching
19.
B. Packet switching
C. Circuit switching
D. None of the these
What is the total vulnerable time value of pure Aloha? CO3.4 K1
A. Tfr
20. B. 1/2 Tfr
C. 2 * Tfr
D. 4 * Tfr
By default, what BGP attribute is evaluated only when two path CO3.4 K1
advertisements are received from the same neighboring AS?
A. Local Preference
21.
B. Multiple Exit Discriminator
C. Next Hop
D. AS Path
Which BGP state denotes a fully operational session? CO3.4 K2
A. Open Sent
22. B. Open Confirm
C. Established
D. Active
Does BGP send incremental or complete updates on a regular basis CO3.4 K1
after the initial route exchange,
A. BGP sends incremental updates only when needed.
B. BGP sends complete updates to ensure that the routing
23.
information is accurate.
C. BGP sends both complete and incremental updates to ensure the
accuracy of routing.
D. BGP does not send any updates after the initial data exchange.
A subset of a network that includes all the routers but contains no CO3.5 K1
loops is called ________
24.
A. Spanning tree
B. Spider structure
C. Spider tree
D. Special tree
A ___________ is an extension of an enterprise’s private intranet CO3.5 K2
across a public network such as the internet, creating a secure
private connection.
25. A. VNP
B. VPN
C. VSN
D. VSPN
Which NetWare protocol provides link-state routing? CO3.5 K2
A. RIP
26. B. SAP
C. NCP
D. NLSP
A Distance Vector router running distance vector protocol CO3.5 K2
advertises its connected routes and learns new routes from its
neighbors.
27. A. Yes
B. No
C. Can be yes or no
D. Can not say
In unicast routing, the size of the network in the distance vector CO3.5 K2
routing cannot exceed.
A.2 hops
28.
B.5 hops
C.10 hops
D.15 hops
DVMRP is a __________ routing protocol, based on RIP CO3.5 K1
A. Source-based
29. B. Group –based
C. Both A and B
D. None of the above
_____ adds pruning and grafting to ______to create a multicast CO3.5 K1
shortest path tree that supports dynamic membership changes.
A. RPM,RPB
30.
B. RPB,RPM
C. RPF,RPM
D. None of the above

PART – B

QUESTIONS CO K
S.NO
LEVEL LEVEL
For the network given in Figure. give the datagram forwarding table CO3.1 K5
for each node. The links are labeled with relative costs; your tables
1
should forward each packet via the lowest-cost path to
its destination. Case study
Develop the Link State Advertisement (LSA) table for node D. CO3.1 K5

3 Distinguish between Link state routing and Distance vector routing. CO3.2 K2
4 Is the metrics used by routing protocols? Justify it. April/May 2015 CO3.2 K4
Routing is used for which purpose? Routing classifications are 2 CO3.3 K2
5
types. Is it right?
What are the switch techniques in switch basics? And list out 3 CO3.3 K3
6
phases in circuit switching.
7 Draw the address type and scope with explanation. CO3.4 K2
8 Is two AS’s interconnected via BGP? Justify it. CO3.4 K1
9 Disset the ipv6? Compare ipv4 and ipv6. CO3.5 K2
10 Construct the IPv6 header format. CO3.5 K2
11 Point out the function of DVMRP. CO3.5 K4
12 Distinguish between PIM-DM and PIM SM? CO3.5 K2

PART - C

QUESTIONS CO K
S.NO
LEVEL LEVEL
Consider the classless routing protocol supports VLSM and CIDR, CO3.1 K4
uses the concept of area to manage & administrative distance is
1.
110. Identify which is the suitable routing protocol for these all the
above functions and explain its states with message format.
i) Identify the function of Routing Information Protocol (RIP). CO3.1 K3
2.
ii) Draw the IPv6 packet header format.
Distinguish the two approaches of packet switching and circuit CO3.2 K2
3
switching techniques.
4 Find out the Distance Vector Routing Protocol in the given graph. CO3.3 K5
Find out the link state routing protocol using the given graph. CO3.3 K5

Consider the directed graph shown in the figure below. There are CO3.3 K5
multiple shortest paths between vertices S and T. Which one will be
reported by Dijkstra's shortest path algorithm? Assume that, in any
iteration, the shortest path to a vertex v is updated only when a
strictly shorter path to v is discovered.

i) Demonstrate the working of Multicast Routing CO3.4 K2


7 ii) Cause of IPv6 is launch? Is IPv6 process is differs to IPv4? If
yes means justify it.
Illustrate in detail the operation of BGP version 4 protocol by CO3.4 K2
8
considering a suitable network.
Examine the elements used in defining the Multicast. Explain in CO3.4 K2
9
detail.
10 Examine all the functions of DVMRP? Narrate in detail. CO3.5 K3
How do the protocol independent multicast protocols scale well in CO3.5 K4
11 environments where a relative small proportion of routers want to
receive traffic for certain group?
UNIT – IV–TRANSPORT LAYER

PART - A

S.NO QUESTIONS CO K
LEVEL LEVEL
1. To define the process at the transport layer the two identifiers needed CO4.1 K1
are called as_______.
A. Logical Addresses
B. Physical Addresses
C. Port Addresses
D. None of the above
2. The ports ranging from 0 to 1023 are called __________. CO4.1 K2
A. Well known, registered
B. Registered
C. Private
D. Dynamic
3. UDP and TCP are two protocols ________ at the layer. CO4.1 K1
A. Data Link
B. Network
C. Transport
D. Application
4. UDP performed ________________________ functions. CO4.1 K2
A. Process to process communication
B. host to host communication
C. Node to Node communication
D. None
5. A port number is __________ bits long. CO4.2 K1
A. 8
B.16
C. 32
D. 64
6. The source port number on the UDP user datagram header defines CO4.2 K2
______________________.
A. the sending computer
B. the receiving computer
C. process running on the computer
D. None of the above
7. To use the services of UDP, we need _________ socket address CO4.3 K2
A. Four
B. Two
C. Three
D. Five
8. UDP packets are called as _________________ CO4.3 K2
A. User Datagram
B. Segments
C. Frames
D. None
9. UDP have a fixed size of header of __________bytes. CO4.3 K2
A. 16
B. 8
C. 40
D. 32
10. TCP is a __________________ protocol. CO4.3 K1
A. byte oriented
B. message oriented
C. block oriented
D. None
11. TCP groups a number of bytes together into a packet called a CO4.3 K2
______________________.
A. User datagram
B. Segment
C. Datagram
D. None
12. TCP uses ___________________ to check safe and sound arrival CO4.3 K1
of data.
A. An acknowledgment mechanism
B. Out of band signaling
C. the services of other protocol
D. None
13. Communication in TCP is ___________________. CO4.4 K2
A. Simplex
B. half-duplex
C. full –duplex
D. None
14. The inclusion of the checksum in the TCP segment is CO4.4 K2
______________.
A. Optional
B. Mandatory
C. Depends on the type of data
D. None
15. In TCP, a SYN +ACK segment consumes _____________ CO4.5 K1
sequence numbers
A.no
B. three
C. two
D. one
16. The connection establishment procedure in TCP is susceptible to a CO4.5 K1
serious security problems called __________ attack.
A. ACK flooding
B. FIN flooding
C. SYN flooding
D. None
17. The SYN flooding attack belongs to a group of security attacks CO4.6 K1
known as _________________ attack.
A. Denial of service
B. Replay
C. Man in the middle
D. None
18. A client program normally uses _____________ port number. A CO4.6 K2
server program normally uses ___________ port number.
A. A well known; an ephemeral
B. An ephemeral; a well known
C. A private; a well known
D. None of the these
19. A socket address is a combination of _______________. CO4.6 K2
A. A MAC address and logical address
B. A MAC address and port number
C. A user specific address and a logic address
D. None of the these
20. ________________ means accepting items from more than one CO4.6 K1
source. ________________ means delivering item to more than one
source.
A. Demultiplexing, Multiplexing
B. Multiplexing , Demultiplexing
C. Encapsulation, Decapsulation
D. Pushing, Pulling
21. In the stop and wait protocol, the maximum send window size is CO4.7 K1
____________ and maximum receive window size is __________
where m is the number of bits in the sequence.
A. 1 ; 1
B. 2m ; -1
C. 1 ; 2m
D. 2m ; 2m
22. In the Go back N protocol, the maximum send window size is CO4.7 K2
____________ and maximum receive window size is __________
where m is the number of bits in the sequence number.
A. 1 ; 1
B. 2m ; -1
C. 2m ; -1 ; 1
D. 2m -1 ; 2m -1
23. Nagle’s algorithm can solve the silly window syndrome created by CO4.7 K1
the ___________________.
A. Sender
B. Receiver
C. Both sender and receiver
D. None.
24. __________ control refers to the mechanism and techniques to keep CO4.8 K1
the load below the capacity.
A. Flow
B. Error
C. Congestion
D. None
25. ___________ treats the two signs of congestion detections, time out CO4.8 K2
and 3 duplicate ACKs in the same way.
A. Taho TCP
B. Reno TCP
C. new Reno TCP
D. None

PART – B
S.NO QUESTIONS CO K
LEVEL LEVEL
1. Identify the different layers of reliable connection protocol and its CO4.1 K5
operation with neat sketch.
2. How will you prove that data link layer protocols for reliable and CO4.2 K2
sequential delivery of data frames?
3. Draw the unreliable connectionless transport protocol layer header CO4.3 K4
format and provide comments on each component of header.
4. Describe UDP message queue techniques. CO4.3 K2
5. Summarize the functions of reliable connection protocol and CO4.4 K2
unreliable connectionless transport protocol layer.
6. Interpret in your own words about error control in TCP with CO4.1 K2
example.
7. State the error control in UDP with example. CO4.4 K1

8. Are three way handshaking protocols for connection establishment? CO4.3 K2


Justify.
9. How reliable flooding does differs from unreliable flooding? CO4.2 K3
10. Using flow control mechanism how the eight segments are CO4.3 K2
exchanged between the client and server.
11. Discuss congestion control mechanism in the transport layer. CO4.5 K4
12. Summarize the concept of TCP congestion control like AIMD. CO4.5 K2

PART - C
S.NO QUESTIONS CO K
LEVEL LEVEL
1. Based on what you know, illustrate the general features of reliable CO4.6 K4
message oriented transport layer protocol.
2. Describe TCP state machines and transition diagram. CO4.5 K2
3. Summarize the services offered by SCTP to the application layer CO4.6 K4
processes.
4. Congestion occurs if load is greater than the capacity of the CO4.5 K2
network. Justify.
5. UDP provides process-to-process communication using socket CO4.4 K2
address. Prove it.
6. Elaborate adaptive transmission mechanism and how it has CO4.5 K4
evolved over time as the internet community has gained more
experience using TCP.
7. Examine each field of the format of the TCP packet header. CO4.3 K2
8. Illustrate the three mechanisms by which congestion control is CO4.5 K4
formulated in TCP with examples.
UNIT – V APPLICATION LAYER

PART - A

S.NO QUESTIONS CO K
LEVEL LEVEL
1. Identify the full form of HTTP? CO5.1 K1
a) Hypertext Transfer Protocol
b) Hypertext Transfer Package
c) Hypertext Text Package
d) Hypertext Transfer Practice
2. Which of the following statements about HTTP are false? CO5.1 K2
a) HTTP describe the structure of web page
b) HTTP run over TCP
c) HTTP can be used to test the validity of hyper link test
d) HTTP allows information to be stored in url Gate 2004
3. Which is one of the pairs of protocols given below from both the CO5.1 K2
protocols that can use multiple TCP connections between the same
client and the server?
a) HTTP, TELNET
b) HTTP, SMTP
c) FTP, SMTP
d) HTTP, FTP Gate 2015
4. Identify the protocol primarily used for browsing data? CO5.1 K2
a) HTTP
b) FTP
c) TFTP
d) TCP
5. Consider the following statements: CO5.1 K2
I. telnet, ftp and http are application layer protocols.
II. EJB (Enterprise Java Beans) components can be deployed in a
J2EE (Java2 Enterprise Edition) application server.
III. If two languages conform to the Common Language
Specification (CLS) of the Microsoft.NET framework, and then a
class defined in any one of them may be inherited in the other.
Which statements are true?
a) I and II only
b) II and III only
c) I and III only
d) I, II and III Gate 2004
6. Here some activities related to email is given. Find the correct CO5.1 K2
match for the protocol used in appropriate activity.
A1: send an email from a mail client to mail server.
A2:download an email in mailbox from mail server to mail client
A3: checking mail in browser
a) A1: HTTP, A2:SMTP, A3: POP
b) A1:SMTP, A2: FTP , A3:HTTP
c) A1:SMTP , A2:POP, A3:HTTP
d) A1:POP, A2:SMTP, IA3:ICMP Gate 2011
7. Which of the following is/are example(s) of stateful application CO5.2 K2
layer protocols?
(i) HTTP
(ii) FTP
(iii) TCP
(iv) POP3
a) (i) and (ii) only
b) (ii) and (iii) only
c) (ii) and (iv) only
d) (iv) only Gate 2016
8. FTP uses _________ parallel TCP connections to transfer a file. CO5.2 K1
a) 1
b) 2
c) 3
d) 4
9. The commands, from client to server, and replies, from server to CO5.2 K2
client, are sent across the control connection in ________ bit ASCII
format.
a) 8
b) 7
c) 3
d) 5
10. Which architecture is FTP built on? CO5.2 K1
a) P2P
b)Client-server
c) Both the above
d) None of these Gate 2022
11. Identify the incorrect statement regarding FTP. CO5.2 K2
a) FTP stands for File Transfer Protocol
b) FTP uses two parallel TCP connections
c) FTP sends its control information in-band
d) FTP sends exactly one file over the data connection
12. Find the FTP reply whose message is wrongly matched. CO5.2 K2
a) 331 – Username OK, password required
b) 425 – Can’t open data connection
c) 452 – Error writing file
d) 452 – Can’t open data connection
13. Which one of the following is not a client server application? CO5.3 K1
a) Internet chat
b) Web browsing
c) E-mail
d) Ping Gate2010
14. Which amongst the following statements is correct for “character at CO5.4 K2
a time” mode?
a) Character processing is done on the local system under the
control of the remote system
b) Most text typed is immediately sent to the remote host for
processing
c) All text is echoed locally, only completed lines are sent to the
remote host
d) All text is processed locally, and only confirmed lines are sent
to the remote host
15. Which one of the following is not correct? CO5.4 K2
a) Telnet is a general purpose client-server program
b) Telnet lets user access an application on a remote computer
c) Telnet can also be used for file transfer
d) Telnet can be used for remote login
16. Telnet is used for _______ CO5.4 K1
a) Television on net
b) Network of Telephones
c) Remote Login
d) Teleshopping site
17. Secure shell (SSH) network protocol is used for __________ CO5.5 K1
a) Secure data communication
b) Remote command-line login
c) Remote command execution
d) All of the above
18. Which standard TCP port is assigned for contacting SSH servers? CO5.5 K2
a) Port 21
b) Port 22
c) Port 23
d) Port 24
19. Which one of the following protocol can be used for login to a shell CO5.5 K1
on a remote host except SSH?
a) Telnet
b) Rlogin
c) Both telnet and rlogin
d) None of the above
20. Which one of the following feature was present in SSH protocol, CO5.5 K2
version 1?
a) Password changing
b) Periodic replacement of session keys
c) Support for public-key certificates
d) None of the above
21. Which one of the following uses UDP as the transport protocol? CO5.6 K1
a) HTTP
b) Telnet
c) DNS
d) SMTP Gate 2007
22. Servers handle requests for other domains _______. CO5.6 K1
a) Directly
b) By contacting remote DNS server
c) It is not possible
d) None of the above
23. Which one of the following uses UDP as the transport protocol? CO5.6 K1
a) HTTP
b) Telnet
c) DNS
d) SMTP
24. Identify the correct sequence in which the following packets are CO5.6 K2
transmitted on the network by a host when a browser requests a
web page from a remote server, assuming that the host has just
been restarted.
a) HTTP GET request, DNS query, TCP SYN
b) DNS query, HTTP GET request, TCP SYN
c) DNS query, TCP SYN, HTTP GET request
d) TCP SYN, DNS query, HTTP GET request Gate 2016
25. Which one of the following protocols is NOT used to resolve one CO5.6 K2
form of address to another one?
a) DNS
b) ARP
c) DHCP
d) RARP Gate 2016
26. Configuration management can be divided into which two CO5.7 K2
subsystems?
a) Reconfiguration and documentation
b) Management and configuration
c) Documentation and dialing up
d) Configuration and dialing up
27. The main difference between SNMPv3 and SNMPv2 is _______. CO5.7 K2
a) Management
b) Integration
c) Classification
d) Enhanced security
28. BER stands for ________. CO5.7 K1
a) Basic Encoding Rules
b) Basic Encoding Resolve
c) Basic Encoding Rotator
d) Basic Encoding Router
29. SNMP is the framework for managing devices in an internet using CO5.7 K1
the ______
a) TCP/IP protocol
b) UDP
c) SMTP
d) None of the above
30. In Network Management System, the division that is responsible CO5.7 K1
for controlling access to network based on a predefined policy is
called _________ .
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management

PART-B
S.NO QUESTIONS CO K
LEVEL LEVEL
1. Analyze the five types of HTTP result codes. CO5.1 K3
2. Summarize the request message & response message format of CO5.1 K3
HTTP.
3. Detect the FTP and it’s process. CO5.2 K4
4. Distinguish between IMAP and POP. CO5.2 K3
5. List out the SMTP commands. How would you explain the CO5.3 K3
message format of SMTP?
6. Give name-address resolution. CO5.3 K3
7. Develop web-based mail. CO5.3 K3
8. Discover the MIME types and subtypes. CO5.5 K3
9. Generalize the SSH components. CO5.5 K4
10. Identify the namespace. CO5.6 K2
11. Interpret the view of DNS. CO5.6 K3
12. Tabulate security of DNS& DDNS. CO5.6 K4

PART-C

S.NO QUESTIONS CO K
LEVEL LEVEL
1. a) Describe in detail about traditional applications. (6) CO5.1 K3
b) Which approach would you use to formulate network CO5.1 K3
management protocol?(6)
2. Generalize the structure of HTTP server receives a request CO5.1 K4
message from an HTTP client, how does the server know when
all headers have arrived and the body of the message is to
follow?
3. How FTP has a message format for exchanging commands and CO5.2 K3
responses during control connection?
4. a) Can you substitute an alternative protocol for IMAP? Justify CO5.2 K4
your answer.(6) CO5.2 K3
b) Describe in detail about the WSDL in web services.(6)
5. Analyze the message format and the message transfer and the CO5.3 K4
underlying protocol involved in the working of the electronic
mail.
6. Describe in detail about the following in electronic mail. CO5.3 K3
i. Message format (4)
ii. Message transfer (4)
iii. Mail reader (4)
7. a) Illustrate the role of POP3 in electronic mail applications. CO5.4 K4
Narrate in detail.(6) CO5.4 K3
b) Demonstrate the telnet in detail. (6)
8. a) Summarize how SMTP transfers message from one host to CO5.5 K4
another host with suitable illustration. (6)
b) Can you associate the functions performed by DNS? Give CO5.5 K4
example. (6)
9. a) Describe the elements of network management in detail. (6) CO5.7 K3
b) Examine the operation of SNMP protocol in detail. (6) CO5.7 K3

TEXT BOOK:
Larry L. Peterson, Bruce S. Davie, “Computer Networks: A systems approach”, Fifth Edition,
Morgan Kaufmann Publishers, 2011.

You might also like