Subject Name: Computer Network Subject Code: 2140709

14
L.J. Institute of Engineering & Technology Semester: IV (2016) Computer Network (2140709) Page 1 Subject Name: Computer Network Subject Code: 2140709 Faculty: Ms. Khushbu Shah Sr. No Chapter 1 Introduction to computer networks and Internet Marks Topic:1 Understanding of network and Internet, The network edge, The network core SHORT QUESTION 1 In a ................topology, if there are n devices in a network, each device has n-1 ports for cables. [LJIET] A) Mesh B) Star C) Bus D) Ring Ans: A 1 2 The ............layer of OSI model can use the trailer of the frame for error detection. [LJIET] A) Physical B) Data link C) Transport D) Presentation Ans:B 1 3 What is the transmission rate of Ethernet LANs? [LJIET] 1 4 The method of communication in which transaction takes place in both directions, but only in one direction at a time, is called ? [LJIET] A) Simplex B) Four wire circuit C) Full duplex D) Half-duplex Ans:D 1 5 What are the IEEE standards for LAN, WAN, MAN? [LJIET] 1 6 What are the Advantages of STAR Topology? [LJIET] 1 DESCRIPTIVE QUESTION 1 What is botnet? Explain in brief.(Dec-2015) [LJIET] 2 2 Explain Advantages and Usage of Network (Old_Nov-2011) [LJIET] 5 3 Give ways to establish effective and Efficient network (Old_Nov-2011) [LJIET] 5 4 Give differences between connection oriented and connectionless services. ?(old_Dec_2015) [LJIET] Explain connection oriented and connectionless services. Also differentiate both. (old_May-2015) [LJIET] 7 5 Explain following network topologies with advantages and disadvantages. (old_Dec_2015) [LJIET] 1. Bus 2. Star 3. Ring 4. Mesh 7 6 What is topology? Give different type of topology and its use. (Old_Nov-2011) [LJIET] 4 7 Explain :LAN, WAN and internet (old_June-2014) [LJIET] Explain the terms : LAN, MAN, WAN, Internet (Old_Nov-2011) [LJIET] 4,7 Topic:2 Understanding of Delay, Loss and Throughput in the packet-switching network SHORT QUESTION 1 Differentiate Packet Switching and Circuit Switching [LJIET] 1 DESCRIPTIVE QUESTION 1 Explain following terms: (May-2015) [LJIET] 1) Processing Delay 2) Queuing Delay 3) Transmission Delay 4) Propagation Delay 8 2 Explain following terms: (Dec-2015) [LJIET] 6

Transcript of Subject Name: Computer Network Subject Code: 2140709

Page 1: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 1

Subject Name: Computer Network

Subject Code: 2140709

Faculty: Ms. Khushbu Shah

Sr.

No Chapter 1 Introduction to computer networks and Internet Marks

Topic:1 Understanding of network and Internet, The network edge, The network core

SHORT QUESTION

1 In a ................topology, if there are n devices in a network, each device has n-1 ports for cables.

[LJIET]

A) Mesh B) Star

C) Bus D) Ring

Ans: A

1

2 The ............layer of OSI model can use the trailer of the frame for error detection. [LJIET]

A) Physical B) Data link

C) Transport D) Presentation

Ans:B

1

3 What is the transmission rate of Ethernet LANs? [LJIET] 1

4 The method of communication in which transaction takes place in both directions, but only in one

direction at a time, is called ? [LJIET]

A) Simplex B) Four wire circuit

C) Full duplex D) Half-duplex

Ans:D

1

5 What are the IEEE standards for LAN, WAN, MAN? [LJIET] 1

6 What are the Advantages of STAR Topology? [LJIET] 1

DESCRIPTIVE QUESTION

1 What is botnet? Explain in brief.(Dec-2015) [LJIET] 2

2 Explain Advantages and Usage of Network (Old_Nov-2011) [LJIET] 5

3 Give ways to establish effective and Efficient network (Old_Nov-2011) [LJIET] 5

4 Give differences between connection oriented and connectionless services. ?(old_Dec_2015) [LJIET]

Explain connection oriented and connectionless services. Also differentiate both.

(old_May-2015) [LJIET]

7

5 Explain following network topologies with advantages and disadvantages. (old_Dec_2015) [LJIET]

1. Bus

2. Star

3. Ring

4. Mesh

7

6 What is topology? Give different type of topology and its use. (Old_Nov-2011) [LJIET] 4

7 Explain :LAN, WAN and internet (old_June-2014) [LJIET]

Explain the terms : LAN, MAN, WAN, Internet (Old_Nov-2011) [LJIET] 4,7

Topic:2 Understanding of Delay, Loss and Throughput in the packet-switching network

SHORT QUESTION

1 Differentiate Packet Switching and Circuit Switching [LJIET] 1

DESCRIPTIVE QUESTION

1 Explain following terms: (May-2015) [LJIET]

1) Processing Delay

2) Queuing Delay

3) Transmission Delay

4) Propagation Delay

8

2 Explain following terms: (Dec-2015) [LJIET] 6

Page 2: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 2

1) Processing Delay

2) Transmission Delay

3) Propagation Delay

Topic:3 protocols layers and their service model, History of the computer network

SHORT QUESTION

1 Define the term Protocol. [LJIET] 1

2 Briefly explain functions of physical layer [LJIET] 2

3 Briefly explain functions of session layer and presentation layer [LJIET] 2

4 What is the size of physical address and logical address? [LJIET] 2

5 IP is responsible for _______ communication while TCP is responsible for _______ communication.

[LJIET] A. host-to-host; process-to-process

B. process-to-process; host-to-host

C. Process-to-process; network-to-network

D. none of the above

Ans: A

1

DESCRIPTIVE QUESTION

1 Draw the layered architecture of OSI reference model and write the at least two services provided by

each layer of the model.(May-2015) [LJIET]

6

2 What are the five layers in the Internet protocol stack? What are the principal responsibilities of each of

these layers? (Dec-2015) [LJIET]

6

3 Enlist seven layers of OSI reference model. Discuss advantages of layered approach? (old_Dec_2015)

[LJIET]

7

4 Draw the OSI reference model. Explain the functionality of each layer in brief. Draw diagram

(old_May-2015) (old_Nov-2014) [LJIET] Draw diagram of OSI reference model? What are the benefits of layering approach in OSI model?

(old_Nov-2014) [LJIET] What is OSI model? Draw Diagram and Explain Physical, Data link and Network layer with its

functions.(Old_Nov-2011) [LJIET]

7, 5

5 List difference between OSI and TCP/IP model (old_May-2013) [LJIET] 7

6 Which of the OSI layers handles each of the following : (Old_Dec-2010)[LJIET]

-Determine which route through the subnet to use.

-Dividing the transmitted bit stream into frames.

-Encryption and compression of the information.

-Flow control between source and destination node.

4

Chapter-2 Application Layer

Topic:1 Principles of computer applications, Web and HTTP, E-mail

SHORT QUESTION

True or false? 1 to 5

1 A user requests a Web page that consists of some text and three images. For this page, the client will

send one request message and receive four response messages. [LJIET] 1

2 Two distinct Web pages (for example, www.mit.edu/research.html and www.mit.edu/students.html)

can be sent over the same persistent connection [LJIET] 1

3 With nonpersistent connections between browser and origin server, it is possible for a single TCP

segment to carry two distinct HTTP request messages. [LJIET] 1

4 HTTP response messages never have an empty message body. [LJIET] 1

5 The Date: header in the HTTP response message indicates when the object in the response was last

modified [LJIET] 1

6 Application layer protocol defines [LJIET]

a) types of messages exchanged

b) message format, syntax and semantics

c) rules for when and how processes send and respond to messages

d) all of the mentioned

Ans: D

1

Page 3: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 3

7 When displaying a web page, the application layer uses the [LJIET]

a) HTTP protocol

b) FTP protocol

c) SMTP protocol

d) none of the mentioned

Ans: A

1

8 .............. is an electronic mail protocol with both client and server functions. [LJIET]

A. SMTP B. MIME

C. POP D. TCP

Ans: C

1

9 What is the difference between HTTP GET and POST method? [LJIET] 1

10 Define Cookies [LJIET] 2

11 Define URL [LJIET] 2

12 What is need of MIME? [LJIET] 2

DESCRIPTIVE QUESTION

1 What is HTTP? Differentiate its persistent and non-persistent types with request-response behavior of

HTTP.(Dec-2015) [LJIET] 6

2 Explain the concept of Cookies and its components with suitable example.(Dec-2015) [LJIET] 8

3 Consider the following HTTP message and answer the following questions: (May-2015) [LJIET]

1) Does browser request a non-persistent or a persistent connection?

2) Which is the (complete) URL of the document requested by the user?

3) Which HTML method is used to retrieve the requested URL?

6

4 Write a note on HTTP. (old_Dec_2015) (old_May-2015) [LJIET]

Write note on following : HTTP and MIME (old_Nov-2015) 7

5 Explain WWW and HTTP (Old_Nov-2011) [LJIET] 5

6 Describe the built in HTTP request methods. (Old_June-2012) [LJIET] 7

7 Explain the high-level view of Internet e-mail system and its major components.(Dec-2015) [LJIET] 8

8 Explain the working of electronic mail protocols SMTP, IMAP and POP3 in brief with suitable

diagram. (May-2015) [LJIET] 8

9 List and explain major functionalities provided by E-mail service (old_May-2015) [LJIET] 7

10 Explain the basic functions of the e-mail system. (Old_Jan-2013) [LJIET] 7

11 E-mail systems contain which two subsystems? Write the five basic functions provided by e-mail

system. (Old_June-2012) [LJIET] 7

12 What is E-mail? How it works? Which protocol it uses? (Old_Nov-2011) [LJIET] 4

13 Explain the architectural overview of the world wide web. (Old_Jan-2013) [LJIET] 7

14 Explain Any two Application Layer Protocol (Old_June_2014) [LJIET] 7

15 Explain the e-mail architecture and services. Write short note on POP3 and MIME.(Old_Dec_2010)

[LJIET]

7

Topic:2 DNS, Socket programming with TCP and UDP

SHORT QUESTION

1 DNS can obtain the................. of host if its domain name is known and vice versa. [LJIET]

A) Station address B) IP address

C) Port address D) Checksum

1

Page 4: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 4

Ans: B

2 Which one of the following allows client to update their DNS entry as their IP address change?

[LJIET] a) dynamic DNS

b) mail transfer agent

c) authoritative name server

d) none of the mentioned

Ans: A

1

3 A DNS client is called [LJIET]

a) DNS updater

b) DNS resolver

c) DNS handler

d) none of the mentioned

Ans:B

1

4 ........... store resource records and information about the domain tree structure and attempt to resolve

received client queries. [LJIET]

A. Domain namespace B. DNS Names

C. Name servers D. Resolvers

Ans:C

1

5 Briefly describe different type of namespaces of DNS [LJIET] 1

DESCRIPTIVE QUESTION

1 Why distributed database design is more preferred over centralized design to implement DNS in the

Internet? Justify. Also explain the way of DNS servers to handle the recursive DNS query using

suitable diagram.(May-2015) [LJIET]

8

2 What is the need of Domain name service? Explain DNS architecture. (old_Dec_2015) [LJIET]

Explain Domain Name System (Old_Jan-2013) [LJIET] 7

3 What is DNS? How resource records are maintained in DNS? (old_May-2015) [LJIET] 7

4 What is the role of Domain Name Server (DNS) in Internet? Explain the hierarchy of various domain

names. (old_Nov-2014) [LJIET] 7

5 Explain : DNS and its use. (old_June-2014)

Explain : DNS and its advantages (Old_Nov-2011)

Explain DNS in detail with example.(Old_June-2011)

How does DNS works ?(Old_Dec-2010) [LJIET]

7,5

Chapter-3 Transport Layer Topic: 1 Introduction and transport layer services, Multiplexing and Demultiplexing

SHORT QUESTIONS

1 A communication device that combines transmissions from several I/O devices into one line is a

[LJIET] A) Concentrator B) Modifier

C) Multiplexer D) Full duplex file

Ans: C

1

2 Which one of the following is a transport layer protocol used in internet? [LJIET]

a) TCP

b) UDP

c) both (a) and (b)

d) none of the mentioned

Ans:C

1

3 List different transport service primitives [LJIET] 1

DESCRIPTIVE QUESTIONS

1 Discuss transport layer multiplexing and Demultiplexing concept.(Dec-2015) [LJIET] 7

2 Explain rdt2.0 with FSM diagram.(Dec-2015) [LJIET] 7

3 Enlist services provided by transport layer. What is socket? Explain its importance at transport layer 7

Page 5: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 5

protocols (old_Nov-2014) [LJIET]

4 Explain the basic five service primitives of the transport layer protocol. (Old_Jan-2013) [LJIET] 7

5 Explain connection establishment and connection release in Transport protocols. (Old_June-2012)

[LJIET]

7

6 Explain crash recovery of transport protocol.(Old_June-2011)[LJIET] 4

7 Write about elements of transport layer (1) connection establishment

(2) connection release. (Old_June-2011)[LJIET] 7

Topic:2 Connection less transport (UDP)

SHORT QUESTIONS

1 UDP packets have fixed-size header of .......... bytes. [LJIET]

A. 16 B. 8

C. 32 D. 64

Ans: B

1

2 A port address in UDP is _______bits long [LJIET]

A. 8 B. 16

B. 32 D.Any of above

Ans:16

1

DESCRIPTIVE QUESTIONS

1 Explain Connectionless Transport protocol UDP with popular Internet applications.(Dec-2015)

[LJIET]

7

2 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host

B each send a UDP segment to Host C with destination port number 6789. Will both of these segments

be directed to the same socket at Host C? If so, how will the process at Host C know that these two

segments originated from two different hosts? (May-2015) [LJIET]

4

3 Discuss the working principle of UDP (Old_May-2013) [LJIET] 7

Topic:3 Principles of reliable data transfer, Connection oriented transport (TCP)

SHORT QUESTIONS

True or false?

1 Host A is sending Host B a large file over a TCP connection. Assume Host B has no data to send Host

A. Host B will not send acknowledgments to Host A because Host B cannot piggyback the

acknowledgments on data. [LJIET]

1

2 The size of the TCP rwnd never changes throughout the duration of the connection. [LJIET] 1

3 Suppose Host A is sending Host B a large file over a TCP connection. The number of unacknowledged

bytes that A sends cannot exceed the size of the receive buffer. [LJIET] 1

4 d. Suppose Host A is sending a large file to Host B over a TCP connection. If the sequence number for

a segment of this connection is m, then the sequence number for the subsequent segment will

necessarily be m + 1. [LJIET]

1

5 The TCP segment has a field in its header for rwnd. [LJIET] 1

6 Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. The current value of Timeout

[LJIET] 1

7 Suppose Host A sends one segment with sequence number 38 and 4 bytes of data over a TCP

connection to Host B. In this same segment the acknowledgment number is necessarily 42 [LJIET] 1

8 TCP groups a number of bytes together into a packet called a.... [LJIET]

A. user datagram B. segment

C. datagram D. packet

Ans: B

1

9 In ............., the sender sends one frame, stops until it receives confirmation from the receiver, and then

sends the next frame. [LJIET]

A. stop and wait protocol B. simplest protocol

C. sliding window protocol D. High level Data Link Control Protocol(HDLC)

Ans: A

1

10 The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be

hooked onto the next outgoing data frame is called [LJIET]

a) piggybacking

b) cyclic redundancy check

1

Page 6: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 6

c) fletcher’s checksum

d) none of the mentioned

Ans: A

11 Transmission control protocol is [LJIET]

a) connection oriented protocol

b) uses a three way handshake to establish a connection

c) recievs data from application as a single stream

d) all of the mentioned

Ans:D

1

12 A _____ is a TCP name for a transport service access point. [LJIET]

a) port

b) pipe

c) node

d) none of the mentioned

Ans:A

1

13 Communication in TCP is ___________. [LJIET]

A. Simplex B. Half-duplex

C. Full duplex D. None of above

Ans: C.

1

14 The inclusion of the checksum in the TCP segment is ________. [LJIET]

A. Optional

B. Mandatory

C. at the discretion of the application program

D. None of above

1

15 __________ control regulates the amount of data a source can send before receiving an

acknowledgment from the destination. [LJIET]

A. Error

B. Flow

C. Congestion

D. None of above

Ans: B

1

16 What is pipelining? [LJIET] 1

17 What is use of sequence number in sliding window protocol? [LJIET] 1

18 What is use of timer in sliding window protocol? [LJIET] 1

19 Give examples for which connection oriented service is best. [LJIET] 1

DESCRIPTIVE QUESTIONS

1 Explain the TCP Segment structure and justify the importance of its field values. (May-2015) [LJIET] 7

2 How many packets overhead while doing the data communication using TCP? Draw the TCP

connection establishment and termination process with diagram.(May-2015) [LJIET]

6

3 Consider sending real-time voice from Host A to Host B over a packet-switched network (VoIP). Host

A converts analog voice to a digital 64 kbps bit stream on the fly. Host A then groups the bits into 56-

byte packets. There is one link between Hosts A and B; its Transmission rate is 2Mbps and its

propagation delay is 10 msec. As soon as Host A gathers a packet, it sends it to Host B. As soon as

Host B receives an entire packet, it converts the packet’s bits to an analog signal. How much time

elapses from the time a bit is created (from the original analog signal at Host A) until the bit is decoded

(as part of the analog signal at Host B)? [LJIET]

4

4 Write a short note on sliding window protocols. .(old_Dec-2015)(old_June-2014) [LJIET]

Describe the working of sliding window protocol. Also explain the piggybacking phenomenon.

(old_May-2015) [LJIET]

7

5 How pipeline approach improves the overall sender utilization time? Explain Go-Back-N pipeline

approach in transport layer. (May-2015) [LJIET] 6

6 Explain following (old_Dec-2015) [LJIET]

- Piggy backing

- Selective Repeat and Go back N

7

7 Explain a protocol Using Go Back N strategy using pipelining and (old_Jan-2013) [LJIET] 7

Page 7: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 7

show the scenario in the case of

• when receiver' window size is 1 and

• when receiver' window size is large

Explain Sliding window protocol using GO back to N.(old_Nov-2011) [LJIET]

8 Explain the term piggybacking, sending window and receiving window. Explain One-Bit sliding

window protocol. (old_June-2012) (old_June_2011)[LJIET]

Explain the one bit sliding window protocol and go back n protocol. Write down

the drawback of both the protocols(old_Dec_2010)[LJIET]

7

9 Compare: Simplex and Stop and Wait Protocol. (old_June-2014) [LJIET] 7

10 Explain STOP and Wait Protocol (Old_Nov-2011) [LJIET] 7

11 Draw and explain TCP packet header. (old_Dec-2015) [LJIET]

Explain Transmission Control Protocol with TCP header fields. (old_May-2015) (Old_Jan-2013)

[LJIET]

7

12 Give differences between or Compare TCP and UDP (old_Nov-2014)(old_June-2014) (Old_Nov-

2011) [LJIET]

List the various duties of the transport layer and explain each in brief. Compare UDP and TCP

(Old_Dec-2010) [LJIET]

3,5,7

13 Discuss the working principle of TCP (Old_May-2013) [LJIET] 7

14 Write about flow control and buffering mechanism in Transport protocols (Old_June-2012) [LJIET] 7

15 Explain Stop and Wait ARQ in detail.(Old_June-2011) [LJIET] 7

16 Explain Utopia (Simplex) protocol.(Old_June-2011) [LJIET] 3

Topic:4 Congestion control

SHORT QUESTIONS

1 State True or False.

Consider congestion control in TCP. When the timer expires at the sender, the value of ssthresh is set to

one half of its previous value. [LJIET]

1

2 Explain the term: Bandwidth (Old_Dec-2010)[LJIET] 1

3 Explain the term: Jitter(Old_Dec-2010)[ [LJIET] 1

4 Explain the term: Throughput (Old_Dec-2010)[ [LJIET] 1

5 Explain the use of chock packet [LJIET] 1

DESCRIPTIVE QUESTIONS

1 What do you mean by congestion and overflow? Explain the slow-start component of the TCP

congestion-control algorithm. (May-2015) [LJIET] 7

2 Give differences between (old_Nov-2014) [LJIET]

1. Connection oriented versus Connection less services

2. Flow Control versus Congestion control

7

3 What is congestion? What are the reasons behind congestion? Explain choke packet mechanism for

congestion control.(old_Nov-2014) [LJIET] 7

4 What is congestion? What are the reasons behind congestion? Explain choke packet mechanism for

congestion control. (Old-Nov-2014) [LJIET] 7

5 Discuss and list the congestion prevention policies at data link, network and transport layers that can

affect the congestion. (old_Jan-2013) [LJIET] 7

6 Explain Load shedding and Jitter control strategies to handle the congestion. (old_Jan-2013) [LJIET] 7

7 Explain the following techniques for achieving good quality of service. (old_June-2012) [LJIET]

(i) Traffic shaping

(ii) Leaky bucket algorithm

7

8 Explain congestion control in Datagram subnets. Write about hop by hop choke packets scheme.

(Old_June-2012) [LJIET]

7

9 Explain Leaky Bucket and Token bucket algorithm in detail. (Old_June-2011) [LJIET]

Explain the leaky bucket algorithm.(Old_Dec-2010) 7,3

10 Explain Jitter Control. (Old_June-2011) [LJIET] 3

11 Explain various Quality of service parameters for transport layer. (Old_June-2011) [LJIET] 3

12 What are the various congestion prevention policies at datalink , network and transport layer of the OSI

?(Old_Dec-2010) [LJIET] 4

Page 8: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 8

Chapter-4 Network Layer Topic:1 Introduction, Virtual and Datagram networks

SHORT QUESTIONS

1 In virtual circuit network each packet contains [LJIET]

a) full source and destination address

b) a short VC number

c) both (a) and (b)

d) none of the mentioned

Ans:B

1

2 Which one of the following is not a function of network layer? [LJIET]

a) routing

b) inter-networking

c) congestion control

d) none of the mentioned

Ans:D

1

3 The network layer protocol of internet is [LJIET]

a) ethernet

b) internet protocol

c) hypertext transfer protocol

d) none of the mentioned

Ans:B

1

DESCRIPTIVE QUESTIONS

1 List difference between Transport layer and Network layer (Old_May-2013) [LJIET] 7

2 Design issues of Network Layer. (Old_Nov-2011) [LJIET] 7

3 Compare datagram subnet and virtual circuit subnet (Old_June-2011)(Old_Dec-2010) OR

Differentiate : Datagram subnet v/s virtual circuit subnet [LJIET]

7,4

Topic:2 study of router, Routing algorithms, Broadcast and Multicast routing

SHORT QUESTIONS

1 What is the difference between routing and forwarding? [LJIET] 1

2 Do routers have IP addresses? If so, how many? [LJIET] 1

3 Define Unicasting [LJIET] 1

4 Define Multicasting [LJIET] 1

5 Define broadcasting [LJIET] 1

6 What is Routing Protocol? [LJIET] 2

7 What is static and dynamic routing? [LJIET] 2

8 Which one of the following routing algorithm can be used for network layer design? [LJIET]

a) shortest path algorithm

b) distance vector routing

c) link state routing

d) all of the mentioned

Ans: D

1

9 A subset of a network that includes all the routers but contains no loops is called [LJIET]

a) spanning tree

b) spider structure

c) spider tree

Ans:A

1

10 ICMP is primarily used for [LJIET]

a) error and diagnostic functions

b) addressing

c) forwarding

d) none of the mentioned

Ans:A

1

11 What do you mean by adaptive routing algorithm? [LJIET] 1

12 Define Migrating host and roaming host in WLAN [LJIET] 1

Page 9: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 9

13 Which protocol implements Distance Vector Routing Algorithm? [LJIET] 1

DESCRIPTIVE QUESTIONS

1 What is the main difference between forwarding and routing? Explain at least two forwarding

techniques used by the router to switching to packets from input port to output port of the router.(Dec-

2015) (May-2015) [LJIET]

7

2 Explain Link-State Routing algorithm. (Dec-2015) [LJIET]

Explain the Link-State (LS) routing algorithm. (May-2015) (old_Jan-2013) (old_June-

2012)(old_June-2011) [LJIET]

7, 6

3 Explain Distance-Vector (DV) routing algorithm.

(Dec-2015) (May-2015) (old_Dec-2015) (old_May-2015) (old_June-014)(old_May_2013)(Old-Nov-

2011) [LJIET]

5, 6, 7

4 Explain shortest path routing with suitable example. (old_Dec-2015) (old_May-2015)(old_Nov-2014)

(Old_Nov-2011) [LJIET]

7

5 Explain Hierarchical and Multi cast Routing. (old_June-2014) [LJIET] 7

6 Explain Router and its use. (Old_June-2014) [LJIET] 3

7 1. Write and explain statement of Optimality Principle with example. [LJIET]

2. Explain the word jitter control with suitable example. (old_Nov-2014) [LJIET] 7

8 Explain in detail OSPF (Old_May-2014) [LJIET]

Write about OSPF (open shortest path first). Which four classes of routers are distinguished by

OSPF?(Old_June-2012) [LJIET]

7

9 What is count-to-Infinity problem? Explain it with example (old_Jan-2013) [LJIET] 7

10 Explain Multicasting (Old_Nov-2011) [LJIET] 4

11 Explain distance vector routing. What is count to infinity problem? (Old_Nov-2011) [LJIET] 7

12 What is the serious drawback of distance vector routing? explain it with

Example (Old_Dec-2010) [LJIET] 3

13 Explain and compare distance vector routing and link state routing algorithm (Old_Dec-2010) [LJIET] 7

14 Explain the following concepts :

Tunneling , Network address translation and DHCP. (Old_Dec-2010) [LJIET] 7

15 What is RPC? Draw and explain steps for RPC. (Old_May-2015) [LJIET] 7

16 Explain the concept and need of tunneling with example. (Old_Nov-2011)(Old_May-2015)

[LJIET]

7

Topic:3 IP protocol and addressing in the Internet

SHORT QUESTIONS

1 What is the 32-bit binary equivalent of the IP address 223.1.3.27? [LJIET] 1

2 ............ addresses use 21 bits for the and 8 bits for the portion of the IP address for TCP/IP network.

[LJIET] A. Class A B. Class B

C. Class C D. Class D

Ans:C

2

3 Find the netid and Hostid for the following. [LJIET]

1)19.34.21.5

2) 190.13.70.10

3)246.3.4.10

4) 201.2.4.2

Ans.

1) 19,13.70.10

2) 190.13, 70.10

3) No netid no hosted because class E address

4) 201.2.4, 2

2

4 A port address in TCP/IP is .........bits long. [LJIET]

A. 32 B. 48

C. 16 D. 64

Ans: C

1

5 The 4 byte IP address consists of [LJIET]

a) network address 1

Page 10: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 10

b) host address

c) both (a) and (b)

d) none of the mentioned

Ans:C

6 What is the range of different IP Classes? [LJIET] 1

7 What is the significance of HLAN in IP Header? [LJIET] 1

DESCRIPTIVE QUESTIONS

1 Compare IPv4 and IPv6.(Dec-2015) [LJIET]

Compare the IPv4 and IPv6 header.(Old_Jan-2013) (Old_Nov-2011) [LJIET] 7,5

2 Explain IPv4 datagram format and importance of each filed. (May-2015) [LJIET] 7

3 Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3. Suppose all of the

interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also suppose that

Subnet 1 is required to support at least 60 interfaces, Subnet 2 is to support at least 90 interfaces, and

Subnet 3 is to support at least 12 interfaces. Provide three network addresses (of the form a.b.c.d/x) that

satisfy these constraints.(Dec-2015) .(May-2015) [LJIET]

4

4 Suppose datagrams are limited to 1,500 bytes (including header) between source Host A and

destination Host B. Assuming a 20-byte IP header, how many datagrams would be required to send an

MP3 consisting of 5 million bytes? Explain how you computed your answer. (May-2015) .(Dec-2015)

[LJIET]

4

5 Explain following with respect to IP address. Also give proper examples of each. (old_Nov-2014)

[LJIET] 1. Structure of IPv4 address

2. Subnet mask

3. Default gateway

7

6 What is subnet? Explain various classes of IPv4 address with respect to bits reserved for host_id and

net_id. Give example and ranges of each class of IPv4 address (old_Nov-2014) [LJIET] 7

7 What is IP address? What is Subnet? Explain different IP address Classes. (Old_June-2014) [LJIET]

Explain the IP addressing scheme in detail. (Old_Jan-2013) [LJIET] 7

8 Explain in detail IPv6 (Old_May-2013) [LJIET] 7

9 Explain the Mobile-IP. (Old_Jan-2013) [LJIET] 7

10 Explain : MAC address and IP address(Old_Nov-2011) [LJIET] 5

11 Explain Fragmentation and its use (Old_June-2014) [LJIET] 4

12 An organization is granted the block 211.17.180.0/24 The administrator wants to create 32 subnets

Find the subnet mask.

Find the number of addresses in each subnet

Find first and last address in subnet 1.

Find first and last address in subnet 32. (Old_Dec-2010) [LJIET]

7

13 Draw IP headed and explain the each field of the header.

Also explain the concept of fragmentation in detail.(Old_Dec-2010) [LJIET] 7

Chapter-5 Link Layer and Local Area Network Topic:1 Introduction and link layer services

SHORT QUESTIONS

1 .......... is responsible for converting the higher level protocol address (IP addresses) to physical network

addresses. [LJIET]

A. Internet Protocol(IP) B. Internet Control Message Protocol(ICMP)

C. Address Resolution Protocol(ARP) D. Bootstrap Protocol(BOOTP)

Ans :C

1

2 Which one of the following task is not done by data link layer? [LJIET]

a) framing

b) error control

c) flow control

d) channel coding

Ans: D

1

3 Which one of the following is a data link protocol? [LJIET]

a) ethernet 1

Page 11: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 11

b) point to point protocol

c) HDLC

d) all of the mentioned

Ans:D

4 The different types of services provided by data link layer is/are ... [LJIET]

A. Unacknowledged connectionless service

B. Acknowledged connectionless service

C. Acknowledged connection oriented service

D. All of the above.

Ans: D

1

5 ........... is the most sophisticated service provided by the data link layer to the network layer. The

source and destination machines establish a connection before any data transfer takes place. [LJIET]

A. Unacknowledged connectionless service

B. Acknowledged connectionless service

C. Acknowledged connection oriented service

D. Unacknowledged connection oriented service

Ans: C

1

6 The two main functions of the data link layer are [LJIET]

A. hardware link control and media access control

B. data link control and protocol access control

C. data link control and media access control

D. both a and c

Ans: C

1

7 If the bit string 0110111110111011111010 is subjected to bit stuffing, What output string will be

transmitted? [LJIET] 1

DESCRIPTIVE QUESTIONS

1 What is bit and byte stuffing? Explain with example. (Dec-2015) [LJIET] 7

2 Explain ARP and justify why ARP query sent within a broadcast frame and ARP response sent within a

frame with specific destination MAC address? (May-2015) [LJIET] 7

3 What do you mean by framing? List various framing techniques and explain any two of

them.(old_Dec-2015) (old_Dec-2010) [LJIET]

What is a Frame? Explain the significance of stuffing. Explain bit stuffing with example. (old_May-

2015) [LJIET] Enlist various framing techniques used in data link layer. Explain any one in detail with suitable

example (old_Nov-2014) [LJIET]

7

4 Discuss Design Issues in Data link Layer. (Old_June-2014)(Old_Nov-2011) [LJIET] 7, 5

5 Enlist various framing techniques used in data link layer. Explain any one in detail with suitable

example (Old_Nov-2014) [LJIET] 7

6 Explain the usage of following devices. Also discuss the OSI layer at which they are used. (old_Nov-

2014) [LJIET] 1. Bridge

2. Repeater

3. Hub and Switch

4. Router

5. Gateway

7

7 Differentiate : Router and Switch (Old_Nov-2011) [LJIET] 4

8 What is Gateway? How it works? (Old_Nov-2011) [LJIET] 4

9 Explain the working principle of bridges (Old_May-2013) [LJIET] 7

10 What is the similarity and difference between switch and bridge. Also explain cut through

switched.(Old_June-2012) [LJIET] 7

11 Explain (i) spanning tree bridges (ii) Explain remote bridges. (Old_June_2012) [LJIET] 7

12 Explain working principle of HDLC (Old_May-2013) [LJIET]

Explain HDLC. (Old_Nov_2011) [LJIET] 7

13 Using Example explain flow control (Old_May-2013) [LJIET] 7

14 Compare transparent bridge and source routing bridge (Old_June-2011) [LJIET] 7

Page 12: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 12

Topic:2 Error-detection and correction techniques

SHORT QUESTIONS

1 What is hamming distance for each of the following codewards: [LJIET]

d(10000 ,00000)

d(10101 ,10000)

d(1111 ,1111)

d(000,001)

Ans. 1, 2, 0, 1

2

2 What are the types of Error? Explain in brief [LJIET] 2

3 When 2 or more bits in a data unit has been changed during the transmission, the error is called ……

[LJIET] a) random error

b) burst error

c) inverted error

d) none of the mentioned

Ans: B

1

4 ............ is the process in which the receiver tries to guess the message by using redundant bits. [LJIET]

A. Forward error correction

B. Backward error correction

C. Transmission

D. Retransmission

Ans:A

1

5 Error detection at the data link layer is achieved by? [LJIET]

A. Bit stuffing B. Cyclic redundancy codes

C. Hamming codes D. Equalization

Ans: B

1

6 Data link protocol almost put CRC in a trailer rather than in a header. Why? [LJIET] 2

DESCRIPTIVE QUESTIONS

1 What is error control? Explain CRC with example .(old_Dec-2015) [LJIET] 7

2 What is the difference between error detection and correction? Explain any one error correction

technique with suitable example.(old_Nov-2014) [LJIET] 7

3 Frame = 1 1 0 1 0 1 1 1 1 1 , Generator = 1 0 0 1 1 Calculate CRC.(old_Nov-2014) [LJIET] 4

4 What is cyclic redundancy check? Show the calculation polynomial code checksum for a

frame 1101011011 using the generator x4+x+1. (Old_June-2012) [LJIET] 7

5 Generate the CRC code for 1101011011.The divisor is 10011. Append CRC with data and check at

receiver side whether any error exists or not. (Old_June-2011) [LJIET] 4

6 A bit stream 110101011 is transmitted using standard CRC method . The generator polynomial is

x4+x+1 .Show the actual bit string transmitted. Also Explain the error detecting and correcting code

with example. (Old_Dec-2010) [LJIET]

7

Topic:3 Multiple access protocols, addressing

SHORT QUESTIONS

1 Which one of the following is the multiple access protocol for channel access control?

[LJIET] a) CSMA/CD

b) CSMA/CA

c) both (a) and (b)

d) none of the mentioned

Ans:C

1

2 Define 1-Persistent and Non-Persistent CSMA [LJIET] 2

3 What is major drawback of single bit parity check method for error detection? [LJIET] 1

DESCRIPTIVE QUESTIONS

1 What do you mean by random access protocols? Explain slotted ALOHA in brief (Dec-2015) [LJIET] 4

2 Explain CSMA/CD Protocol(Dec-2015) [LJIET] 4

3 Explain slotted ALOHA channel access technique. (May-2015) [LJIET] 7

Page 13: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 13

4 What is ALOHA? Explain variants of ALOHA protocol.(old_Nov-2014) (Old_June-2014) [LJIET]

OR

Explain ALOHA system. How slotted ALOHA works? Differentiate it with pure ALOHA. (old_May-

2015) [LJIET]

Write the functions of Media Access Control sub layer. And Compare pure ALOHA and slotted

ALOHA. (Old_Dec-2010) [LJIET]

7

5 Explain various versions of CSMA protocols (old_Dec-2015) [LJIET] 7

6 What is CSMA? Explain persistent and nonpersistent CSMA. (old_May-2015) [LJIET] 7

7 Explain CSMA and CSMA/CD protocols.(old_Nov-2014) [LJIET] 7

8 What is channel allocation? How CSMA helps to solve problem? (Old_June-2014) [LJIET] 7

9 Explain the working principle of CSMA (Old_May-2013) [LJIET] 7

10 Define (Old_June-2012) [LJIET]

a) nonpersistent CSMA

b) p-persistent CSMA.

3

11 Why CSMA/CA is used for wireless network? Explain it.(Old_June-2012) [LJIET] 7

12 Explain wireless LAN protocol and explain hidden station and exposed station

problem of it. What is the solutions to this problem. Explain.(Old_Dec-2010) [LJIET] 7

Topic:4 Ethernet, switches

SHORT QUESTIONS

1 In an 802.3 frame, what is the purpose of the preamble? [LJIET]

A. It provides the cyclic redundancy check.

B. It alerts and synchronises the destination network interface card.

C. It indicates the length of the data field.

Ans: B

1

2 Ethernet frame consists of [LJIET]

a) MAC address

b) IP address

c) both (a) and (b)

d) none of the mentioned

Ans: A

1

3 MAC address is of [LJIET]

1) 24 bits

b) 36 bits

c) 42 bits

d) 48 bits

Ans:D

1

4 The maximum size of payload field in ethernet frame is [LJIET]

a) 1000 bytes

b) 1200 bytes

c) 1300 bytes

d) 1500 bytes

Ans:D

1

5 Which access methodology does token ring employ? [LJIET]

A. Modified token passing.

B. Token passing.

C. CSMA/CD.

Ans:B

1

6 What is the minimum frame size of Ethernet? [LJIET] 1

7 Difference between Hub and Switch [LJIET] 2

DESCRIPTIVE QUESTIONS

1 Explain Ethernet Frame structure. (Dec-2015) [LJIET] 7

2 Explain the self-Learning properties of link layer switches.(Dec-2015) [LJIET] 7

Page 14: Subject Name: Computer Network Subject Code: 2140709

L.J. Institute of Engineering & Technology Semester: IV (2016)

Computer Network (2140709) Page 14

3 What is Ethernet? Explain Fast ethernet and Gigabit Ethernet. (Old_June-2014) [LJIET] 7

4 Which two different modes of operation are supported by Gigabit Ethernet? (Old_June-2012) [LJIET] 7

5 Apply binary, Manchester and differential Manchester encoding on following bit pattern 10110111

(Old_Dec-2015) [LJIET]

7

6 Explain switched Ethernet.(Old_June-2012) [LJIET] 3

7 Compare : Ethernet and Fast Ethernet (Old_Nov-2011) [LJIET] 5

8 Explain Different types of Switching methods with examples. (old_June-2014) [LJIET] 7

9 Explain IEEE Standard 802.4 in detail.(Old_June_2011)[LJIET] 7

10 Explain following terms with respect to Computer Network (1) Broadcasting (2) Bluetooth (3) Routing

(4) Socket (5) IP Address (6) VLAN (Old_May-2015) [LJIET] 7

11 Write note on:

Internet Control Message Protocol (ICMP) , Bridge and Switches.(Old_Dec-2010) [LJIET] 7