CS2363 Computer Networks
Important 16 MARKS Questions
UNIT-I
1. Explain the ISO-OSI model of computer network with a neat diagram.
2. Discuss the major functions performed by the Presentation layer and Application layer of the ISO OSI model.
3. Explain Transport Layer and Physical Layer.
4. What are the major components of an optical communication system? Discuss.
5. Distinguish between point to point links and multi point links. Give relevant diagrams.
6. Explain Data Link Layer and Network Layer.
7. Compare Connection oriented and connectionless service.
8. a) What is the need for data encoding and explain the various data encoding schemes and compare their features. (8)
b) Explain how hamming code can be used to correct burst errors. (8)
9. Explain the operation of the bit-oriented protocol HDLC with the required frames
10.Explain the various error detection and correction Mechanisms used in computer network.
11. Write short notes on:
a) Go back NARQ (8)
b) Selective repeat ARQ (8)
12. a) Discuss the major functions performed by the Presentation layer and Application
layer of the ISO - OSI model. (8)
b) Compare Connection oriented and connectionless service. (4)
c) What are the major components of an optical communication system? Discuss. (4)
13. a) A block of 32 bits has to be transmitted. Discuss how the thirty two bit block is
transmitted to the receiver using Longitudinal Redundancy Check. (4)
b) Consider a 32 bit block of data 11100111 11011101 00111001 10101001 that has to
be transmitted. If Longitudinal Redundancy Check is used what is the transmitted bit stream?(4)
c) In the Hamming code, for a data unit of 'm' bits how do you compute the number of
redundant bits 'r' needed? (4)
d) What kinds of errors can Vertical Redundancy check determine? What kinds of errors it cannot determine? (4)
14. Discuss stop and wait protocol
15. Discuss sliding window protocol using Go back n.
16. How does a Token Ring LAN operate? Discuss.
UNIT-II
1. Explain distance vector routing in detail.
2. Explain packet switching in detail.
3. What are routers? Explain in detail.
4. What are the services provided by DNS server? Explain in detail.
5. Find the class of each IP address. Give suitable explanation. (8 x 2 = 16)
i) 227.12.14.87
ii) 193.14.56.22
iii) 14.23.120.8
iv) 252.5.15.111
v) 134.11.78.56
vi) 172.18.58.1
vii) 00000000 11110000 11111111 00110011
viii) 10000000 11110000 11111111 00110011
6. State the major difference between Distance Vector Routing and Link State Routing.
Discuss how these routing techniques work.
7. What is the sub network address if the destination address is 200.45.34.56 and the subnet
mask is 255.255.240.0?
8. List and diagrammatically illustrate and discuss the four general categories of attack.
9. With relevant example discuss about Substitution Ciphers.
10. Briefly discuss how DES algorithm works.
UNIT-III
1. a) Perform a comparative study between the ISO OSI model and the TCP/IP reference model.(8)
b) Distinguish between point to point links and multi point links. Give relevant diagrams.
2. List and discuss the states used in the TCP connection management finite state machine.
3. Discuss the various timers used by TCP to perform its various operations.
4. Present a tutorial on User Datagram Protocol (UDP).
5. Discuss the strategies TCP uses to avoid congestion.
6. Explain UDP & TCP.
7. Explain leaky bucket and token bucket algorithm.
8. Explain the duties of transport layer.
UNIT-IV
1. Explain the type of encryption/decryption method.
2. Explain about RSA algorithm
3. Explain about Data Compression technique?
4. What is mean by Public key cryptography and explain authentication – key distribution – key agreement
5. Explain details about IP SECURITY?
6. Explain details about WEB SECURITY?
7. Explain details about FIREWALLS?
UNIT-V
1. Explain how security is provided in interact operations in detail.
2. What is HTTP protocol used for? What is the default port number of HTTP protocol?
3. Discuss the features of HTTP and also discuss how HTTP works.
4. List and discuss the types of DNS records.
5. Explain WWW.
6. What are the duties of FTP protocol?