CS2302 Computer Networks–Important Question with Keys (2012 1st Edition)

Anna University
Department of Computer Science Engineering

Department : B.E CSE

Semester : V
Year : 3rd yr
Regulation : 2008
Subject Code : CS2302

Subject Name : Computer Networks

Content : CS2302 Computer Networks– Important Questions with Keys – 1st Edition of 2012.


16 MARKS QUESTIONS & KEYS


UNIT I


1. Explain ISO/OSI reference model.

_ Physical layer

_ Data link layer

_ Network layer

_ Transport layer

_ Session layer

_ Presentation layer

_ Application layer


2. Explain the topologies of the network.

_ Mesh topology

_ Star topology

_ Tree topology

_ Bus topology

_ Ring topology


3. Explain the categories of networks.

_ Local Area Network(LAN)

_ Metropolitan Area Network(MAN)

_ Wide Area Network(WAN)


4. Explain coaxial cable & fiber optics.

_ Coaxial cable

_ Coaxial cable standards

_ Coaxial cable connectors

_ Fiber optics

_ Propagation modes

_ Fiber sizes

_ Cable composition

_ Light sources for optical cable

_ Fiber optic connectors

_ Advantages & disadvantages of optical fiber


5. Explain line coding (digital to digital conversion).

_ Unipolar

_ DC component

_ Synchronization

_ Polar

_ Non return to zero(NRZ)

_ NRZ-L

_ NRZ-I

_ Return to zero

_ Biphase

_ Manchester

_ Differential Manchester

_ Bipolar

_ Alternate Mark Inversion(AMI)

_ Bipolar 8-zero substitution(B8ZS)

_ High-Density Bipolar 3(HDB3)


UNIT II


1. Explain error detection and error correction techniques.

_ Types of errors

_ Single bit error

_ Burst error

_ Error detection

_ Vertical redundancy check(VRC)

_ Longitudinal redundancy check(LRC)

_ Cyclic redundancy check(CRC)

_ Checksum

_ Error correction

_ Single-bit error correction

_ Hamming code

_ Burst error correction


2. Explain error control mechanism.

_ Stop and wait ARQ

_ Sliding window ARQ

_ Go back-n

_ Selective-reject


3. Explain the flow control mechanism

_ Stop and wait

_ Sliding window.


4. Explain the timers and time registers in FDDI.

Time registers

_ Synchronous allocation(SA)

_ Target token rotation time(TTRT)

_ Absolute maximum time(AMT)

_ Timers

_ Token rotation timer(TRT)

_ Token holding timer(THT)


5. Explain about Ethernet.

_ Access method :CSMA/CD

_ Addressing

_ Electrical specification

_ Frame format

_ Implementation:

_ 10 base 5 :Thick Ethernet

_ 10 base 2 :Thin Ethernet

_ 10 base T :Twisted-pair Ethernet

_ 1 base 5 :Star LAN


6. Explain the frame format for token ring and token bus.

_ Access method: Token passing

_ Priority and reservation

_ Time limits

_ Monitor stations


7. Explain about HDLC.

_ Station types:

_ Primary station

_ Secondary station

_ Configurations:

_ Unbalanced configuration

_ Symmetrical configuration

_ Balanced configuration

_ Modes of communication:

_ Normal Response Mode(NRM)

_ Asynchronous Response Mode(ARM)

_ Asynchronous Balanced Mode(ABM)

_ Frames :

_ Flag field

_ Address field

_ Control field

_ Information field

_ FCS field


UNIT III


1. Explain the two approaches of packet switching techniques.

_ Datagram approach

_ Virtual circuit approach

_ Switched virtual circuit(SVC)

_ Permanent virtual circuit(PVC)

_ Circuit – switched connection versus virtual – circuit connection

_ Path versus route

_ Dedicated versus shared


2. Explain IP addressing method.

_ Internetwork protocol (IP)

_ Datagram

_ Addressing

_ Classes

_ Dotted decimal notation

_ A sample internet


3. Define routing & explain distance vector routing and link state routing.

_ Distance vector routing

_ Sharing information

_ Routing table

_ Creating the table

_ Updating the table

_ Updating algorithm

_ Link state routing

_ Information sharing

_ Packet cost

_ Link state packet

_ Getting information about neighbors

_ Initialization

_ Link state database


4. Define bridge and explain the type of bridges.

_ Bridges

_ Types of bridges

_ Simple bridge

_ Multiport bridge

_ Transparent bridge


5. Explain subnetting

_ Subnetting

_ Three levels of hierarchy

_ Masking

_ Masks without subnetting

_ Masks with subnetting

_ Finding the subnetwork address

_ Boundary level masking

_ Non-boundary level masking


6. Write short notes about repeaters, routers and gateways.

_ Repeaters

_ Routers

_ Routing concepts

_ Least-cost routing

_ Non adaptive routing

_ Adaptive routing

_ Packet lifetime

_ Gateways


UNIT IV


1. Explain the duties of transport layer.

  • End to end delivery
  • Addressing
  • Reliable delivery Error control Sequence control Loss control Duplication control
  • Flow control
  • Multiplexing


2. Explain socket in detail.

  • Introduction Explanation program


3. Explain UDP & TCP.

_ User Datagram Protocol(UDP)

_ Source port address

_ Destination port address

_ Total length

_ Checksum

_ Transmission Control Protocol(TCP)

_ Source port address

_ Destination port address

_ Sequence number

_ Acknowledgement number

_ Header length

_ Reserved

_ Control

_ Window size

_ Check sum

_ Urgent pointer

_ Options and padding


4. Explain about congestion control.

_ Congestion avoidance

_ BECN

_ FECN

_ Four situations

_ Discarding


5. Explain leaky bucket and token bucket algorithm

_ Leaky bucket algorithm

_ Leaky bucket

_ Switch controlling the output rate

_ Flowchart


UNIT V


1. Explain the functions of SMTP.

System for sending messages to other computer users based on e-mail addresses. SMTP provides mail exchange between users on the same

or different computers.

  • User Agent
  • Mail Transfer Agent
  • Multipurpose Internet Mail Extensions
  • Post Office Protocol


2. Write short notes on FTP.

  • Transfer a file from one system to another.
  • TCP connections
  • Basic model of FTP


3. Explain about HTTP.

  • HTTP transactions
  • HTTP messages
  • URL


4. Explain the WWW in detail.

  • Hypertext & Hypermedia
  • Browser Architecture
  • Categories of Web Documents
  • HTML
  • CGI
  • Java


5. Explain the type of encryption/decryption method.

Conventional Methods:

Character-Level Encryption: Substitutional & Transpositional

Bit-Level Encryption:

Encoding/Decoding, Permutation, Substitution, Product, Exclusive-Or & Rotation

Public key Methods


6. Explain about RSA algorithm.

  • Public key Encryption technique.
  • Encryption algorithm
  • Decryption algorithm
  • Security in RSA

  • 7. Explain about secret key encryption algorithm.
  • Data Encryption Standard
  • Algorithm
  • Sub key generation

7 comments:

  1. I definitely enjoying every little bit of it and I have you bookmarked to check out new stuff you post. Cable Universe

    ReplyDelete
  2. You can take away a side panel of your PC and can use a compressed air can to clean the CPU. You need to pay special attention to heat sink, the video card, power supply and the front case fan. blog de empreendedorismo

    ReplyDelete
  3. افزایش بازدید سایت یکی از نتایج مستقیم بهبود سئو است. با بهینه سازی محتوای وب سایت و استفاده از کلمات کلیدی مناسب می توان ترافیک ارگانیک از سئو عربی را افزایش داد. این به معنای جذب بازدیدکنندگانی است که به دنبال محتوای مرتبط با کسب و کار شما هستند و به احتمال زیاد آنها را به مشتریان واقعی تبدیل می کنند. همچنین بهبود سرعت بارگذاری صفحه و تجربه کاربری نیز می تواند نقش مهمی در افزایش بازدید سایت داشته باشد.

    ReplyDelete
  4. همپینگ به کسب و کارها کمک می کند تا استراتژی های بازاریابی و فروش را پیاده سازی کنند. شامل توسعه برنامه های تبلیغاتی، مدیریت کمپین های بازاریابی و نظارت بر عملکرد آنها است. بازاریابی همپینگ با استفاده از ابزارها و تکنیک های مدرن بازاریابی به کسب و کارها کمک می کند تا پیام های خود را به بهترین شکل ممکن به مخاطب منتقل کنند و بازدهی بالاتری در فعالیت های بازاریابی خود داشته باشند.

    ReplyDelete
  5. مجموعه تریدست یکی از پیشروان در ارائه خدمات حمل و نقل داخلی و ترانزیت بین‌المللی است. این مجموعه با بهره‌گیری از کادری مجرب و حرفه‌ای، توانسته است خدماتی با کیفیت و مطمئن را به مشتریان خود ارائه دهد. تریدست با استفاده از فناوری‌های نوین و به‌روز، فرآیند حمل و نقل را بهینه‌سازی کرده و رضایت مشتریان را جلب کرده است.

    ReplyDelete
  6. key element of Kurdish SEO is using effective website SEO strategies to improve your site’s ranking in Google SEO Kurdish. Creating high-quality internal and external links that point to relevant and authoritative content can help improve your site’s ranking in search results. Partnering with local bloggers and influencers who are influential in the Kurdish community can help increase your site’s credibility and visibility. Given these points, using Kurdish SEO can significantly increase website traffic and sales in the local market of the Kurdistan Region.

    ReplyDelete