0% found this document useful (0 votes)
96 views3 pages

CN-question Bank

The document outlines key concepts in computer networks, covering the OSI and TCP/IP reference models, layered architecture, transmission media, error detection techniques, and various protocols such as ALOHA, CSMA, TCP, and UDP. It discusses routing algorithms, transport layer functions, DNS services, and addressing methods including IPv4 and IPv6. Additionally, it addresses network devices, congestion control, and crash recovery techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views3 pages

CN-question Bank

The document outlines key concepts in computer networks, covering the OSI and TCP/IP reference models, layered architecture, transmission media, error detection techniques, and various protocols such as ALOHA, CSMA, TCP, and UDP. It discusses routing algorithms, transport layer functions, DNS services, and addressing methods including IPv4 and IPv6. Additionally, it addresses network devices, congestion control, and crash recovery techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

COMPUTER NETWORKS

UNIT-I

1. With a neat diagram explain the OSI reference model in detail? Explain the functions
performed in each layer.

2. Explain TCP/IP reference model.

3. Differentiate the OSI and TCP/IP reference models.

4. Describe the characteristics of layered architecture.

5. Explain Internet history standards and administration.

6. Elucidate the design issues of data link layer

7. Elicit types of transmission media with their merits and demerits.

8. Explain the following error detection techniques with an example.

i) Checksum ii) Two dimensional parity check

9. Differentiate between guided transmission media and unguided transmission media.

10. What are the different types of error detection methods?

11. The generator polynomial is x 3 +x+1. A sender want to send data 1001. Generate CRC code.
Also describe error checking process if 3rd bit is inverted from the left.

12. Explain flow control in Data-Link layer

13. Define bit stuffing and character stuffing.

14. Explain the Hamming Code with an example.

15. What are the types in sliding window protocol?

UNIT-II

1. Explain why collision is an issue in a random-access protocol

2. Briefly discuss about ALOHA.

3. Differentiate Pure ALOHA and Slotted ALOHA What is CSMA? Explain types of CSMA.

4. What is the sliding window protocol?

5. Write about CSMA/CD and CSMA/CA in detail.


6. Explain collision-free protocols

7. What are the types of Ethernet?

8. What is the functionality of Ethernet MAC sub layer? Explain each field in Ethernet Frame with
a neat diagram.

9. Define Bridge. Explain the different types of Bridges

10. Compare and contrast the network devices repeaters, hubs, bridges and switches.

UNIT III, IV and V


1. Define Routing. Explain Distance Vector Routing Algorithm with an example.
2. Define Routing. Explain Distance Vector Routing Algorithm with an example.
3. What are the advantages and limitations of flooding?
4. Describe Hierarchical routing algorithm example.
5. Explain connection management in transport layer.
6. Compare and contrast TCP and UDP Protocols.
7. What are the major components in E-mail system?
8. What are the services provided by transport layer to the upper layers? Discuss about HTTP
request and response mechanisms.
9. Explain the connection establishment and release in transport layer.
10. What is DNS? What are the services provided by DNS?
11. How would you summarize the concepts of E-mail, its architecture and services?
12. What is non-adaptive routing?
13. What is meant by congestion?
14. What is the function of transport layer?
15. What is UDP?
16. What is the function of application layer?
17. Explain the IPv4 and IPv6 header format.
18. Explain the elements of transport layer.
19. Describe the General principles of Congestion Control.
20. The major problem with distance vector algorithm is ‘count to infinity’. How exchange of
complete path from router to destination instead of delay, helps in solving count to infinity
problem.
21. Explain in brief about TCP connection establishment and Release.
22. Describe in brief about TCP segment Header.
23. What are the design issues of Network Layer? Explain in detail.
24. What is DNS? Explain the architecture of DNS Servers in Internet.
25. Discuss the applications of tunneling.
26. Differentiate between FTP and SMTP.
27. Discuss the transport layer service primitives. What do you understand by 3 way handshake
Technique? Also discuss the TCP connection management.
28. Define and describe Classful Addressing and Classless Addressing.
29. Discuss about ARP and RARP protocols in detail.
30. Explain about the principle of optimality.
31. Explain about admission control
32. How to find shortest path using Dijkstra algorithm? Explain with an example
33. What is packet fragmentation?
34. Explain IPv6 addressing
35. Explain IPv4 addressing
36. Write short note on SSH protocol.
37. What is internetworking
38. Compare and contrast TCP and UDP Protocols.
39. Explain about 3-way handshake mechanism for connection establishment and connection
release.
40. How to find shortest path using Dijkstra algorithm? Explain with an example.
41. What is the use of HTTP and FTP protocols?
42. Discuss ICMP and DHCP protocols in detail
43. Explain the TELNET
44. What is CIDR addressing
45. How does the Remote procedure call works? Explain it.
46. How crash recovery is managed at the transport layer?
47. Elaborate on Crash Recovery techniques in Transport Layer.
48. What are the services provided by the Internet transport protocol? Explain.
49. Write short notes on
a) HTTP c) SSH
b) FTP d) E-mail

50. What is Logical address and Physical address in computer networks? Why a mapping from
logical address to physical address and vice versa is required? Explain the protocols which
perform it.

You might also like