CS2363 Computer Network: Part B Questions

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

CS2363 Computer Network

Part B Questions
UNIT I
1. Explain in detail the error detection and error corrections.(UQ)
2. Discuss in detail about the layers of OSI model. (UQ).
3. Explain the different approaches of framing in detail.
4. Write the Sliding Window Algorithm and explain it in detail.
5. Name the four basic network topologies and explain them giving all the relevant
features.(UQ)
6. Explain the functioning of wireless LAN in detail.(UQ)
7. Explain Ethernet in detail.
8. Discuss the frame format of token ring in detail.
9. Differentiate FDDI from token ring and Write in detail about Resilient Packet Ring.
10. Write short notes on WI-Fi,Wi-Max, Cellphone technologies.
11. Write in detail about bridges. Discuss the spanning tree algorithm in detail.
UNIT II
1. Write notes on the following (UQ)
(i) Internet protocol.
(ii) Routers.
2. Discuss in detail the various aspects of IPV6. (UQ)
3. What are the different approaches in Packet Switching? Explain them in detail.
4. Discuss DHCP and ICMP in detail.
5. Explain Distance Vector routing in detail.
6. Explain OSPF in detail.
7. Discuss RIP in detail.
8. Problems in subnetting.
9. Write short notes on the following
10. Multicasting ii. ARP iii. RARP
UNIT III
1. With neat architecture, explain TCP in detail.
2. Explain adaptive flow control in detail and its uses.
3. With neat architecture, explain UDP in detail.
4. Discuss the different Queuing Discipline in detail.
5. Explain the Congestion Avoidance techniques in detail.
6. Explain TCP Congestion control techniques in detail.
7. Explain how QoS is provided through Integrated Services.
8. Explain how QoS is provided through Differentiated Services.
UNIT IV
1. Explain in detail the symmetric key and public key encryption mechanism.
2. Explain details about IP SECURITY?
1

3. Explain about RSA algorithm.


4. Explain the following:
a. Authentication based on shared secret key
b. Authentication using a key distribution center.
5. Discuss in detail about symmetric-key cryptography.
6. Explain details about WEB SECURITY?
7. What is mean by Public key cryptography and explain authentication, key
distribution, and key agreement?
8. Explain about Data Compression technique?
9. Write a note on JPEG, MPEG and MP3
UNIT V
1.
2.
3.
4.
5.
6.

Explain the SMTP and HTTP. Give their uses, state strengths and weaknesses.
Explain the role of a DNS on a computer network.
Explain Email protocols in detail.
Discuss FTP in detail.
Discuss SNMP and Telnet in detail.
Write short notes on
i.PGP ii.SSH
7. Explain about overlay network.
8. Discuss the applications of multimedia in audio and video

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy