Prev Year Questions

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Prev Year Questions (Computer Networks)

May-22

1. Explain the OSI model stating its importance in network architectures.

2. What is the principal difference between connectionless and connection-oriented communication?

3. Explain data link layer address with examples.

4. A radio station is using a 14.44 kbps channel for message transmission and the sending message
packets are 100 bits long. Calculate the maximum throughput for the channel using slotted ALOHA.

5. Describe the stop and wait flow control technique.

6. What is a subnet mask? Explain different classes of IP address.

7. Describe Go-Back-N and Selective Repeat protocol.

8. What is bit and byte stuffing? Explain with example.

9. Explain the connection establishment and connection release in Transport protocols.

10. Describe the Frame Relay Protocol Architecture and explain the functions of each layer.

11. Discuss Internet services standards for TCP/IP and the process of standardization for RFCs and
TCP/IP.

12. Explain Distance Vector routing with example.

13. Explain routing and congestion control.

14. Differentiate various broadband network local loop technologies stating their properties.

15. Write short notes on:

a) FDDI
b) ARP
c) ICMP
d) UDP
May-23

1. What is Computer Network (CN)? Give its architecture and briefly explain each component of CN.

2. Draw the ISO-OSI reference model and explain the functionalities of each layer in detail.

3. What is the need for Flow control? Explain the common approaches for flow control at the data link
layer.

4. Discuss the following:

- i) Go-Back-N

- ii) Hybrid ARQ

5. Give the difference between connection-oriented and connectionless services.

6. Explain the working of ARP and RARP.

7. Explain Binary Exponential Back-off (BEB) with a suitable example.

8. A group of N stations shares a 56 Kbps pure aloha channel. Each station outputs a 1000 bits frame
on an average of once every 100 sec (stations are buffered). What is the max value of N?

9. What is the need for the Network layer? What services are provided by this layer? Explain.

10. Describe the working of the Bellman-Ford algorithm using a suitable example.

11. What is MAC Addressing? What are the three types of MAC addresses? Discuss with examples.

12. What is Fragmentation and Reassembly? Why do we need fragmentation and reassembly at the
network layer? Explain.

13. Discuss the following:

- i) SNMP

- ii) Broadcast and Multicast Routing

- iii) MLMA

- iv) Service Primitives

14. Draw and explain the header format of a User Datagram Protocol (UDP).
May-23

1. Identify the layers in the OSI reference model and illustrate their functions with a suitable diagram.

2. Discuss the design issues of computer networks.

3. Explain the working principle of the Sliding Window protocol with a suitable diagram.

4. Explain in detail the error and flow control mechanisms employed at the data link layer.

5. Explain the CSMA Protocol and how collisions are handled in CSMA/CD.

6. Discuss the Least Cost routing algorithm with a suitable example.

7. What is Routing? Differentiate between broadcast routing and multicast routing.

8. Explain in detail TCP Connection management.

9. Give and explain the UDP Header Format.

10. Give the difference between connection-oriented and connectionless services.

11. What is Fragmentation and Reassembly? Why do we need fragmentation and reassembly at the
network layer? Explain.

12. Differentiate between congestion control and flow control.

13. Explain Simple Network Management Protocol (SNMP) and its functions.

14. What are traditional ciphers? What are the different techniques used in traditional ciphers?
Explain.

15. Write Short Notes on:

a) SMTP

b) TCP Timer Management

c) ALOHA and Slotted ALOHA

d) BEB Algorithm

by:

0832AD211027

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy