Prev Year Questions
Prev Year Questions
Prev Year Questions
May-22
4. A radio station is using a 14.44 kbps channel for message transmission and the sending message
packets are 100 bits long. Calculate the maximum throughput for the channel using slotted ALOHA.
10. Describe the Frame Relay Protocol Architecture and explain the functions of each layer.
11. Discuss Internet services standards for TCP/IP and the process of standardization for RFCs and
TCP/IP.
14. Differentiate various broadband network local loop technologies stating their properties.
a) FDDI
b) ARP
c) ICMP
d) UDP
May-23
1. What is Computer Network (CN)? Give its architecture and briefly explain each component of CN.
2. Draw the ISO-OSI reference model and explain the functionalities of each layer in detail.
3. What is the need for Flow control? Explain the common approaches for flow control at the data link
layer.
- i) Go-Back-N
8. A group of N stations shares a 56 Kbps pure aloha channel. Each station outputs a 1000 bits frame
on an average of once every 100 sec (stations are buffered). What is the max value of N?
9. What is the need for the Network layer? What services are provided by this layer? Explain.
10. Describe the working of the Bellman-Ford algorithm using a suitable example.
11. What is MAC Addressing? What are the three types of MAC addresses? Discuss with examples.
12. What is Fragmentation and Reassembly? Why do we need fragmentation and reassembly at the
network layer? Explain.
- i) SNMP
- iii) MLMA
14. Draw and explain the header format of a User Datagram Protocol (UDP).
May-23
1. Identify the layers in the OSI reference model and illustrate their functions with a suitable diagram.
3. Explain the working principle of the Sliding Window protocol with a suitable diagram.
4. Explain in detail the error and flow control mechanisms employed at the data link layer.
5. Explain the CSMA Protocol and how collisions are handled in CSMA/CD.
11. What is Fragmentation and Reassembly? Why do we need fragmentation and reassembly at the
network layer? Explain.
13. Explain Simple Network Management Protocol (SNMP) and its functions.
14. What are traditional ciphers? What are the different techniques used in traditional ciphers?
Explain.
a) SMTP
d) BEB Algorithm
by:
0832AD211027