UNIT-I
1. Explain the ISO-OSI model of computer network with a neat diagram.
2. Discuss the major functions performed by the Presentation layer and Application
layer of the ISO OSI model.
3. Explain Transport Layer and Physical Layer.
4. What are the major components of an optical communication system? Discuss.
5. Distinguish between point to point links and multi point links. Give relevant
diagrams.
6. Explain Data Link Layer and Network Layer.
7. Compare Connection oriented and connectionless service.
UNIT- II
1. a) What is the need for data encoding and explain the various data encoding
schemes and compare their features. (8)
b) Explain how hamming code can be used to correct burst errors. (8)
2. Explain the operation of the bit-oriented protocol HDLC with the required frames
[Link] the various error detection and correction Mechanisms used in computer
network.
4. Write short notes on:
a) Go back NARQ (8)
b) Selective repeat ARQ (8)
5. a) Discuss the major functions performed by the Presentation layer and
Application layer of the ISO - OSI model. (8)
b) Compare Connection oriented and connectionless service. (4)
c) What are the major components of an optical communication system?
Discuss. (4)
6. a) A block of 32 bits has to be transmitted. Discuss how the thirty two bit
block is transmitted to the receiver using Longitudinal Redundancy Check.
(4)
b) Consider a 32 bit block of data 11100111 11011101 00111001 10101001
that has to be transmitted. If Longitudinal Redundancy Check is used what
is the transmitted bit stream?(4)
c) In the Hamming code, for a data unit of 'm' bits how do you compute the
number of redundant bits 'r' needed? (4)
d) What kinds of errors can Vertical Redundancy check determine? What
kinds of errors it cannot determine? (4)
7. Discuss stop and wait protocol
8. Discuss sliding window protocol using Go back n.
9. How does a Token Ring LAN operate? Discuss.
UNIT-III
1. Explain distance vector routing in detail.
2. Explain packet switching in detail.
3. What are routers? Explain in detail.
CS2302 Computer Networks
[Link]
[Link]
4. What are the services provided by DNS server? Explain in detail.
5. Find the class of each IP address. Give suitable explanation. (8 x 2 = 16)
i) [Link]
ii) [Link]
iii) [Link]
iv) [Link]
v) [Link]
vi) [Link]
vii) 00000000 11110000 11111111 00110011
viii) 10000000 11110000 11111111 00110011
6. State the major difference between Distance Vector Routing and Link State
Routing. Discuss
how these routing techniques work.
7. What is the sub network address if the destination address is [Link] and
the subnet mask
is [Link]?
8. List and diagrammatically illustrate and discuss the four general categories of
attack.
9. With relevant example discuss about Substitution Ciphers.
10. Briefly discuss how DES algorithm works.
UNIT-IV
1. a) Perform a comparative study between the ISO OSI model and the TCP/IP
reference model.(8)
b) Distinguish between point to point links and multi point links. Give
relevant diagrams. (8)
2. List and discuss the states used in the TCP connection management finite state
machine.
3. Discuss the various timers used by TCP to perform its various operations.
4. Present a tutorial on User Datagram Protocol (UDP).
5. Discuss the strategies TCP uses to avoid congestion.
6. Explain UDP & TCP.
7. Explain leaky bucket and token bucket algorithm.
8. Explain the duties of transport layer.
UNIT-V
1. Explain how security is provided in interact operations in detail.
2. What is HTTP protocol used for? What is the default port number of HTTP
protocol?
3. Discuss the features of HTTP and also discuss how HTTP works.
4. List and discuss the types of DNS records.
5. Explain WWW.
6. What are the duties of FTP protocol?
7. Explain the type of encryption/decryption method.
8. Explain about RSA algorithm
[Link]