ADVANCED COMPUTER NETWORKS (20MCA104)
IMPORTANT QUESTIONS
MODULE 1
3 Marks Questions
1. With figures, explain the basic topologies used in computer networks.
2. Calculate the propagation time and transmission time for a 5Mbytes message if
the bandwidth of the network is 1Mbps. Assume that distance between the sender
and receiver is 12000km and light travels at 2.4 x 10 8 m/s.
3. Explain two different network architectures.
4. Find propagation time and transmission time for a 2.5Kbyte message if the
bandwidth of the network is 1Gbps. Assume that the distance between sender
and receiver is 20000km and the speed of light is 2.4 x 108 m/s.
5. Distinguish between interface, protocol and layer in network software.
6. How token bucket algorithm performs congestion control?
7. Explain protocol layering and its advantages.
8. Describe the working of file transfer protocol with suitable figures.
9. What are the reasons for using layered protocol architecture?
10. Differentiate HTTP persistent and non-persistent communications.
11. List out and explain the functionalities of different DNS records.
6 Marks Questions
1. With figure explain the responsibilities of various OSI protocol layers.
2. Write short notes on the following protocols used in computer network
a) ARP b) ICMP c) POP3 d) SMTP
3. Discuss on the following terminologies
a) FTP b) HTTP c) DNS d) IMAP
4. What is the concept of Quality of Service in computer networks, explain various
techniques used to improve it.
5. What are the five layers in the Internet protocol stack? What are the principal
responsibilities of each of these layers?
6. Describe the name-address resolution techniques used in DNS.
7. Explain the techniques and mechanisms that guarantee the quality of service of
the network to deliver predictable service to an application program.
8. Explain the layered architecture of the TCP/IP reference model.
9. What is the relevance of a network protocol architecture? With neat diagram, brief
the responsibilities of network support layers in OSI Reference model?
10. Discuss with relevant example, the application layer protocol used to retrieve web
pages from the Web. (hint : HTTP )
11. List and explain ISO/OSI layers and their functions.
12. Describe various service models in Quality of Service (QOS).
MODULE 2
3 Marks Questions
1. Compare Frequency Division Multiplexing with Time Division Multiplexing
2. With figure explain how Go-Back N ARQ works.
3. Demonstrate how the Stop and Wait protocol works in reliable data transfer.
4. Explain the UDP datagram header format.
5. What are port numbers, give its importance in computer communication?
6. Explain flow control and error control in TCP.
7. Compare TCP and UDP at the transport layer
8. Explain multiplexing and de-multiplexing with diagrams.
9. Demonstrate how Stop-and-Wait protocol is used for reliable data transfer.
10. Discuss about three-way handshaking in TCP with suitable diagram.
11. Compare TCP and UDP at transport layer.
12. Demonstrate how stop-and-wait protocol is used for reliable data transfer.
6 Marks Questions
1. Elucidate TCP header structure and major transport layer services.
2. Explain congestion control. What are the factors which causes it? Explain each
categories of congestion control in detail.
3. Explain the working Transmission Control Protocol with its various features.
4. What is the use of multiplexing in the transport layer, explain its types.
5. Explain stop-and-wait and Go back-N protocol in detail.
6. Explain connection establishment and connection termination in TCP.
7. How the flow and error control service is provided by the transport layer using
Go-Back-N and Selective-Repeat protocols. Depict the working using timing
diagrams.
8. Explain TCP segment structure with the frame format.
9. What is network congestion? Show how the performance of network is affected
by congestion? Write about the mechanisms to alleviate congestion after it
happens.
10. Demonstrate the working of Go-Back-N and Selective Repeat protocols with
suitable diagrams.
11. Write a short note on:
a. Stop-and-wait [3 Marks]
b. Go-back-N [3 Marks]
12. Explain the principles of congestion control with its fairness and efficiency.
MODULE 3
3 Marks Questions
1. Differentiate between virtual circuit and datagram approach used in packet
switching.
2. Explain distance vector routing used in packet routing.
3. Demonstrate with example how the link state algorithm works in routing packets.
4. Describe the Border Gateway Protocol and its session types.
5. Write short note on RIP.
6. Compare classful and classless addressing, giving examples for both.
7. Draw the format of the IPv6 packet header, highlighting the significance of each
field.
8. Differentiate between routing and forwarding.
9. What are Virtual Circuits? Compare with circuit switched and packet switched
networks.
10. Explain the features of RIP.
11. Explain how IPv6 solve the problem of IPv4 exhaustion?
12. Explain how ARP is working in data link layer?
6 Marks Questions
1. Express how address depletion faced by classful addressing is overcome
by classless addressing.
2. A block of address is granted to a small organization. One of the address is
205.16.37.39/28. Find the starting and ending address given to organization
3. With suitable diagram explain IPv4 datagram packet format.
4. An ISP is granted a block of addresses starting with 190.100.0.0/16. The ISP
needs to distribute these addresses to three groups as follows
First group have 64 customers, each needs 256 addresses
Second group have 128 customers, each needs 128 addresses
Third group have 128 customers, each needs 64 addresses.
Design the sub blocks and find out how many addresses are still available after
these allocations.
5. Compare classful addressing with classless addressing used in IPv4 with
examples.
6. Describe the format of IPv4 datagram with the help of a diagram, highlighting
the significance of each field.
7. Explain how exterior routing is done using BGP.
8. How routing is performed in the internet using interdomain routing protocol BGP.
9. Explain the working of link state routing. Use Dijkstra’s algorithm and show the
tabular summary of the algorithm’s computation to find the shortest path for
node U in the above graph.
10. Demonstrate the working of Go-Back-N and Selective Repeat protocols with
suitable diagrams.
11. Define routing? Explain the process of Link State Routing with OSPF protocol.
12. What is Virtual circuit? Explain the connection management in Virtual circuit
with suitable diagrams.
MODULE 4
3 Marks Questions
1. Write short note on Ethernet along with its frame format.
2. Explain how token passing mechanism works in IEEE 802.5 standard.
3. Define Hamming code. Apply the strategy for generating the parity bits from the
data word 1011.
4. Explain how pure ALOHA avoids packet collision during data communication
with flowchart.
5. Explain the duties of data link Layer.
6. Compare any to random access protocols.
7. Explain token passing and polling-based multiple access protocol with examples
8. What is the use of the checksum method? A sender has two data items to send:
1 1 1 0 0 1 1 0 0 1 1 0 0 1 1 0 and 1 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1.
Compute checksum for the data.
9. A sender needs to send the two data items 110001 and 100110, find the
checksum at sender and receiver to check if there is any error or not?
10. Draw and explain IEEE 802.3 Ethernet frame format.
11. What is the difference between a Hub and a Switch?
12. A series of 8-bit message blocks to be transmitted across a data link using CRC
for error detection. A generator polynomial of x3+ x2+1.is to be used. Message
transmitted as 110010. Explain how CRC check is implemented?
13. Classify various wired media used in short and long distance communication.
6 Marks Questions
1. a) Explain briefly on error detection code technique checksum used in data
communication.
b) For this given data 11001100 10101010 11110000 11000011, perform
check sum operation at sender site and receiver site and verify the data at
receiver site.
2. Explain Carrier Sense Multiple Access with collision detection algorithm in detail.
3. Explain how Carrier Sense Multiple Access/Collision Detection is performed in
the data link layer, and draw the ethernet frame format.
4. a) Analyse and describe how Cyclic Redundancy Check is performed in data
communication.
b) Using Cyclic Redundancy Check, generate the code word for the data
polynomial x5 + x2 with key polynomial x3 + x2 + 1 at sender site and, at
receiver site check the correctness of the data received.
5. What are the different error detection techniques used at the data link layer?
6. What is multiple access problem? Explain the CSMA/CD method of medium
access in Ethernet LANs.
7. Explain CRC. Generate codeword at sender and perform checking of codeword
at receiver. Assuming no error for the dataword 1100 and divisor 1101 using
CRC.
8. Elucidate the techniques character-oriented framing and bit-oriented framing in
data link control (DLC) to organize the bits that are carried by the physical
layer.
9. Explain the random access protocol used for collision detection in Ethernet.
10. Write a short note on:
a. Collision based multiple access protocol
b. Token based multiple access protocol
11. Explain IEEE 802.3 Ethernet frame format with its access protocol.
MODULE 5
3 Marks Questions
1. Explain how Simple Network Management Protocol manages devices in a
network with figure.
2. Why gateways are used in computer networks? List its features.
3. Describe Virtual Private Network with its type.
4. List and explain any three active attack which affects the security in data
communication.
5. Explain Bluetooth architecture.
6. What is a firewall?Explain.
7. Explain the piconet and scatternet architecture of Bluetooth.
8. What is the use of VPN are the techniques to guarantee privacy for organizations
using VPN?
9. With a neat diagram explain the architecture of Bluetooth
10. What is VPN?
11. Explain Network Address Translation (NAT).
12. Explain piconet topology of Bluetooth?
6 Marks Questions
1. Explain Bluetooth technology with its architecture.
2. Explain various functions and protocols used by network management system.
3. Explain the use of firewalls and what are its different types.
4. Explain IEEE 802.11 with its architecture and frame format.
5. Describe the format of IEEE 802.11.How does Multiple Access with Collision
6. Avoidance solve the hidden node problem in Wireless LANs?
7. Write short note on:
i. Troubleshooting in networks
ii. SNMP
8. With neat diagram explain the architecture of IEEE 802.11 Wireless LAN.
9. a) Elaborate the working of traffic analysis tools.
b) Explain any 3 tools/ administrators. commands for troubleshooting used by
network
10. Explain SNMP framework for managing devices in the Internet.
11. What is Bluetooth? Explain the various layers of Bluetooth with a neat diagram.
12. Write a short note on:
i. Traffic analysis tools
ii. Troubleshooting