0% found this document useful (0 votes)
53 views48 pages

CN Pyqs

The document consists of a series of questions and answers related to computer networks, covering topics such as transport layer protocols, IP addressing, congestion, fragmentation, and various network protocols. It includes definitions, explanations of concepts like circuit switching, and details about TCP/IP model and data communication. The questions are structured in a format suitable for examination or study purposes.

Uploaded by

chamangoti01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views48 pages

CN Pyqs

The document consists of a series of questions and answers related to computer networks, covering topics such as transport layer protocols, IP addressing, congestion, fragmentation, and various network protocols. It includes definitions, explanations of concepts like circuit switching, and details about TCP/IP model and data communication. The questions are structured in a format suitable for examination or study purposes.

Uploaded by

chamangoti01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

CS-242: Computer Networks – I

P-6384

Q1) Attempt any EIGHT of the following (Out of TEN): [8 × 1 = 8]

a) Which is connection-oriented transport layer protocol?


ANS. Transmission Control Protocol (TCP), Stream Control Transmission
Protocol (SCTP).

b) Identify the class of the IP addresses 192.168.60.12 and 10.11.1.1


ANS. 192.168.60.12 – Class C
10.11.1.1 – Class A

c) Define congestion.
ANS. Congestion is a network may occur if the load on the network (number of
packets sent to the network) is greater than the capacity of the network (
number of packers network can handle).

d) What is fragmentation?
ANS. Fragmentation is the process of breaking a packet into smaller units so it can
pass through the network with a smaller MTU (Maximum Transmission Un)

e) Convert dotted decimal IP address to binary address: 255.255.0.0


ANS. 11111111.11111111.00000000.00000000

f) What is socket address?


ANS. The combination of an IP address and a port number is called as socket add.

g) How many maximum no. of computers are used to create piconet?


ANS. 8 -> 1 master and 7 slaves

h) Apply bit stuffing on the pattern:


01001111111101111110
ANS. After 5 consecutive 1s one zero is added therefor, result is
010011111101111110

i) What is Ethernet?
ANS. Ethernet is a standardized system for connecting computers to a LAN.

j) What is network?
ANS. A network is a collection of interconnected devices that share data and
resources.

Q2) Attempt any FOUR of the following (Out of FIVE): [4 × 2 = 8]

a) List different task performed by the network layer.


ANS. 1. Routing of packets
2. Logical Addressing (IP)
3. Packet Forwarding
4. Fragmentation and reassembly

b) What are the three phases of Mobile IP?


ANS. 1. Agent Discovery
2. Registration
3. Tunneling (between home and foreign agent)

c) List classes for classful IP addressing.


ANS. Class A, Class B, Class C, Class D, Class E

d) What are the functions of transport layer?


ANS. 1. Service point addressing (Port number Addressing)
2. Error control is performed on end-to-end rather than across a single link.
3. Error correction is done by retransmission.
4. Flow control in TL, prevents the source from sending data packets faster
than the destination can handle.
5. The connectionless TL treats each segment as an independent packet and
delivers it to the transport layer.
6. The connection-oriented TL, firstly makes a connection with the
destination and then delivers the data. And after the delivery of data, the
connection is terminated.

e) What is TCP?
ANS. 1. TCP stands for Transmission Control Protocol.
2. It is one of the most important protocol in Internet Protocol Suite.
3. reliable and connection-oriented protocol.
4. lies between application and network layer, and serves as the intermediary
between application programs and network operations.
Q3) Attempt any TWO of the following (Out of THREE): [2 × 4 = 8]

a) What are the types of CSMA Protocols?


ANS. There are 3 different types of CSMA protocols: -
A] 1-Persistent -> When the station detects an idle-channel, it immediately
transmits the frames with probability 1.
B] Non-Persistent ->A station that has a frame to send senses to the channel.
If channel is idle, it sends immediately.
C] P-Persistent -> station becomes ready to send, it senses the channel.
if channel -> busy -> station waits until the next slot
if channel -> idle -> it transmits with a probability p.

b) Write the advantages of computer network.


ANS. 1. A computer network allows all the network users or computers at a
different location to communicate easily.
2. ability to share data/files and information to users or computers connected
to computer network.
3. access of files from computers throughout the world.
4. server is placed in a secure place and the good mechanism id providing
for backup of data.
5. Network security issues consist of prevention from virus attacks and
protecting data from unauthorized access.
6. Sharing and transferring files within the networks is very rapid, depending
on the type of network.

c) Explain the distinct steps involved in circuit switching.


ANS. There are 3 distinct steps: -
A] Circuit Establishment – before any data transfer, the end-to-end
connection should be established.
B] Data Transfer – Transfer of data is from source to the destination. The
data may be analog or digital, depending on type of network. connection
is full-duplex.
C] Circuit Disconnect – After all the data has been transferred or at the end
of data transfer the connection is terminated. Signals must be propagated
to deallocate the dedicated resource.

Q4) Attempt any TWO of the following (Out of THREE): [2 × 4 = 8]

a) Write the policies adopted by open loop congestion control.


ANS. 1. Retransmission Policy – Resend only lost or corrupted packets to avoid
extra congestion.
2. Window Policy – Use selective repeat instead of Go-Back-N to reduce
unnecessary retransmissions.
3. Discarding Policy – Discard less important or corrupted packets during
congestion.
4. Acknowledgement Policy – Send acknowledgement in bulk or on timer
to reduce traffic.
5. Admission Policy – allow data into the network only if there are enough
resources available.

b) Explain IPv6 Address types.


ANS. There are 3 types: -
A] Unicast – defines a single computer. packet send to unicast address must
be delivered to that specific/intended computer. It has 2 types, provider
based and geographically based.
B] Anycast Address – defines a group of computers that all share a single
address. it is assigned to multiple interfaces. It should be delivered to
exactly one of the members of the group.
C] Multicast Address – defines a group of computers. each member of the
group receives a copy. packet sent should be received by each member
of the group.

c) Which services are provided by TCP?


ANS. 1] Process-to-process communication
2] Stream Delivery Service
3] Sending and receiving buffers
4] Segments
5] Full Duplex Communication
6] Connection Oriented Service
7] Reliable Service

Q5) Attempt any ONE of the following (Out of TWO): [1 × 3 = 3]

a) Write & Draw Bluetooth frame format.


ANS.

1. Access Code – It is a 72-bit field that contains synchronizations bits.


identified as a master.
2. Header – 54-bit field. contains an 18-bit pattern that is repeated for 3 times.
Header field contains address which is 3-bit field and can define up to seven
slaves.
type, this is a 4bit field identifies the type of data coming from upper layers.
F, this is a flow bit used for flow control.
A, this bit is used for acknowledgment.
S, this bit contains a sequence number of the frame to detect retransmission.
checksum, 8-bit field contains checksum to detect errors in header.
3. Data – field can be 0 to 2744 bits long. contains data or control information
coming from upper layers.

b) Explain multiplexing & demultiplexing at the transport layer.


ANS. A] Multiplexing – the transport layer at the source performs multiplexing.
Whenever an entity accepts items from more than one source, it is
referred as multiplexing.

B] Demultiplexing – the transport layer at the destination performs


demultiplexing.
Whenever an entity delivers items from more than one source, it is
referred as demultiplexing.
CS-242: Computer Networks – I
P5144

Q1) Attempt any EIGHT of the following (Out of TEN). [8 × 1 = 8]

a) What is Port address?


ANS. A port address is a 16-bit identifier used at the transport layer to identify a
specific process or application on a host.

b) What is the size of IPv4 & IPv6 Address?


ANS. IPv4 – 32-bits
IPv6 – 128-bits

c) List application Layer Protocol.


ANS. Secure Shell (SSH), File Transfer, Protocol (FTP), Trivial File Transfer
Protocol (TFTP), Simple Mail Transfer Protocol (SMTP), Internet Message
Access Protocol (IMAP), Reverse Address Resolution Protocol (RARP),
Bootstrap Protocol (BOOTP), Simple Network Management Protocol
(SNMP), Border Gateway Protocol (BGP), Hypertext Transfer Protocol
(HTTP).

d) "UDP is Connection Oriented Protocol." State the statement is true /


false.
ANS. False. UDP is a connection less protocol.

e) What is the function of Presentation layer?


ANS. Translation, Encryption and compression.

f) What is Protocol?
ANS. A protocol is a set of rules that governs data communications, i.e., governs
how data is transmitted and received between devices in a network.

g) Which devices operates at physical layer.


ANS. Hub, repeater, modem, network cables, NIC (Network Interface Card)

h) What is Bandwidth?
ANS. Bandwidth is the maximum data transfer rate of a network or
communication channel. Usually measured in bits per second.

i) What is CSMA/CD?
ANS. stands for Carrier Sense Multiple Access with Collision Detection.
It is a protocol in which the station senses the carrier or channel before
transmitting frames.

j) Define Masking.
ANS. A process that extracts the address of the physical network from an IP
address is called Masking.

Q2) Attempt any FOUR of the following (Out of FIVE). [4 × 2 = 8]

a) Define Terms:
i) Jitter
ii) Latency
ANS. i)Jitter - Jitter refers to the variation in the packet arrival time. Jitter is the
uneven delay in the delivery of audio or video packets.
ii) Latency – The latency or delay defines how long it takes for an entire
message to completely arrive at the destination from the time the first bit
is sent out from the source.

b) Write Nyquist & Shannon's formula for calculating data rate of a channel.
ANS. i) Nyquist Formula - Bit rate = 2 × bandwidth × log2L
ii) Shannon’s Formula - Capacity = Bandwidth × Log2 (1 + SNR)

c) Define routing.
ANS. Routing is a process of selecting the path along which the data can be
transferred from source to the destination.

d) Define following Data communication standards:


i) De Facto
ii) De Jure
ANS. i) De Facto – It is standard that is widely accepted and used in practice, even
though it may not be officially approved by any formal standards
organization.
ii) De Jure – It is formally approved standard developed by official standards
organizations.
e) Apply bit stuffing on Pattern 01101111111111110010
ANS. 0110111110111110010

Q3) Attempt any TWO of the following (Out of THREE). [2 × 4 = 8]

a) Explain Multiplexing & Demultiplexing in transport Layer.


ANS. A] Multiplexing – the transport layer at the source performs multiplexing.
Whenever an entity accepts items from more than one source, it is
referred as multiplexing.

B] Demultiplexing – the transport layer at the destination performs


demultiplexing.
Whenever an entity delivers items from more than one source, it is
referred as demultiplexing.

b) What is Taxonomy for Media Access Protocol?


ANS. The taxonomy for Media Access Protocol is a classification system that
defines how devices share a common communication medium in a network.
It is mainly divided into two broad categories: -
A] Contention-Based Protocols (Random Access)
B] Controlled Access Protocols
C] Channelization Protocols

c) Which are the methods of framing.


ANS. Framing is the process of dividing the data stream into manageable units.
Methods are: - Length Count (Length-based Framing), Byte Stuffing
(Character-oriented Framing), Bit Stuffing (Bit-oriented Framing), Physical
Layer Coding Violations

Q4) Attempt any TWO of the following (Out of THREE). [2 × 4 = 8]

a) Write note on Circuit Switching.


ANS. Circuit switching is a method of communication where a dedicated physical
path is established between the sender and the receiver before the actual data
transmission begins. This path remains reserved and active throughout the
communication session, ensuring a constant and reliable connection. It is
commonly used in traditional telephone networks, where dialing a number
sets up a temporary connection between the caller and the receiver through a
series of switching offices. Each switching office links the incoming and
outgoing lines to maintain the continuous path. Once the call is established,
no other communication can use the same path until the call ends. This
technique provides reliable and orderly data delivery but can be inefficient,
as the dedicated path remains unused during silent periods of the
conversation.

b) For the given IP address 205.16.37.39/28 in some block of address,


Calculate:
i) Address Mask
ii) First Address of block
iii) Last address of block
iv) Number of addresses in the block

ANS.
c) Write note on UDP
ANS. 1. The User Datagram Protocol (UDP) is the simplest Transport Layer
communication protocol in the TCP/IP protocol suite and serves as the
intermediary between the application programs and the network
operations.
2. UDP is a connectionless, unreliable Transport Layer protocol.
3. UDP does not add anything to the services of IP except to provide
process-to-process communication instead of host-to-host communication.
Also, it performs very limited error checking.
4.UDP is powerless protocol. But it is a very simple protocol, using
minimum overhead.
5.UDP is stateless protocol. It is a suitable protocol for streaming
applications such as VoIP, multimedia streaming.
Q5) Attempt any ONE of the following (Out of TWO). [1 × 3 = 3]

a) What is BSS & ESS? Explain in detail.


ANS. A] BSS (Basic Service Set) –
1. BSS is a building block for a Wireless LAN.
2. made up of stationary or mobile wireless station and an optional
central base station, known as Access Point (AP).
3. BSS without an AP is a stand-alone network and called as ad hoc
architecture.
4. Such types of networks cannot send data to other BSSs.

B] ESS (Extended Service Set) –


1. An extended service set is made up of two or more BSSs with Aps.
2. ESS uses two types of stations, i.e., mobile and stationary stations
3. The mobile stations are the normal stations in the BSS.
4. The stationary stations are AP stations that are part of a wired LAN.

b) Explain TCP/IP Model in detail.


ANS. 1. TCP/IP stands for Transmission Control Protocol/Internet Protocol.
2. The TCP/IP is the conceptual model and set of communications protocols
used on the Internet and similar computer networks.
3. TCP/IP protocol suite also called the Internet protocol suite.
4. It is a hierarchical protocol made up of interactive modules, each of which
provides a specific functionality.
5. TCP/IP is thought of as a five-layer model – application, transport,
internet, network interface, hardware devices.
CS-242: Computer Networks – I
PA-1018

Q1) Attempt any Eight of the following: [8 × 1 = 8]

a) List components of data communication.


ANS. 1. Sender
2. Message
3. Transmission Medium
4. Receiver
5. Protocol

b) What is data communication?


ANS. Data communication is a process of exchanging data or information between
two devices (a sender and a receiver) through some kind of transmission/
communication medium such as coaxial cable or fiber optic cable (wired)
and/or air (wireless).

c) Define Protocols.
ANS.

d) List any two channelization protocols.


ANS. 1. FDMA (Frequency Division Multiple Access)
2. TDMA (Time)
3. CDMA (Code)

e) State any two applications of wireless LAN.


ANS. 1. Internet access in homes and offices
2. File sharing in small office/home office networks
f) What is bandwidth?
ANS.

g) Define congestion.
ANS.

h) What is Routing?
ANS.

i) What is a Port Number?


ANS.

j) What is internetworking?
ANS. Internetworking is connecting multiple computer networks together to
function as a single network.

Q2) Attempt any Four of the following: [4 × 2 = 8]

a) What is Computer Network? Write any four characteristics of Computer


Network.
ANS. 1. A computer network refers to a collection of two or more computers
(nodes) which are connected together to share information and resources.
2. Characteristics: - Availability, cost, reliability, security, speed, scalability,
topology, integration, sharing.

b) What is LAN? Write any two advantages of LAN.


ANS. 1. Local Area Networks (LANs) are privately-owned networks covering a
small geographical area, (less than 1 km) like a home, office or groups of
buildings.
2. Advantages: -
(i) The reliability of LAN is high because the failure of one computer in
the network does not affect the functioning for other computers
(ii) Less expensive to install.
(iii) High rate of data transmission is possible.

c) Consider a noiseless channel with a bandwidth of 4000 Hz transmitting a


signal with two signal levels. What will be the maximum bit rate?
ANS.

d) Write any four application of Bluetooth technology.


ANS.

e) Change the following IPv4 address from binary notation to dotted decimal
notation.
i) 10000001 00001011 00001011 11101111
ii) 11000001 10000011 00011011 11111111
ANS.

Q3) Attempt any two of the following: [2 × 4 = 8]

a) Compare OSI Reference Model and TCP/IP model.


ANS.

b) Explain the important design issues of the data link layer.


ANS. 1. Addressing - Every layer needs a mechanism for identifying senders and
receivers. As a consequence of having multiple destinations, some form of
addressing is needed in order to specify a specific destination.
2. Data Transfer Methods - Data transfer means sending data from one
computer to another. data transfer can be of three modes i.e., simplex,
half duplex and full duplex.
3. Error Control – Error control is an important issue because physical
communication channels are not perfect. The receiver must have some
way of telling the sender which messages have been correctly received
and which have not.
4. Flow Control - If the sender is fast compared to the receiver, the issue
occurs at every layer is how to keep a fast sender from swamping a slow
receiver with data. One solution is both entities agree upon the data rate to
control the flow. Another solution involves some kind of feedback from the
receiver to the sender about the receiver’s current situation. This subject is
called flow control.

c) Explain the different services offered by the Network layer.


ANS. 1. Packetizing - The process of encapsulating the data received from upper
layers of the network (also called as payload) in a network layer packet at
the source and decapsulating the payload from the network layer packet at
the destination is known as packetizing.
2. Routing and Forwarding - The network layer is responsible for routing the
packets from its source to the destination. With the help of forwarding,
data packets are transferred from one place to another in the network.
3. Other services are flow control which regulated the amount of data a
source can send without overloading the receiver.
Error control – this is the process of detecting and correcting data packets
that have been corrupted or lost during transmission.
Quality, Congestion control and security.

Q4) Attempt any two of the following: [2 × 4 = 8]

a) Write any four differences between Fast ethernet and Gigabit ethernet.
ANS.
b) Write any eight features of IPv6 protocol.
ANS. 1. Expanded Addressing Capabilities.
2. Support for resource allocation.
3. Support for more security.
4. Header format simplification.
5. New options
6. Auto – configuration
7. Allowance for extension
8. Scalability
9. Mobility
10. End-to-end connectivity

c) Explain any four features supported by TCP.


ANS. 1. Numbering System – As there are no number values in the segment
header for transferred packets, two fields are used i.e., sequence number
and acknowledgement number. This fields refers to byte number not
segment number.
2. Byte Number – TCP numbers all data bytes that are transmitted in a
connection.
3. Sequence number – the value in the sequence number field of a segment
defines the number of the first byte contained in that segment.
4. Acknowledgement Number – Communication in TCP is full duplex i.e.,
all parties send and receive data at the same time. each party uses a
acknowledgment number to confirm the bytes it has received.
5. Flow Control
6. Error control
7. Congestion control

Q5) Attempt any one of the following: [1 × 3 = 3]

a) Explain datagram format of UDP.


ANS.

UDP packets called as user datagrams have a fixed-size header of 8 bytes.


1. Source Port Number – 16 bits field and used by the process running on the
source host which wants to make communication.
2. Destination Port – 16 bits field and used by the process running on the
destination host.
3. Length – 16 bits field defines the total length of the user datagram, header
plus data.
4. Checksum – 16 bits field is used to detect errors over the entire user
datagram.
b) Define Pulling.
ANS. If the producer delivers the items after the consumer has requested them, the
delivery is referred to as pulling.

When the consumer pulls the items, it requests them when it is ready. In this case,
there is no need for flow control
CS-242: Computer Networks – I
P1295

Q1) Attempt any EIGHT of the following (out of TEN). [8×1=8]

a) Define Bandwidth.

b) What is throughput?
ANS. It is the actual measurement of how fast we can send the data.
Throughput refers to measurement of data transferred in a specific time
period.

c) What is Jitter?

d) List the control access protocols.


ANS. 1. Reservation
2. Polling
3. Token passing

e) Define packetizing.

f) Write IPv6 address space.


ANS. the address space of ipv6 contains 2^128 addresses and this address space is
2^96 times of the ipv4 address
340,282,366,920,938,463,374,607,431,768,211,456

g) List UDP services.


ANS. 1. Process to process communication
2. Connectionless Service
3. Flow Control
4. Error Control
5. Congestion ctrl

h) Write the list of states for TCP.


ANS. 1. Closed
2. Listen
3. Close-Wait
4. Time-Wait
5. Closing
6. Last-ACK

i) What is full duplex communication?


ANS. TCP offers full duplex communication in which data can flow in both
directions at the same time.

j) Write the registered ports.


ANS.

Q2) Attempt any Four of the following (out of FIVE). [4×2=8]


a) Write a note on BSS.
b) What are the different layers in the TCP/IP reference model?
ANS. Physical, Data Link, Network, Transport and Application

c) Write the net id & host ID of IP address: 117. 149. 29.4.


ANS. Net id – 117.149.
Host id – 39.4

d) What are the two sub layers of data link layer?


ANS. Data link layer has two sub-layers:
1. Logical Link Control (LLC): It deals with protocols, flow-control, and
error control
2. Media Access Control (MAC): It deals with actual control of media.

e) Write the different control bits or flags in control field of TCP segment.
ANS. Control bits or flags in TCP segment are:
1. URG – the value of urgent pointer field is valid
2. ACK – the value of the acknowledgment field is valid.
3. PSH – Push the data.
4. RST – reset the connection
5. SYN – Synchronize sequence number during connection.
6. FIN – Terminate the connection.

Q3) Attempt any TWO of the following (out of THREE). [2×4=8]


a) What is the propagation time for a 2.5 Kbyte message if the bandwidth of
the network is 1 Gbps? Assume that the distance between the sender and
the receiver is 12,000 km and that light travels at 2.4×10 8 m/s.
ANS.

b) Write some important design issues of the data link layer.


ANS. 1. Services provided to the Network Layer: The data link layer acts as a
service interface to the network layer. How to provide a well-defined service
interface in the network layer on source machine to the network layer on
destination machine.
2. Frame Synchronization/Framing: Frame synchronization is the major issue of
data link layer. The source machine sends data in blocks called frames to be the
destination machine. The starting and ending of each frame should be identified so
that the frame can be recognized by the destination machine. This design issue
determines how the bits of the physical layer are grouped into frames.
3. Flow Control: It deals with how to regulate the flow of frames so that slow
receivers are not swamped by fast senders.
4. Error Control: This design issue deals with transmission errors. It must provide
an error control mechanism to detect and retransmit damaged, duplicate, or lost
frames from source to destination.

c) What are the main properties of routing?


ANS. 1. Correctness - routing should be properly and correctly done so that the
packets may reach their proper destination.
2. Simplicity – routing should be done in a simple manner so that the
overhead is as low as possible.
3. Robustness – the algorithms designed for routing should be robust
enough to handle hardware and software failures and should be able to
cope with changes in the topology and traffic without requiring all jobs in
all hosts to be aborted and the network rebooted every time some router
goes down.
4. Stability – routing algorithms should be stable under all possible circumst
-ances.
5. Fairness – every node connected to the network should get a fair chance
of transmitting their packets.
6. Optimality – routing algorithms should be optimal in terms of throughput
and minimizing mean packet delays.

Q4) Attempt any TWO of the following (out of THREE). [2×4=8]


a) Write the difference between TCP & UDP.
ANS.
b) Explain sliding window in TCP.
ANS. 1. The buffer is represented as a set of slices, called sliding window, that
occupy part of the circle at any time.
2. At the sender site, when a packet is sent, the corresponding slice is
marked.
3. When all the slices are marked, it means that the buffer is full and no
further messages can be accepted from the application layer.
4. When an acknowledgment arrives, the corresponding slice is unmarked.
5. If some consecutive slices from the beginning of the window are
unmarked, the window slides over the range of the corresponding
sequence number to allow more free slices at the end of the window.

c) Write the base header format of IPv6.


ANS.
1. Version (4 bits) field specifies the version of Internet Protocol number.
For IPv6 it is 6 i.e., 0110.
2. Traffic Class (4 bits) field defines the priority of the packet with respect
to traffic congestion.
3. Flow Label (20 bits) field that is designed to provide special handling for
a particular flow of data. The purpose of flow label field is to indicate that
the packet belongs to a specific sequence of packets between source to
destination and can be used to prioritized delivery of packets for services
like voice.
4. Payload Length (16 bits) is a field defining the total length of IP
datagram including the base header.
5. Next Header (8 bits) field identifies the type of header immediately
following the IPv6 header.
6. Hop Limit (8 bits) field serves the same purpose as the TTL (Time to
Live) field in IPv4. The Hop Limit field shows the maximum number of
routers the IPv6 packet can travel.
7. Source Address (128 bits) field identifies the original source of the
datagram.
8. Destination Address (128 bits) field identifies the destination of the
datagram.

Q5) Attempt any ONE of the following (out of TWO). [1×3=3]

a) Describe bus topology in detail.


ANS. 1. In bus topology, all nodes are connected to a central cable which is called
a bus.
2. This bus is also called as Trunk or referred as Backbone cable.
3. Nodes are connected to the bus cable by drop lines and taps. Drop lines
connects the device to the main cable and tap is connector that either
splices into the main cable or punctures the sheathing of a cable to create
a contact with the metallic core.
4. When a device needs to send the data, it places the data onto the bus,
which then travels to all devices but only the intended receiver accepts it,
others ignore the messages.
5. Only one device can transmit at a time. and others have to wait until the
bus is free.

b) Write the difference between IPv4 and IPv6.


ANS.
MORE PYQS

1. Introduction to Networks and Network Models

1. Give diagrammatic representation of bus and mesh topology. [


ANS.

1 M]
2. What are the advantages of point-to-point network? [2
ANS. 1. Simple setup – easy to install and manage, as it connects only two devices.
2. High Speed and Performance - Full bandwidth is used by just two devices,
resulting in faster data transfer.
3. Reliable Connection - Direct communication link reduces the chance of
errors and interruptions.
4. Better Security - Since no third device is involved, data is less likely to be
intercepted.
5. No Congestion - No competition for bandwidth means smooth and
uninterrupted communication.

3. What is internetworking? [1 M]
ANS. An internetwork is a collection of individual networks, connected by
intermediate networking devices, that functions as a single large network.

1. Define protocol with its key elements. [1M]


ANS. A protocol is defined as, "a formal set of rules, key elements are: Syntax
(What is to be communicated), Semantics (how it Is to be communicated), Timing
(when it should be communicated?).

2. Define mesh topology. [1 M]


ANS. Mesh topology is a network setup where each device is connected to every
other device in the network using a dedicated link, providing multiple paths for
data to travel.

3. Which devices operate at physical layer? [1 M]


ANS. Hub, modem, repeater, network cables, NIC (physical part of Network
Interface Card).

4. State the difference between LAN and WAN. [5


ANS.
M]

5. What are the responsibilities of session and presentation layer? [5 M]


ANS. 1. Transport layer is responsible for
the process-to-process delivery of the entire message
2. Session layer has the primary responsibility of beginning, maintaining and
ending the communication between two devices, which is called Session.

6. Explain star topology with their advantages.


ANS. 1. In star topology each device has a dedicated point-to-point link on it to a
central controller, usually called hub or switch.
2. The devices are not directly connected to one another.
3. Each computer on a star network first communicates with a central
hub/switch that forwards the message either to all the computers or
only to the destination computers.2 M]
4. Advantages:
1) Easy to install, reconfigure and wire.
2) Centralized management which helps in monitoring the network
3) Fast as compared to ring topology.
4) Multiple devices can transfer data without collision
5) Eliminates traffic problems.
6) It is easy to detect the failure and troubleshoot it.

1. List two similarities between TCP/IP and OSI model. [1 M]


ANS. 1. Both are layered models used to understand network communication.
2. Both models define protocols for data communication across networks.

2. For n devices in a network, what is the number of cables required for ring
topology?
ANS. In a ring topology, each device connects to exactly two others, forming a
ring. So, number of cables required = n.
[1 M]
3. Explain the OSI reference model in detail.
ANS. 1. The purpose of the OSI model is to show how to facilitate communication
between different systems without requiring changes to the logic of the underlying
hardware and software.
2. The OSI model is not a protocol, it is a model for understanding and
designing a network architecture that is flexible, robust and interoperable.
3. The OSI model is a layered framework for the design of network systems
that allows communication between all types of computer systems.
4. The seven layers of OSI model are physical layer, data link layer, network
layer, transport layer, session layer, presentation layer and application layer.

4. Write in detail about simplex, half duplex and full duplex data communication.
ANS. A] Simplex Communication –
1. In simplex mode, the communication can take place in only one
direction
2. a terminal can only send data and cannot receive it or it can only
receive data but cannot send it.
3. simplex mode communication is unidirectional.
B] Half Duplex –
1. In half-duplex mode, the communication can take place in both
directions, but only in one direction at a time.
2. In this mode, data is sent and received alternatively.
3. In this mode, data is sent and received alternatively.
C] Full Duplex –
1. In full-duplex mode, the communication can take place in both
directions simultaneously, i.e., at the same time on the same channel.
[1 M]
2. What is the responsibility of physical layer.
ANS. It transmits raw bits over a communication medium and deals with physical
connection between devices. [1 M
M]
4. What is topology? Explain the ring topology with advantages and
disadvantages. [5 M]
ANS. 1. The topology of a network is defined as “the geometric representation of
the relationship of all the links and linking devices (nodes) in a network”.
2. ring topology – In ring topology, the computers in the network are
connected in a circular fashion which form of a ring.
3. Advantages:
1.Require less cabling.
2.Less expensive and easy to install.
3.Adding or deleting a device is easy.
4.Reduces chances of collision.
4. Disadvantages:
1.If one node goes down, it takes down the whole network.
2.Slow in speed.
3. Traffic is unidirectional.
M]M]
2. Which topology requires a multipoint connection? [1 M]
ANS. Bus topology

4. Explain similarities and differences between OSI and TCP/IP reference


models. [5
M]
5. State advantages and disadvantages of star topology.
ANS. Advantages:
1. Easy to install, reconfigure and wire.
2. Centralized management which helps in monitoring the network.
3. Fast as compared to ring topology.
4. Multiple devices can transfer data without collision.
5. Eliminates traffic problems.
6. No disruptions to the network then connecting or removing devices.
7. It is easy to detect the failure and troubleshoot it.
Disadvantages:
1. If the central node (hub or switch) goes down then the entire
network goes down.
2. More cabling is required than bus or ring topology, so more
expensive.
3. Performance is dependent on capacity of the central device.]

2. List any four application layer protocols.


ANS. Secure Shell (SSH), File Transfer Protocol (FTP), Trivial File Transfer
Protocol (TFTP), Simple Mail Transfer Protocol (SMTP), Internet Message Access
Protocol (IMAP), Hypertext Transfer Protocol (HTTP)

3. What is computer network? [1 M]


-> computer network is an interconnection of computers and computing devices
using either wires or radio waves over small or large geographical areas.
M]
5. State advantages and disadvantages of mesh topology.
-> Advantages:
1. Each connection can carry its own data load due to a dedicated link.
2. Eliminates traffic problems.
3. Mesh topology is robust. If one link becomes unusable, it does not affect
other systems.
4. Privacy or security because of dedicated lines.
5. Point-to-point links make fault identification easy and simple.
Disadvantages:
1. More cables are required than other topologies.
2. Overall cost of this network is very high.
3. Installation and reconfiguration is very difficult.
4. Set-up and maintenance of this topology is very difficult.
5. Expensive due to hardware requirements such as cables. [2 M]

2. Lower Layers

1. Apply bit stuffing on the pattern: 01001111111101111110.


-> We insert 0 after every sequence of five 1s:
Original: 01001111111101111110
Stuffed: 0100111110111101111100
[1 M]
2. List any two channelization protocols. [1 M]
-> 1. FDMA – Frequency Division Multiple Access
2. CDMA – Code “”
3. TDMA – Time “”
3. Explain Pure ALOHA and slotted ALOHA with example.
-> A] Pure ALOHA:
1. The original ALOHA protocol is called pure ALOHA
2. In pure ALOHA, whenever any station transmits a frame, it
expects the acknowledgement from the receiver.
3. If acknowledgement is not received within specified time, the
station assumes that the frame (or acknowledgement) has been
destroyed.
4. pure ALOHA dictates that when the time-out period passes, each
station must wait for a random amount of time before resending its
frame. This randomness will help avoid more collisions. 5 M]
B] Slotted ALOHA:
1. An improvement to the original ALOHA protocol was "Slotted
ALOHA", which introduced discrete time slots and increased the
maximum throughput.
2. In slotted ALOHA, the time of the shared channel is divided into
discrete intervals called slots.
3. In slotted ALOHA, if any station is not able to place the frame onto
the channel at the beginning of the slot, i.e., it misses the time slot
then the station has to wait until the beginning of the next time slot.

4. Explain circuit switching in detail. [5 M]


-> 1. Circuit switching takes place at the physical layer of the TCP/IP reference
model.
2. Circuit switched networks consist of a set of switches connected by
physical links.
3. In a circuit switched network, two nodes communicate with each other
over a dedicated communication path.
4. Circuit switching is commonly used technique in telephony, where the
caller sends a special message with the address of the callee (i.e., by dialing
a number) to state its destination.
5. It involves 3 distinct steps: Circuit Establishment, Data Transfer, Circuit
Disconnect

5. Explain Polling "Select" function.


-> 1. Select is used when the primary device sends the data.
2. When the primary station wants to send data to other machines, it should
intimate the other secondary device that it is sending the data.
3. To do this, the primary machine first sends the SEL frame in which the
address of the machine (secondary machine) to which it wants to send the
data is present.
4. Then, the primary machine waits for the acknowledgement from that
machine. Once the acknowledgement is reached then the data is sent.

6. Which types of services are defined by IEEE 802.11?


-> BSS (Basic Service Set), ESS (Extended Service Set) [1
IEEE 802.11 defines services like authentication, association, disassociation, data
delivery, and privacy. [5 M]M]

7. What is Ethernet? Give its type with a short description.


-> Ethernet is a widely used LAN technology based on CSMA/CD.
Types:
1. 10Base5 Thick coaxial cable.
2. 10Base2 Thin coaxial.
3. 10Base-T Twisted pair.
4. 10Base-F Fiber optic.

8. Give any four goals of Fast Ethernet.


-> Goals of Fast Ethernet:
1. Upgrade the data rate to 100 Mbps.
2. Keep the same 48-bit address.
3. Make it compatible with Standard Ethernet.
4. Keep the same frame format.
5. Keep the same minimum and maximum frame length. [2 M]

1. What is framing? Explain any two framing methods with examples.


-> 1. Breaking the bit stream into frames is called framing.
2. Framing in the data link layer separates a message from one source to a
destination by adding a sender address and a destination address.
3. The framing methods are Character count, Flag bytes with byte stuffing,
Starting and ending flags, with bit stuffing and Physical layer coding
violations.
4. Character Count - Character count method uses a field in the header to
specify the number of characters in the frame. The data link layer at
destination checks the character count, it knows how many
characters follow and where the end of frame is.
5. Starting and Ending flags with bit stuffing - it allows character codes with
an arbitrary number of bits per character. Each frame begins and ends with a
special bit pattern, 01111110. Whenever, the sender's data link layer-
encounters a five consecutive 1s in the data, it automatically stuffs a 0-bit
into the outgoing bit stream. So this is a bit stuffing.

2. Explain FDMA in detail.


-> 1. FDMA is a channel access method used in multiple-access protocols as
channelization protocol.
2. In FDMA, the available bandwidth is divided into various frequency
bands. Each station is allocated a band to send its data.
3. This band is reserved for that station for all the time.
4. The frequency bands of different stations are separated by small bands of
unused frequency. These unused frequency bands are called guard bands that
prevent station interference.
5. FDMA is the process of dividing one channel or bandwidth into multiple
individual bands, each for use by a single user.4 M]

3. What are Random access methods? Explain any one mechanism. [4 M]


[3 M]

5. Which standard is used for wireless LAN?


-> The standard used for wireless LAN is IEEE 802.11. It defines the protocols for
wireless communication (Wi-Fi), including frequency, modulation, and data
transmission methods. [1 M]

6. What is Bluetooth? Write any two advantages of Bluetooth. [2 M]


-> 1. Bluetooth is a wireless LAN technology used to connect devices of
different functions such as telephones, computers like laptop or desktop,
notebooks, cameras, printers and so on
2. Bluetooth technology is a short-range wireless radio technology that
allows electronic devices to connect to one another.
3. Bluetooth is an open specification for short-range wireless transmission of
voice and data.
4. Advantages of Bluetooth:
1. It is cheaper in cost.
2. Easy to install and setup.
3. It makes connecting to different devices convenient.
4. Setting up a Bluetooth connection between two devices is quick and
easy.
5. It is wireless technology.
6. Bluetooth doesn't need any configuration to start a connection and
perform file transfers.
7. Bluetooth is actually inexpensive.

1. State the strategies used to avoid collisions.


-> 1. Carrier Sense (CSMA): Devices listen to the channel before transmitting.
2. Collision Detection (CSMA/CD): Devices detect collisions and
retransmit after random time (used in Ethernet).
3. Collision Avoidance (CSMA/CA): Devices wait before sending data to
avoid collisions (used in Wi-Fi).
4. Time-Slotting (Slotted ALOHA): Data sent only at slot start to reduce
overlapping.
5. Controlled Access: Using methods like Token Passing or Polling to
avoid simultaneous transmission.
[1 M]

2. Explain the packet switching with advantages and disadvantages.


-> 1. In packet switching, messages are divided into packets of fixed or variable
size.
2. The size of the packet is determined by the network and the governing
protocol.]
3. Advantages:
1. In packet switching, no circuit set up is required in advance.
2. In packet switching, the quality of data transmission is kept high
(error free).
3. In packet switching, no bandwidth is reserved.
4. Packet switching is more fault tolerant.
4. Disadvantages:
1. In packet switching, different packets can follow different paths, so
they may arrive out of order.
2. If the network becomes overloaded, packets are delayed or
discarded or dropped. This leads to retransmission of lost packets by
the sender. This often leads to loss of critical information if errors are
not recovered.
3. Packet switching network cannot be used in applications requiring
very little delay and higher quality of service e.g., reliable voice calls.
4. Protocols used in the packet switching are complex and require
high initial implementation costs.

3. Describe the functions performed by Data Link Layer. [5 M]


-> 1. Framing: Divides the stream of bits into manageable data units called
frames.
2.2. Physical Addressing: Adds source and destination MAC addresses to each
frame to identify devices on the same network.
3. Error Detection and Correction: Detects and corrects errors in the frame
using techniques like parity bits, CRC, or checksums.
4. Flow Control: Controls the speed of data transmission to prevent the receiver
from being overwhelmed.
5. Access Control: Determines which device has the right to use the
communication channel when multiple devices are connected (MAC – Media
Access Control).
M] [5 M]
6. Why is CSMA/CD not required in full duplex switched Ethernet? [1 M]
-> In full duplex switched Ethernet, each device has a dedicated connection to
the switch, so no collisions can occur. Therefore, CSMA/CD is not needed, as
devices do not share the medium.

7. State any two applications of wireless LAN.


-> 1. Internet access in homes, colleges, offices, and public places using Wi-Fi.
2. Wireless file and printer sharing in enterprise or campus environments.
[1 M]
8. Explain in detail 802.3 MAC frame format.
->
[3 M]

9. Write any two applications of Bluetooth technology. [2 M]


-> 1. It is used for providing communication between peripheral devices like
wireless mouse or keyboard with the computer.
2. It is used by modern healthcare devices to send signals to monitors.
3. It is used by modern communicating devices like mobile phones, PDAs,
palmtops etc. to transfer data rapidly.
4. It is used for dial up networking. Thus allowing a notebook computer to
call via a mobile phone.
5. It is used for cordless telephoning to connect a handset and its local base
station.
6. It also allows hands-free voice communication with a headset.

2. List the cables used with Ethernet LAN.

-> The common cables used with Ethernet LAN are:

1. Twisted Pair Cable (e.g., Cat5e, Cat6 – most widely used)


2. Coaxial Cable (used in older Ethernet setups like 10Base2, 10Base5)
3. Fiber Optic Cable (used in high-speed Ethernet like 100Base-FX)

1 M]
3. A telephone network is an example of a circuit switched network. State
True/False.
➔ True – Traditional telephone networks use circuit switching, where a
dedicated path is established for the entire call. [1 M]

5. Explain the strategies used by CSMA/CA.


-> Strategies Used:
1.Carrier Sensing: A device first checks if the channel is free before sending
data.
2. Interframe Space (IFS): Even after the channel is idle, the device waits for
a short duration (IFS) before transmitting to avoid collisions with priority
frames.
3. Backoff Timer: If the channel is busy, the device chooses a random backoff
time and waits before checking again.
4. Acknowledgment (ACK):
The receiver sends an acknowledgment to the sender after successful data
receipt. If no ACK is received, the sender retransmits the frame.2 M]

7. Compare the circuit and packet switching.


->
Feature Circuit Switching Packet Switching
Connection A dedicated path is established before No dedicated path; data is sent in
Setup data transfer. packets independently.
Resource Resources (like bandwidth) are Resources are used on demand and
Usage reserved for the session. shared dynamically.
Continuous and consistent during the Packets may take different paths and
Data Transfer
session. arrive out of order.
Variable delay due to queuing and
Delay Lower delay after setup; fixed path.
routing.
Reliability High once connection is established. Depends on routing and congestion.
Internet communication (emails, web
Example Traditional telephone networks.
browsing).
[4 M]

8. Draw BSS with an access point.


-> 1. BSS is a building block for a Wireless LAN.
2. made up of stationary or mobile wireless station and an optional central
base station, known as Access Point (AP).
3. BSS without an AP is a stand-alone network and called as ad hoc
architecture.
4. A BSS with an AP is called an infrastructure network
5. All stations in such architecture are communicating through an AP.

9. Draw the frame format of Ethernet.


->
[2 M]

2. What is flow control? Why is it needed?


-> 1. Flow control refers to a set of procedures used to restrict the amount of
data the sender can send before waiting for acknowledgment.
2. Why is it Needed?

• To prevent buffer overflow at the receiver.


• To ensure smooth and efficient data transfer.
• To maintain data integrity and avoid retransmissions due to lost frames.

5. Write a note on the Reservation method used in controlled access. [3 M]

6. What is channelization? List three channelization methods and explain any one
method. [5 M]

7. State the minimum and maximum Ethernet frame length. [1 M]

8. How many maximum no of computers is used to create Piconet? [1 M]

9. Explain the types of traditional Ethernet. [5 M]3 M]

11. Explain the datagram circuit and virtual circuit in detail. [4 M]


12. Explain BSS and its types with diagrams. [4 M]M]
3. Explain the data link protocols for noiseless channels. [5 M]
4. State the difference between reservation and polling. [3 M]M]
6. Give difference between WLAN and Bluetooth. [5 M]
7. Explain 10Base5, 10Base2, 10Base-T, 10Base-F.

3. Network Layer

1. Find out the class, Net ID and Host ID of IP address 126.47.50.23. [1 M]


2. Explain classful addressing in detail. [5 M]
3. List different task performed by the network layer. [2 M]
1. Find out class, netid and hostid of IP address 126.25.21.1. [4 M]
1. What is fragmentation? [1 M]
2. State the class of the IP address 128.89.0.26. [1 M]
3. Explain open and closed loop congestion control mechanisms. [5 M]
1. Identify the class of the IP addresses 192.168.60.12 and 10.11.1.1. [1 M]
2. Define subnetting. [1 M]
3. What is routing? Explain the desirable characteristics. [5 M]1 M]. [1 M]
3. What is congestion? [5 M]
4. What are the services provided by the network layer? [5 M]
5. List the congestion control policies used at the network layer. [2 M]
1. Convert dotted decimal IP address to binary address 255.255.0.0. [1 M]]
3. Explain Host id and Net id of IP address classes. [4 M]
4. Transport Layer

1. Give header size of UDP packet. [1


ANS. 8-bytes [1
M]
2. Explain the concept of multiplexing and demultiplexing used in process to
process delivery. The transport layer at the source performs multiplexing
ANS. 1. The transport layer at the source performs multiplexing & transport layer
at the destination performs demultiplexing.
2. Whenever an entity accepts items from more than one source, it is referred
to as multiplexing (many to one).
3. an entity delivers items to more than one source, it is referred to as
demultiplexing (one to many).
4. For ex, three client processes are running at the client site namely P1, P2,
P3. Client P1 and P3 sends data requests from one server and client P2
sends data from another server. The transport layer at the client site
accept 3 messages and creates 3 packets. it acts as multiplexer.

1. State any two applications of UDP. [1 M


ANS. 1. Streaming applications
2. Real time applications
3. DNS lookups
]
2. Explain stream delivery service and sending and receiving buffer service
of TCP. [5 M]
ANS. A] Stream Delivery Service:
TCP allows the sending process to deliver data as a stream of bytes and
allows the receiving process to obtain data as a stream of bytes.
TCP creates an environment in which the two processes seem to be
connected by an imaginary “tube”.
The sending process produces the stream of bytes and the receiving
process reads data from it.

B] Sending and Receiving Buffers:


TCP requires buffers for data storage, since the sending and receiving
processes may not write or read data at the same rate/speed.
There are two buffers, sending buffer and receiving buffer, one for each.
Sending site is divided into three sections – white section which is empty
and can be filled by the sending process, cross-section area shows the
byte is sent but not acknowledge yet. and dotted area contains byte to be
sent by the sending TCP.
At receiving site, circular buffer is divided into 2 areas, white and shaded.
white area contains empty buffers to be filled by bytes received from the
network layer.
The shaded section contains received bytes that can be read by the
receiving process.

1. What is the window size of the TCP segment? [1


ANS. 16-bit field
M]
2. Write a short note on: UDP. [5 M]
ANS. 1. The User Datagram Protocol (UDP) is the simplest Transport Layer
communication protocol in the TCP/IP protocol suite and serves as the
intermediary between the application programs and the network
operations.
2. UDP is a connectionless, unreliable Transport Layer protocol.
3. UDP does not add anything to the services of IP except to provide
process-to-process communication instead of host-to-host communication.
Also, it performs very limited error checking.
4.UDP is powerless protocol. But it is a very simple protocol, using
minimum overhead.
5.UDP is stateless protocol. It is a suitable protocol for streaming
applications such as VoIP, multimedia streaming.4 M
]
1. List the protocols used at the transport layer. [1 M]
ANS. 3 protocols :- TCP (Transmission Control Protocol), SCTP (Stream Control
transmission Protocol), UDP (User Datagram Protocol)

2. List the services provided by TCP. [


ANS. 1. Process to process communication
2. Stream Delivery service
3. Sending and receiving buffers
4. Segments
5. Full duplex Communication
6. Connection oriented Service
7. Reliable Service
1 M]
3. Give difference between TCP and UDP. [5 M
1. Draw and explain UDP datagram. [5 M]

2. Explain TCP features.


ANS. 1. Numbering System - TCP software keeps track of segment (packets)
transmitted and received. But there is no number value in the segment header.
There are two fields i.e., sequence number and the acknowledgement number.
2. Byte Number - TCP numbers all data bytes that are transmitted in a connection.
Numbering is independent in each direction.
3. Sequence Number - The value in the sequence number field of a segment
defines the number of the first byte contained in that segment. When a segment
carries a combination of data and control information(piggybacking), it uses a
sequence number.
4. Acknowledgement Number - Each party also uses an acknowledgment number
to confirm the bytes it has received. The value of the acknowledgement field in a
segment defines the number of the next byte a party expects to receive.
5. Flow Control – The receiver of data controls the amount of data that is to be sent
by the sender.
6. Error Control – Error control is byte oriented. used for providing reliable
services.
7. Congestion Control - Receiver not only controls the amount of data sent by the
sender (flow control), but it is also determined by the level of congestion in the
network.

You might also like