You are on page 1of 9

UNIT-1 (2 MARKS) 1. What is mean by data communication? 2.

What are the three criteria necessary for an effective and efficient network? 3. What are the three fundamental characteristics determine the effectiveness of the data communication system? 4. What are the advantages of distributed processing? 5. Why are protocols needed? 6. Why are standards needed? 7. For n devices in a network, what is the number of cable links required for a mesh and ring topology? 8. What is the difference between a passive and an active hub? 9. Distinguish between peer-to-peer relationship and a primary-secondary relationship. 10. Assume 6 devices are arranged in a mesh topology. How many cables are needed? How many ports are needed for each device? 11. Group the OSI layers by function. 12. What are header and trailers and how do they get added and removed? 13. The transport layer creates a communication between the source and destination. What are the three events involved in a connection? 14. What is the DC component? 15. How does NRZ-L differ from NRZ-I? 16. Using HDB3, encode the bit stream 10000000000100. Assume the number of is so far is odd and the first 1 is positive. 17. What are the functions of a DTE? What are the functions of a DCE? 18. What does the electrical specification of EIA-232 describe? 19. Discuss the mode for propagating light along optical channels. 20. What is refraction? 21.How are the guided media differing from unguided transmission media? 22. What are the disadvantages of optical fiber as a transmission medium? 23. What are the criteria used to evaluate transmission medium?

24. Give the relationship between propagation speed and propagation time? 25.Explain cross talk and what is needed to reduce it? (16 Marks) 1. Discuss the different transmission media used for data communication. 2. Discuss the different signal encoding formats with examples 3. State the functions of session layer. 4. What is meant by differential encoding. 5. Give two services offered by session layer. 6. Where are the essential characteristics of an encoding scheme?Explain. 7. Explain various LAN topologies. 8. Draw a neat sketch showing a cutaway of a base band co-axial cable? 9. What are local area networks? 10. With reference to transmission media,describe the relative merits of optical fibers and copper. 11. What are the services offered by the network layer? 12. Give two services offered by the session layer. 13. What is the need for data encoding? 14. Explain the various data encoding schemes and compare their features. 15. Explain OSI layer and its functions with neat sketch. 16. Describe the modem standards. 17. Briefly discuss RS 232 with example. UNIT-Il (2 Marks) 1.What are the responsibilities of data link layer? 2. Mention the types of errors. 3. Define the following terms. 4. What is redundancy? 5. List out the available detection methods. 6. Write short notes on VRC. 7. Write short notes on LRC. 8. Write short notes on CRC. 9. Write short notes on CRC generator. 10. Write short notes on CRC checker. 11. Give the essential properties for polynomial. 12. Define checksum.

13. What are the steps followed in checksum generator? The sender follows thesesteps 14. List out the steps followed is checksum checker side. The receiver must follow these steps 15. Write short notes on error correction. 16. Mention the types of error correcting methods. There are 2 error-correcting methods. 17. What is the purpose of hamming code? 18. Define flow control. 19. What is a buffer? 20. Mention the categories of flow control. 21. What is the function of stop and wait flow control? 22. Mention the advantage and disadvantage of stop and wait flow control. 23. Define ARQ. 24. Mention the function of go-back N-ARQ. 25. What is selective reject ARQ? 26. Define HDLC. 27. List the types of stations is HDLC. HDLC differentiates between 3 types of stations. 28. Define configuration. 29. List the various ways of station configuration. The stations are configured in 3 ways 30. What are the different communication modes in HDLC? HDLC supports 3 modes of communication between stations. 31. Mention the types of frames in HDLC. 32. Give the usage of I, S, U frames. 33. Write the types of frame fields contained in HDLC. 34. What is meant by bit stuffing? 35. Define LAN.

36. Mention the various architecture in a LAN. 38. List the most command kinds of Base band 802.3 LAN. 39. Mention the different kinds of Ethernet networks. 40. Write short notes on FDDI. 41. Describe the three HDLC station types? 42. What is piggy backing? 43. Name the four types of S-frames? The four types of S-frames are 44. Name the five categories of U-frames? (16 Marks) 1. With reference to sliding window protocol explain selective repeat & Go back N working mechanism. 2. Explain the data link layer in internet and HDLC? 3. Explain the working of the traditional Ethernet? 4. Explain in detail about the access method and frame format used in Ethernet & token ring? 5. Explain in detail the types of redundancy checks used in data communications with examples? 6. Explain with example how hamming code can be used to correct burst errors? 7. Explain about IEEE 802.11 protocol architecture for wireless LAN? 8. Explain about FDDI in detail. 9. Explain frame format,operation and ring maintenance features of IEEE 802.5 MAC protocol? 10. Explain SONET with a neat sketch. UNIT-III (2Marks) 1. What are the network support layers and the user support layers? 2. What are the functions of LLC? 3. What are the functions of MAC? 4. What is protocol data unit? 5. What are the responsibilities of network layer? 6. What are headers and trailers and how do they get added and removed? 7. What is a virtual circuit? 8. What are data grams? 9. What are the two types of implementation formats in virtual circuits? 10. What is meant by switched virtual circuit? 11. What is meant by Permanent virtual circuit? 12. Define Routers.

13. What is meant by hop count? 14. How can the routing be classified? 15. What is time-to-live or packet lifetime? 16. What is meant by router? 17. Write the keys for understanding the distance vector routing. 18. Write the keys for understanding the link state routing. 19. How the packet cost referred in distance vector and link state routing? 20. How the routers get the information about neighbor? 21. What are the four internetworking devices? 22. Define IP address. 23. What is Token Bus? 24. What is token passing? 25. Define Masking? 26. What are the rules of boundary-level masking? 27. Define Gateway. 28. What is LSP? PART B 1. What is an internet? Imagine an organization where internet is needed & discuss it in detail with a neat diagram. (16) 2. Explain in detail about datagram approach and compare with circuit switching. (16) 3. a. Explain Routing Table and Routing Module (8) b. A company is granted the site address 201.70.64.0. The company needs 6 subnets. Design the subnets. (8) 4. a. How is the looping problem solved by switches and by routers. How do switches/routers handle link failure? (8) b. Explain the IP addressing. (8) 5. a. Change the following IP address from dotted decimal notation to binary notation. (2)

b. Change the following IP address from binary notation to dotted decimal notation. (2)

c. Find the net and host id of the IP addresses (2)

d. In a class C subnet, find out the network address (2)

e. What is the maximum number of subnets in class A / B using the following masks. (8)

6. A router using Distance Vector Routing has the following routing table

The router receives the following packet from router C

Show the updating routing table (16) 7. Find the shortest path tree and routing table for B (16)

UNIT-4 PART A ( 2 Marks) 1. What are the services provided by the transport layer?

2. Define reliability and its aspects. 3. Define multiplexing. 4. Define RTT. 5. What is the purpose of Urgent pointer in the TCP header? 6. What is meant by slow start in TCP? 7. Define socket. 8. Define datagram socket. 9. Draw a neat diagram of a transport layer segment. 10. Differentiate between TCP and UDP. 11. Define QoS. 12. What are the steps in call set up process? 13. Define integrated services. 14. Name some tuples which is used to identify a TCP socket. 15. What do you meant by congestion? 16. What are the types of congestion control? Explain. 17. Define flow control? PART B 1. A client uses UDP to send data to a server. The data are 16 bytes. Calculate the efficiency of the transmission at the UDP Level (16) 2. Explain the concepts behind in the Silly Window Syndrome. (16) 3. a. Draw and explain in detail about the State Transmission diagram of TCP (8) b. Explain in detail about congestion avoidance in TCP (8) 4. a. Define UDP. (2) b. Explain the segment format of UDP (6) c. Explain in detail about congestion control (8) 5. a. Explain the three phases of TCP (8) b. Explain the segment format of TCP (8)

6. Explain in detail about various techniques to improve Qos (16) 7. Explain in detail about integrated services (16) UNIT -5 PART A ( 2 Marks) 1. Define DNS. 2. Name some generic domain labels. 3. What are the four main properties of HTTP? 4. Describe why HTTP is designed as a stateless protocol. 5. Define virtual terminal. 6. What do you mean by active web pages? 7. What are the transmission modes of FTP? 8. Compare HTTP and FTP. 9. What are the types of source records? 10. What do you meant by FTP? 11. Draw the basic model of FTP. 12. What are the things supported by SMTP? 13. Draw the General format of HTTP request messages. 14. What are the categories of web documents and specify the languages which it is used for each document? 15. What are the things define by URL? 16. What are the aspects of information security? 17. Name some security services. 18. What are the types of security attacks? 19. Define AES. 20. Write the steps for an RSA. 21. What is the relationship between CGI & dynamic documents? 22. What is an active document? 23. What is conventional encryption?

24. Define the structure of data in FTP. 25. Define Catching in DNS. PART B 1. Define DNS and explain the major sections of DNS in detail? (16) 2. With a neat diagram explain the basic model of FTP? (16) 3. What is public key cryptography and explain RSA in detail with one example. (16) 4. Explain various types of substitution techniques. (16) 5. a. SMTP, FTP and HTTP are protocols to transfer messages from one point to another. Compare and contrast their use (8) b. Write short notes on HTTP Request and Response messages (8) 6. Explain in detail about SMTP. (16) 7. a. Use the following encryption algorithm to encrypt the message, a. Replace each character with its ASCII code b. Add a 0 bit at the left to make each character 8 bits long c. Swap the first 4 bits with the last 4 bits. d. Replace every 4 bits with its hexadecimal equivalent 8. What is the key in this method (8) b. Using the RSA algorithm, encrypt and decrypt the message BE with key pairs (3,15) and (5,15). (8)

You might also like