0% found this document useful (0 votes)
57 views

Computer Network and Security, All The Module Question Bank Vtu

Computer network and security, all the five models question bank VTU autonomous.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

Computer Network and Security, All The Module Question Bank Vtu

Computer network and security, all the five models question bank VTU autonomous.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CNS-21AML153-Question Bank

Module-1

1. Define Data Communication. Describe its components and data flow mechanisms with example.
2. What are the causes of transmission impairment? Write the factors on which the data rate is
depending on.
3. What is Data Communication? Explain the following data communications: a) Fundamental
characteristics of Data Communication, b) Components of Data Communications.
4. Define Data Communication. Describe its characteristics and network criteria of networks.
5. Illustrate different topologies of computer networks with its pros and cons.
6. A Make use of the following processes in TCP/IP protocol suite to perform data transmission and
demonstrate them with an example.
a. Encapsulation and Decapsulation
b. Multiplexing and Demultiplexing
7. Assume we need to download text document at the rate of 5000 pages per second (a page with 100
lines with 50 characters in each line). Identify the required bit rate of this channel and also find the
bit rate of HDTV?
8. A digital signal has eight levels. Identify the bits are needed per level.
9. Consider the power of a signal is 100mW and the power of a noise is 10μW; Identify the values of
SNR and SNRdB. if it is a noiseless channel chat is the SNR and SNRdB
10. Suppose a signal travel through transmission medium and its power is reduced to one-half. Identify
the attenuation.
11. A signal travels from point A to point B. At point A, the signal power is 100 W. At point B, the
power is 90 W. What is the attenuation in decibels?
12. Solve the following problems i) A signal travels from point A to point B. At point A, the signal
power is 100 W. At point B, the power is 90 W. What is the attenuation in decibels? ii) The period
of a signal is 100 ms. what is its frequency in kilohertz?
13. The period of a signal is 100 ms. What is its frequency in kilohertz?
14. Consider the power of a signal is 10mW and the power of a noise is 1μW; Identify the values of
SNR and SNRdB. if it is a noiseless channel chat is theSNR and SNRDb
15. Consider the signal at the beginning of a cable with −0.3 dB/km has a power of 2 mW, what is the
power of the signal at 5 km?

Moduel-2

1. List and explain the data link layer services. Explain in details.
2. Construct network to demonstrate the data link layer services with nodes and links. Explain it in
detail.
3. Explain bit oriented framing and character oriented framing explain byte and bit staffing and un-
staffing with an example.
4. Identify ARP operations and demonstrate them with its packet format. Explain it in detail.
5. Explain the Stop and Wait protocol with FSM and flow diagram.
6. Explain the standard Ethernet Protocol with a neat frame format.
7. What are the sub layers of Data Link Layer? Explain the services provided by the data link Layer.
8. Write a note on standard Ethernet.
9. Differentiate the data rates for Standard Ethernet, Fast Ethernet, Gigabit Ethernet, and 10 Gigabit
Ethernet
10. Explain the process of byte stuffing and unstuffing and bit stuffing and unstuffing

Moduel-3

1. List and explain the network layer services.


2. Define CIDR. Explain it in detail.
3. Problems on classful and classless addressing.
4. Identify the range of IP Addresses for given IP address 20.10.30.35 / 27 and explain CIDR
notation?
5. Identify the subblocks for an organization by granting a block of addresses with the beginning
address 14.24.74.0/24. The organization needs to have 3 subblocks of addresses to use in its three
subnets: one subblock of 10 addresses, one subblock of 60 addresses, and one subblock of 120
addresses.
6. Consider a simple network and apply virtual-circuit packetswitching network and explain its
different phases.
7. Consider a simple network and apply datagram switching(connectionless) network and explain its
different phases.
8. Construct sequence diagram for DHCP operations by considering simple client server scenario and
also explain the DHCP operation.
9. Develop a link state routing algorithm and illustrate the working procedure of link state by
considering simple network.
10. Apply NAT technique and illustrate how ISP allocates IP address to the organization.
11. Consider simple network, explain virtual-circuit packet switched network and explain its different
phases.
12. Develop a distance routing algorithm and illustrate the working procedure for finding shortest path
by considering simple network.
13. With a neat diagram, explain the occupation of the address space with different classes of IP
addresses in classful addressing.
14. Analyze the following address and identify its type. Differentiate unicast, multicast and broadcast
addresses.
a) 5B:34:45:11:92:F9
b) A6:34:45:11:92:F8
c) FF:FF:FF:FF:FF:F8
d) 7G:34:11:54:63:57
e) 5D:3C:5D:32:C5:A6

15. Analyze the different classfull address types

a) 245.134.12.80
b) 200.34.22.11
c) 103.134.154.112
d) 25.249.136.9
a. 12.16.153.15
Module-4

1. List and explain the transport layer protocols.


2. Explain the transport layer services.

3. Compare the Transmission control protocol and User datagram protocols along with the services of
both.
4. With a neat diagram, explain the various fields in the TCP segment header.
5. With a neat diagram, explain the various fields in the UDP segment header.
6. Distinguish between the persistent and non-persistent HTTP with the neat diagrams.
7. Consider John wants to send some document through messenger application to Sham, apply Go-
Back-N protocol to facilitates the flow and error control in this data transmission with a neat
diagram? Explain it with all the possible cases.
8. Assume Ram wants to get some information from the google and he is trying to retrieve the data
using web browser. Make use of Domain Name System to explain the Interaction between the user
and the web.
9. With a neat diagram, illustrate the functioning of GoBack-N protocol.
10. Identify TCP services and feature of transport layer protocols.
11. Model basic FTP protocol for client and server data transfer system.
12. Explain the need of DNS with a neat diagram.
13. Differentiate persistent and non-persistent HTTP.
14. Explain DNS name space and DNS in the internet.
15. Explain the features of the following Application-Layer Paradigms
i. Client-Server Paradigm
ii. Peer-to-Peer Paradigm
Module-5

1. Define Cryptography. List and explain the various services and mechanisms.
2. Differentiate symmetric key and asymmetric key cryptography.
3. Identify the different types of attacks with an example of each.
4. Identify network security services and mechanisms used in X.800 to secure the data transmission.
5. With the neat diagram explain the Data Encryption Standard.
6. Assume Alice and Bob are performing secure data exchange, apply digital signature with all
essential elements to explain its usage for secure data transfer.
7. Problems on RSA.
[eg:Apply the RSA algorithm to demonstrate the encryption and decryption process. Consider the
plain text P=25 and use two prime numbers p=5 and q=13. Also identify the pair of public key and
private key.]
8. With a neat diagram, illustrate the AES Encryption algorithm
9. Write a note on SHA-1 algorithm.

You might also like