0% found this document useful (0 votes)
4 views

CIA 2 - Computer Networks - QB

Vhv

Uploaded by

Rengeshwar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

CIA 2 - Computer Networks - QB

Vhv

Uploaded by

Rengeshwar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Question Bank

CONTINUOUS INTERNAL ASSESSMENT – II

22CS501 – COMPUTER NETWORKS

PART A

1. Compare IP4 and IP6 and Expand the address 0:15::1:12:1213 to its original.

2. Compute the size of the window for host A if the value of rwnd is 3000 bytes and the value of
cwnd is 3500 bytes?
3. List out the drawbacks of User Datagram Protocols (UDP) and compare with Transmission
Control protocol (TCP)
4. Illustrate the Datagram of Transmission Control protocol (TCP)
5. Mention the features and types of VoIP
6. The TCP server sends the SYN +ACK segments to the fake clients, which are lost. Interpret
the attack and methods to overcome.
7. Define back pressure and choke point in congestion mechanism
8. Interpret the ways of checking network reachability.
9. Compare the retransmission policy with the Admission policy in TCP congestions
10. Draw the frame format of IEEE802.3

11. Infer the term NAT in network layer.

12. Differentiate CSMA/CD and CSMA/CA.

13. Define sub-netting in network layer and list its various classes.

14. Sketch the header format of UDP.

15. Classify the three types of WWW documents.

16. Compare open loop congestion control and closed loop congestion control.

17. List out the types of firewalls.

18. Brief on HDLC protocol.

Page 1 of 3
PART-B

i Explain the function of Bluetooth (IEEE 802.15.1) with required datagram and illustrations

Alternatively asked as

Assume you are working in a software company where you have been allotted with Team ‘A’ and
Team ‘A’ consist of 26 members including Project manager and Team members. Among the 26
members your position is 14. Let’s consider you have to form a team of three members and
complete the new task. You have the option to select the team members as prime numbers from
your position. You need to exchange the task between the team members in radio telegraphy
whose operating frequency is between 2.40 GHz – 2.48 GHz with a guard band of 2 MHz which is
limited to a short range communication. Construct the mechanism for this radio telegraphy with a
required architecture.

ii Illustrate that Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that
automatically provides an Internet Protocol (IP) host with its IP address and other related
configuration information
i

For the above network, using distance vector routing, generate the following routing tables:

a: initial routing table of all the nodes


b: Node A shares to Node C. Updated table of Node C
c: Node C shares to Node A. Updated table of Node A
d: Node C shares to Node B. Updated table of Node B
ii Express the datagram, encapsulation, error and query messages handling by Internet Control
Message Protocol (ICMP) and mention its drawback

Page 2 of 3
i Examine that Simple Network Management Protocol (SNMP) is an application-layer protocol for
monitoring and managing network devices on our campus local area network (LAN).
ii Explain the following concepts with the required illustration and examples
a) Firewall
b) DoDS attack
i Justify that Quality of service (QoS) is the use of mechanisms or technologies that work on a
network to control traffic and supports the performance of critical applications with limited network
capacity
ii Justify the significance of the following methods in application layer of OSI model
a) FTP (File Transfer Protocol)
b) WWW and HTTPs

Using Bellman-Ford algorithm identify the shortest paths from Source node ‘A’ to the destination
node ‘G’ with their respective routing tables.

Intricate the use of mechanisms or technologies that work on a network to control traffic and ensure
the performance of critical applications with limited network capacity.
Illustrate the three-way process of synchronization, synchronization and acknowledgement and
acknowledgement in detail where the message exchanged between client and server for
connection establishment in TCP.
Justify and elaborate with its working why a DNS system is required instead of directly using IP
addresses.

Page 3 of 3

You might also like