0% found this document useful (0 votes)
7 views

Computer Networks Model 1

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Computer Networks Model 1

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Computer Networks

Model Question Paper 1


Each Questions carries 2 Marks

1. What is the necessity of a computer networks?


2. Write a note on Internet.3. Write the difference between UTP and STP.
4. What are services provided by data link layer?
5. Compute odd parity and even parity for the data 11010011.
6. What is static and dynamic routing.
7. Abbreviate ARP,UDP,SMTP,FTP.
8. Mention the advantages of TCP.
9. Define NBT.
10. Mention the types of switching.

Each Question carries 6 Marks..

11. Compare LAN, MAN and WAN.


12. Write a short note on IGMP.
13. What is coaxial cable? Write about various type of coaxial cable.
14. Explain the various error detection techniques.
15. Compare datagram and virtual circuit.
16. Differentiate link state and distance vector routing.PART-CIII. Answer any three questions.

Each question carries 8 marks.

17.
(a) Differentiate between centralized and decentralized network layout.
(b) Write a note on ICMP.
18.
(a) Write a note on unguided transmission media.
(b) Calculate the check sum for the set of numbers 7, 11, 12,0,6
19.
(a) Derive Shannon channel capacity for noisy channel.
(b) Calculate the odd parity bit for the following group of data bits
i. 10011001
ii. 00001111
iii.01010010
iv. 01101010
20.
(a) Explain different types multiple access protocol
(b) Explain distance vector routing algorithm with an example.
21.
(a) Describe each of the following
i. SYN-ACKSYN
ii. SYN
iii.ACK
(b) Explain the importance of QOS.
22.
(a) Explain the working of SMTP.
(b) Explain network application architecture.
1. What is the necessity of computer networks:
 Computer networks are essential for various reasons, including:
 Resource Sharing: Allows sharing of hardware, software, and data
resources among connected devices.
 Reliability: Enhances reliability through redundant paths, reducing
the risk of system failure.
 Communication: Facilitates efficient communication through email,
messaging, and collaborative tools.
 Remote Access: Enables remote access to data and applications,
fostering flexibility and mobility.
 Cost Efficiency: Allows cost-effective resource utilization, especially
for shared resources.
2. Write a note on the Internet:
 The Internet is a global network connecting millions of private, public,
academic, business, and government networks. Key features include:
 World Wide Web (WWW): A system of interconnected hypertext
documents and multimedia content.
 Email: Electronic mail communication.
 Social Media: Platforms for social interaction and content sharing.
 Search Engines: Tools for finding information.
 E-commerce: Online buying and selling of goods and services.
3. Write the difference between UTP and STP:
 UTP (Unshielded Twisted Pair):
 No shielding around the twisted pairs of copper wires.
 Less expensive and more flexible.
 Commonly used in Ethernet networks.
 STP (Shielded Twisted Pair):
 Each pair of wires is wrapped in a metallic foil for shielding.
 Offers better protection against electromagnetic interference (EMI).
 Typically used in environments with higher interference risks.
4. What are the services provided by the data link layer:
 The data link layer provides services such as:
 Encapsulation: Frames data for transmission over the physical layer.
 Addressing: Adds source and destination MAC addresses to frames.
 Error Detection and Correction: Ensures data integrity through error
checking.
 Flow Control: Manages the flow of data between sender and receiver.
 Access Control: Coordinates access to the physical medium.
5. Compute odd parity and even parity for the data 11010011:
 Odd Parity: The number of 1s, including the parity bit, is odd.
 Original Data: 11010011
 Odd Parity: 110100111 (appending a 1 to make it odd)
 Even Parity: The number of 1s, including the parity bit, is even.
 Original Data: 11010011
 Even Parity: 110100110 (appending a 0 to make it even)
6. What is static and dynamic routing:
 Static Routing: Routing configured manually by a network administrator. The
routing table is set and does not change automatically. Suitable for small
networks with a stable topology.
 Dynamic Routing: Routing determined dynamically by routers exchanging
information. Routing tables are updated automatically based on network
conditions. Suitable for large networks or those with changing topologies.
7. Abbreviate ARP, UDP, SMTP, FTP:
 ARP: Address Resolution Protocol
 UDP: User Datagram Protocol
 SMTP: Simple Mail Transfer Protocol
 FTP: File Transfer Protocol
8. Mention the advantages of TCP:
 Reliability: Ensures reliable and error-free data delivery.
 Connection-oriented: Establishes a connection before data transfer, ensuring
a reliable link.
 Flow Control: Manages data flow between sender and receiver to prevent
congestion.
 Error Detection and Correction: Detects and corrects errors in transmitted
data.
9. Define NBT:
 NBT: NetBIOS over TCP/IP. It is a protocol that allows NetBIOS
communication over a TCP/IP network. NetBIOS provides naming, session,
and datagram services used by applications for communication.
10. Mention the types of switching:
 Circuit Switching: Establishes a dedicated communication path between two
devices for the entire duration of the conversation.
 Packet Switching: Divides data into packets and sends them independently
to the destination. Common in modern networks like the Internet.

11. Compare LAN, MAN, and WAN:

 LAN (Local Area Network):


 Scope: Limited geographical area (e.g., within a building or campus).
 Ownership: Privately owned and managed by a single organization.
 Speed: High data transfer rates.
 Components: Connects computers, servers, and other devices.
 Examples: Ethernet, Wi-Fi.
 MAN (Metropolitan Area Network):
 Scope: Covers a larger geographical area (e.g., a city or metropolitan region).
 Ownership: May be owned by a single organization or shared by multiple
organizations.
 Speed: Moderate data transfer rates.
 Components: Connects multiple LANs within a city.
 Examples: Fiber optics, WiMAX.
 WAN (Wide Area Network):
 Scope: Spans a large geographical area (e.g., across countries or continents).
 Ownership: Often involves multiple organizations and service providers.
 Speed: Lower data transfer rates compared to LANs and MANs.
 Components: Connects multiple LANs and MANs over long distances.
 Examples: Internet, private leased lines.

12. Write a short note on IGMP:

 IGMP (Internet Group Management Protocol):


 Purpose: Used by hosts and adjacent routers to manage multicast group
memberships.
 Functionality: Allows hosts to join or leave multicast groups dynamically.
 Versions: IGMPv1, IGMPv2, and IGMPv3 (latest version).
 Role: Facilitates efficient routing of multicast traffic within a network.
 Operation: Hosts send IGMP reports to routers, indicating interest in specific
multicast groups.

13. What is coaxial cable? Write about various types of coaxial cable:

 Coaxial Cable:
 Description: Consists of a central conductor, insulating layer, metallic shield,
and outer insulating layer.
 Types:
 Thinnet (10BASE2): Used in older Ethernet networks, with a thinner
diameter.
 Thicknet (10BASE5): Used in older Ethernet networks, with a thicker
diameter.
 RG-6 and RG-59: Commonly used for cable television (CATV) and
broadband Internet.
 RG-11: Used for long-distance cable runs, providing lower signal loss.
14. Explain the various error detection techniques:

 Parity Bit: Adds a single bit to the data to make the total number of ones either even
(even parity) or odd (odd parity).
 Checksum: Involves adding a checksum value to the data, which is calculated based
on the content. Any change in the data can be detected by recalculating the
checksum.
 Cyclic Redundancy Check (CRC): Uses polynomial division to generate a remainder
(CRC code) that is appended to the data. Changes in the data can be detected by
recalculating the CRC.
 Hash Function: Generates a fixed-size hash value based on the data content. Any
change in the data results in a different hash value.

15. Compare datagram and virtual circuit:

 Datagram:
 Connection: Connectionless communication.
 Routing: Each packet is routed independently.
 Overhead: Lower overhead, as no connection setup is required.
 Example: Internet Protocol (IP).
 Virtual Circuit:
 Connection: Connection-oriented communication.
 Routing: Established connection guides the routing of all packets.
 Overhead: Higher overhead due to connection setup and maintenance.
 Example: Asynchronous Transfer Mode (ATM).

16. Differentiate link state and distance vector routing:

 Link State Routing:


 Information Exchange: Routers exchange information about the state of
their links.
 Routing Table: Each router constructs a detailed map of the network.
 Algorithm: Uses Dijkstra's algorithm to find the shortest path.
 Example: OSPF (Open Shortest Path First).
 Distance Vector Routing:
 Information Exchange: Routers periodically exchange their routing tables
with neighboring routers.
 Routing Table: Contains information about the distance (cost) and next-hop
to reach each destination.
 Algorithm: Uses the Bellman-Ford algorithm for path determination.
 Example: RIP (Routing Information Protocol).

17. (a) Differentiate between centralized and decentralized network layout:

 Centralized Network Layout:


 Characteristics:
 All network resources, data, and control are concentrated in a central
hub or server.
 Client devices depend on the central server for data processing and
control.
 Advantages:
 Centralized management simplifies administration and security
measures.
 Easier implementation of uniform policies and updates.
 Disadvantages:
 Single point of failure (the central server), leading to network
downtime.
 Scalability issues as the network grows.
 Decentralized Network Layout:
 Characteristics:
 Resources and control are distributed across multiple nodes in the
network.
 Each node can operate independently, with less reliance on a central
server.
 Advantages:
 Improved fault tolerance and reliability due to distributed resources.
 Scalability as additional nodes can be added without a central
bottleneck.
 Disadvantages:
 Complexity in management and coordination.
 Challenges in enforcing uniform policies and updates.

17. (b) Write a note on ICMP:

 ICMP (Internet Control Message Protocol):


 Purpose:
 Used by network devices to send error messages and operational
information about network conditions.
 Essential for diagnosing and troubleshooting network-related issues.
 Functions:
 Error Reporting: Notifies the source of any network issues, such as
unreachable destinations or time exceeded during packet
transmission.
 Ping: Echo Request and Echo Reply messages are used for network
connectivity testing.
 Message Types:
 Echo Request/Reply, Destination Unreachable, Time Exceeded,
Redirect, etc.
 Example:
 Ping uses ICMP Echo Request and Echo Reply messages to check
network connectivity.

18. (a) Write a note on unguided transmission media:


 Unguided Transmission Media:
 Definition:
 Also known as wireless or open-air transmission media.
 Types:
 Radio Waves: Used for wireless communication, including Wi-Fi and
Bluetooth.
 Microwaves: Higher frequency than radio waves, commonly used in
point-to-point communication.
 Infrared: Used for short-range communication, like remote controls.
 Satellite Communication: Utilizes signals transmitted to and from
satellites.
 Advantages:
 Flexibility in deployment, especially in areas where laying cables is
impractical.
 Well-suited for mobile communication.
 Disadvantages:
 Susceptible to interference from other devices and environmental
factors.
 Limited bandwidth compared to some guided media.

18. (b) Calculate the checksum for the set of numbers 7, 11, 12, 0, 6:

 Checksum Calculation:
 Sum of the numbers: 7 + 11 + 12 + 0 + 6 = 36
 Checksum: 256 - (Sum % 256) = 256 - (36 % 256) = 256 - 36 = 220

19. (a) Derive Shannon channel capacity for a noisy channel:

 Shannon Channel Capacity Formula:


 C = B * log2(1 + S/N)
 C: Channel capacity (bps)
 B: Bandwidth of the channel (Hz)
 S: Signal power
 N: Noise power

19. (b) Calculate the odd parity bit for the following group of data bits:

 i. 10011001:
 Odd parity bit calculation: 1 (bit count is odd)
 ii. 00001111:
 Odd parity bit calculation: 0 (bit count is even)
 iii. 01010010:
 Odd parity bit calculation: 1 (bit count is odd)
 iv. 01101010:
 Odd parity bit calculation: 0 (bit count is even)

20. (a) Explain different types of multiple access protocols:

 Multiple Access Protocols:


 Random Access: Devices contend for the channel, and collisions are resolved
through methods like CSMA/CD (used in Ethernet).
 Controlled Access: Devices follow a predetermined order to access the
channel, minimizing collisions (e.g., token passing in Token Ring).
 Channelization: Divides the channel into multiple time slots or frequency
bands, and devices take turns accessing them (e.g., TDMA and FDMA).

20. (b) Explain distance vector routing algorithm with an example:

 Distance Vector Routing:


 Operation:
 Each router maintains a table indicating the distance (cost) and next-
hop to reach each destination.
 Periodically exchanges routing tables with neighboring routers.
 Algorithm:
 Uses the Bellman-Ford algorithm.
 Example:
 Consider a network with routers A, B, C, and D.
 Initial routing tables may look like:
| Destination | Next Hop | Cost |

|-------------|----------|------|

|A |A |0 |

|B |B |∞ |

|C |C |∞ |

|D |D |∞ |

 Routers exchange tables, update their own, and continue until convergence.

21. (a) Describe each of the following:

 i. SYN-ACK-SYN:
 Part of the three-way handshake in TCP.
 SYN: Initiates a connection request.
 SYN-ACK: Indicates acknowledgment and agreement to establish a
connection.
 SYN: Acknowledges the acknowledgment, completing the connection setup.
 ii. SYN:
 TCP packet with the SYN (synchronize) flag set.
 Initiates the connection setup process.
 iii. ACK:
 TCP packet with the ACK (acknowledge) flag set.
 Acknowledges the receipt of data or confirms the establishment of a
connection.

21. (b) Explain the importance of QoS (Quality of Service):


 Importance of QoS:
 Bandwidth Management: Ensures proper allocation of bandwidth for
different applications and users.
 Prioritization: Allows critical applications to receive higher priority for
network resources.
 Packet Loss Prevention: Minimizes packet loss to maintain data integrity.
 Latency Control: Reduces delays in data transmission.
 Reliability: Ensures a reliable and consistent user experience.

22. (a) Explain the working of SMTP:

 SMTP (Simple Mail Transfer Protocol):


 Purpose:
 Used for sending and receiving emails.
 Operates over TCP.
 Working:
 Step 1: Connection Establishment
 The client (email sender) establishes a connection to the SMTP
server using a TCP handshake.
 Typical port: 25.
 Step 2: Greeting
 The client sends a "HELO" or "EHLO" command to identify
itself to the server.
 The server responds with a greeting, confirming the
connection.
 Step 3: Sender and Recipient Information
 The client provides the sender's email address and the
recipient's email address to the server using the "MAIL FROM"
and "RCPT TO" commands.
 Step 4: Message Body
 The client sends the email message, including the subject,
body, and any attachments.
 The server acknowledges each part of the message.
 Step 5: Closing the Connection
 The client indicates the end of the email message using the
"QUIT" command.
 The server acknowledges the closure, and the connection is
terminated.

22. (b) Explain network application architecture:

 Network Application Architecture:


 Definition:
 The design and structure of software applications that use network
communication to achieve specific functionalities.
 Components:
 Client: Initiates requests and interacts with the user. Examples
include web browsers, email clients, etc.
 Server: Listens for requests from clients, processes them, and sends
back responses. Examples include web servers, email servers, etc.
 Middleware: Software that facilitates communication and data
exchange between clients and servers. Examples include databases,
application servers, etc.
 Client-Server Model:
 Client-Side: Responsible for user interface and user interaction.
 Server-Side: Handles application logic, data processing, and storage.
 Communication: Clients send requests to servers, and servers
respond with the requested data or perform requested actions.
 Peer-to-Peer Model:
 No Distinction: All devices in the network can act as both clients and
servers.
 Decentralized: No centralized server; devices communicate directly
with each other.
 Three-Tier Architecture:
 Presentation Tier: User interface and interaction.
 Application (Logic) Tier: Business logic and processing.
 Data (Storage) Tier: Database and data storage.
 Web-Based Architecture:
 Client-Side Scripting: Code executed on the user's browser.
 Server-Side Scripting: Code executed on the web server.
 Communication: Through HTTP/HTTPS protocols.

You might also like