0% found this document useful (0 votes)
9 views3 pages

CSC 824 Practices Questions

The document outlines various topics in advanced computer communications and networks, including channel capacity, switching methods, multiple access protocols, error detection, and network architecture. It also covers cybersecurity challenges, the transition to IPv6, and the architecture of 4G LTE networks. Each section includes practice questions aimed at deepening understanding of the concepts and their applications.

Uploaded by

adminhubs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views3 pages

CSC 824 Practices Questions

The document outlines various topics in advanced computer communications and networks, including channel capacity, switching methods, multiple access protocols, error detection, and network architecture. It also covers cybersecurity challenges, the transition to IPv6, and the architecture of 4G LTE networks. Each section includes practice questions aimed at deepening understanding of the concepts and their applications.

Uploaded by

adminhubs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CSC 824: Advanced Computer Communications a

nd Networks – practice and discussion Questions


Channel and Information Theory

1. Explain Shannon’s channel capacity theorem for an analog communication channel


with AWGN, and derive the capacity formula.
2. Define the entropy of a discrete random source and explain its significance in information t
heory.

Switching, Multiplexing, and Resource Sharing

3. Compare circuit switching and packet switching. What are their main characteristics,
advantages, and disadvantages?
4. Describe frequency-division, time-division, and statistical multiplexing. Give example
s of each.
5. Explain the differences between virtual circuit and datagram packet-switching networks. Li
st the advantages and disadvantages of each approach.

Multiple Access Protocols

6. Compare Pure ALOHA and Slotted ALOHA. How do their throughput efficiencies di
ffer?
7. What is pure ALOHA and slotted ALOHA? Consider the delay at both low loads. Which
one is less? Explain your answer.
8. Describe persistent and non-persistent CSMA, and explain how CSMA/CD works.
9. Explain in detail the CSMA Protocol and the CSMA /CD protocols, and how they detect c
ollisions.
10. Explain the token-passing medium access method and compare it with CSMA approaches.

Error Detection and Correction

12. What is a Hamming code, and how does it detect and correct errors?
13. Explain the principle of Cyclic Redundancy Check (CRC) and how it is used for err
or detection.

Reliable Transmission and Flow Control

14. Compare Stop-and-Wait, Go-Back-NNN, and Selective Repeat ARQ protocols. Wha
t are the benefits of each?
15. What is sliding-window flow control? How does selective retransmission interact with flo
w control?
Network Architecture and Models

16. Describe the OSI 7-layer model and its purpose. How does it compare to the Internet
(TCP/IP) model?
17. Differentiate between a network service and a network protocol.
18. What is the TCP/IP Model? Explain the functions, protocols, and services of each layer.
Compare with the OSI Layer Model.
19. Briefly introduce queueing theory as applied to network nodes. What does an M/M/1 que
ue represent, and what is its utilization factor?

Physical Media and LAN

20. List the main categories of physical transmission media and give examples of each.
21. What is a network bridge (or switch) in a LAN, and how does bridging differ from r
outing?

WAN and Routing

22. Describe common WAN technologies and point-to-point link protocols.


23. Compare distance-vector and link-state routing algorithms. What are their key features?

Naming, Addressing, and Routing

24. Explain the role and structure of the Domain Name System (DNS). How does name resol
ution work?
25. Describe IPv4 addressing and how IP forwarding works. What is the significance of a 32-
bit address space?
26. What is ARP (Address Resolution Protocol), and how is it used in IPv4 networks?

Transport and Application Layers

27. Contrast TCP and UDP in terms of reliability, connection orientation, and use cases.
28. What are transport-layer port numbers, and how does TCP implement congestion control?
29. Give examples of key application-layer protocols and their typical uses.

Internet Architecture

30. What is meant by “internetworking” (the Internet)? Describe IP’s datagram forwarding m
odel.

Cybersecurity and Modern Networks

31. Discuss common types of cybercrime and basic cybersecurity solutions or framewor
ks.
32. Recognise, assess and counter the cybersecurity threats faced by today’s enteprise networ
ks
33. Case Study: A global financial firm plans to deploy an SD-WAN overlay and migrate cri
tical applications to a multi-cloud environment. As CISO, you must ensure network agility do
es not compromise security.
a. Identify five security requirements unique to SD-WAN in a cloud-centric architecture.
b. Propose a defense-in-depth design integrating SD-WAN, cloud security controls (e.g., C
ASB, ZTNA), and traditional firewalls.
34. a. Define Confidentiality, Integrity, and Availability in your own words.
b. For each pillar, describe two technical controls that enforce it (e.g., encryption, hash-base
d checks, RAID).
c. Provide a real-world scenario in which a failure of exactly one pillar (choose any) leads to
a significant security incident.

IPv6

35. What are the main features and improvements of IPv6 compared to IPv4?
36. What is IPv6? Explain its advantages over IPv4. Also, explain its frame format.

4G LTE

37. Outline the architecture of 4G LTE (4GPP) networks and their key components.
38. Explain the radio access modulation in LTE. What are OFDMA and SC-FDMA, and why
are they used?
39. Describe the main security features built into the 4G LTE architecture (e.g., mutual authe
ntication via AKA, confidentiality/integrity of air-interface).
40a. Explain how an attacker might exploit a rogue base station (“IMSI catcher”) and how L
TE’s security mitigates—but does not entirely prevent—such attacks.
40b. Propose additional measures (network- or device-side) to strengthen LTE security again
st IMSI catchers.

You might also like