Assignment Questions Module 1: Networks Introduction 1. Discuss the properties of a network. Module 3 & 4: Packetized File Transfer and Layering 2. Discuss the key design issues for layering in a network 3. Explain how information exchange takes place between two layers with a neat diagram 4. What is connection oriented and connectionless services? 5. Explain six different types of services provided by both connectionless and connection-oriented services 6. Differentiate between services and protocols Module 5: Performance Metrics 7. Explain the two performance metrics of a network 8. Explain the significance of delay x bandwidth product Module 6: Basic Building Blocks 9. What are the two important properties of an electromagnetic wave? 10. What is modulation? 11. What are the two classes of hardware building blocks used to construct a network? Module 7: Modulation Encoding 12. Explain different encoding strategies 13. Explain the problems with NRZ encoding scheme caused by long strings of 1 s and 0 s. Page 1 of 8
Module 8: Physical Media 14. Explain two types of broadband networks. 15. Explain how an optical transmission system works. 16. Explain construction of fiber cables 17. Explain how different parts of electromagnetic spectrum are used for communication Module 9: Transmission 18. What are the characteristics of multiplexer? 19. Describe the characteristics of frequency division multiplexing. Module 10: DLL Framing 20. Discuss various key design issues present in data link layer 21. Explain the various services provided to the network layer by the data link layer 22. Explain character stuffing method of framing 23. What is bit stuffing? 24. Explain point to point frame format. Module 11: Error Detection 25. Explain the idea behind two-dimensional parity. 26. What are the basic rules for dividing polynomials? 27. Explain CRC algorithm with an example 28. List the characteristics of CRC. Module 12 & 13: Error Control 29. Illustrate with a neat diagram, scenarios of stop-and-wait algorithm 30. Write a note on unrestricted simplex protocol. 31. Discuss the performance of Stop and Wait ARQ. Page 2 of 8
Module 14: Sliding Window 32. Explain the working of sliding window algorithm 33. Explain Go-back-N protocol with a neat diagram. Module 15: Medium Access Sub layer 34. Discuss the efficiency of sliding window protocol? Module 16: Aloha Ethernet 35. Differentiate between static channel allocation and dynamic channel allocation. 36. Explain bus and tree topologies. 37. Describe the construction and working of ring and star topologies. 38. What are the two approaches of channel allocation? 39. What does channel allocation problem states? Module 17: Ethernet 40. Describe the characteristics of pure ALOHA protocol 41. Write a note on slotted ALOHA 42. Discuss the performance of ALOHA system 43. Explain different versions of carrier sense protocols Module 18: Content free protocols 44. Explain Ethernet frame format 45. What are the functions of Ethernet adaptor? 46. What is CSMA/CD? Explain the conceptual model of CSMA/CD Module 19: ATM 47. Discuss the performance of bit-map method. 48. Illustrate binary countdown protocol with a neat diagram 49. Write a note on limited contention protocols 50. Explain adaptive tree walk protocol with an example Page 3 of 8
Module 20: Token Bus 51. Why use fixed length cells? 52. List the properties of ATM Cells. 53. Explain ATM cell formats. 54. Describe the relationship between ATM and AAL. 55. Explain AAL 3/4 packet format and cell format. 56. Explain encapsulation and segmentation for the following 57. AAL 3/4 (ii) AAL 5 Module 21: Token Ring 58. Explain token bus ring organization 59. Explain 802.4 token bus frame format 60. Write a note on Token bus MAC sub layer protocol 61. Explain briefly the mechanisms used by the MAC sub layer protocol to allow stations to enter the ring and leave the ring. 62. Explain how problems caused due to transmission errors or hardware failures in the ring are handled. Module 22: Token Ring 63. What are the two operating modes of a ring interface? Explain with a neat diagram 64. Write a note on Wire Centers. 65. Explain 802.5 token ring frame format 66. Explain token ring operation. 67. Explain how token ring control frames are used to maintain token ring. Module 23: FDDI 68. With neat diagram explain FDDI frame format 69. Explain the topology of FDDI Ring. 70. Define FDDI ring? Explain the physical properties of FDDI ring Page 4 of 8
Module 24: FDDI Analysis 71. Briefly explain the features of FDDI. 72. Give the specification of FDDI 73. Explain different types of Traffic that FDDI supports 74. Formulate the time at which token reaches next node. 75. Explain the frame format of FDDI Module 25: Wireless LANs 76. Differentiate between Exposed nodes and Hidden nodes. 77. Explain Wireless transmission 78. What is WLAN? Explain its architecture 79. Explain Multiple Access Collision Avoidance 80. How an access point is scanned in WLAN Module 26: Bridges and Switches 81. What is packet switching? Mention two types of packet switching. 82. Compare between Virtual Circuit and Datagram s. 83. Explain datagram Packet switching with delay diagrams 84. Explain Virtual Circuit Packet switching. 85. With a neat diagram explain the structure of the switch 86. Illustrate SOURCE ROUTING with diagram. Module 27: Switches and Connectionless 87. What are the characteristics of a Connectionless network? 88. Explain the concept of learning bridges 89. Write a note on limitations of bridges 90. Explain Spanning tree algorithm Page 5 of 8
Module 28: Network Layer 91. Differentiate between Connection-Oriented and Connection-Less services 92. Explain how data transmits between nodes in a network with an example 93. Explain the header format of IPv4 94. With example, explain the issues of internetworking 95. What is Internetworking? And List the features of internetworking Module 29: Fragmentation 96. What is FAR? Explain with an example 97. Explain different classes of IPv4 98. What is IP address? Explain IP address format Module 30: Router Forwarding 99. What is host forwarding explain with algorithm 100. What kind of information stored in the routing table? 101. What is sub netting? Module 31: Congestion Control 102. Describe Congestion control vs. flow control 103. Mention the congestion causing policies 104. Explain Leaky bucket algorithm 105. Explain token bucket algorithm 106. Explain congestion control in Virtual circuit and datagram subnets Module 32: Routing Algorithms 107. What is routing? Explain the classification of routing 108. List the goals of routing 109. With an example explain Dijktra s algorithm 110. With an example explain Distance Vector Algorithm 111. What is count to Infinity Problem? Explain how this problem can be overcome Page 6 of 8
Module 33: Virtual private networks (VPNs) 112. With header formats explain ICMP. 113. Explain ARP and RARP 114. Write a note on DHCP. Module 34: Routing Algorithms 115. Mention the methods to overcome the drawback of flooding. 116. What is deflection routing? Explain with an example 117. Write a note on Reverse path Forwarding. Module 35: BGP 118. Explain two types of BGP 119. Explain Different BGP messages with its header formats 120. Explain CIDR. Module 36: Transport Layer 121. List the features of UDP. 122. Explain header format of UDP. 123. Explain the operations of TCP. 124. List the features of TCP. Module 37 & 38: TCP Congestion Management 125. Explain the procedure to terminate TCP connection. 126. Explain with neat diagram three way handshake connection establishments. 127. Explain TCP FSM. 128. Write the pictorial representation of TCP Transmission Policy and define Congestion control in TCP. 129. Briefly explain the TCP congestion control Algorithms. Page 7 of 8
Module 40: Application Layer Protocols 130. Briefly explain Firewall 131. Explain application layer firewall 132. What is DNS? Explain 133. Explain the DNS hierarchical structure 134. Briefly explain different types of DNS resource record Module 41: Network Management 135. What are the functions of network management? 136. What is an Agent? Explain. 137. Explain how SNMP access management information. 138. Explain different data types allowed in SMI. 139. With an example explain Management Information Base (MIB). Module 42: SMTP 140. What is SMTP? Explain the format of message. 141. Explain the flow of commands in SMTP. 142. Explain the commonly used commands in SMTP. 143. Define Multipurpose Internet Mail Extensions (MIME). List the features offered by MIME Module 43: Network Security 144. Explain RSA algorithm in detail 145. With block diagram explain DES algorithm 146. Explain public key cryptosystem 147. Explain Secret key cryptosystem 148. Differentiate PKC and SKC Page 8 of 8