Home / Computer Networks / Computer Network Questions

Computer Network Questions

Define computer network. Briefly explain the criteria of network.

What is peer to peer process? Explain different levels of addresses used in internet.

Describe byte stuffing and unstuffing. When do we need ESC character and why?

Explain the function of the “Jam” signal on an Ethernet network. What is the minimum frame size for CSMA/CD protocol and why?

Describe control field format for different types of HDLC frame.

Explain the terms vulnerable time and contention window. Prove that a receiving station can get the data sent by a specific sender if it multiplies the entire data on the channel by the sender chip code and then divided it by the number of stations.

What is sliding window. Explain the reason for moving from the Stop-and-Wait ARQ protocol to the Go-Back-N ARQ protocol.

Explain the flow diagram of Selective Repeat ARQ in the case that the forward channel is not reliable, one of the data frame is lost and some of the ACKs are delayed but reliable.

An Ethernet MAC sub layer receives 1540 bytes of data from upper layer. Can the data be encapsulated in one frame? If not how many frames are needed to send? What is the size of the data in each frame?

What kinds of problem can arise when two hosts on the same Ethernet share the same hardware address? Describe what happened and why this behavior is a problem?

Define cellular telephony. Describe frequency-reuse principle of cellular network.

Briefly describe the categories of Standard Ethernet.,

Can we use mono alphabetic substitution if our symbols are just 0 and 1? Is it a good idea?

Explain the TCP connection establishment procedure.

Explain the services provided by the network security.

What is digital signature? Explain the necessity of digital signature.

Define the term computer network. Explain the categories’ of network.

Show that the size of the sender and receiver window must be at most one half of 2m in selective repeat ARQ.

What is Walsh table? Create a Walsh table for Ws.

Explain whether or not ACKs of NAKs need to be numbered in stop and wait ARQ system.

Prove that a receiving station can get the data sent by a specific sender if it multiplies the entire data on the chandelle by the sender chip code and then divided it by the number of stations.

Describe the procedure for pure ALOHA protocol.

Briefly explain the mechanism of encoding and decoding of 100 base-TX.

What are the advantages of dividing an Ethernet LAN with a bridge?

Explain the term backbone and describe two examples where such a technique may be used.

What is a transparent bridge? What is loop problem in transparent bridge? How can we avoid this problem? Explain.

Briefly describe Select and Poll functions in polling access method.

Draw the transition phase diagram of PPP.

Explain three types of keys used in cryptography.

Can you used mono alphabetic substitution if your symbols are just 0 and 1? Is it a good idea? Justify your answer.

Explain the services provided by cryptography.

What is digital signature? Explain the necessity of digital signature.

A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle?

What is NAT? How can NAT help in address depletion?

Point out the reasons of fragmentation.

What is CDMA? How does CDMA encode and decode data? Show with an example.

Explain the function of the three flags in the IPv4 header.

How do you map logical address to physical address? Describe it briefly.

Is the size of the ARP packet is fixed? Explain.

Briefly explain Bootstrap protocol with necessary diagram.

Explain the TCP connection establishment procedure.

What is socket? Explain the basic features of a socket.

How does the hop count limit alleviate RIP’s problems?

Define the term forwarding. Briefly discuss different types of forwarding methods.

How many network can a router consent? Explain

Define the term hard width, throughput, bit rate and baud rate in terms of data transmission.

How does logical and physical address perform to transfer data from one node to another node where these two nodes are in different network? Describe with appropriate diagram.

Design two simple algorithms for bit-stuffing. The first adds bits at the sender, the second removes bits ate the receiver.

Why is it called the CHAP authentication protocols is better than PAP for PPP? Clarify.

Discuss a scheme for migrating the current Internet from IPv4 to IPv6. What basic idea used?

Explain the mechanism of stop-and-wait ARQ. Justify which ARQ can be used to improve upon stop-and-wait ARQ?  How?

What are the advantages of bridge over hub? How does a transparent bridge automatically build a bridge table?

What are the reasons for having an upper as well as a lower bound on packet size in networks using shared media?

Why is CAMA/CA appropriate for WLAN? Show the flow diagram for CSMA/CA.

Distinguish between vulnerable time and collision window.

Write summery on CHANNELIZATION multi-access protocol.

Draw the MLT-3, Manchester signals for the bit stream 110001111111.

Compare between 100Base TX, 100Base-FX Ethernet standard?

Discuss the issues associated with fragmentation. Include consideration of where fragmentation and reassembly may occur and the effects upon both network and user.

Explain why it is necessary to recalculate the checksum at each router.

What kinds of problems can arise when two hosts on the same Ethernet share the same hardware address? Describe what happens and why that behavior is a problem.

An IPv4 packet has arrived with the first 8 bits as shown:
01000010. Do the receivers discard the packet? Why?

What is (i) Bandwidth (ii) Throughpur? How are the two different?

How do logical and physical addresses perform to transfer data from one node to another node where these two nodes are different network? Describe with appropriate diagram.

What are the merits of CHAP over PAP? Illustrate the encapsulation steps of CHAP packets in a PPP frame.

Once the layer 2 component of your network driver software receivers a frame, how does it know what to do with it?

Discuss a scheme for migration the current Internet from IPv4 to IPv6. What basic idea was used.

Compare IP address assignment with BOOATP and DHCP. Why is DHCP a better option?

Explain the features of ICMP protocol.

What are the reasons for having an upper as well as a lower bound on packet size in networks using shared media?

Why Ethernet chooses CSMA/CD as its protocol instead of other. Please list its advantages and compare it with slotted ALOHA, pure ALOHA and CSMA.

Distinguish betweenvulnerable time and collision window.

Please compare CSMA/CA with CSMA/CD. Why IEEE 802.11 uses CSMA/CA instead of CSMA/CD?

Draw the MLT-3, Manchester signals for the bitstream 0110010111.

What are the common Gigabit Ehernet implementations/

Discuss the issues associated with fragmentation. Include consideration of where fragmentation and reassembly may occur and the effects upon both network and user.

Explain why it is necessary to recalculate the checksum at each router.

What kinds of probvvlems can arise when two hosts on the same Ehernet share the same hardware address? Describe what happens and why that behavior is a problem.

Explain the function of the three flags in the IPv4 header.

An organization is granted the block 16.0.0.0/8. The administrator wants to create 500 subnets.

Find the subnet mask, Find the number of addresses in each subnet, Find the first and last addresses in subnet 1 mask, and how many usable host addresses will there be per subnet?

Explain the term backbone and describe two examples where such a technique may be used.

Describe the strategies of VLAN and its membership methods.

Explain how bridging loops occur. What might be the solution of it?

What is NAT? How can NAT help  in address deplection?

Explain the terms:

MIME

HTTP
SMTP

DNS

IIMAP & POP3

Explain how TCP flow control works.

Define the term Logical topology and Physical topology.

Make a suitable sketch showing both the TCP/IP stack and the OSI Reference Model Compare the differences between their two approaches to networking.

Briefly describe how DNS, DHCP and SMTP work.

For n devices in network, what is the number of caple links required for a mesh and ring topology?

Compare and contrast HDLC with PPP. Which one is byte-oriented which is bit-oriented?

Show that in Go-Back-N ARQ the size of the sent window must be less that 2m. where m is the size of the sequence number field in bits.

Why does CHAP perform better than PAP in terms of PPP?

Explain whether or not ACKs and NAKs need to be numbered in a stop-And-wait  ARQ system.

Explain two key advantages of CSMA/CD compared with CSMA which result in improved performance.

Distinguish between vulnerable time and collision window.

Do we need channelizing protocol when we use CATV channel? Why?

Siscuss the issues associated with fragmentation. Include consideration of where fragmentation and reassembly may occur and the effects upon both network and user.

Explain why it is necessary to recalculate the checksum at each router.

What kinds of problems can arise when two hosts on the same Ethernet share the same hardware address? Describe what happens and why that behavior is a problem.

An IPv4 packet has arrived with the first 8 bits as shown:
01000010. Do the receivers discard the packet? Why?

An organization is granted the block 130.56.0.0/16. The administrator wants to create 1024 subnets.

Find the subnet mask
Find the number of adderesses in each subnet
Find the first and last addresses in subnet 1.

Explain the trem backbone and describe two examples wehre such a technique may be used.

Describe the advantages of combining switches with hubs and routers.

Describe with figure the address format of IPv6. Which technique is use during the transition from IPv4 to IPv6. or vice versa?

State the reason why classless inter-domain routing (CIDR) was introduced.

Explain the differences between a PSTN and ISDN.

Explain the terms:
Firewell
Packet filtering

Compare TCP with UDP and explain.
why a user program cannot directly access IP; and hence
why UDP is necessary.

Explain the TCP connection establishment procedures.

Suppose a computer sends a packet at the network layer to another computer somewhere in the Internet. The logical destination address to the packet is corrupted. What happens to the packet? How can the source computer be informed of the situation?

What are some of the factors that determine whether a communication system is a LAN or WAN?

Give the names of the layers of the ISO reference model and the names of the corresponding layers in the TCP/OP protocol stack. By considering the ISO model, describe the functions of all the layers.

For n devices in a network, what is the number of cable links required for a mesh, ring, bus, and star topology?

Why bit-stuffing is used? Bit-stuff the following data:
0001111111011111001110011111001110111111111

What is ATM? Name the ATM layers and their functions.

How do logical and physical addresses perform to transfer data from one node to another node where these two nodes are in different network? Describe with appropriate diagram.

Argue on the necessity of fragmentation for IP packet?

What is VLAN? How does a VLAN save a company time and money?

What are the advantages of switch? How does a transparent switch automatically build a bridge table?

Describe the exposed station problem in WLAN.

Explain how ADSL is able to transmit both data and telephone calls over the same twisted pair cable which connects a house to a local exchange.

Why Manchester encoding scheme cannot be used   in First Ethernet? Which strategy does it follow for 100Base-TX?

What are the merits of CHAP over PAP? Illustrate the encapsulation steps of CHAP packets in a PPP frame.

Why is there no need for CSMA/CD on a full-duplex Ethernet LAN?

Explain the purpose and operation of the Address Resolution Protocol. Include reference to ARP caches in your explanation.

What are the roles of repeaters, switch, router, and gateways in achieving internetworking? Identify the OSI layers in which they  operate.

Explain why collision is an issue in a random access protocol but not in controlled access or channelizing protocols.

Differentiate between 1-persisitend and p-persisted CSMA.

What functions do TCP perform? Explain the steps in the TCP three-way handshake.

Why do HTTP, FTP, SMTP, and POP3 run of top of TCP rather that on UDP?

Suppose Alice, with a Web-based e-mail account, sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alice’s host to Bob’s host. Be sure to list the bseries of application-layer protocols that are used to move the message between the two hosts.

What are the advantages of proxy server? How does proxy server make sure that clients get  up to date contents.

For n devices in a network, what is the number of cable links required for a mesh, ring, bus and star topaciosy?

Explain the terms ‘peer-to-peer communication’ and ‘encapsulation’; What advantage do these concepts offer designers of open systems?

For each of the services shown below, state whether a simplex, half-duplex or full-duplex form of  communication is most suitable. Give reasons for your choices.
Traditional terrestrial TV
Cable TV
Pay-Tv
File transfers
PC banking
PC banking
Telephone call

Explain whether or no ACKs or NAKs to be numbered in stop and wait ARQ system.

Show that in selective repeat ARQ the size of the sender and receiver window must be at most one half of 2m.

Explain how the p-persistence algorithm used with CSMA/CD network, attempts to improve bas efficiency compared with 1-persistence and non-persistence algorithms.

What is Walsh table? Create a Walsh table for W8.

What is CDMA? How does CDMA encode and decode data? Show with an example.

If an Ethernet destination address is 05:01:12:03:04:05. What is the type of this address?

Why there is no need for CSMA/CD on full-duplex Ethernet LAN?

What do you mean when we say that a bridge can filter traffic? Why filtering is important?

Define transparent bridge. Explain how transparent bridge can create a loop. How can you avoid loop in transparent bridge? Explain.

What is the difference between a port address, a logical address, and physion address.

How do logical and physical addresses perform to transter data from one to another node where these two nodes are in different network? Describe with appropriate diagram.

Why Manchester encoding scheme cannot be used in First Ethernet? Which strategy does it follow for 100Base-TX?

Compare and contrast HDLC with PPP framing concept.

Describe the difference between p-persistent CSMA and no persisted CSMA.

Show that in Go-Back-N ARQ, the size of the send window must be less than2m. where m is thte size of the sequence number field in bits.

Explain the reason for moving from the stop-and-wait ARQ Protocol to the Go-Back-N ARQ Protocol.

Why is there no need for CSMA/CD on a full duplex Ethernet LAN.

Define piggybacking and its usefulness.

What are the merits of CHAP over PAP? Illustrate the encapsulation steps of CHAP packets in PPP frame.

What are some of the reasons that could drive the decision to use a switch rather than a shared media hub?

What are the characteristics of 100base-TX Ethernet?

What is CDMA? How CDMA encode and decode data? Show with a example.

Draw the MLT-3, Manchester signals for the bit stream 10001101111.

You have five computers connected by an Ehernet switch at home. Is this a LAN, a MAN, or a WAN? Explain your season.

Assume we have created a packet-switechd internet. Using the TCP/IP protocol suite, we need to transfer a huge life. What are the advantage and disadvantage of scending large packets?

Give the names of the layers of the OST model and the names of the corresponding layers in the TCP/IP protocol stack. By considering the ISO model, mention the functions perfomed by a protocol operating all of the layers.

A host was given the 192.168.3.219/27 IP address. Find the number of addresses in the block, the first address, the last address, and the total number of hosts available in the network.

Explain the purpose and operation Address Resolution Protocol. Include reference to ARP caches in your explanation.

What are the advantages of switch over hub? How does a transport switch automatically build a bridge table?

Indicate the reasons why CSMA/CD cannot be implemented by Wireless LANs.

Explain the purpose of the length/type, Data and CRC fields of the Eherned frame.

What is a network? What are the  critceria of a stable network?

What are the difference between a pot address,a logical address and a physical address?

Explain two important concept in the protocol layering: encapsulation and decapsulation multiplexing and demultiplexing.

What are the advantages of a multipoint connection over a point-to-point connection?

Write short note on: LAN, WAN, The Internet.

For n devices in a network what is the number of cable links required for a mesh and ring topology.

What are the ser vices provided by PPP?

Why flags are needed when we use variable sized fames. Bit-stuff the following data:
0001111110111110011110011111001

 

Why there is no need for CRC in the Simple Protocol.

In random access protocol why Backoff time  TB is used?

A network using CSMA/CD has a bandwidth of 1Mbps. If the maximum propagation time is 25.6 us, what is the minimum size of the frame?

Describe the authentication protocol of PPP?

Discuss the principle of stop and wait flow control algorithm. Draw titme line diagrams and explain how loss of a frame and loss of an ACK arehandled.

In HDLC protocol, what are the three types of frame used? Discuss the fields and their uses.

Stations in a pure a Alohn network send frames of size 1000 bits at the rate of 1Mbps. What is the vulnerable time for this network.

There is no acknowledgment mechanism in CSMA/CD, but we need this mechanism in CSMA/CA. Explain the reason.

List some stratediges in CSMA/CA that are  used to avoid collision.

In polling access method, how are Select and poll functions used for communication?

What is the main advantage of Slotted ALOHA over Pure ALOHA?