FON Question Bank

FON Question Bank 

Chapter-1

 

  1. Difference between TCP/IP and ISO/OSI Model.
  2. Define computer network. Discuss applications of computer network. (Dec-2011)
  3. Mentions uses of computer network. (May-2011)
  4. Define Unicasting and Multi casting.(May-2011)
  5. Compare connection oriented and connectionless service.

 

Chapter-2

 

  1. What is maximum data rate of noisy and noiseless channel?
  2. What is Attenuation, Chromatic dispersion, Noise, Distortion
  3. Discuss GSM Technology used in cellular phones
  4. List and explain service provided by IEEE 802.11 standard.
  5. What is bit rate and baud rate?
  6. Explain working of active repeater and passive repeater.
  7. Explain QPSK, QAM-16, QAM-64.
  8. What is wireless local loop?
  9. What is meant by attenuation with respect to signal? (May 2011)
  10. Explain fiber optic networks with diagram.(May-2011)
  11. Discuss effect of noise on parallel lines of twisted pair cable.(Dec-2011)

 

Chapter-3

 

  1. Why framing is required? Explain any one method with example.
  2. Explain Byte stuffing with example.(June-2010)
  3. Discuss in brief about window protocol.(Dec-2011)
  4. Explain Sliding window protocol using Go Back N and show how it deals with lost frame, duplicate frames and lost acknowledgement.(June-2010)
  5. Why selective repeat is better than Go back N protocol? Give the reasons.
  6. Compute the hamming code for bit pattern 1100001. (May-2011)
  7. What is advantage of piggybacking & pipelining? (May-2011)
  8. What is advantage of using NAK in data link layer protocol? (May-2011)
  9. Give two reasons why network might use an error correcting code instead of error detection and retransmission.
  10. Problems- 2, 3,5 (Book-Computer Network by Tanenbaum)
  11. Problem 9,10 (Book-Computer Network by Tanenbaum)
  12. Problem 14,15 (Book-Computer Network by Tanenbaum)

 

Chapter-4

 

  1. Explain CSMA protocol-OR- Explain Non persistent, 1-persistent and

P-persistent CSMA protocol. (May-2011, Dec-2011)

  1. What is CSMA/CD? Explain working of it.
  2. What is topology? Briefly explain any two topologies.(June-2010)
  3. Explain Manchester and Differential Manchester encoding. Encode binary data bit “1100010” and sketch waveform. (June-2010, May 2011)
  4. Explain Hidden node and exposed node problem in wireless network.( May-2011)
  5. Explain Binary exponential backoff algorithm.(May-2011)
  6. Explain working on MACA protocol. (May-2011)
  7. Explain MACAW –OR- Explain working of RTS and CTS in wireless LAN.(MAY-2011)
  8. What is Time domain reflectometry?
  9. Explain Carrier Extension and Frame bursting.
  10. Write a short note on Inter frame spacing of 802.11 MAC Layer.
  11. Explain modes of 802.11. (hint: PCF and DCF)
  12. State significance of NAV in CSMA/CA.
  13. Difference between “MF” and “more” field of 802.11 data frame.
  14. Explain different services of wireless LAN. –OR- Explain five distribution and four station services of wireless LAN
  15. Give specifications of various Ethernet Cabling. Discuss about fast Ethernet in brief.( Dec-2011)
  16. State the function of Repeater, Bridge, Hub , Switch, Router , Gateway.(Dec-2011)
  17. Problem 16,17,18 (Book-Computer Network by Tanenbaum)

 

Chapter-5

 

  1. What is stored and forward packet switching?
  2. What is difference between broadcasting and flooding?
  3. What is difference between routing and forwarding? (May-2011)
  4. Explain Count-to-infinity problem.
  5. What is Load Shedding? Explain wine and milk strategies(June-2010)
  6. Explain role of foreign agent and home agent in mobile routing.
  7. Explain how learning about neighbors and measurement of line cost takes place in link state routing.
  8. Explain the milk & wine policy for congestion control. (May-2011)
  9. State the significance of Age field in Link state packet.
  10. Explain hop by hop chock packet. Compare it with normal chock packet method.(May-2011)
  11. Explain Link state routing algorithm.(Dec-2011)
  12. Explain routing in mobile host with example.
  13. Explain congestion control in virtual circuit subnet.
  14. Explain working of Dijkstra’s shortest path algorithm with example. (May-2011)
  15. Briefly explain the concept and need for quality of service.(May-2011)

 

 

Chapter-6

 

  1. Explain three way handshakes during TCP connection establishment.(June-2010)
  2. What are the elements of Transport protocols?
  3. Explain Initial Connection protocol.
  4. What are the service primitives for TCP protocol with respect to transport layer? Explain each one.(May-2011)
  5. What are the two methods of releasing the connection? Explain four protocol scenarios for releasing the connection.
  6. What is two-way army problem?
  7. Explain blue army problem in connection release in transport layer. (May-2011)

 

Chapter-7

  1. What is importance of resource records? Explain each one.
  2. What is DNS system? What is DNS name space? Explain in detail.(Dec-2011)
  3. Why zone is required in Name server?
  4. Explain Five basic functions of Email Service.
  5. What are limitations of POP3? How does IMAP differ from POP3? (Dec-2011)
  6. Explain the terms : Name Server , Domain, Zone, authorative records. (Dec-2011)

 

Chapter-8

 

  1. What is Ciphertext, Cryptanalysis and Cryptology?
  2. State Kerchoff’s principle.
  3. Explain the key pair generation in RSA algorithm.(June-2010,Dec-2011)
  4. What is Asymmetric key cryptography. State the algorithm used. (June-2010)
  5. Explain Cipher Block chaining mode. (June-2010)
  6. What are symmetric key algorithms? List major disadvantages of them.
  7. Explain DES algorithm in detail. Give steps of encryption.(Dec-2011)
  8. In Triple DES why EDE is used instead of EEE?
  9. What is digital signature? What is message digest?
  10. Explain the working of monoalphabetic cipher with example.(May-2011)
  11. Explain working of transposition or columnar cipher.  (May-2011)
  12. Explain working and application of P-Box(May-2011)
  13. Explain working and application of Onetime pad(May-2011)
  14. What is public key algorithm?(Dec-2011)

 

 Answer the following in one or two sentences. (All Chapters)

 

  1. What is piggybacking? (June-2010)                (ch-3)
  2. What is major drawback of single bit parity check method for error detection? (May-2011)                       (ch-3)
  3. Define multicasting, unicasting and broadcasting(June-2011)           (ch-1)
  4. Define Frequency and wavelength (June-2011)                                 (ch-2,4)
  5. Give examples for which connection oriented service is best.           (ch-1)
  6. Differentiate between Simplex, Half duplex and Full duplex communication mode.(May 2011)    (ch-1)
  7. Data link protocol almost put CRC in a trailer rather than in a header. Why?    (ch-3)
  8. What is Baud rate and Bit rate for the standard 10 Mbps Ethernet?             (ch-4)
  9. What is the minimum frame size of Ethernet?                                                (ch-4)
  10. What is importance of CTS in wireless transmission?                                    (ch-4)
  11. What is meaning of 1 in 1-Persistent CSMA?(June-2010)                             (ch-4)
  12. What is soft and hard handoff? (June-2010)                                                  (ch-2)
  13. What is parity bit and how is it used?(June-2010)                                         (ch-3)
  14. What is Random Early Detection (RED), Jitter and warning bit?                 (ch-5)
  15. Explain the use of chock packet. (June-2010)                                                (ch-5)
  16. What do you understand by adaptive routing.(June-2010)                            (ch-5)
  17. Which protocol implements Distance Vector Routing Algorithm?                (ch-5)
  18. What is cryptography? (June-2010)                                                                (ch-8)
  19. What is onetime pad in cryptography?(June-2010)                                        (ch-8)
  20. Give name of  any two symmetric key cryptography algorithm                     (ch-8)
  21. What is meant by WAN, PAN?(May-2011)                                                  (ch-1)
  22. Encrypt “GUJARAT” using Caesar cipher. (June-2010)                               (ch-8)
  23. What is need of MIME?(May-2011)                                                              (ch-7)
  24. What is need for DNS in internet.(May-2011)                                               (ch-7)
  25. Mention use of computer network(Mya-2011)                                               (ch-1)
  26. What is security by obscurity?(May-2011)                                                     (ch-8)
  27. Differentiate forwarding and routing process. (May-2011)                           (ch-5)
  28. Difference between cipher and code.(May-2011)                                          (ch-8)

 

Compare and Contrast the following (All Chapters)

  1. OSI and TCP/IP reference model                                                       (ch-1)
  2. Hub and Switch (May-2011)                                                              (ch-4)
  3. Circuit Switching and Packet Switching. (May-2011)                       (ch-2)
  4. TCP and UDP (June-2010)                                                                 (ch-1)
  5. Broadcast, multicast, unicast                                                              (ch-1)
  6. Co-axial Cable and Twisted Pair Cable (UTP cable) (June-2010)      (ch-2)
  7. Satellite system and fiber optics(May-2011)                                      (ch-2)
  8. Error Control and Flow Control (June-2010)                                     (ch-3)
  9. IMAP and POP3 (June-2010)                                                                        (ch-7)
  10. Broadcast Network and Point-to-point network                                (ch-1)
  11. Radio wave and Microwave Transmission                                         (ch-2)
  12. Single mode and multimode fiber                                                      (ch-2)
  13. Datagram subnet and virtual circuit                                                    (ch-5)
  14. 802.11 and 802.16                                                                              (ch-4)
  15. LAN, MAN and WAN                                                                      (ch-1)
  16. Transposition and Substitution Cipher                                               (ch-8)
  17. Store and forward and cut-through switches                                     (ch-4)
  18. Symmetric and Asymmetric Cipher.(May-2011)                                (ch-8)

 

 

Short note (All chapters)

  1. Error correction & detection(Dec-2011)                                             (ch-3)
  2. CDMA                                                                                                (ch-4)
  3. CSMA/CA                                                                                          (ch-4)
  4. IEEE 802.3 (Ethernet)                                                                                    (ch-4)
  5. Twisted Pair Cable(UTP)(May-2011)                                     (ch-2)
  6. Fiber Optic (May-2011)                                                                      (ch-2)
  7. 802.16 Protocol Stack                                                                         (ch-4)
  8. 802.11 Protocol Stack                                                                         (ch-4)
  9. Cable Modems                                                                                    (ch-2)
  10. Gigabit Ethernet                                                                                 (ch-4)
  11. Transposition ciphers                                                                          (ch-8)
  12. Bluetooth architecture (Dec-2011)                                                     (ch-4)

Quantum Cryptography.

 

Share

Leave a Reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.