14CS2007 Computer Networks B.Tech Question Bank : karunya.edu
Name of the College : Karunya Institute of Technology & Sciences
University : Karunya University
Degree : B.Tech
Department : Information Technology
Subject Name : Computer Networks
Document Type : Question Bank
Website : karunya.edu
Download :https://www.pdfquestion.in/uploads/ka…20Networks.pdf
Karunya Computer Networks Question Paper
Part-A
1. Differentiate between internet and intranet.
2. What are the two types of spread spectrum?
Related : Karunya University 14CS2008 Cryptography & Network Security B.Tech Question Bank : www.pdfquestion.in/2882.html
3. Define hamming distance.
4. What are carrier sense protocols?
5. What are the two types of routing algorithms?
6. What is spanning tree?
7. Expand the term TPDU.
8. Packing the parameters is called ———————–.
9. What are the two parts of message inside the envelope?
10. The traditional way to handle forms and other interactive web pages is a system called ————
11. OSI stands for ____________reference model.
12. __________, __________and ________are called guided transmission media.
13. A data in the Datalink Layer can be called as ___________.
14. ____________ is multiple access protocol.
15. IP Version __________is 32 bits long.
16. RIP is _________routing.
17. ___________is a connection-oriented protocol.
18. Combination of IP Address and port address is called _________address.
19. _________is a method called mapping name with IP Address.
20. ____________is a protocol.
21 Why OSI is named so?
22. Give the formula to calculate attenuation in decibels.
23. What are the two types of flow control used in data link layer?
24. What is multicast?
25. What are routing algorithms?
26. Define congestion.
27. What is transport entity?
28. Mention any two timers used in TCP.
29. ——————— refers to the process of creating messages and answers.
30. Expand XML and XSL
Part – B
31 What is a Client Program?
32. Consider sending a packet from a sending host to a receiving host over a fixed route. List the delay components in the end-to-end delay. Which of these delays are constant and which are variable?
33. What is the difference between network architecture and application architecture?
34. What is the difference between persistent HTTP with pipelining and persistent HTTP without pipelining?
35. Consider a TCP Connection between Host A and Host B. Suppose that the TCP Segments traveling from Host A and Host B have source port number ‘x’ and destination port number ‘y’. What are the source and destination port numbers for the segments traveling from Host B to Host A?
36. State True or False : The Size of the TCP RcvWindow never changes throughout the duration of the connection.
37. What is the difference between forwarding and routing?
38. What is the 32-bit binary equivalent of the IP Address 223.1.3.27?
39. Expand MAC and CDMA.
40. Define “Managing Entity”.
41. Define Protocol.
42. Within an Internet Service Provider’s network, the points at which they connect to other Internet Service Providers are known as ___________.
43. What is a socket?
44. Name the protocols involved in a web based Email application like Gmail, Hotmail etc.
45. The port numbers ranging from 0 to 1023 are called as ___________.
46. What is flow control?
47. Expand :
a. NAT
b. CIDR
48. List down the fields present in IPv4 header but not in IPv6 header.
49. Define managing entity.
50. What is the maximum size of an Ethernet data frame?
51 List the functions of session layer.
52. State the use of start and stop bits in serial communication.
53. Error detection at the data link layer is achieved by __________.
54. Go-back-N method requires more storage at the receiving site. Justify.
55. What is meant by tunneling?
56. Define congestion.
57. What is meant by sliding window syndrome?
58. List the primitives of transport service.
59. How do you make an image clickable in HTML?
60. List the DNS record types.
61 How many characters per sec (7 bits + 1 parity) can be transmitted over a 2400 bps line if the transfer is synchronous (1 start and 1 stop) bit.
62. State the functions of the transport layer.
63. What is the Hamming distance between 001111 and 010011?
64. In the carrier sense network if the prevailing condition is a ‘Channel busy’, then the technique can be used in non-persistent networks and then it results in randomized wait and sense. Justify.
65. Define packet flooding.
66. Is fragmentation needed in concatenated virtual-circuit internets or only in datagram systems?
67. End-to-end connectivity is provided from host-to-host at the transport layer. Justify.
68. What is meant by marshalling?
69. DNS uses UDP or TCP. Justify.
70. When Web pages are sent out, they are prefixed by MIME headers. Why?
Part – C
71 List out the different media used for data transmission over the network.
72. Define Packet.
73. What are the common architectures used for network applications?
74. What the IP address specify.
75. What is meant by UDP?
76. Define Receive window.
77. What are the important functions of network layer?
78. What is HOL Blocking?
79. What is adapter?
80. Give the Ethernet frame structure.
81. What are the two most important protocols in the internet?
82. Define TCP.
83. API stands for ________.
84. What is the use of IP address?
85. Define Demultiplexing.
86. The port numbers ranging from 0 to 1023 are called ________.
87. What is subnet?
88. CIDR stands for ________.
89. What do you mean by error detection?
90. Define full – duplex.
91. Define protocol.
92. What are the two fundamental approaches to build a network core?
93. _________and_________ are the two common architectures for network applications.
94. Define a web page.
95. A transport layer protocol provides for_________ between application processes running on different hosts.
96. Define UDP.
97. _________ allows a datagram to be delivered to any one of a group of hosts.
98. What is a Gateway router?
99. What do you mean by error correction?
100. Define half-duplex.
101. What is public internet?
102. What is a Network protocol?
103. What is the use of User Agent?
104. What services might a network application need from a transport protocol?
105. Define Multiplexing.
106. What is the use of UDP checksum?
107. What is the job of network layer routing protocol?
108. How can you classify the routing algorithms?
109. What is an adapter?
110. Which error detection mechanisms are used in modern computer?
111. The Internet’s connection-oriented service provides reliable data transfer by using _________.
112. Name the two broad classes of packet-switched networks.
113. HTTP defines how_________ request Web pages from servers.
114. Name the two sorts of client-server applications.
115. The port numbers ranging from 0 – 1023 are called _________.
116. A TCP connection provides for _________data transfer.
117. Algorithms with global state information are often referred to as _________.
118. The _________ connects the router’s input ports to its output ports.
119. Adapters are also commonly known as _________.
120. The simplest form of error detection is the use of a _________.
121. What is meant by data communication?
122. List out the types of network.
123. What are the responsibilities of data link layer?
124. What is redundancy?
125. What are the responsibilities of network layer?
126. What is a virtual circuit?
127. What is the difference between network layer delivery and the transport layer delivery?
128. What is meant by segmentation?
129. What is the difference between a user agent (UA) and a mail transfer agent (MTA)?
130. Write down the three types of WWW documents.