You are on page 1of 20

Acropolis Technical Campus, Indore

ASSIGNMENT 1
Subject: Computer Network
Faculty: Ms. Garima Jain

Subject Code: EC-803


Department:Electronics & Communication

1). what is computer network. How it is differ from distributed network?


2). what is the need of OSI model?
3). Explain the function of Physical Layer?
4). Explain the function of Data Link Layer?
5). Explain the function of Network Layer?
6). Explain the function of Transport layer?
7). Explain the function of session layer?
8). Explain the function of presentation layer?
9). Explain the function of application layer?
10). what is Connection less and Connection Oriented services?

ACROPOLIS TECHNICAL CAMPUS,INDORE


ASSIGNMENT 2
Subject: Computer Network
Subject Code: EC-803
Faculty: Ms. Garima Jain
Department: Electronics &
Communication
1). What are the types of Transmission medium?
2). Explain Circuit Switching?
3). Explain Packet Switching?
4). Explain Massage Switching?
5). what is Parallel Data Communication Techniques? Explain their application areas.
6). what is Serial Data Communication Techniques? Explain their application areas.
7). what are the Computer Network Topologies? Explain each Topology in brief.
8) Compare between the Synchronous and Asynchronous Data Communication Techniques.
9). what do you mean by Transmission medium? Explain their types.
Date of Submission:- 31/03/2015

ACROPOLIS TECHNICAL CAMPUS,INDORE


ASSIGNMENT 3
Subject: Computer Network
Subject Code: EC-803
Faculty: Ms. Garima Jain
Department: Electronics &
Communication
Q1. What are data link layer?
Q2 What is Framing?
Q3. Explain error detection techniques?
Q4. Explain subnet and super net?
Q5. Explain static and dynamic channel allocation?
Q6 explain slotted ALOHA protocol. Derive efficiency for slotted ALOHA protocol?
Q7. What do you mean by Carrier Sense Mutiple Access Protocols?
Q8 What do you mean by CSMA/CD- CSMA with Collision Detection?

Date of Submission:- 15/04/2015

ACROPOLIS TECHNICAL CAMPUS,INDORE


ASSIGNMENT 4 ANSWER
Subject: Computer Network
Subject Code: EC-803
Faculty: Ms. Garima Jain
Department: Electronics &
Communication
Q 1 Explain CSMA collision free protocol?
Q2 What is the domain name system?
Q3. Explain CSMA/CD Ethernet and gigabit Ethernet?
Q4.What is the limitation of IPv4?
Q5 Explain comparison of IPV4 and IPV6?
Q6 Explain distance vector routing?
Q7 Explain unicast and multicast routing?
Q8 write a short note on mobile IP?

Date of Submission:-

/ /

ACROPOLIS TECHNICAL CAMPUS,INDORE


ASSIGNMENT 5 ANSWER
Subject: Computer Network
Subject Code: EC-803
Faculty: Ms. Garima Jain
Department: Electronics &
Communication
Q1. Explain quality of service?
Q2. Explain internetworking and connectionless internetworking?
Q3. Explain user datagram protocol?
Q4. Explain TCP/IP Modal?
Q5 Describe the design issue for transport layer?
Q6 write note on Electronic mail?
Q7 write note on RFID?
Q8 write note on Bluetooth?
Q9 write note on Cryptography?

Subject: Computer Network


Faculty: Ms. Garima Jain

TUTORIAL1
Subject Code: EC-803
Department:Electronics &
Communication

Q1.What do you mean by a network?


Q2 Explain about asynchronous transfer mode (ATM)
Q3 Explain type of connections
Q4 Explain type of wired media.
Q5 Explain type of wireless media.
Q6 compare comparison of message, circuit and packet switching ?
Q7 Explain the difference between UTP & STP?

Subject: Computer Network


Faculty: Ms. Garima Jain

TUTORIAL2
Subject Code: EC-803
Department:Electronics &
Communication

Q1.Explain reference model ISO-OSI.


layer description
merits of OSI model
demerits of OSI model
Q2 Explain TCP/IP reference model
TCP/IP Architecture
merits of TCP/IP model
demerits of TCP/IP model
Q3 Explain similarities between OSI and TCP/IP models?
Q4 Discuss performance comparison of OSI and TCP/IP models?

Subject: Computer Network


Faculty: Ms. Garima Jain

TUTORIAL3
Subject Code: EC-803
Department:Electronics &
Communication

Q1.Explain type of errors on data link layer


Q2 explain checksum error detection methods
Q3 explain cyclic redundancy check (CRC) error detection methods.
Q4 explain CRC Generator and CRC Checker
Q2 Discuss about hamming code for error detection and correction?
Q3 Explain Automatic Repeat Request (ARQ) techniques
Q4 Discuss sliding window protocols?

Subject: Computer Network


Faculty: Ms. Garima Jain

TUTORIAL4
Subject Code: EC-803
Department:Electronics &
Communication

Q1 find the hamming weight of the following code vector:


X=11010100
Q2 find the checksum of following message.
10110001, 10101011, 00110101, 10100001

Objective Question
1. The data link layer takes the packets from _____ and encapsulates them into frames for
transmission.
a)network layer
b) physical layer
c) transport layer
d) application layer
Answer:a
2. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
Answer:d

3. Which sublayer of the data link layer performs data link functions that depend upon the
type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
Answer:b
4. Header of a frame generally contains
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
Answer:d
5. Automatic repeat request error management mechanism is provided by
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
Answer:a
6. When 2 or more bits in a data unit has been changed during the transmission, the error is
called
a) random error
b) burst error
c) inverted error
d) none of the mentioned
Answer: b
7. CRC stands for
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
Answer: a
8. Which one of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) HDLC
d) all of the mentioned
Answer: d

9. Which one of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) both (a) and (b)
d) none of the mentioned
Answer:c
10. The technique of temporarily delaying outgoing outgoing acknowledgements so that they
can be hooked onto the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletchers checksum
d) none of the mentioned
Answer: a
11. The physical layer concerns with
a) bit-by-bit delivery
p) process to process delivery
c) application to application delivery
d) none of the mentioned
Answer A
12. Which transmission media has the highest transmission speed in a network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
Answer C
13. Bits can be send over guided and unguided media as analog signal by
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
Answer A
14. The portion of physical layer that interfaces with the media access control sublayer is
called
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) none of the mentioned
Answer A
15. physical layer provides
a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber

d) all of the mentioned


Answer D
16. In asynchronous serial communication the physical layer provides
a) start and stop signalling
b) flow control
c) both (a) and (b)
d) none of the mentioned
Answer C
17. The physical layer is responsible for
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
Answer D
18. The physical layer translates logical communication requests from the ______ into
hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
Answer A
19. A single channel is shared by multiple signals by
a) analog modulation
b) digital modulation
c) multiplexing
d) none of the mentioned
Answer C
20. Wireless transmission can be done via
a) radio waves
b) microwaves
c) infrared
d) all of the mentioned
Answer D
21. Transport layer aggregates data from different applications into a single stream before
passing it to
a) network layer
b) data link layer
c) application layer
d) physical layer
Answer: a
22. Which one of the following is a transport layer protocol used in internet?
a) TCP
b) UDP
c) both (a) and (b)

d) none of the mentioned


Answer: c.
23. User datagram protocol is called connectionless because
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) both (a) and (b)
d) none of the mentioned
Answer:a
24. Transmission control protocol is
a) connection oriented protocol
b) uses a three way handshake to establish a connection
c) recievs data from application as a single stream
d) all of the mentioned
Answer:d
25. An endpoint of an inter-process communication flow across a computer network is called
a) socket
b) pipe
c) port
d) none of the mentioned
Answer:a
26. Socket-style API for windows is called
a) wsock
b) winsock
c) wins
d) none of the mentioned
Answer:b
27. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) none of the mentioned
Answer:a
28. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) none of the mentioned
Answer:a
29. Transport layer protocols deals with
a) application to application communication
b) process to process communication
c) node to node communication

d) none of the mentioned


Answer:b
30. Which one of the following is a transport layer protocol?
a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol
Answer:a
31. This is not a application layer protocol
a) HTTP
b) SMTP
c) FTP
d) TCP
Answer: d
Explanation: TCP is transport layer protocol
32. The packet of information at the application layer is called
a) Packet
b) Message
c) Segment
d) Frame
Answer: b
33. This is one of the architecture paradigm
a) Peer to peer
b) Client-server
c) HTTP
d) Both a and b
Answer: d
Explanation: HTTP is a protocol.
34. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
Answer: c
35. Application layer offers _______ service
a) End to end
b) Process to process
c) Both of the mentioned
d) None of the mentioned
Answer: a
36. E-mail is
a) Loss-tolerant application

b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Answer: c
Explanation: Because it can work with available throughput.
37. Pick the odd one out
a) File transfer
b) File download
c) E-mail
d) Interactive games
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
38. Which of the following is an application layer service ?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
Answer: d
39. To deliver a message to the correct application program running on a host, the _______
address must be consulted
a) IP
b) MAC
c) Port
d) None of the mentioned
Answer: c
40. This is a time-sensitive service
a) File transfer
b) File download
c) E-mail
d) Internet telephony
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
41. Transport services available to applications in one or another form
a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
Answer: d
42. Electronic mail uses this Application layer protocol
a) SMTP
b) HTTP
c) FTP
d) SIP

Answer: a
43. The ____ translates internet domain and host names to IP address.
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
Answer:a
44. Which one of the following allows a user at one site to establish a connection to another
site and then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) telnet
d) none of the mentioned
Answer:c
45. Application layer protocol defines
a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the mentioned
Answer:d
46. Which one of the following protocol delivers/stores mail to reciever server?
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
Answer:a
47. The ASCII encoding of binary data is called
a) base 64 encoding
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding
Answer:a
48. Which one of the following is an internet standard protocol for managing devices on IP
network?
a) dynamic host configuration protocol
b) simple newtwork management protocol
c) internet message access protocol
d) media gateway protocol
Answer:b

49. Which one of the following is not an application layer protocol?


a) media gateway protocol
b) dynamic host configuration protocol
c) resource reservation protocol
d) session initiation protocol
Answer:c
50. Which protocol is a signalling communication protocol used for controlling multimedia
communication sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) none of the mentioned
View Answer
Answer:a
.
51. Which one of the following is not correct?
a) application layer protocols are used by both source and destination devices during a
communication session
b) application layer protocols implemented on the source and destination host must match
c) both (a) and (b)
d) none of the mentioned
Answer:c
52. When displaying a web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) none of the mentioned
Answer:a.
53. OSI stands for
a) open system interconnection
b) operating system interface
c) optical service implementation
d) none of the mentioned
Answer:a
54. The OSI model has ___ layers.
a) 4
b) 5
c) 6
d) 7
Answer:d
55. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer

b) presentation layer
c) application layer
d) both (a) and (b)
Answer d
56. Which layer links the network support layers and user support layers
a) session layer
b) data link layer
c) transport layer
d) network layer
Answer:c
Explanation:Physical, data link and network layers are network support layers and session,
presentation and application layers are user support layers.
57. Which address is used in an internet employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
Answer:d
58. TCP/IP model was developed _____ the OSI model.
a) prior to
b) after
c) simultaneous to
d) none of the mentioned
Answer:a
59. Which layer is responsible for process to process delivery?
a) network layer
b) transport layer
c) session layer
d) data link layer
Answer:b
60. Which address identifies a process on a host?
a) physical address
b) logical address
c) port address
d) specific address
Answer:c
61. Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) none of the mentioned

Answer:a
62. Transmission data rate is decided by
a) network layer
b) physical layer
c) data link layer
d) transport layer
Answer:b
63. The network layer concerns with
a) bits
b) frames
c) packets
d) none of the mentioned
Answer:c
64. Which one of the following is not a function of network layer?
a) routing
b) inter-networking
c) congestion control
d) none of the mentioned
Answer:d
65. The 4 byte IP address consists of
a) network address
b) host address
c) both (a) and (b)
d) none of the mentioned
Answer:c
66. In virtual circuit network each packet contains
a) full source and destination address
b) a short VC number
c) both (a) and (b)
d) none of the mentioned
Answer:b
67. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Answer:d
68. Multidestination routing
a) is same as broadcast routing
b) contains the list of all destinations

c) data is not sent by packets


d) none of the mentioned
Answer:c
69. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned
Answer:a
70. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) none of the mentioned
Answer:d
71. The network layer protocol of internet is
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) none of the mentioned
Answer:b
72. ICMP is primarily used for
a) error and diagnostic functions
b) addressing
c) forwarding
d) none of the mentioned
Answer:a

You might also like