Sunteți pe pagina 1din 5

ALPHA COLLEGE OF ENGINEERING & TECHNOLOGY

PUDUCHERRY
DEPARTMENT OF ECE

SUBJECT TITLE: Data Communication Networks SUBJECT CODE: EC T52


FACULTY NAME: P.Samundeeswari Year/Sem: III//V

11 MARK QUESTIONS

UNIT-I

NETWORK MODELS

1. Discuss in detail about the layers of OSI-ISO reference model with neat diagram.
2. Explain briefly about the various topologies of the network.
3. With the help of neat diagram explain about the architecture of the SONET/SDH.
4. Briefly discuss about the architecture of ATM protocol reference model.
5. Compare the various topologies of network such as LAN, WAN and MAN.
6. Discuss in detail about the ATM layer with neat diagram.
7. Explain briefly about the layers of Broadband ISDN.
8. Briefly explain about the architecture and layers of TCP/IP protocol suite.
9. Explain briefly about the architecture of Bluetooth.
10. Discuss in detail about the cognitive radio and Adhoc network with neat diagram.
UNIT-II

DATA LINK CONTROL AND MEDIUM ACCESS

1. Explain in detail about the function of error detection and error correction method.
2. Summarize the design goal of gigabit Ethernet, illustrate how encoding is performed in
this network along with the frame format of Ethernet.
3. Show how TDD-TDMA is implemented in a Bluetooth device in a piconet.
4. Briefly discuss about the stop and wait protocol.
5. Discuss how Go-Back N ARQ protocol is functioning in Data Link Layer also justify why the
window size is chosen as less than 2m .
6. Briefly describe about the various random access methods.
7. Discuss in detail about the three techniques of controlled access method with neat
diagram.
8. Compare the functions and performance of standard Ethernet, fast Ethernet and gigabit
Ethernet.
9. Expand HDLC and write short about HDLC.
10. Explain the physical layer access mechanisms, MAC layer protocol and the MAC layer
frame format for wireless LAN 802.11.
11. Compare the concept and functions of IEEE 802.3, IEEE 802.4 and IEEE 802.5.
12. Compare and contrast CSMA/CD with CSMA/CA.
UNIT-III

NETWORK ROUTING

1. Provide the generic format of IPv6 header. Also name and specify the role of SIX
extension headers present in IPv6.
2. With a neat sketch that provides the frame format of ARP request packet, show how a
logical address is mapped against its corresponding physical address.
3. Briefly discuss about the unicast routing protocol and its implementation in the internet.
4. Show how an address of IPv4 is converted into IPv6 address.
5. Briefly discuss about the two important function of internet control message protocol.
6. Illustrate how a physical address is mapped against its corresponding logical address.
7. Compare and contrast of IPv4 with IPv6 address.
8. Discuss in detail about the header format for IPv4 datagram with neat diagram.
9. Contrast and compare vector routing with link state routing.
10. Briefly discuss the multicast distance vector routing and its implementation in the
internet.
UNIT-IV

TRANSPORT AND CONGESTION

1. Explain any four congestion control mechanism used in packet switching technique.
2. Explain the process of TCP sliding window flow control in detail. Show how the window
size is calculated in this process.
3. Discuss various open loop and closed loop congestion control mechanisms employed in
TCP.
4. Describe the effects of congestion. Explain the various congestion control techniques.
5. Discuss the various issues related to congestion control in a network.
6. Explain about issues and challenges related to wireless security.
7. Discuss the implementation issues related to TCP flow control.
8. Briefly explain the different types of traffic control functions used in ATM networks to
maintain the promised QOS parameter.
UNIT-V

SECURITY

1. Explain in detail about the function home network security.


2. Classify and narrate the operating mechanism of each type of firewalls.
3. Explain Data Encryption Standard (DES) in detail.
4. Discuss in detail about the features of the wireless security features.
5. Explain the operational description of PGP.
6. Write and explain the Digital Signature Algorithm.
7. Explain Diffie-Hellman key Exchange in detail with an example.
8. Explain RSA algorithm in detail with an example.
9. How AES is used for encryption/decryption? Discuss with example.
10. Explain simplified DES with example.
11. State and explain the principles of public key cryptography.

Signature of HOD

S-ar putea să vă placă și