Вы находитесь на странице: 1из 4

Subject Name : 21 Most Important questions

Sr.no 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Unit 1 1 1 1 1 2 2 2 2 3 3 3 3 3 3 4 4 4 4 4 4

28 Important questions or topics


Sr.no 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Unit 1 1 1 1 1 1 2

3 3 3

18 19 20 21 22 23 24 25 26 27 28

3 3 3 4 4 4 4 4 4 4 4

26 Least Important questions or topics


Sr.no 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Unit 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 3 3 3 3 3 3 3 4 4 4

DCNS All question will carry 5 marks only


21 Most Important questions
Questions

Explain the structure of Packet Switch. Write a note on co-axial cable. Explain the 3 phases in circuit switched network. Time Division Switch What is meant by serial transmission? List its types and explain anyone in detail. Polling Controlled Access What do you mean by - Sliding Window, Piggybacking What is HDLC? State different types of frames of HDLC. State and explain various classes in Classful addressing. Three-Way Handshaking in TCP FTP What are the advantages of IPv6? With respect to routing define forwarding & list forwarding techniques used. Write a short note on QoS and Flow Characteristics. What is meant by Closed-loop congestion control? Explain any two closed-loop congestion control policies. PGP What are the different types of attacks? Write a note on symmetric key encryption and Asymmetric What is digital signature? How does it work? Attacks on digital signature What is a firewall? State design goals of firewall, types, limitations, characteristics What is IPSec ? Write in brief about AH and ESP security protocols.

28 Important questions or topics


Question All topology

FDM, TDM Data flow mode (Serial, Parallel) Transmission impairment Guided List and explain the characteristics of an Analog signal. Network devices (Repeater, Bridge, etc) With the help of flow diagram explain working of CSMA/CD Discuss loop problems faced by bridged networks. What is the solution for this problem ? Discuss exposed station problem faced by Wireless LAN. Write a note on the networks in Bluetooth. Flow Control and Error Control (Sliding window, stop-n-wait with ARQ) What is CRC ? How CRC Encoder works ? Explain PPP Transition phases. Explain RIP What is congestion? What do you mean by open-loop congestion control? Explain any 2 types of openloop congestion control.
DNS

ARP Transition IPv4 to IPv6

Types of Login in Telnet.


Write a note on DES.

State and explain different types of malicious programs. Which services are provided by SSL? DMZ Perform encryption of the message "ATTACK IS TODAY" using Autokey Cipher with key = 12 Using the additive cipher with key = 15, decrypt the message -"PQDGI". Name and Explain any five types of viruses.
Intrusion Detection

26 Least Important questions or topics


Question

Consider a signal 10101011. Draw timing diagrams for NRZ-L,NRZ-Iand RZ schemes. WDM Transmission Mode (simplex, Half Duplex, Full Duplex) What is mB/nB coding? Explain with example OSI layers and their working Explain the concept of FHSS with a diagram. Encode the data sequence 010011 using Manchester and Differential Manchester encoding scheme Identify the five components of a data communication system What factors can affect performance of network ? Explain. ADSL Unguided Explain the method of checksum for error detection. State and explain any 3 network connectivity devices. Write a note on VLAN. Why linear block codes are popular than cyclic? Give example of one linear code Ethernet Frame What is UDP? Explain the UDP packet format Explain the role of DHCP. Unicast routing What is the role of SMTP & HTTP? RARP With the help of a diagram explain the implementation of sending and receiving buffers in TCP. If an IP packet arrives with the first 8 bits as 01001101, what the receiver will do with the packet and why ? Also state whether this is IPv4 or IPv6 packet. How SMIME works at both sender and receiver site? What is cipher? Explain additive cipher. Explain any 5 security mechanisms which can be incorporated into a protocol layer to provide security services.

Вам также может понравиться