Академический Документы
Профессиональный Документы
Культура Документы
5. What is an internet?
6. Draw hybrid topologies with a star backbone and four ring networks.
7. When a party makes a local telephone call to another party,is this a point to point or
multipoint connection? Explain your answer.
8. You have two computer connected by an Ethernet hub at home.Is this a LAN, a MAN
or a WAN ?explain your reason . What bare two type of line configuration?
Tutorial – 2
3. Discuss why layering is essential in reference model. Discuss its pros and cons.
4. Define the following terms: SAP, SUBNET, PROTOCOL SERVICES, and PDU.
5 What is the difference between a port address, a logical address, and streams?
TUTORIAL-3
Tutorial - 4
1. Explain the following terms
(a) Pipelining (b) Piggybacking
6.What would be correct CRC code for the data word 110101010 using the generator ploynomial
x2+x+1
7.Explain the characteristics that a good polynomial generator need in CRC error chekcs
8.Find the minimum hamming distance for the following cases
(a) Detection of two errors
(b)Correction of two errors
(c)Detection of 3 errors or correction of 2 errors
9.Construct the hamming code for the following bit stream 11010111
10.Explain the frame format of HDCL protocol
11.Data stream consisting of 101001101 is to be transmitted .Generate a hamming code for it
.Include a single bit error at any bit position of the received code and detect it using hamming
algorithm.
Tutorialc 5
1.Compare and contrast random access protocols with channelizing protocols.
2. What is bridge? When is it useed?How is a ridge configured ? what are the software an d
hardware components?
3.100 stations on a pure aloha network share ! mbps channel.If frames are 1000bit long find the
throughput if station is sending 10 frame per second.
4.Anetwork using CSMA/CD has bandwidth of 10 mbps.If maximum propagation time is 25.6
microseconds,what is he minimum size of the frame?
5.Create a system of 3 lans with four bridges B1-B4 connects LAN1 and LAN2, B2 connects
LAN1 and LAN3, B3 connects LAN2 and LAN3, B$ connects LAN1,2 and LAN3 .
Choose B1 as the root bridge.Show the forwarding and bloking ports after applying the spanning
tree procedure.
6.Justify the statement slotted aloha achieves double efficiency then pure aloha.
7. Explain binary exponential back off algorithm.
TUTORIAL-6
1. Explain IEEE802.3 MAC frame with neat diagram?
2. How does the Ethernet address 1A:3B:4C:6D:2E:1F appear n the line in binary.
4. Compare the following standard Ethernet implementation in terms of media, maximum length,
and line 10base 5, 10baseF, 10baseT, 100baseTX and 100baseFX.
5. If an Ethernet destination address 05:02:03:04:05. What is the type of address, unicast,
multicast or broadcast?
6. Compare Token ring and IEEE 802.5
7. Ethernet frames must be at least 64bytes long, why? How is it possible to maintain the frame
size in fast Ethernet?
8. Find expression for token rotation time (TRT) in token passing ring.
9. A large tone ring has 100 stations & a token rotation time of 40 msec. The token holding time is
10msec.what is the max. achievable efficiency of the ring.
10. Suppose there is heavy traffic on both a CSMA/CD LAN and a token ring LAN. A station of
which system is more likely to wait longer to send a frame? Why?
TUTORIAL-7
1.Change the following IP address from Binary notation to the dotted decimal notation
6.The value of total length field in an IPV4 datagram is 36, and the value of header field is 5. How
may bytes of data s the packet carrying .
7. Find out why two securuity protocol are there in IPV6
8. Change the following IPV4 multicast address to Ethernet multicast address. How may of them
specify the same Ethernet address.
(a)224.17.72.8
(b)235.16.72.8
(c)237.19.6.88
(d)224.82.12.8
Net 1 5 B
Net 2 1 C
Net 3 2 F
Net 4 4 G
What would be the contents of table if router received the following RIP message from router C
Net 1 2
Net 2 2
Net 3 4
Net 4 8
10. What is the mechanism of stip and wait sliding window protocol ?
Tutorial – 8
1. Compare and contrast link state & distance vector routing algorithms.
2. Explain three way handshaking in TCP.
3. In what situations would synchronization points be largely unnecessary and important?
4. What is the translation method recommended by OSI model?
5. What are the two methods of encryption/decryption methods? What is the main difference
between the categories?
6. Using Dijkastra's algorithm computes the shortest path from E to all other network node
A 2 D 4 E
` F
B 1 C 1
AB = 1, BD = 3, DC = 2, DF = 2, EF = 3
7. For private key and public key encryption, discuss the key and their ownership.
8. Discuss the term reciprocity in relation to RSA algorithm.
9. Encrypt the following message using the monoalphabetics substitution with key=4
THIS IS A GOOD EXAMPLE
10. Encrypt the following message using the monoalphabetics substitution with key=4
IRGVCTXMSR MW JYR
11. Encrypt and decrypt the message "BE" using the RSA algorithm with pairs kp=3 and ks=11
and use N=15
Tutorial - 9
1.To understand the secuiry of the RSA algorithm , find Ks if Kp=7 and N=187
2.Encrypt the following bit pattern using ghe exclusive OR operation and the given kay .
(a) Plain text : 1001111111100001
(b) Key : 1000111110001111
3.What are the advangages of a mulitpoint connection over a point to point connection .
4.For n devices in a network , what is the number f cable links required for a mesh , ring bus and
star topology ?
5.What is the differnce in a central and secondary hub ? What is the difference between a pssive
and active hub ?
6.Explain CSMA/CD and its use . What part of 802 project use CSMA/CD
7.Why are two buess needed in DQDB?
8.How are slots generated in DQDB?
9. What is the advntage of implementing DQDB in ring configuraton?
Tutorial - 10