Question Bank Pre-GTU Computer Network Computer Engineering Department
Question Bank Pre-GTU Computer Network Computer Engineering Department
Question Bank Pre-GTU Computer Network Computer Engineering Department
Computer Network
Computer Engineering Department
4. What do you mean by random access protocols? Explain slotted ALOHA in brief
9. Explain ARP and justify why ARP query sent within a broadcast frame and ARP response
sent within a frame with specific destination MAC address?
10. Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3.
Suppose all of the interfaces in each of these three subnets are required to have the prefix
223.1.17/24. Also suppose that Subnet 1 is required to support at least 60 interfaces,
Subnet 2 is to support at least 90 interfaces, and Subnet 3 is to support at least 12
interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfy these
constraints.
11. What is the main difference between forwarding and routing? Explain at least two
forwarding techniques used by the router to switching to packets from input port to output
port of the router.
12. Explain the TCP Segment structure and justify the importance of its field values.
13. Explain IPv4 datagram format and importance of each filed
16. An ISP is granted a block of addresses starting with 120.60.4.0/20. The ISP wants to
distribute these blocks to 100 organizations with each organization receiving 8 addresses
only. Design the subblocks and give the slash notation for each subblock. Find out how
many addresses are still available after these allocations
17. One of the addresses in a block is 17.63.110.114/24. Find the first address and the last
address in the block.
19. Draw the layered architecture of TCP/IP model and write at least two services provided by
each layer of the model.
20. How UDP checksum value is calculated? Explain with suitable example.
21. What is proxy server? What are the benefits of caching proxy server?
26. Explain connection oriented and connectionless services. Also differentiate both
27. Describe the working of sliding window protocol. Also explain the piggybacking
phenomenon
28. What is the difference between error detection and correction? Explain any one error
correction technique with suitable example
29. What is count to infinity problem explain in detail.