Docstoc

FON_QuestionBank

Document Sample
FON_QuestionBank Powered By Docstoc
					                                    LJMCA
                                FON Question Bank
Compare and contrast the following

   1. OSI and TCP/IP reference model
   2. Hub and Switch
   3. Circuit Switching and Packet Switching
   4. TCP and UDP
   5. Broadcast, multicast, unicast
   6. Co-axial Cable and Twisted Pair Cable (UTP cable)
   7. Error Control and Flow Control
   8. IMAP and POP3
   9. Broadcast Network and Point-to-point network
   10. Radio wave and Microwave Transmission
   11. Single mode and multimode fiber
   12. Datagram subnet and virtual circuit
   13. 802.11 and 802.16
   14. LAN, MAN and WAN
   15. Transposition and Substitution Cipher
   16. Store and forward and cut-through switches
   17. Satellite and Fiber


All chapters
    Short note on

   1. CDMA
   2. IEEE 802.3 (Ethernet)
   3. Twisted Pair Cable
   4. Fiber Optic
   5. 802.16 Protocol Stack
   6. 802.11 Protocol Stack
   7. Cable Modems
   8. ADSL
   9. Gigabit Ethernet
   10. Transposition ciphers
   11. Bluetooth architecture
   12. Quantum Cryptography.
   13. CSMA/CA




Prepared By:Yakuta Karkhanawala, Khushbu Shah , Supriya Shah
Chapter-2
  1. What is maximum data rate of noisy and noiseless channel?
  2. What is Attenuation, Chromatic dispersion, Noise, Distortion
  3. Discuss GSM Technology used in cellular phones
  4. List and explain service provided by IEEE 802.11 standard.
  5. What is bit rate and baud rate?
  6. Explain working of active repeater and passive repeater.
  7. Explain QPSK, QAM-16, QAM-64.
  8. What is wireless local loop?
Chapter-3
  1. Why framing is required? Explain any one method with example.
  2. Explain Sliding window protocol using Go Back N and show how it deals with
      lost frame, duplicate frames and lost acknowledgement.
  3. Why selective repeat is better than Go back N protocol? Give the reasons.

Chapter-4

   1. Explain CSMA protocol-OR- Explain Non persistent, 1-persistent and P-
       persistent CSMA protocol
   2. What is CSMA/CD?
   3. What is topology? Briefly explain any two topologies.
   4. Explain Manchester and Differential Manchester encoding. Encode binary data bit
       “1100010” and sketch waveform.
   5. Explain Hidden node and exposed node problem in wireless network.
   6. Explain Binary exponential backoff algorithm.
   7. Explain MACAW –OR- Explain working of RTS and CTS in wireless LAN.
   8. What is Time domain reflectometry?
   9. Explain Carrier Extension and Frame bursting.
   10. Write a short note on Inter frame spacing of 802.11 MAC Layer.
   11. Explain modes of 802.11. (hint: PCF and DCF)
   12. State significance of NAV in CSMA/CA.
   13. Difference between “MF” and “more” field of 802.11 data frame.
   14. Explain different services of wireless LAN. –OR- Explain five distribution and
       four station services of wireless LAN
   15. State the function of Repeater, Bridge, Hub , Switch, Router , Gateway
   16. Give two reasons why network might use an error correcting code instead of error
       detection and retransmission.


Chapter-5
  1. What is stored and forward packet switching?
  2. What is difference between broadcasting and flooding?
  3. What is difference between routing and forwarding?
  4. Explain Count-to-infinity problem.
  5. What is Load Shedding? Explain wine and milk strategies



Prepared By:Yakuta Karkhanawala, Khushbu Shah , Supriya Shah
   6. Explain role of foreign agent and home agent in mobile routing.
   7. Explain how learning about neighbors and measurement of line cost takes place in
       link state routing.
   8. State the significance of Age field in Link state packet.
   9. Explain hop by hop chock packet. Compare it with normal chock packet method.
   10. Explain Link state routing algorithm.
   11. Explain routing in mobile host with example.
   12. Explain congestion control in virtual circuit subnet.


Chapter-6
  1. Explain three way handshakes during TCP connection establishment.
  2. What are the elements of Transport protocols?
  3. Explain Initial Connection protocol.
  4. What are the service primitives for TCP protocol? Explain each one.
  5. What are the two methods of releasing the connection? Explain four protocol
      scenarios for releasing the connection.
  6. What is two-way army problem?

Chapter-7
  1. What is importance of resource records? Explain each one.
  2. What is DNS system? What is DNS name space? Explain in detail.
  3. Why zone is required in Name server?
  4. Explain Five basic functions of Email Service.
  5. Can a machine with single DNS name have multiple IP Address? How could this
      occur?
  6. DNS uses UDP instead of TCP. If DNS packet is lost, there is no automatic
      recovery. Does this cause a problem? And if so, how is it solved?


Chapter-8

   1.   What is Ciphertext, Cryptanalysis and Cryptology?
   2.   State Kerchoff’s principle.
   3.   Explain the key pair generation in RSA algorithm
   4.   What is Asymmetric key cryptography. State the algorithm used.
   5.   Explain Cipher Block chaining mode.
   6.   What are symmetric key algorithms? List major disadvantages of them.
   7.   Explain DES algorithm in detail.
   8.   In Triple DES why EDE is used instead of EEE?
   9.   What is digital signature? What is message digest?




Prepared By:Yakuta Karkhanawala, Khushbu Shah , Supriya Shah
All Chapters
Answer the following in one or two sentences
   1. What is piggybacking?
   2. Define multicasting, unicasting and broadcasting
   3. Define Frequency and wavelength
   4. Give examples for which connection oriented service is best.
   5. Give an example of Simplex, Half duplex and Full duplex communication mode.
   6. Data link protocol almost put CRC in a trailer rather than in a header. Why?
   7. What is Baud rate and Bit rate for the standard 10 Mbps Ethernet?
   8. What is the minimum frame size of Ethernet?
   9. What is importance of CTS in wireless transmission?
   10. What is meaning of 1 in 1-Persistent CSMA?
   11. What is soft and hard handoff?
   12. What is parity bit and how is it used?
   13. What is Random Early Detection (RED), Jitter and warning bit?
   14. Explain the use of chock packet.
   15. Which protocol implements Distance Vector Routing Algorithm?
   16. What is cryptography?
   17. What is onetime pad in cryptography?
   18. Give name of any two symmetric key cryptography algorithm




Prepared By:Yakuta Karkhanawala, Khushbu Shah , Supriya Shah

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:16
posted:11/26/2011
language:English
pages:4