• Computer Network Practice Problems

A computer network is a collection of various computing machines that are able to share each other’s resources in a mannerly fashion . Computer network is at the centre of all the modern processes and computational exercises. A computer network makes the world wide web possible. It is through a computer network that all the technological advances are made and the concept of forming and maintaining a computer network is basic to almost all modern professions. Here we have a section that has most interesting questions testing your knowledge about computer networks. Let us see more!

Browse more Topics under Networking

  • Computer Networks
  • The OSI Model
  • Computer and Network Security
  • Internet and the WWW
  • Security Tools, Virus, Hacking

Networking Practice Questions

Networking Practice Questions has questions based on the concepts of Computer Networks, The OSI Model , Computer and Network Security, Internet and the World Wide Web . Here we will see many previous years questions which will not only help you get a total recap of what you have learned but also let you understand the type of challenges and the level of difficulty that you must expect.

Q1: Hub is associated with ……. network.    [S B I Clerk 2011]

A) Bus             B) Ring                     C) Star                     D) Mesh                       E) All of the above

Q2: Multiplexing involves ……. path and …………….. channel.              [S B I Clerk, 2011]

A) one, one                B) one, multiple                   C) multiple, one                   D) multiple, multiple               E) None of the above

Q3: The advantage of L A N is   [S B I Clerk, 2012]

A) sharing peripherals                      B) backing up your data                  C) saving all your data                  D) accessing the web                E) automatic printing of data

Q4: Which type of network would use phone lines ?              [S B I Clerk 2012]

A) W A N                     B) L A N                              C) W W A N                      D) Wireless                    E) None of the above

Q5: Servers are those computers which provide resources to other computers connected by:    [S B I Clerk 2009]

A) network                  B) backup system                        C) server                D) peripheral                     E) modem

Q6: A combination of hardware and software that allows communication and electronic transfer of information between computers is a:               [S B I Clerk 2012]

A) network                   B) backup system                     C) server               D) peripheral                E) modem

Q7: What type of resource is most likely to be a shared common resource in a computer network?         [Allahbad Bank Clerk, 2010]

A) Printers                   B) Speakers               C) Floppy Disk Drives                         D) Keyboards                    E) None of the above

Q8: A device that connects to a network without the use of cables is said to be:     [I B P S Clerk, 2012]

A) distributed             B) cabled                  C) centralized D) open source                  E) wireless

computer network

Find Your Answers Here

Q1: C), Q2: B), Q3: A), Q4: A), Q5: A), Q6: A), Q7: A), Q8: E)

Q1: ……… is the most important/ powerful computer in a typical network.       [S B I P. O. 2013]

A)   Network station                B) Network Client                  C)  Desktop                  D)Network server                     E) Network switch

Q2: P2P is a …….. application architecture.      [I B P S Clerk 2012]

A) client/ server                  B) distributed                  C) centralised                        D) 1 – tier               E) None of the above

Q3: Which of the following represents the fastest data transmission speed?         [S B I Clerk, 2012]

A) Bandwidth                      B) bps                C) gbps                      D) kbps                  E) mbps

Q4: In O S I network architecture, the routing is performed by:          [I B P S Clerk 2012]

A) network layer                         B) data link layer                      C) transport layer                  D) session layer                     E) None of the above

Q5: Which of the following is considered a broadband communication channel?     [S B I P. O. 2010]

A) Coaxial cable                B) Fiber optics cable          C) Microwave circuits            D) All of these            E) None of the above

Q6: How many bits are there in the ethernet address?               [S B I clerk 2011]

A) 64 bits                     B) 48 bits                   C) 32 bits                  D) 16 bits                  E) None of these

Q7: How many layers are in the T C P/ I P model?     [S B I Clerk 2011]

A) 4 layers                B) 5 layers                       C) 6 layers                    D) 7 layers                   E) None of these

Q8: Ethernet, token ring and token bus are types of?     [S B I Associates 2012]

A) W A N                   B) L A N                     C) Communication channels              D) Physical medium               E) None of the above

Q9: Which of the following items is not used in Local Area Networks (L A Ns)?   [S S C  C G L 2012]

A) Interfaced card                        B) Cable                        C) Computer                   D) Modem

Q10: Which is the name of the network topology in which there are bidirectional links between each possible node?       [S S C     C G L 2012]

A) Ring                B) Start                C) Tree                  D) Mesh

Q11: An alternate name for the completely interconnected network topology is:            [S S C           C G L    2012]

A) mesh              B) star                  C) tree                  D) ring

Find Your Answer Here

Q1: D), Q2: A), Q3: C), Q4: A), Q5: D), Q6: B), Q7: B), Q8: B), Q9: D), Q10: D), Q11: A)

Q1: The secret code that gives you access to some program is?          [Punjab And Sindh Bank Clerk, 2010]

A) clue               B) cue                    C) password            D) help                E) None of the above

Q2: Sending an E-mail is similar to?    [S B I Clerk 2011]

A) writing a letter                  B) drawing a picture                    C) talking on the phone                    D) sending a package    E) None of the above

Q3: Which of the following is the communication protocol that sets the standard used by every computer that accesses web-based information?            [S B I P. O. 2010]

A) X M L                         B) D M L                     C) H T T P                     D) H T M L                    E) None of the above

Q4: Which of the following is required to create an H T M L document?    [I B P S Clerk, 2011]

A) Browser                    B) Internet                          C) Text Editor                    D) Search engine                      E) None of the above

Q5: If you receive an E-mail from someone you don’t know what should you do?             [S B I Clerk, 2008]

A) Forward it to the police immediately.

B) Delete it without opening it.

C) Open it and respond to them saying that you don’t know them.

D) Reply and ask them for their personal information.

E) Reply and tell them you want to keep in touch with them.

Q1: C), Q2: A), Q3: C), Q4: C), Q5: B)

Customize your course in 30 seconds

Which class are you in.

tutor

  • Internet and World Wide Web

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Download the App

Google Play

Administrivia

Lectures and assignments, second half.

If you're seeing this message, it means we're having trouble loading external resources on our website.

If you're behind a web filter, please make sure that the domains *.kastatic.org and *.kasandbox.org are unblocked.

To log in and use all the features of Khan Academy, please enable JavaScript in your browser.

Computers and the Internet

Course: computers and the internet   >   unit 3, computer networks.

  • Wires, cables, and WiFi
  • Physical network connections
  • Bit rate, bandwidth, and latency
  • Bit rate and bandwidth
  • (Choice A)   A
  • (Choice B)   B
  • (Choice C)   C
  • (Choice D)   D

Home Announcements Schedule Assignments Slides Projects Reading

Assignments

The homework assignments give you a chance to practice the math and knoweldge skill you've read about in the text book and heard in class. The point of the homework is to help you learn these concepts. You can certainly ignore this, and it will definitely lower your grade by a full letter, but I strongly advice you complete the homework. Doing so will ensure that you can answer the questions that will appear on the midterm and final exams.

The last 30 minutes of each lecture will be devoted to problem solving and programming lab work. Thus, if you are stuck on a problem, this is an excellent place to get your questions answered without having to go to additional office hours.

Homeworks are always due at the beginning of class on the day they are specified on the schedule. Late homework is not accepted without prior permission from the professor.

Homework 7: Wireless and Mobile Networks

Assigned: Mar. 4th Due: Mar. 9nd Problems: P1, P4, P6, P7, P10, P14

Homework 6: The Link Layer (Chapter 5)

Assigned: Feb. 23th Due: Mar. 2nd Problems: P1, P2, P6 (b only), P12, P19, P21, P33

All exercises are from the Problems section of the textbook.

Homework 5: The Network Layer (Chapter 4)

Assigned: Feb. 21st Due: Feb. 28th Problems: P8, P16, P20, P25c, P26, P33, P35, P40, P45

All exercises are from the Problems section (not Review Questions) of Chapter 4 the textbook (pages 424-435).

Homework 4: The Transport Layer (Chapter 3)

Assigned: Jan. 26th Due: Jan. 31st Problems: P4, P14, P19, P24, P27, P42, P47

All exercises are from the Problems section (not Review Questions) of Chapter 3 the textbook (pages 299-311).

Homework 3: The Application Layer (Chapter 2)

Assigned: Jan. 12th Due: Jan. 19th Problems: P6, P8, P9, P11, P18, P19 (do 2 sites for part b), P21, P30, P31

All problems are from the Problems section (not Review Questions) section of Chapter 2 of the Textbook (pages 181-189).

Exercise 1: Your first application layer protocol

Design a client/server protocol for a game lobby. What messages do you need? What occurs on the server when a particular message is received? A finite-state machine helps tremendously in the design!

Homework 2: Computer Networks and the Internet (Chapter 1)

Assigned: Jan. 5th Due: Jan. 12th Problems: P2, P5, P6, P10, P14, P16, P23, P30

All problems are from the Problems section (not Review Questions) section of Chapter 1 of the Textbook (pages 72-79).

Homework 1: The Topology of the Internet, kinda

Assigned: Jan. 3rd Due: Jan. 5th

In this assignment you will use the traceroute (tracert for Windows users) program to find the route to three (3) of your favorite sites on the Internet. Draw a graph of your results, labeling each node with the IP address of the hops between your location and the destinations. The links between them should be marked with the measured delays between each link.

In addition, you will need to download Wireshark (freely available) and run it somewhere on the DU network for 30 seconds. Record all the packet types you saw and make a simple pie chart showing divisions by packet type.

  • Assignment 1
  • Assignment 2
  • Assignment 3
  • Assignment 4
  • Assignment 5

Announcements

  • Instructions

Related links

  • Kurose Ross
  • Student Resources
  • Assignments 30
  • Attendance 2[bonus]

Browse Course Material

Course info.

  • Prof. Hari Balakrishnan

Departments

  • Electrical Engineering and Computer Science

As Taught In

  • Computer Networks

Learning Resource Types

Assignments.

facebook

You are leaving MIT OpenCourseWare

Computer Networks

Important questions and answers, question paper download, online study material, lecturing notes, assignment, reference, wiki.

Computer Networks

PHYSICAL LAYER

Data link layer, network layer, transport layer, application layer.

Privacy Policy , Terms and Conditions , DMCA Policy and Compliant , Contact

Contact Us(Customer Care) Via Social Media

Copyright © 2018-2024 BrainKart.com; All Rights Reserved. Developed by Therithal info, Chennai.

Assignments:

New York University

Computer Science Department

Courant Institute of Mathematical Sciences

Course Title: Data Communication & Networks                                                            Course Number: g22.2662-001

Instructor: Jean-Claude Franchitti                                                                                 Session: 4

Assignment #2

I.           Due                   Thurday   March 6, 2008, at the beginning of class.

           

II.          Objectives

  • See protocols in action.

III.        References

  • Slides and handouts posted on the course Web site
  • Textbook chapters as applicable

IV.        Software Required

  • Wireshark Packet Sniffer and Packet Capture Library (see section V below).
  • Microsoft Word.
  • Win Zip as necessary.

V.        Assignment

            Preamble and Disclaimer:

As noted on the corresponding SourceForge site, the Ethereal development team switched names from Ethereal to Wireshark in May 2006 due to trademark issues (see http://www.wireshark.org/faq.html#q1.2 for more details on this). Incidentally, some people pronounce the name Ethereal as “ether-real,” while others pronounce it “e-thir-E-al,” as in the English word ethereal, which means ghostly or insubstantial. The Ethereal name’s origin comes from the Ethernet protocol, a link-level protocol that is studied extensively in Chapter 5 of the textbook, and in the class labs.

1. Wireshark Lab - Getting Started

One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that accompany the textbook take the first approach. In the Wireshark labs, we’ll take the latter approach.   You’ll be running various network applications in different scenarios using a computer on your desk, at home, or in a lab. You’ll observe the network protocols in your computer “in action,” interacting and exchanging messages with protocol entities executing elsewhere in the Internet.    Thus, you and your computer will be an integral part of “live” labs in this class.   You’ll observe, and you’ll learn, by doing.

The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer .   As the name suggests, a packet sniffer captures (“sniffs”) messages being sent/received from/by your computer; it will also typically store and/or display the contents of the various protocol fields in these captured messages. A packet sniffer itself is passive. It observes messages being sent and received by applications and protocols running on your computer, but never sends packets itself. Similarly, received packets are never explicitly addressed to the packet sniffer.   Instead, a packet sniffer receives a copy of packets that are sent/received from/by application and protocols executing on your machine.

Figure 1 shows the structure of a packet sniffer. At the right of Figure 1 are the protocols (in this case, Internet protocols) and applications (such as a web browser or ftp client) that normally run on your computer.   The packet sniffer, shown within the dashed rectangle in Figure 1 is an addition to the usual software in your computer, and consists of two parts.   The packet capture library receives a copy of every link-layer frame that is sent from or received by your computer.   Recall from the discussion from section 1.5.2 in the text (Figure 1.20 in the 4 th Edition of the textbook used for the class) that messages exchanged by higher layer protocols   such as HTTP, FTP, TCP, UDP, DNS, or IP all are eventually encapsulated in link-layer frames that are transmitted over physical media such as an Ethernet cable.   In Figure 1, the assumed physical media is an Ethernet, and so all upper layer protocols are eventually encapsulated within an Ethernet frame.   Capturing all link-layer frames thus gives you all messages sent/received from/by all protocols and applications executing in your computer.

The second component of a packet sniffer is the packet analyzer , which displays the contents of all fields within a protocol message.   In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols.   For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame.   It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram.   Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment.   Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the text.

We will be using the Wireshark packet sniffer (i.e., www.wireshark.org) for these labs, allowing us to display the contents of messages being sent/received from/by protocols at different levels of the protocol stack.   (Technically speaking, Wireshark is a packet analyzer that uses a packet capture library in your computer). Wireshark is a free network protocol analyzer that runs on Windows, Linux/Unix, and Mac computers. It’s an ideal packet analyzer for our labs – it is stable, has a large user base and well-documented support that includes:

(a)     A user-guide (i.e., http://www.wireshark.org/docs/ )

(b)    Man pages (i.e., http://www.wireshark.org/docs/man-pages/ )

(c)     A detailed FAQ (i.e., http://www.wireshark.org/faq.html )

(d)    Rich functionality that includes the capability to analyze more than 500 protocols

(e)     A well-designed user interface

The Wireshark packet sniffer operates in computers using Ethernet to connect to the Internet, as well as so-called point-to-point protocols such as PPP.

2. Wireshark Lab – Getting Wireshark  

In order to run Wireshark, you will need to have access to a computer that supports both Wireshark and the libpcap packet capture library. If the libpcap software is not installed within your operating system, you will need to install libpcap or have it installed for you in order to use Wireshark.   See http://www.wireshark.org/download.html for a list of supported operating systems and download sites.

Download and install the Wireshark and (if needed) the libpcap software:

·         If needed, download and install the libpcap software.   Pointers to the libpcap software are provided from the Wireshark download pages.   For Windows machines, the libpcap software is known as WinPCap , and can be found at http://winpcap.mirror.ethereal.com/ .

·         Go to www.wiresharkl.org and download and install the Wireshark binary for your computer. It is recommended to download from http://sourceforge.net/project/showfiles.php?group_id=255 which includes a WinPCap bundle option.

·         Download the Wireshark user guide.   You will most likely only need Chapters 1 and 3.

The Wireshark FAQ has a number of helpful hints and interesting tidbits of information, particularly if you have trouble installing or running Wireshark.

3. Wireshark Lab – Running Wireshark

When you run the Wireshark program, the Wireshark graphical user interface shown in Figure 2a will be displayed. Initially, no data will be displayed in the various windows.

Figure 2a: Wireshark Capture Options Window

Figure 2 below shows the original Ethereal graphical user interface along with an explanation of the various areas which applies to both Ethereal and Wireshark.

                       

The Wireshark interface has five major components:

·         The command menus are standard pulldown menus located at the top of the window.   Of interest to us now are the File and Capture menus.   The File menu allows you to save captured packet data or open a file containing previously captured packet data, and exit the Wireshark application.   The Capture menu allows you to begin packet capture.

·         The packet-listing window displays a one-line summary for each packet captured, including the packet number (assigned by Wireshark; this is not a packet number contained in any protocol’s header), the time at which the packet was captured, the packet’s source and destination addresses, the protocol type, and protocol-specific information contained in the packet. The packet listing can be sorted according to any of these categories by clicking on a column name.   The protocol type field lists the highest level protocol that sent or received this packet, i.e., the protocol that is the source or ultimate sink for this packet.

·         The packet-header details window provides details about the packet selected (highlighted) in the packet listing window.   (To select a packet in the packet listing window, place the cursor over the packet’s one-line summary in the packet listing window and click with the left mouse button.).   These details include information about the Ethernet frame and IP datagram that contains this packet. The amount of Ethernet and IP-layer detail displayed can be expanded or minimized by clicking on the right-pointing or down-pointing arrowhead to the left of the Ethernet frame or IP datagram line in the packet details window.   If the packet has been carried over TCP or UDP, TCP or UDP details will also be displayed, which can similarly be expanded or minimized.   Finally, details about the highest level protocol that sent or received this packet are also provided.

·         The packet-contents window displays the entire contents of the captured frame, in both ASCII and hexadecimal format.

·         Towards the top of the Wireshark graphical user interface, is the packet display filter field, into which a protocol name or other information can be entered in order to filter the information displayed in the packet-listing window (and hence the packet-header and packet-contents windows).   In the example below, we’ll use the packet-display filter field to have Wireshark hide (not display) packets except those that correspond to HTTP messages.

4. Wireshark Lab – Taking Wireshark for a Test Run

The best way to learn about any new piece of software is to try it out!   Do the following

1.       Start up your favorite web browser, which will display your selected homepage.

2.       Start up the Wireshark software.   You will initially see a window similar to that shown in Figure 2, except that no packet data will be displayed in the packet-listing, packet-header, or packet-contents window, since Wireshark has not yet begun capturing packets.

3.       To begin packet capture, select the Capture pull down menu and select Options .   This will cause the “Wireshark: Capture Options” window to be displayed, as shown in Figure 3.

Figure 3: Wireshark Capture Options Window

4.       You can use all of the default values in this window.   The network interfaces (i.e., the physical connections) that your computer has to the network will be shown in the Interface pull down menu at the top of the Capture Options window. In case your computer has more than one active network interface (e.g., if you have both a wireless and a wired Ethernet connection), you will need to select an interface that is being used to send and receive packets (mostly likely the wired interface). After selecting the network interface (or using the default interface chosen by Wireshark), click Start .   Packet capture will now begin - all packets being sent/received from/by your computer are now being captured by Wireshark!

5.       After you begin packet capture, you can select Statistics > Protocol Hierarchy from the command menus to obtain a summary of the number of packets of various types that are being captured as shown in Figure 4.

Figure 4: Wireshark Protocol Hierarchy Statistics

6.       While Wireshark is running, enter the URL:         http://gaia.cs.umass.edu/ethereal-labs/INTRO-ethereal-file1.html and have that page displayed in your browser. In order to display this page, your browser will contact the HTTP server at gaia.cs.umass.edu and exchange HTTP messages with the server in order to download this page, as discussed in section 2.2 of the text.   The Ethernet frames containing these HTTP messages will be captured by Wireshark.

7.       After your browser has displayed the INTRO-ethereal-file1.html page, stop Wireshark packet capture by selecting Capture > Stop in the Wireshark in the command menus.   The Wireshark window will display all packets captured since you began packet capture.   The Wireshark window should now look similar to Figure 2. You now have live packet data that contains all protocol messages exchanged between your computer and other network entities! The HTTP message exchanges with the gaia.cs.umass.edu web server should appear somewhere in the listing of packets captured.   But there will be many other types of packets displayed as well (see, e.g., the many different protocol types shown in the Protocol column in Figure 2).   Even though the only action you took was to download a web page, there were evidently many other protocols running on your computer that are unseen by the user.   We’ll learn much more about these protocols as we progress through the text!   For now, you should just be aware that there is often much more going on than “meet’s the eye”!

8.       Type in “http” (without the quotes, and in lower case – all protocol names are in lower case in Wireshark) into the display filter specification window at the top of the main Wireshark window.   Then select Apply (to the right of where you entered “http”).   This will cause only HTTP message to be displayed in the packet-listing window.  

9.       The HTTP GET message that was sent from your computer to the gaia.cs.umass.edu HTTP server should be shown among the first few http message shown in the packet-listing window. When you select the HTTP GET message, the Ethernet frame, IP datagram, TCP segment, and HTTP message header information will be displayed in the packet-header window. Recall that the HTTP GET message that is sent to the gaia.cs.umass.edu web server is contained within a TCP segment, which is contained (encapsulated) in an IP datagram, which is encapsulated in an Ethernet frame. If this process of encapsulation isn’t quite clear yet, review section 1.5 in the text. By clicking on the expansion buttons (+ or -) to the left side of the packet details window,   you can minimize or maximize the amount of   Frame, Ethernet, Internet Protocol, and Transmission Control Protocol information displayed.   Maximize the amount information displayed about the HTTP protocol.   Your Wireshark display should now look roughly as shown in Figure 5 (Note, in particular, the minimized amount of protocol information for all protocols except HTTP, and the maximized amount of protocol information for HTTP in the packet-header window).

10.   Exit   Wireshark

Figure 5: Wireshark Display After Step 9

Congratulations!   You’ve now completed the first lab.

5. Wireshark Lab – What to hand in

The goal of this first lab was primarily to introduce you to Wireshark. The following questions will demonstrate that you’ve been able to get Wireshark up and running, and have explored some of its capabilities. Answer the following questions, based on your Wireshark experimentation.

1.       What is   the MAC address of your Host? You can find this in the frame level information.

2.       List the different protocols that appear in the protocol column in the unfiltered packet-listing window in step 4.7 above.

3.       How long did it take from when the HTTP GET message was sent until the HTTP OK reply was received? (By default, the value of the Time column in the packet-listing window is the amount of time, in seconds, since Wireshark tracing began.   To display the Time field in time-of-day format, select the Wireshark View pull down menu, then select Time Display Format , then select Time-of-day .)

4.       What is the Internet address of the gaia.cs.umass.edu (also known as www-net.cs.umass.edu)?   What is the Internet address of your computer?

5.       Print the two HTTP messages displayed in step 4.9 above. To do so, select Print from the Wireshark File command menu, and select “ Selected Packet Only” under Packet Range and “As displayed” under Packet Format and then click OK.

Save your capture in a capture file named Nxxx.cap where Nxxx is your student ID.

Submit this capture file and the answers to the questions above.

Email your assignment (archive) file to your TA.

VI.        Deliverables

  • Electronic: Your assignment (archive) file must be emailed to the TA.   The file must be created and sent by the beginning of class.   After the class period, the homework is late.   The email clock is the official clock.  
  • Written: Printout of the file(s) included in your assignment (archive) file. The cover page supplied on the next page must be the first page of your assignment file

      Fill in the blank area for each field.       

The sequence of the hardcopy submission is:

1.       Cover sheet

1.       Assignment Answer Sheet(s)

VII.       Sample Cover Sheet

Name ________________________   Username: ______________    Date: ____________             (last name, first name) Section: ___________

Assignment 2

Assignment Layout (25%)

o Assignment is neatly assembled on 8 1/2 by 11 paper.

o Cover page with your name (last name first followed by a comma then first name), username and section number with a signed statement of independent effort is included.

o Answers to all assignment questions are correct. o File name is correct.

Total   in points                                                                       ___________________ Professor’s Comments:

Affirmation of my Independent Effort: _____________________________

                                                                                    (Sign here)

Table of Contents

Basic computer networks interview questions, advanced computer networks interview questions, top 30 computer networks interview questions and answers.

Commonly Asked Computer Networks Interview Questions and Answer in 2024

A set of computers connected to share resources is known as a computer network. The primary resource shared over the network is the Internet. Another example is the sharing of a printer between different computers. However, the best example is the Internet. In this article, you are going to discover the most frequently asked computer network interview questions. If you are looking for a career in IT hardware and networking , you need to prepare them. Every interview is different, but we have covered the most critical computer network interview questions that can help you succeed.

The computer network interview questions are divided into two parts as follows:

  • Basic computer network interview questions
  • Advanced computer network interview questions

Let us start with some basic computer networks interview questions!

1. What is meant by a link and node?

A network includes two or more computers connected directly by a physical medium like coaxial cable or optical fiber. Link is the physical medium of connection in this setup, and nodes are the computers connected. 

2. Define IP address.

In a network system, an IP address is a unique software address of a computer. It is 32 bit. 

3. What do you understand by DNS?

There are two types of server/client programs. One is directly used by the user and the other support application programs. Domain Name system belongs to the second type as it is used by other programs, for example, to find the IP address of an e-mail recipient. 

4. What is a peer-to-peer process?

A peer-to-peer process refers to all processes on a machine that communicates at a given layer.

5. Define network topology.

Network topology refers to the network's physical structure that defines how nodes or computers will be connected.  

6. What is a firewall?

A firewall is a security system concept that helps in protecting computers from any cyber-attack or unauthorized access. 

7. Tell us the maximum segment length of the 100Base-FX network.

The maximum length of a 100Base-FX network is 412 meters. 

8. What is the role of the network layer in the OSI reference model?

The network layer is responsible for packet switching, control of network congestion, and data routing. This layer has routers operating under it. 

9. Explain OSI and its role in computer networks.

OSI or Open Systems Interconnect is a reference model for data communication. It has seven layers, each defining a particular aspect of how network devices communicate and connect. One layer dictates how data is transmitted, while the other deals with physical media used. 

10. Give the disadvantage of the peer-peer network.

As the resources to be accessed are shared by one of the workstations on the network, there is a performance hit. 

11. Define ping.

Ping is a utility program that allows us to check connectivity on the network between network devices. A device can be pinged by using its device name(like computer name) or IP address. 

12. What is meant by clustering support?

Clustering support is the ability of a network operating system in a fault-tolerant group to connect multiple servers. The primary purpose of clustering is that if one server fails, the processing can continue with the next server in the cluster. 

13. How does dynamic host configuration protocol help in network administration?

The network administrator applies the dynamic host configuration protocol to create a pool of IP addresses instead of visiting each client computer to configure a static IP address. This pool is known as the scope that can be assigned to clients dynamically. 

14. What do you understand by decoder?

The decoder is a type of circuit that converts the digital signal into an analog signal and encoded data into its original format. 

15. Can you tell us about the use of Pseudo TTY?

It is a false terminal allowing external machines to log in or to connect through Telnet. No connection can take place without it. 

16. Tell us about the advantages of a Modem.

Some advantages of modem are:

  • Its speed depends on the cost
  • It is more helpful in connecting LAN with the Internet
  • It is the most widely used data communication roadway. 

17. Explain Proxy Server and its function.

IP addresses are required for data transmission and are even used by DNS to route to the correct website. Without knowledge of the actual and correct IP address, it is not possible to identify the network's physical location. Proxy servers prevent unauthorized access of IP addresses and make the computer network virtually invisible to external users.  

18. What are the characteristics of networking?

The characteristics of networking are:

  • Medium- the channel used by computers for communication
  • Topology- the way computers are arranged in the network physically or logically
  • Protocols- deals with how computers communicate with one another. 

19. What do you understand by beaconing?

When a network self-repair its issues, then it is known as beaconing. It is mainly used in Fiber Distributed Data Interface (FDDI) and token ring networks. If a device in the network faces any problem, then the devices that are not receiving any signal are notified. This way, the problem gets repaired within the network. 

20. What is SLIP?

SLIP refers to Serial Line Interface Protocol. It is used for transmitting IP datagrams over a serial line. 

Next up, we will cover the ten most advanced computer networks interview questions!

1. Can you explain what LAN is?

LAN refers to Local Area Network. It is the network between devices located in a remote physical location. It can be either wired or wireless. LANs differ from each other based on given factors:

  • Protocol - rules for data transfer
  • Media - medium for connecting like twisted pair wires and optic fibers
  • Topology - arrangement of nodes in the network 

2. What is an anonymous FTP?

Anonymous FTP allows users to access public data. The user need not identify himself to the server, and the login is anonymous. So, while using anonymous FTP, you are required to add 'anonymous' in place of the user id. Anonymous FTPs effectively distribute large files to many people without giving vast numbers of password and username combinations. 

3. Tell us about UTP cable.

A UTP cable is made up of copper and has a resistance of 100 ohms. It includes 2-1800 unshielded twisted pairs surrounded by a non-metallic case. These twists provide immunity to EMI and electrical noise.

4. What do you understand by TCP?

Transmission Control Protocol or TCP is a connection-oriented protocol that maintains an established connection between communicating devices until both are done exchanging messages. This protocol is used to determine how application data can be delivered over a network using packets. It also receives and sends packets from and to the network layer and is in charge of flow control. 

Become a Cyber Security Professional

  • 3.5 Million Unfilled Cybersecurity Roles Globally
  • 700 K Available Job Roles

CISSP ® - Certified Information Systems Security Professional

  • 24x7 learner assistance and support
  • Batches in alignment with the new version

Cyber Security Expert

  • Get Lifetime access to self-paced videos
  • CEH Exam Voucher with 6 months of complimentary iLabs access

Here's what learners are saying regarding our programs:

Peter Bartow

Peter Bartow

Sr project manager it pmo at university of miami , university of miami.

I enjoyed taking the class with so many people from all over the world.

Martin Beard

Martin Beard

Lpl financial advisor , hfcu financial services.

My learning experience with Simplilearn was enriching and valuable. It will undoubtedly help me to transition into my new chosen field of Cybersecurity. I liked the live virtual classes as well as the recorded sessions.

5. What is meant by NOS?

NOS or Network Operating System is an operating system designed to support databases, workstations, personal computers, and networks. For example, Linux , MAC OS X, Windows Server 2008. These OS provide functionalities such as multiprocessing support, processor support, web services, authentication, etc. 

6. Explain piggybacking.

In two-way communication, the receiver sends an acknowledgment to the sender on receiving the data packets. Suppose the receiver does not send the acknowledgment immediately and waits till the network layer passes in the following data packet. In that case, an acknowledgment is attached to the outgoing data frame. This process is known as piggybacking. 

7. What do you understand by DHCP?

Dynamic Host Configuration Protocol or DHCP is a network management protocol. DHCP automatically assigns IP addresses to the devices on the network and is used on the UDP/IP networks. In turn, it reduces the need for a network admin to assign IP addresses manually; this further reduces errors. 

8. What is the best place to install an antivirus program in a network containing twenty workstations and two servers?

The best option is to install antivirus on all the computers of the network. This will protect all devices from others in case there is a virus inserted into the server. 

9. Tell us about IPv6.

IPv6 refers to the Internet Protocol version 6. This is the latest version of the Internet Protocol. Its IP address length is 128 bits which resolve the issue of approaching network addresses shortage.  

10. What do you understand by sneakernet?

Sneakernet refers to the unofficial term for transferring electronic information by physically moving media like the USB flash, Floppy disk, optical disks, etc. 

This article is going to be helpful for everyone attending a computer network interview. As it is a complex topic, you need to be careful while answering these computer networks interview questions. You can smoothly get through the network architect interview by preparing for the topics mentioned above. We have tried to cover most of the essential things in this article. However, if you want to learn more about networking and master it in and out, you can check out our CCNA routing and switching training. What are you waiting for? Start preparing for your next computer networks interview now!

Our Cyber Security Certifications Duration And Fees

Cyber Security Certifications typically range from a few weeks to several months, with fees varying based on program and institution.

Learn from Industry Experts with free Masterclasses

Cyber security.

CISSP Demo Session

Expert Webinar: Ask Our Cyber Security Expert

Recommended Reads

Cloud Computing Interview Guide

What Is a Computer Network? Definition, Components, Objectives, and Best Practices

Top 80+ JavaScript Interview Questions and Answers for 2024

Kubernetes Interview Guide

Top 65+ JQuery Interview Questions And Answers for 2024

180+ Core Java Interview Questions and Answers for 2024

Get Affiliated Certifications with Live Class programs

  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.

Navigation Menu

Search code, repositories, users, issues, pull requests..., provide feedback.

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly.

To see all available qualifiers, see our documentation .

  • Notifications

aks2507/Computer-Networks-Assignments

Folders and files, repository files navigation, computer-networks-assignments, assignment:1.

  • Create processes sequentially; P1 -> P2 -> P3 -> P4
  • Create two processes from single process and the parent informs whenever and whichever of the children exit; P1 -> P2, P1 -> P3
  • Alternatingly post statements from two processes and use semaphores for synchronization
  • Use semaphores to read and write from and to shared memory

Assignment:2

  • Alternate lines read by parent and child process from a file using semaphores
  • Alternate lines read by two diffrent processes from a file using semaphores
  • Create two shared memories X and Y. P1 writes to X. Then P2 reads from it, then P2 changes something, writes to Y and after that, P1 reads from Y, changes something and then writes to X and so on.

Assignment:3

  • Basic pipes implementation
  • Parent sends a string, child makes some changes to it and then sends it back
  • Parent and child chatting system using threads and pipes
  • P1 sends a string, P2 makes some changes to it and then sends it back(P1 & P2 are diffrent programs)
  • P1 and P2 chatting system using threads and pipes
  • Implement a program using popen()
  • Use popen and create nested pipes; P1 <---> P2 <---> P3 <---> P4

Assignment:4

  • Implement a program using polling
  • Implement a program using mkfifo()
  • Chat server using mkfifo()
  • Code Checker

Assignment:5

  • Implement a program using raise()
  • Implement a program using different kinds of signals and use user signals as well; Communicate between both child and parent
  • Use two shared memories and signals to implement two way communication between two processes
  • Make a handler that nullifies the functioning of Ctrl+c
  • Make a handler that nullifies the functioning of Ctrl+c for only the first 5 times you press Ctrl+c

Assignment:6

  • P2 receives a signal from P1 and P2 knows it is from P1
  • P1 executes P2, P3 and P4, and signals all of them at the same time as a group
  • Communicate between two threads within a process
  • Communication between two threads in two processes. P1 sends and P2 receives

Assignment:7

  • Parent Process: S; Two other processes C1 and C2 send data to S via a fifo. Another process D sends signal to S, telling to send the message from C1 and C2 to either send to G1(children S`1 and S`2) or to G2(children A and B). There is one shared memory that tells how many times kill has been called.

Assignment:8

  • Basic implementation of message passing system calls like msgget(),msgsnd(),msgrcv() and msgctl()
  • Peer to Peer chat using message queues
  • Print all the information reagarding the message queue
  • Sequentially send messages to diffrent processes i.e. P1 -> P2 -> P3 -> P4 -> P1 -> ......
  • Implement the Chat Server using message queues. If P1 sends a message then P2 and P3 should see it, If P2 sends a message then P1 and P3 should see it and If P3 sends a message then P1 and P2 should see it.

Assignment:9

  • Use readv() and writev() in a client-server program

Assignment:10

  • Create two groups of clients. If a client wants to send a message globally, it gets broadcasted to all the clients. If it wants to send locally, it gets broadcasted only to its group. Group the clients using gids.

Assignment:11

  • Implement a basic device driver
  • Implement a basic character based device driver

Assignment:12->Minor Exam questions implementation

  • Clients join a server in a circular manner and get notified by the previosly joined client that they have joined the client-server system. Any new client joins between C1 and the last client that joined the system.
  • P1 accepts the outputs of P2, P3 AND P4 as and when they are available, and then sends those outputs to P5 and P6 for printing them. P5 and P6 should get the outputs through scanf()/cin and you should not use any read(), write() commands in P1.

Assignment:13

  • Iterative Connection Oriented Client-Server system -> Where the server directly serves the client
  • Concurrent Connection Oriented Client-Server system -> Where we use fork to create a child process of the server that serves the client
  • Multi-service Concurrent Connection Oriented Client-Server system -> Where we use execv() to run a service that serves a client
  • Multi-threaded Concurrent Connection Oriented Client-Server system -> Where we use threads to manage different clients

Assignment:14

  • Using select() to implement connection between one sever and multiple clients. In this case, a group chat is implemented.

Assignment:15

  • Basic implementation of UDP(Connectionless) socket programming(Client-Server)
  • Client-Server chat program implemented using UDP
  • One server handles a 2 TCP clients and a UDP Client
  • One server handles multiple TCP and UDP Clients(The program isn't complete)

Assignment:16

  • Implementing Unix Domain sockets by passing the fd of a file being read. After sender reads half the file, it send the fd to receiver to read the other half of it

Assignment:17

  • fd_pass: Accepting the client connections and then passing their fds to an alternate server that serves those clients
  • NITW_News: Consider the following different processes at NitwNews Channel Studio as shown in sample figure below. Editor(E) gets news from Reporters(R). Reporters type news through keyboard and send to standard output, which in turn goes to Editor. Whenever Editor receives a news, he sends the news to News Reader’s table. The News Readers N1 and N2 reads the news alternatively, i.e. arrange to display the news onto the Screen.(A news will be displayed only once onto the screen). If a News Reader notices a decimal number(port address) in the start of news content, then it gets connected to a Live telecaster(L) whose IP address is IP5, and the noticed port number. After connecting, the News Reader arranges to echo onto the screen, whatever it gets from Live telecaster. At this moment the other News Reader should not read any news as live telecast is going on. Once live telecast is over, the news reading will be done alternatively by N1 and N2 as usual. The News Reader who has got connected to live telecast should also notify the Editor, so that the editor will maintain a total count of live telecasts at any moment. This count can be seen/known by anybody in the studio. If Editor notices a news message with prefix “/d” from any of the Reporters, then it passes that Reporter to Document Writer(D). The Document Writer stores the news messages that it gets from the Reporter in a file(document). Implement all the different type of processes involved in this News Channel Studio scenario. You must have to use all the IPC (Inter Process Communication) mechanisms, 90% of I/O multiplexing, required BSD socket system calls and other suitable system calls.(This question is not possible to complete with the given set of system calls that we are taught, so don't worry if it doesn't work. It didn't work for anyone)

Assignment:18

  • Implement the inetd server with multiple clients(TCP and UDP)
  • Implement the dynamic inetd server(not completed in this repository)

Assignment:19

  • Hamming Code generation
  • Hamming Code error detection
  • rpc_calc(For simple arithmetic operations)
  • rpc_math(For arithmetic operations and sorting)
  • rpc_squaring(For squaring a number)
  • rpc_practice(Digits' sum)
  • test(Just a test progrom to see if rpcgen was working fine or not)

Assignment:20

  • IP header printing
  • Packet sniffing
  • IP Spoofing
  • Svayambhoo Server -> very similar to packet sniffing program, except this has to sniff only the packets that are sent to particular ports
  • A Service server process Si can accept the first client and serves. After that it does not accept.
  • Any Service Server Process Si , can start its execution at any time on a different sfdi.
  • A Tracer process T observes a Service server process Si serving the first client. Then it sends that service port number to Ingenerate Super Server ( ISS ) so that ISS can start accepting the second client onwards for that service request.
  • After receiving a service port number from T, the ISS only accepts service requests for any of the Service server processes and passes the accepted clients to the corresponding Si
  • Any client Ci can also get service port numbers from T, and can get connected for the service.
  • Implement the processes ISS, T , Si , Ci. See image in the folder for further clarification
  • In this case, the code is not completed

Assignment:21

  • A Client Process sends an enquiry message to Server computer system, asking for what are all the service server processes available in it. All the service server processes will receive this message and each one of them replies to the client about its service information (All of them may not send replies at the same time). The client now connects to the required service sever process. A client can connect to multiple server processes. Code to implement all processes. Check the image in the folder for further clarification.(The code for this is not perfect)
  • NITW Passport(This question was not solved by me, but I am still putting it up here so that one can try, if they want): Assume that a process S in a server system is providing passport verification service as follows: client processes C1, C2, C3,…Ci, which are running in the same computer system, contact the sever process S, and sends a message containing its name(Aabhaas Das), postal address (eg, H-No : 10 -12- 45, Fathima Nagar, Warangal). Names will be different but postal address is same. A process called Verifier V, is also running in the same computer system of S. Now the server process S makes arrangements, so that process V can verify the details of a Ci. The process V has to send the same details (i.e. name, postal address) to client processes and should get a confirmed message from concerned Ci. Then it informs S about the result of verification. Depending on the result of verification, process S either can issue or deny passport to Ci. The process V and a process Ci should have to use only one descriptor. (Hint: no need of signals or any IPC)

Assignment:22

  • Printing ARP Header
  • Printing Ethernet frame

Mid Semester Laboratory Exam Quesitons

  • All in one server(Refer the image in the folder for clarification)
  • Training and Placement Server(Refer the image in the folder for clarification)

End Semester Laborartory Exam Question

There was a set of several questions, out of which, I got one. I will be putting both the pdfs in the folder as well, so that one might refer the questions, if they wish. My question was as follows.(It was the 3rd question)

  • Nitnetd Super Server(Privileged): Nitnetd super server is similar to inetd super server except on the limit of maximum number of clients for a particular service. Assume that Nitnetd server provides services S1, S2 on ports say 1, 2. The Nitnetd server can accept a maximum of 2 clients for S1 service on port 1, maximum of 3 clients for S2 service on port2. Once the maximum limit reaches on a port , Nitnetd will be rejecting connection requests of clients, until the running S1, S2 server processes exit after servicing some of the clients. Suppose at a moment 2 clients are being served by 2 server processes of S1. Then Nitnetd keeps rejecting of connection requests for port 1. Now, if any one S1 server process completes its service and exits, then Nitnetd can accept one client for S1 service on port1. At any time, if Nitnetd is not able to service clients because of maximum limit, it notifies to another side by server N2, which will be serving any number of the clients. But a Client should be given first preference to get connected to Nitnetd. ( As Nitnetd is the main server , assume that it provides speedy service connection than that of N2. ) Implement all the processes in this scenario. Hint : After all, the Service server processes are children of Nitnetd super server process.

-----THE END-----

  • Batchfile 11.7%

Networking Projects

Networking assignment Questions

This section of the website contains networking assignment questions, network security assignment questions, CCNA assignment questions ,interview and objective questions, lab assignments. Sample questions are provided below. The detailed answers to the questions are available in the respective ebooks which can be purchased from Amazon. ——————————————————————————————————————

The following are networking based questions ideal for assignments , interview and self assessment. Sample questions are provided below. The detailed answers to questions is included in the ebook 250 Computer Networking assignment questions and answers on Amazon

PC1 PC2 and PC3 are connected to the internet via a NAT router which does port address translation. If the three PC’s simultaneously initiate a HTTP session with the web server, explain how the NAT router would handle the communication

If NAT is configured for internet sharing on a router, is it required to setup additional routing for forwarding packets to the internet or would NAT take care of the same.

An organization has a main office and 5 branch offices. It is required to connect the offices with options of using leased lines and frame relay. Give one reason from a business perspective why the organization should use frame relay for its WAN design.

A computer is connected to the internet via an ADSL router. The ADSL router is configured with appropriate DNS server IP address. Is it required to configure the DNS server IP address on the computer as well for internet access.

Telnet uses TCP port 23. Does this imply that the telnet connection initiated by a user connecting to the router from a computer uses TCP port 23

The detailed answers to questions is included in the ebook 250 Computer Networking assignment questions and answers on Amazon ——————————————————————————————————————

CCNA assignment Questions

The following are CCNA based questions ideal for assignments , interview and self assessment. Sample questions are provided below. The detailed answers to questions is included in the ebook CCNA Interview Questions and Answers

Two interfaces of a router is configured with IP addresses 192.168.1.1, subnet mask 255.255.255.0 and IP address 192.168.2.1, subnet mask 255.255.255.0. Would the routing table of the router contain any information?

There are two computers connected to a switch. The switch is powered on. After the switch boots, how many entries would be available in the mac-address table of the switch?

A network has to be designed for an organization. The organization has 5 departments each of which has different network addresses, which require communication with each other. What strategy and technology can be used for achieving the same?

A PC is connected to a 5 port ethernet hub operating at 100 Mbps. Other ports of the hub are free and not connected to any other devices. At what duplex setting can the hub operate?

The IP address of a PC is 192.168.1.2/24 and its default gateway is 192.168.1.1/24. The user on the PC pings an IP address which is on a different network (IP address: 192.168.2.2, Default gateway: 192.168.2.1). What would be the destination IP address in the IP header in the ping response packet coming from the IP address 192.168.2.2?

—————————————————————————————————————-

Network security assignment questions

The following are network security based questions ideal for assignments , interview and self assessment. Sample questions are provided below. The detailed answers to questions is included in the ebook Network Security Interview Questions and Answers

An organization uses a Cisco router for routing between its internal networks. What feature on the router can be used to block access specifically between two internal networks

An organization has a HTTPS based server behind a firewall. A website is hosted on the Web server. Which port should be open on the firewall for allowing outside users to access the HTTPS based website.

Two IPSEC routers are configured to communicate with each other. Pre-shared keys are used on both the routers. Are these keys used for encrypting data on the IPSEC tunnel

A user in an organization wishes to connect to a Web server, which is residing on the internet. The user is behind the organization firewall. What configuration should be setup on the firewall for the user to access the Web server.

A user receives a virus infected file in his email inbox. There is no antivirus on the system. Would the virus infect the system, if the user deletes the file from the inbox.

——————————————————————————————————————-

Recommended Ebooks for Assignments, Q&A, Self assessment.

250+ Network Engineer Interview Questions & Answers

The Ebook contains 250+ interview questions based on different networking and security concepts. Objective and scenario based questions with detailed answers are included.

computer network assignment questions

  • All Platforms
  • First Naukri
  • All Companies
  • Cognizant GenC
  • Cognizant GenC Next
  • Cognizant GenC Elevate
  • Goldman Sachs
  • Infosys SP and DSE
  • TCS CodeVita
  • TCS Digital
  • TCS iON CCQT
  • TCS Smart Hiring
  • Tech Mahindra
  • Zs Associates

Programming

  • Top 100 Codes
  • Learn Python
  • Learn Data Structures
  • Learn Competitve & Advanced Coding
  • Learn Operating System
  • Software Engineering
  • Online Compiler
  • Microsoft Coding Questions
  • Amazon Coding Questions

Aptitude

  • Learn Logical
  • Learn Verbal
  • Learn Data Interp.
  • Psychometric Test

Syllabus

  • All Syllabus
  • Cognizant-Off Campus
  • L&T Infotech
  • Mahindra ComViva
  • Reliance Jio
  • Wells Fargo
  • ZS-Associates

Interview Preparation

  • Interview Preparation
  • HR Interview
  • Virtual Interview
  • Technical Interview
  • Group Discussions

Interview Exp.

  • All Interview Exp.
  • Accenture ASE
  • ZS Associates

Off Campus

  • Get OffCampus updates
  • On Instagram
  • On LinkedIn
  • On Telegram
  • On Whatsapp
  • AMCAT vs CoCubes vs eLitmus vs TCS iON CCQT
  • Companies hiring via TCS iON CCQT
  • Companies hiring via CoCubes
  • Companies hiring via AMCAT
  • Companies hiring via eLitmus
  • Companies hiring from AMCAT, CoCubes, eLitmus
  • Prime Video

PrepInsta Prime

  • The Job Company
  • Placement Stats

computer network assignment questions

Notifications Mark All Read

No New notification

  • Get Prime
  • Persistent Home
  • Previous Papers

Persistent Syllabus

  • Logical Reasoning
  • Verbal English
  • Computer Science
  • Automata Questions
  • Coding Questions
  • Advanced Coding
  • Super Achiever Test
  • Drona Interview
  • Recruitment process
  • Eligibility Criteria

Get Hiring Updates

Computer networks questions and answers, free material.

computer network assignment questions

Computer Networks Quiz-1

Paid Material

Computer Networks Quiz-2

Computer Networks Quiz-3

Computer Networks Quiz-4

Complete Mock Subscription for Persistent

computer network assignment questions

76% of prime members learners got selected in Persistent

7 out of 10 fresh grads in Persistent are from PrepInsta

3,110+ bought in last 1 Month

computer network assignment questions

Login/Signup

Personalized Analytics only Availble for Logged in users

Analytics below shows your performance in various Mocks on PrepInsta

Your average Analytics for this topic

Topic Mocks completed

0 out of 4 Mocks

Related Banners

prepinsta

Prepinsta Prime

computer network assignment questions

Get Prepinsta Prime

Get all 200+ courses offered by Prepinsta

Check out our instagram

Never Miss an OffCampus Update

Get OffCampus Updates on Social Media from PrepInsta

Follow us on our Media Handles, we post out OffCampus drives on our Instagram, Telegram, Discord, Whatsdapp etc.

computer network assignment questions

Get over 200+ course One Subscription

Get PrepInsta Prime Subscription

TCS, Cognizant, Delloite, Infosys, Wipro, CoCubes, KPMG, Amazone, ZS Associates, Accenture, Congnizant & other 50+ companies

Programming

Data Structures, Top 500 Codes, C, C++, Java Python & other 10+ subjects

Full Stack Web Development, Data Science, Machine Learning, AWS Cloud, & other 10+ skills and 20+ projects

OffCampus Updates

computer network assignment questions

Never Miss OffCampus Updates

Get OffCampus Update from PrepInsta

Follow us on our Social Media Handles

computer network assignment questions

Related Pages

computer network assignment questions

Persistent Aptitude Questions

Persistent Logical Questions

Persistent Verbal English

Persistent Advanced Coding Questions

Persistent Super Achiever Test

prepinsta

September 16, 2022

Computer Bits Daily

  • Install Android App
  • _C Programming App
  • Privacy Policy
  • Computer Basic
  • Tutorial & More
  • _C Programming
  • _Computer Network
  • _Operating System
  • _Prog. & DS
  • _Static Webpage
  • _Basic Computer
  • _Python PDA
  • _JOC Python

Computer Networks And Internet Protocol | NPTEL

Computer networks and internet protocol - assignment: answer with explanation.

The broad objective of the course is to understand - (i) the architecture and principles of today's computer networks, (ii) the protocols and their functionalities, (iii) the requirements for the future Internet and its impact on the computer network architecture. In this course, we'll broadly cover the basic TCP/IP protocol stack and touch on the next generation computer networks. We'll take a top-down approach to cover different protocols at the TCP/IP protocol stack.

Computer Networks And Internet Protocol - Assignment Answer with Explanation

Computer Networks And Internet Protocol: Welcome to NPTEL Online Course - Jan 2023!!

Computer networks and internet protocol - week 1 | assignment 1 [jan 2023] - click for solution, computer networks and internet protocol - week 2 | assignment 2 [jan 2023] | nptel - click for solution, computer networks and internet protocol - week 3 assignment 3 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 4 assignment 4 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 5 assignment 5 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 6 assignment 6 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 7 assignment 7 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 8 assignment 8 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 9 assignment 9 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 10 assignment 10 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 11 assignment 11 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 12 assignment 12 | nptel | jan 2023 - click for solution, learn python at "computer courses - android app"  - click to install .

PRG

Posted by: PRG

You may like these posts, post a comment, popular posts.

Run Python Program on android with termux

Run Python Program on android with termux

Run C plus plus Program on android with termux - Computer Bits Daily

Run C plus plus Program on android with termux - Computer Bits Daily

Run C Program on android with termux

Run C Program on android with termux

  • Android App
  • Basics of computer knowledge
  • c on termux
  • Compute Learning Android App
  • Computer Fundamental
  • Data Structure
  • ‎Excel
  • html css javascript
  • Operating System practical list 4330703

Search This Blog

Install android app, subscribe us.

Amazon Associate Disclosure

  • Android App 2
  • Basics of computer knowledge 26
  • c programming 2
  • Compute Learning Android App 2
  • computer bits daily 5
  • Computer Fundamental 26
  • Data Structure 4
  • Ethical Hacking 2
  • ‎Excel 7
  • Excel formula 4
  • google spreadsheet 3
  • google tricks and tips 3
  • Microsoft Word 1
  • Motivational Quotes 1
  • Operating System practical list 4330703 1
  • Power Point MCQs 1
  • powerpoint 1
  • windows 10 1
  • windows 11 7

Menu Footer Widget

Contact form.

Engineering Mathematics

Discrete mathematics, operating system.

  • Computer Networks

Digital Logic and Design

  • C Programming
  • Data Structures

Theory of Computation

Compiler design.

  • Computer Org and Architecture
  • Previous Years GATE CSE and IT Papers Download Link

Data Structure & C Programming

  • Data Structures & C Programming - GATE CSE Previous Year Questions
  • Top MCQs on Array Data Structure with Answers
  • Top MCQs on Linked List Data Structure with Answers
  • Top MCQs on Stack Data Structure with Answers
  • Top MCQs on Queue Data Structure with Answers
  • Top MCQs on Binary Trees Data Structure with Answers
  • Top MCQs on Binary Search Tree (BST) Data Structure with Answers
  • Top MCQs on Tree Traversal with Interview Question and Answers | DSA Quiz
  • Top MCQs on B and B+ Trees with Answers
  • Top MCQs on Heap Data Strcuture with Answers
  • Top MCQs on Graph Data Strcuture with Answers
  • Top MCQs on Hash Data Strcuture with Answers
  • Algorithms - GATE CSE Previous Year Questions
  • Top MCQs on Complexity Analysis of Algorithms with Answers
  • Top MCQs on Recursion Algorithm with Answers
  • Top MCQs on Searching Algorithm with Answers
  • Top MCQs on Divide and Conquer Algrithm with Answers
  • Top MCQs on Greedy Algorithms with Answers
  • Top MCQs on Dynamic Programming with Answers
  • Top MCQs on Complexity Analysis using Recurrence Relations with Answers
  • Top MCQs on NP Complete Complexity with Answers
  • Top MCQs on Graph Traversals with Answers
  • Top MCQs on Shortest Paths in Graphs with Answers
  • Top MCQs on Minimum Spanning Tree (MST) in Graphs with Answers
  • Network Layer
  • Transport Layer
  • Application Layer
  • Network Security
  • Database Design(Normal Forms)
  • Transactions and concurrency control
  • File structures (sequential files, indexing, B and B+ trees)
  • OS CPU Scheduling
  • OS Memory Management
  • OS Input Output Systems

Computer Organization and Architecture

  • CPU control design and Interfaces
  • Secondary memory and DMA
  • Combinational Circuits
  • Sequential circuits
  • Number Representation
  • Set Theory & Algebra
  • Combinatorics
  • Top MCQs on Graph Theory in Mathematics
  • Numerical Methods and Calculus
  • Linear Algebra
  • Theory of Computation - GATE CSE Previous Year Questions
  • Recursively enumerable sets and Turing machines
  • Undecidability
  • Parsing and Syntax directed translation
  • Code Generation and Optimization

Computer Networks – GATE CSE Previous Year Questions

Solving GATE Previous Year’s Questions (PYQs) not only clears the concepts but also helps to gain flexibility, speed, accuracy, and understanding of the level of questions generally asked in the GATE exam, and that eventually helps you to gain good marks in the examination. Previous Year Questions help a candidate practice and revise for GATE, which helps crack GATE with a good score. 

Computer Networks Previous Year GATE Questions help in analyzing the question pattern of a subject and marking scheme as well as it helps in time management which overall increases the score in the GATE exam. With regular practice of PYQs, candidates can easily crack GATE with a good GATE Score.

Before 2006, questions asked in GATE were mainly theoretical, but in recent years, the questions asked were multiple-choice questions with a single correct option or multiple correct options. We are looking to provide the multiple-choice questions that are asked in GATE.

Computer Networks GATE Previous Year Questions

In this article, we are mainly focusing on the Computer Networks GATE Questions that are asked in Previous Years with their solutions, and where an explanation is required, we have also provided the reason.

In Computer Networks , we will deal with the following concepts. We have also provided GATE Previous Year’s Questions on these topics. Here is the list of those topics along with their links.

  • Physical Layer
  • Data Link Layer

Below mentioned are the links to the Computer Networks PYQ’s pages. On each page, you will get the questions asked in CN along with the years asked.

Also, here we are going to discuss some basic PYQs related to Computer Networks.

1. Which one of the following is not a client-server application? [GATE CSE 2010] (A) Internet Chat (B) Web Browsing (C) Email (D) ping Solution: Correct answer is ( D )

For more, refer to GATE CS 2010 | Question 16.

2. Match the following. [GATE CSE 2007] (P) SMTP (1) Application layer (Q) BGP  (2) Transport layer (R) TCP 3) Data link layer (S) PPP (4) Network layer   (5) Physical layer (A) P-2, Q-1. R-3, S-5 (B) P-1, Q-4, R-2, S-3 (C) P-1, Q-4, R-2, S-5 (D) P-2, Q-4, R-1, S-3 Solution: Correct answer is ( B )

For more, refer to GATE | GATE-CS-2007 | Question 70.

3. Choose the best match between Group 1 and Group 2. [GATE CSE 2004]  Group-1  Group-2  P. Data Link Layer 1. Ensures reliable transport of data over a physical point-to-point link  Q. Network layer 2. Encoder/Decoder data for physical transmission R. Transport layer 3. Allows end-to-end communication between two processes   4. Routes data from one network node to the next (A) P-1, Q-4, R-3 (B) P-2, Q-4, R-1 (C) P-2, Q-3, R-1 (D) P-1, Q-3, R-2 Solution: Correct answer is ( A )

For more, refer to GATE | GATE-CS-2004 | Question 15 .

GATE CSE Previous Year Question Papers

These previous year’s questions help you in understanding the question patterns followed by GATE that directly help a candidate in scoring good marks in GATE. Below are the mentioned links of year-wise GATE Previous Question Papers.

Please Login to comment...

Similar reads.

  • GATE-CS-2012

Improve your Coding Skills with Practice

 alt=

What kind of Experience do you want to share?

COMMENTS

  1. CS-68 Computer Networks Assignment Questions

    Assignment Code : BCA (5)CS-68/Assignment/08. Note : Attempt all Questions. Question 1: Draw the TCP/IP network architectural model and explain the features of various layers. Also list the important protocols at each layer and describe its purpose. Briefly describe the difference between the OSI and TCP/IP architectural model.

  2. Computer Network: Networking Practice Questions With Listed Answers

    A computer network is a collection of various computing machines that are able to share each other's resources in a mannerly fashion. A computer network is at the centre of all the modern processes and computational exercises. ... Networking Practice Questions has questions based on the concepts of Computer Networks, The OSI Model, Computer and ...

  3. 50 Computer Networks MCQs with Answers

    Question 9. Consider the set of activities related to e-mail A : Send an e-mail from a mail client to mail server B : Download e-mail headers from mail box and retrieve mails from server to a cache C : Checking e-mail through a web browser The application level protocol used for each activity in the same sequence is. SMTP, HTTPS, IMAP.

  4. CSE 473. Introduction to Computer Networks

    Text: Computer Networking by Kurose and Ross TCP/IP Sockets in Java by Calvert and Donahoo (optional) electronic versions of both available on Amazon Professor Jon Turner, Bryan 522C, 935-8552 ... The table below lists reading assignments, homework questions and review questions. (Reading assignments from K&R are identified by chapter and ...

  5. Computer networks (practice)

    Learn for free about math, art, computer programming, economics, physics, chemistry, biology, medicine, finance, history, and more. Khan Academy is a nonprofit with the mission of providing a free, world-class education for anyone, anywhere.

  6. Computer Network Questions and Answers

    In this network model, all the net flows are typically zeros. options: a. transportation b. maximal flow c. assignment d. solver View Answer TCO A) A backbone network is -a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information....

  7. CCNA v7.0 Exam Answers 2023

    Modules 1 - 3: Basic Network Connectivity and Communications Exam Answers. Test. Modules 4 - 7: Ethernet Concepts Exam Answers. Test. Modules 8 - 10: Communicating Between Networks Exam Answers. Test. Modules 11 - 13: IP Addressing Exam Answers. Test. Modules 14 - 15: Network Application Communications Exam Answers.

  8. COMP 3621: Computer Networks Assignments

    Homework 1: The Topology of the Internet, kinda. Assigned: Jan. 3rd. Due: Jan. 5th. In this assignment you will use the traceroute (tracert for Windows users) program to find the route to three (3) of your favorite sites on the Internet. Draw a graph of your results, labeling each node with the IP address of the hops between your location and ...

  9. CSL374/672: Computer Networks

    The course will cover protocols at the Application, Transport, Network, Data link, as well as Physical layers. Lab. Assignment 1; Assignment 2; Assignment 3; Assignment 4; Assignment 5; Announcements Here is a set of sample questions for your practice. You can expect similar or more difficult questions in quizzes and other examinations ...

  10. Assignments

    Computer Networks. Menu. More Info Syllabus Calendar Readings Lecture Notes Assignments Projects Tools Related Resources Assignments. ASSIGNMENTS USEFUL FILES FAQ SOLUTIONS Problem Set 1 20001206.byte ... assignment_turned_in Problem Sets with Solutions. Download Course.

  11. Commonly asked Computer Networks Interview Questions

    If the message is sent to all the nodes in a network it is called Broadcasting. This is typically used in Local networks, for examples DHCP and ARP use broadcasting. What are layers in OSI model? There are a total of 7 layers. 1. Physical Layer. 2. Data Link Layer. 3.

  12. PDF Computer Network Assignments

    COMPUTER NETWORK ASSIGNMENTS Assignments based on CS-333 (Computer Networks -I) and CS-343 (Computer Networks -II ) ... Self study questions for students : 1. List the stages of Linux boot process 2. What is runlevel? ... Network mapper tool to discover hosts and services on a computer network. $ nmap <ip-address> Output : $ nmap <server-ip ...

  13. Computer Networks

    Gigabit Ethernet. IEEE 802.11. Bluetooth: Architecture and Devices. Connecting Devices. Backbone Networks. Virtual LANs. Virtual-Circuit Networks: Frame Relay and ATM. Asynchronous Transfer Mode (ATM) Important Short Questions and Answers: Computer Networks - Data Link Layer.

  14. Computer Network MCQ (Multiple Choice Questions)

    4. MCQ on Application Layer. The section contains Computer Network multiple choice questions and answers on application layer, http, ftp, smtp, dns, dhcp, ipsecurity, virtual private networks, smi, and telnet. Application Layer - 1. Application Layer - 2. HTTP.

  15. Computer Networks -- Assignments

    Computer Networks -- Assignments. This page contains the assignments (and their solutions) for Computer Networks. All assignments are due in class (at the beginning of class!) on the due date noted in the syllabus. Assignments: Assignment #7 (due 11/27/18 at the start of class) is here. The solutions are here.

  16. Data Communication and Network: Assignment #2

    Assignment 2 . Assignment Layout (25%) o Assignment is neatly assembled on 8 1/2 by 11 paper. o Cover page with your name (last name first followed by a comma then first name), username and section number with a signed statement of independent effort is included. o Answers to all assignment questions are correct. o File name is correct.

  17. Top 30 Computer Networks Interview Questions and Answers

    10. Give the disadvantage of the peer-peer network. As the resources to be accessed are shared by one of the workstations on the network, there is a performance hit. 11. Define ping. Ping is a utility program that allows us to check connectivity on the network between network devices.

  18. GitHub

    Assignment:1. Create processes sequentially; P1 -> P2 -> P3 -> P4. Create two processes from single process and the parent informs whenever and whichever of the children exit; P1 -> P2, P1 -> P3. Alternatingly post statements from two processes and use semaphores for synchronization.

  19. Networking assignment Questions

    The detailed answers to questions is included in the ebook 250 Computer Networking assignment questions and answers on Amazon. Question 1. PC1 PC2 and PC3 are connected to the internet via a NAT router which does port address translation. If the three PC's simultaneously initiate a HTTP session with the web server, explain how the NAT router ...

  20. Top 50 Networking Interview Questions (2024)

    Basic Networking Interview Questions. Now, let's get started with the list of top Networking Interview Questions: 1. Name two technologies by which you would connect two offices in remote locations. Two technologies that would connect two offices in remote locations are VPN and Cloud computing. 2.

  21. Computer Networks Questions and Answers » PREP INSTA

    Computer Networks Questions and Answers. Quiz; Free Material. Computer Networks Quiz-1. 0%. Start. Paid Material. Computer Networks Quiz-2. 0%. Start. Computer Networks Quiz-3. 0%. Start. Computer Networks Quiz-4. 0%. Start. Prime Mock. Complete Mock Subscription for Persistent. Get Prime Mock. 76% of prime members learners got selected in ...

  22. Computer Networks And Internet Protocol

    Computer Networks And Internet Protocol - Assignment: Answer with Explanation. The broad objective of the course is to understand - (i) the architecture and principles of today's computer networks, (ii) the protocols and their functionalities, (iii) the requirements for the future Internet and its impact on the computer network architecture.

  23. Computer Networks

    Computer Networks Previous Year GATE Questions help in analyzing the question pattern of a subject and marking scheme as well as it helps in time management which overall increases the score in the GATE exam. With regular practice of PYQs, candidates can easily crack GATE with a good GATE Score. Before 2006, questions asked in GATE were mainly ...