0% found this document useful (0 votes)
9 views

Computer Networking 2015-16

Computer Networking (BCA,2015-16)
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
9 views

Computer Networking 2015-16

Computer Networking (BCA,2015-16)
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
http://www.makaut.com CS/BCA/Odd/Sem-Sth/BCA-S01/2015-16 = =e MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, ‘WEST BENGAL BCA-501 Data COMMUNICATION AND COMPUTER NETWORKS Time Allotted: 3 Hours Full Marks: 70 The questions are of equal value. The figures in the margin indicate full marks. Candidates are required to give their answers in their own words as far as practicable. Alll symbols are of usual significance. GROUP A (Multiple Choice Type Questions) 1. Answer any fen questions. 101 = 10 (i) A system uses 32 levels for data representation for transmission; the number of bits that this system can support is (aya (B) 16 (©) 32 @)s (ii) Baud is (A) number of bits per second (B) number of signal changes per second (C) number of bytes per second (D) number of character per second (ii) ARP is used to find (A) IP address (B) MAC address, (C) Subnet address () Host address 5142 1 ee http://www.makaut.com http://www.makaut.com (CS/BCA/Odd/Sem-Sth/BCA-501/2015-16 (iv) How many redundancy bits are required to correét a data containing 8 bits? (A)3 (B)4 (5 @)8 (v) Firewall (A) allows people on the internet to see just one IP address (B) does not allow any connections to server (C)restricts unauthorized users from accessing sensitive data (D) manages password function (vi) In which ARQ, when a NAK is received, all frames sent since the last frame acknowledge are retransmitted? (A) Stop-and-Wait (B) Go back n (C) Selective Reject () Both (A) and (B) (vii) The highest data rate is provided by the transmission medium (A) Coaxial Cable (B) Twisted Pair (C) Optical fiber (D) Microwave (viii) What is present in all HDLC control fields? (A) PF bit (B) N(R) (C) Code bits @)NGS) (ix) Signal become weak with increase in distance traveled because of (A) modulation (B) attenuation (©) distortion (D) switching (x) IP address in the B class is given by (A) 125.123.123.3 (B) 191.023.21.52 (C) 192.128.32.56 (D) 10.17.16.38 (xi) Usually information security is achieved by (A) layering (B) addressing (C) grade of service (D) cryptography 2 5142 http://www.makaut.com http://www.makaut.com (CS/BCA/Odd/Sem-Sth/BCA-501/2015-16 (xii) Router operates in (A) data link layer (B) network layer (©) transport layer (D)all of these GROUP B (Short Answer Type Questions) Answer any three questions. 3x5 =15 2. What is transmission impairment? What are its causes? 5 3. Distinguish between Circuit switching and Packet switching. 5 4, Define bit rate and baud rate. Consider a noiseless channel with a bandwidth 342 of 3000: Hz transmitting a signal with two signal levels. Calculate the maximum bit rate. 5. (a) What is Ethemet? (b) What are the differences between IEEE 802.4 and IEEE 802.5? 4 6. (a) What do you mean by multiplexing? 2 (b) Discuss the basic difference between TDM and FDM. 3 GROUP C (Long Answer Type Questions) Answer any three questions. 3x15=45 7. (a) Communications services may be classified as Connection Oriented or 6 Connectionless. Briefly summarize the principal difference between these two service classes. (b) Write down the advantages ‘and disadvantages of Synchronous and 6 Asynchronous modes of data transmission. (©) Given a bandwidth of 6000 Hz for an 8-PSK signal, what are the baud rate 3 and bit rate? 5142 3 Tum Over http://www.makaut.com http://www.makaut.com CS/BCA/Odd/Sem-Sth/BCA-501/2015-16 8. (a) Explain the operation of CRC error detection method. By means of an 8 example show hor (i) The error detection bits are generated (i) The received frame is checked for transmission errors Use the generator polynomial x’ +x + 1. (b) In stop-and-wait flow control, define and discuss the handling of 1 () A damaged frame (ii) A lost frame 9. (@) Differentiate between Link State and Distance Vector routing algorithms. 5 () What do you mean by encryption and decryption? What is Cipher text? 6 Explain different encryption techniques under conventional method of encryption and decryption. (©) What is inverse multiplexing? Why do we need inverse multiplexing? 4 10.(a) Explain the IEEE 802.3 MAC frame format. (b) Explain X.25 frame format. How packets are associated with the virtual cireuit on which they travel? What is the purpose of an LCN? (© A file contains 3 million bytes. How long does it take to download this file 2 using a 100-Kbps channel and 10-Mbps channel? ao 11, Write short notes on any three of the following: 3x5 (a) Firewall (b) Describe the following terms (@ Hop-by-hop (ii) End-to-end (©) UDP (@) TELNET © 16 $142 http://www.makaut.com

You might also like