0% found this document useful (0 votes)
15 views3 pages

IT_6_KCS603_SET1

This document is an examination paper for the Computer Networks course at KIET Group of Institutions, covering various topics such as network topologies, protocols, and traffic shaping mechanisms. It includes multiple sections with questions on theoretical concepts, practical applications, and problem-solving related to networking. The exam is structured into three sections with a total of 100 marks, aimed at assessing students' understanding and skills in the subject.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views3 pages

IT_6_KCS603_SET1

This document is an examination paper for the Computer Networks course at KIET Group of Institutions, covering various topics such as network topologies, protocols, and traffic shaping mechanisms. It includes multiple sections with questions on theoretical concepts, practical applications, and problem-solving related to networking. The exam is structured into three sections with a total of 100 marks, aimed at assessing students' understanding and skills in the subject.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Roll No.

___________________

KIET Group of Institutions


PUE Examination (2022-2023) EVEN Semester

Department: Information Technology Course: B.Tech


Year: 3rd Year Semester: VIth
Subject Name: Computer Networks Subject Code: KCS-603

Duration: 3 Hrs Max. Marks: 100


Note: Attempt all the questions of each section
Section-A (2X10=20)
Q. 1 Question Competitive BL/
CO
Exam# KC*
a Discuss the mesh topology with its advantages and disadvantages. 1 2/C
b Explain the causes of transmission impairment. 1 2/C
c Consider the Pure ALOHA, Slotted ALOHA, and Non-persistent CSMA. 2
2/C
Which one will you use at high load? Explain the reason in your answer.
d For the m=4, Find the window size (send window and receive window) for all GATE 2
3/P
three ARQ protocol. 2016
e For which one of the following reasons does Internet Protocol (IP) use the GATE 3
2/C
time-to-live (TTL) field in the IP datagram header? 2006
f An organization has a class B network and wishes to form subnets for 64 GATE 3
3/P
departments. The subnet mask would be 2005
g Distinguish between flow control and congestion control. 4 2/C
h Differentiate between lossless and lossy compression. 4 2/C
i Write the port number of DNS, SMTP, Telnet and HTTP protocols. 5 1/F
j Write the name of layers on which following protocol works: GATE 5 1/C
(i) SMTP (ii) BGP (iii) TCP (iv) PPP 2007

Section-B (6X5=30)
Discuss the following network commands: AKTU
ping, ipconfig, netstat, tracert, nslookup, hostname 2021
Q. 2 OR 1 2/C
Discuss the following network connecting device: AKTU
Hub, Switch, Router, Gateway, Repeater, Bridge. 2010
Station A needs to send a message consisting of 9 packets to station B using a
sliding window (window size 3) and go back n error control strategy. All packets
are ready and immediately available for transmission. If every 5th packet that A GATE
transmits gets lost (but no ACKs from B ever get lost), then illustrate step by 2006
step, the number of packets that A will transmit for sending the message to B.
Q. 3 2 3/C
OR
Examine if, in a Stop-and-Wait ARQ system, the bandwidth of the line is 1
Mbps, and 1 bit takes 20 ms to make a round trip. What is the bandwidth-delay
GATE
product? If the system data frames are 1000 bits in length, what is the utilization
2007
percentage of the link? What is the utilization percentage of the link, if the link
uses Go-Back-N ARQ with a 15-frame sequence?
The IP network 200.198.160.0 is using subnet mask 255.255.255.224. Determine GATE
and design all the subnets with their first address and last address. 2016
OR
A block of addresses is granted to a small organization. We know that one of the
addresses is 205.16.37.39/28. Calculate the following
Q. 4 3 3/P
a. Default mask
GATE
b. Subnet mask
2014
c. The first address
d. The last address
The number of addresses.
● CO -Course Outcome generally refer to traits, knowledge, skill set that a student attains after completing the course successfully.
● Bloom’s Level (BL) - Bloom’s taxonomy framework is planning and designing of assessment of student’s learning.
● *Knowledge Categories (KCs): F-Factual, C-Conceptual, P-Procedural, M-Metacognitive
● #Reference to Competitive Exams (GATE, GPAT, CAT, GRE, TOFEL, NET, etc. )
Roll No. ___________________
Illustrate the Leaky Bucket Traffic Shaping mechanism with suitable figure. AKTU
2013
Q. 5 OR 4 4/P
Illustrate the Token Bucket Traffic Shaping mechanism with suitable figure. AKTU
2013
Demonstrate the TELNET and its working procedure.
OR
Q. 6 5 3/P
Demonstrate the SNMP protocols in detail. AKTU
2016
Section-C (10X5=50)
Illustrate the circuit, message and packet switching techniques and also outline
their advantages and disadvantages. 1 4/C
Q. 7
OR
Illustrate the OSI reference model and also outline the differences with TCP/IP AKTU
protocol suite. 2018
In Go-back-N ARQ, the size of send window must be less than 2m, where m is
the size of sequence number field in bits. Defend with suitable figure. 2 5/P
Q. 8 OR
Defend the different persistent strategy of CSMA/CD and also defend the
CSMA/CA with suitable diagram.
Illustrate the count to infinity problem. Assume that for the following subnet, AKTU
distance vector routing is used and the following vectors that have just come into 2016 3 4/P
router C, from B: (5,0,8,12,6,2); from D: (16,12,6,0,9,10); and from E:
(7,6,3,9,0,4); the measured delays to B, D, and E are 6,3,5 respectively. Calculate
and discover the C’s new routing table. Give both the outgoing line to use and
the expected delay.

Q. 9

OR
Compare and contrast the open-loop and closed-loop congestion control
mechanism with various policies at different layers.
Compare and discuss the symmetric key cryptography and asymmetric key
cryptography with suitable figures. 4 4/P
Q. 10 OR
Illustrate the TCP header format with suitable figures. AKTU
2018
Illustrate two email protocols (IMAP4 and POP3). AKTU
2013 5 4/C
Q. 11 OR
Illustrate that, how does DNS perform data name resolution? AKTU 2017

● CO -Course Outcome generally refer to traits, knowledge, skill set that a student attains after completing the course successfully.
● Bloom’s Level (BL) - Bloom’s taxonomy framework is planning and designing of assessment of student’s learning.
● *Knowledge Categories (KCs): F-Factual, C-Conceptual, P-Procedural, M-Metacognitive
● #Reference to Competitive Exams (GATE, GPAT, CAT, GRE, TOFEL, NET, etc. )
Roll No. ___________________

● CO -Course Outcome generally refer to traits, knowledge, skill set that a student attains after completing the course successfully.
● Bloom’s Level (BL) - Bloom’s taxonomy framework is planning and designing of assessment of student’s learning.
● *Knowledge Categories (KCs): F-Factual, C-Conceptual, P-Procedural, M-Metacognitive
● #Reference to Competitive Exams (GATE, GPAT, CAT, GRE, TOFEL, NET, etc. )

You might also like