JISCE / UG / CSE / R18 / EVEN / SEM-6 / CS601 / 2022-23
COMPUTER NETWORK
CS601
TIME ALLOTTED: 3 HOURS FULL MARKS: 70
The figures in the margin indicate full marks.
Candidates are required to give their answers in their own words as far as practicable
GROUP – A
(Multiple Choice Type Questions)
1. Answer any ten from the following, choosing the correct alternative of each question: 10×1=10
Marks CO No.
(i) Transmission control protocol is ____________. 1 2
(a) connection oriented protocol
(b) uses a three-way handshake to establish a
connection
(c) receives data from application as a single stream
(d) all of the mentioned
(ii) ICMP is primarily used for _____________. 1 3
(a) error and diagnostic functions
(b) addressing
(c) forwarding
(d) none of the mentioned
(iii) Header of a frame generally contains ____________. 1 2
(a) synchronization bytes
(b) addresses
(c) frame identifier
(d) all of the mentioned
(iv) To deliver a message to the correct application program 1 4
running on a host, the _______ address must be consulted.
(a) IP
(b) MAC
(c) Port
(d) None of the mentioned
(v) Multiplexing is used in _______. 1 2
(a) Packet switching
(b) Circuit switching
(c) Data switching
(d) Packet & Circuit switching
(vi) Delimiting and synchronization of data exchange is 1 4
provided by __________.
(a) Application layer
(b) Session layer
(c) Transport layer
(d) Link layer
Page 1 of 3
JISCE / UG / CSE / R18 / EVEN / SEM-6 / CS601 / 2022-23 JISCE / UG / CSE / R18 / EVEN / SEM-6 / CS601 / 2022-23
(vii) Which of the following task is not done by data link layer? 1 2 6. Generate the CRC code for the data word of 1010011110. 5 2
(a) framing The divisor is 1011.
(b) error control GROUP – C
(c) flow control (Long Answer Type Questions)
(d) channel coding Answer any three from the following 3×15=45
(viii) If subnet mask is [Link], then how many subnets 3
Marks CO No.
are available?
(a) 2 1 7. (a) Explain CSMA/CA with flow chart. 5 2
(b) 18 (b) Describe different techniques in open loop and closed loop 4 4
(c) 4 congestion control.
(d) 24 (c) Explain the difference between Leaky bucket algorithm, 3 4
(ix) The total number of links required to connect n devices 1 1 Token bucket algorithm.
using Mesh Topology is _______________. (d) How cable modem works? 3 4
(a) 2n 8. (a) How packet filtering works for network security? Explain 5 3
(b) n(n+1)/2 digital signature.
(c) n(n-1)/2 (b) What is cryptography? Explain different types of key used 5 5
(d) None of the above in cryptography.
(x) The hamming code is a method of ___________. 1 2 (c) Explain the role of ICMP in networking. 5 1
(a) Error detection
(b) Error correction 9. (a) Compare between TCP and UDP. 5 4
(c) Error encapsulation (b) Write a comparative study on Go-Back-N ARQ & 5 4
(d) both (a) and (b) Selective Repeat ARQ.
(xi) All the packets in a message follow the same path in 1 2 (c) Explain the functionalities of Bridges in computer 5 2
___________. network.
(a) Datagram packet switching 10. (a) Explain IP datagram with diagram. 5 3
(b) Virtual circuit packet switching (b) Discuss the working principles of proxy firewall for 3+2 5
(c) Message switching network security. Explain digital signature.
(d) None of these (c) Compare between circuit, message and packet switching. 5 2
(xii) Link control protocol and Network control protocol is a 1 2 11. Write short notes (any three) 3×5=15
feature of __________. (i) SMTP 5 5
(a) Peer-to-Peer protocol (ii) TELNET 5 5
(b) Point-to-Point protocol (iii) TCP congestion control policy 5 4
(c) MAC Protocol (iv) WWW & HTTP 5 5
(d) HDLC protocol (v) DHCP 5 3
GROUP – B
(Short Answer Type Questions)
Answer any three from the following 3×5=15
Marks CO No.
2. How do the digital to analog conversion is carried out 5 3
through ASK, FSK and PSK, explain with diagrams?
3. Describe HDLC frame format with three different type 5 2
frame control field.
4. Describe the working principle of virtual circuit switching. 5 2
5. Compare between Pure ALOHA and Slotted ALOHA 5 2
mechanisms.
Page 2 of 3 Page 3 of 3