0% found this document useful (0 votes)
21 views

Computer Network-scheme BCA sem5

Uploaded by

abintomy06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Computer Network-scheme BCA sem5

Uploaded by

abintomy06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

B.

Sc/BCA DEGREE (CBCS ) SPECIAL SUPPLEMENTARY EXAMINATIONS, APRIL

2023

Fifth Semester

CORE COURSE - CS5CRT12 - COMPUTER NETWORKS SCHEME

Common for B.Sc Information Technology Model III & Bachelor of Computer Applications

2020 Admission Only

1725F2AD

Part A

Answer any ten questions.

Each question carries 2 marks.

1. Define data and signals.


Data are simply values or sets of values of qualitative or quantitative variables, belonging to a set of
items. It may be in the form of numbers, letters, or a set of characters. It is often collected via
measurements(1 Mark)
In order for data or information to be transferred electronically, it must first be converted into
electromagnetic signals. The signal can then be used to transfer data from one device to another device.
The signal can be either analog or digital in nature. (1 Mark)
2. Define mode of transmission.
Transmission mode means transferring data between two devices. he three types of transmission media
are simplex ,half duplex and full-duplex mode.(Give 2 marks).
3. Define multiplexing.
Multiplexing is a method used by networks to consolidate multiple signals -- digital or analog -- into a
single composite signal that is transported over a common medium, such as a fiber optic cable or radio
wave.(Give 2 marks)
4. Differentiate step index and graded index fiber.
STEP INDEX FIBER : The refractive index of the core is uniform throughout and undergoes on abrupt
change at the core cladding boundary(1 mark)
GRADED INDEX FIBER: The refractive index of the core is made to vary gradually such that it is
maximum at the center of the core(1 mark)
5. Define switch. What are the different types of switches?
Switches are networking devices operating at layer 2 or a data link layer of the OSI model. They
connect devices in a network and use packet switching to send, receive or forward data packets or data
frames over the network.(1 Mark).Different types of switches are Unmanaged switches, Managed
switches, LAN Switch, PoE Switch(Give 1 mark.1/4 mark for one switch).
6. Differentiate sequence number and acknowledgement number.
The client on either side of a TCP session maintains a 32-bit sequence number it uses to keep track of
how much data it has sent. This sequence number is included on each transmitted packet, and
acknowledged by the opposite host as an acknowledgement number to inform the sending host that the
transmitted data was received successfully.(Give 2 marks).
7. Differentiate CSMA/CD and CSMA/CA.
CSMA/CA is a network protocol for carrier transmission that stands for Carrier Sense Multiple Access
with Collision Avoidance. This protocol is used for collision avoidance..
In CSMA/CD, when a collision is recognized, the transmission is halted, and the stations send a "jam
signal", after which the station waits for a random time context before retransmission.(Give 2 marks)
8. What is scatternet.
A scatternet is a type of network that is formed between two or more Bluetooth-enabled devices, such
as smartphones and newer home appliances. A scatternet is made up of at least two piconets.(Give 2
marks).
9. What is an address space? What is the address space of IPv4?
Address space is the amount of memory allocated for all possible addresses for a computational entity -
- for example, a device, a file, a server or a networked computer(Give 1 mark).

IPv4 is composed of 32-bit address length and is the fourth version of the Internet Protocol (IP)(Give 1`
mark)
10. What is flow label?
The Flow Label is a 20-bit field that is part of the IPv6 header. It is used by a source to label certain
groups of packets for easy identification and handling by routers, mainly to implement Quality of
Service (QoS).(Give 2 marks)
11. What is open loop congestion control?
The Open loop refers to the protocols that should be used in order to prevent congestion. That is, the
congestion should not occur in the first place. This is based on the technique of having a good design
implementation in order to prevent the congestion from taking place.(Give 2 marks)
12. How is HTTP similar to FTP.
Both HTTP and FTP use a TCP connection to transmit data over the connection. Both HTTP and TCP
follow a client-server architecture. Both HTTP and TCP establish a data connection over which, data is
transmitted.

(10×2=20)

Part B

Answer any six questions.

Each question carries 5 marks

13. Write a note about the organization of layer.


Significance of a layerd architecture(1Mark)
Brief the 7 layers of OSI model (Give 4 marks)
14. Write down the steps of analog to analog conversion.
Write about the 3 modes –amplitude modulation, frequency modulation and Phase modulation.
15. Explain FHSS in detail.
Frequency-hopping spread spectrum (FHSS) is a method of transmitting radio signals by rapidly
changing the carrier frequency among many frequencies occupying a large spectral band. The changes
are controlled by a code known to both transmitter and receiver.(for definition-give 2 marks,
Explanation 3 marks)
16. Explain error detection and error correction in Data Link layer.
Give 1 mark for explanation of error detection and correction.
Any 2 error detection methods-2 marks
Any 2 error correction methods-2 marks
17. What is framing? Differentiate fixed-size and variable size framing.
Framing definition and need-2 marks
Difference between fixed-size and variable size framing.-Give 3 marks

18. What are the issues to be considered, when an Ethernet LAN and a wireless LAN are

connected using a bridge?

Compatibility, Bandwidth and Speed, Security, Network Addressing, Latency and Reliability, Interference,
Scalability, Management and Monitoring, Quality of Service (QoS),Redundancy and Failover

Explanation of any 5 issues stated above(Give 5 marks)


18. Briefly describe the Hexadecimal colon notation of an IPv6 address.
Explanation of colon notation-Give 2 marks
Example-Give 3 marks
19. Explain fully qualified domain name and partially qualified domain name.
Fully Qualified Domain Name (FQDN):
A Fully Qualified Domain Name is a complete and unambiguous domain name that specifies the exact
location of a resource on the internet. It includes both the hostname and the domain name, along with
the top-level domain (TLD). An FQDN is specified in a hierarchical order from right to left, separated
by dots. For example: "www.example.com" is an FQDN, where "www" is the hostname, "example" is
the domain name, and ".com" is the TLD.

Partially Qualified Domain Name (PQDN):


A Partially Qualified Domain Name is an incomplete or abbreviated form of a domain name that does
not specify the full hierarchy. It is used when the domain name is not fully qualified or when it is being
referenced within a specific context or domain. A PQDN does not include the TLD. For example:
"www" or "server1" can be considered PQDNs when used within a local network or a specific domain
context. The missing part of the domain hierarchy is assumed based on the local domain or search path
configuration.
Give full marks for the explanation.
20. Explain Traditional ciphers with example.
Traditional ciphers refer to classical encryption techniques that were used before the advent of modern
cryptographic algorithms. These ciphers typically involve substitution or transposition of characters to
encrypt and decrypt messages. Here are a few examples of traditional ciphers:
Caesar Cipher:
The Caesar cipher is a substitution cipher where each letter in the plaintext is shifted a certain number
of positions down the alphabet. For example, with a shift of 3, the letter 'A' would be encrypted as 'D',
'B' as 'E', and so on. This is a simple example of a monoalphabetic substitution cipher.
Plain text: HELLO
Cipher text: KHOOR
Give full marks for explanation with example.

(6×5=30)

Part C

Answer any two questions.

Each question carries 15 marks.

21. Categories the basic topologies in terms of line configuration.


There are four basic network topologies - bus, ring, mesh and star.
Multipoint: Bus, Ring. A bus topology consists of a single cable connecting all devices in the network.
Same goes for a ring topology, where a single ring connection is used to connect all devices together.
The devices communicate via the shared cable.
Point to point: Mesh, Star. A mesh topology consists of a network of devices all connected to each
other individually. Same goes for a star topology. Each device is connected to almost every other
device in this network.
Explanation of each topology with diagram-Give full marks
22. Define transmission medium. Explain guided media in detail.
Transmission media definition-Give 3 marks
Explanation of guided media –twisted pair, coaxial cable , fiber optic cable etc -Give 3 marks each
24. Explain Cellular Telephony. Write notes on (i)base station (ii) mobile switching center (iii)

frequency reuse priciple (iv) Hand off

Cellular telephony, also known as mobile telephony, is a wireless communication system that enables voice and
data transmission over cellular networks. It operates by dividing a geographical region into smaller areas called
cells, each served by a base station. This approach allows for efficient use of the available radio spectrum and
provides seamless connectivity as users move from one cell to another.(Give 3 marks for definition)

Base station explanation-3 marks

mobile switching center-3 marks

frequency reuse principle-3 marks

Hand off-3 marks

25. What is connectionless services? Explain UDP in detail.

Connectionless service explanation-Give 3 marks

UDP explanation-4 marks

UDP Header Explanation with diagram-8 marks

(2×15=30)

You might also like