0 ratings0% found this document useful (0 votes) 19 views4 pagesComputer Networking 2015-16
Computer Networking (BCA,2015-16)
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
http://www.makaut.com
CS/BCA/Odd/Sem-Sth/BCA-S01/2015-16
=
=e
MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY,
‘WEST BENGAL
BCA-501
Data COMMUNICATION AND COMPUTER NETWORKS
Time Allotted: 3 Hours Full Marks: 70
The questions are of equal value.
The figures in the margin indicate full marks.
Candidates are required to give their answers in their own words as far as practicable.
Alll symbols are of usual significance.
GROUP A
(Multiple Choice Type Questions)
1. Answer any fen questions. 101 = 10
(i) A system uses 32 levels for data representation for transmission; the number
of bits that this system can support is
(aya (B) 16
(©) 32 @)s
(ii) Baud is
(A) number of bits per second
(B) number of signal changes per second
(C) number of bytes per second
(D) number of character per second
(ii) ARP is used to find
(A) IP address (B) MAC address,
(C) Subnet address () Host address
5142 1 ee
http://www.makaut.comhttp://www.makaut.com
(CS/BCA/Odd/Sem-Sth/BCA-501/2015-16
(iv) How many redundancy bits are required to correét a data containing 8 bits?
(A)3 (B)4
(5 @)8
(v) Firewall
(A) allows people on the internet to see just one IP address
(B) does not allow any connections to server
(C)restricts unauthorized users from accessing sensitive data
(D) manages password function
(vi) In which ARQ, when a NAK is received, all frames sent since the last frame
acknowledge are retransmitted?
(A) Stop-and-Wait (B) Go back n
(C) Selective Reject () Both (A) and (B)
(vii) The highest data rate is provided by the transmission medium
(A) Coaxial Cable (B) Twisted Pair
(C) Optical fiber (D) Microwave
(viii) What is present in all HDLC control fields?
(A) PF bit (B) N(R)
(C) Code bits @)NGS)
(ix) Signal become weak with increase in distance traveled because of
(A) modulation (B) attenuation
(©) distortion (D) switching
(x) IP address in the B class is given by
(A) 125.123.123.3 (B) 191.023.21.52
(C) 192.128.32.56 (D) 10.17.16.38
(xi) Usually information security is achieved by
(A) layering (B) addressing
(C) grade of service (D) cryptography
2
5142
http://www.makaut.comhttp://www.makaut.com
(CS/BCA/Odd/Sem-Sth/BCA-501/2015-16
(xii) Router operates in
(A) data link layer (B) network layer
(©) transport layer (D)all of these
GROUP B
(Short Answer Type Questions)
Answer any three questions. 3x5 =15
2. What is transmission impairment? What are its causes? 5
3. Distinguish between Circuit switching and Packet switching. 5
4, Define bit rate and baud rate. Consider a noiseless channel with a bandwidth 342
of 3000: Hz transmitting a signal with two signal levels. Calculate the
maximum bit rate.
5. (a) What is Ethemet?
(b) What are the differences between IEEE 802.4 and IEEE 802.5? 4
6. (a) What do you mean by multiplexing? 2
(b) Discuss the basic difference between TDM and FDM. 3
GROUP C
(Long Answer Type Questions)
Answer any three questions. 3x15=45
7. (a) Communications services may be classified as Connection Oriented or 6
Connectionless. Briefly summarize the principal difference between these
two service classes.
(b) Write down the advantages ‘and disadvantages of Synchronous and 6
Asynchronous modes of data transmission.
(©) Given a bandwidth of 6000 Hz for an 8-PSK signal, what are the baud rate 3
and bit rate?
5142 3 Tum Over
http://www.makaut.comhttp://www.makaut.com
CS/BCA/Odd/Sem-Sth/BCA-501/2015-16
8. (a) Explain the operation of CRC error detection method. By means of an 8
example show hor
(i) The error detection bits are generated
(i) The received frame is checked for transmission errors
Use the generator polynomial x’ +x + 1.
(b) In stop-and-wait flow control, define and discuss the handling of 1
() A damaged frame
(ii) A lost frame
9. (@) Differentiate between Link State and Distance Vector routing algorithms. 5
() What do you mean by encryption and decryption? What is Cipher text? 6
Explain different encryption techniques under conventional method of
encryption and decryption.
(©) What is inverse multiplexing? Why do we need inverse multiplexing? 4
10.(a) Explain the IEEE 802.3 MAC frame format.
(b) Explain X.25 frame format. How packets are associated with the virtual
cireuit on which they travel? What is the purpose of an LCN?
(© A file contains 3 million bytes. How long does it take to download this file 2
using a 100-Kbps channel and 10-Mbps channel?
ao
11, Write short notes on any three of the following: 3x5
(a) Firewall
(b) Describe the following terms
(@ Hop-by-hop
(ii) End-to-end
(©) UDP
(@) TELNET
© 16
$142
http://www.makaut.com