Mid-Test ----------------------------------------------------------------------------------------------------------- Class :B.E. Max. Marks :50 Subject:C.C.N. Day and Date : ----------------------------------------------------------------------------------------------------------- Q1 Solve any four questions.(4x5=20 marks) 1. Explain different network topologies and discuss their advantages and disadvantages. 2. Give different mode transition commands and explain the mode transition in HDLC using. 3. Explain the function of each layer in OSI standard interface. 4. Give the relationship between them using Shannon’s theorem and Nyquist theorem. Define Bandwidth and data rate. 5. Explain modem with the help of block schematic. What is null modem? 6. What is Pure ALOHA and Slotted ALOHA. Discuss throughput versus offered traffic for ALOHA system?
Q2 Solve any two from the following questions.(10 marks each)
1. How error control can be done using Hamming code for single bit error and burst error. A Hamming code generated as 10110010011 is received as 10110010111 at receiver then explains how error correction is done by hamming code? 2. What do you mean by guided transmission media and unguided transmission media? Discuss two examples of each transmission media. 3 What are electrical, mechanical, functional and procedural specifications of EIA234D standard interface? Draw commonly implemented circuit in standard full duplex configuration using this standard.
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
Mastering Linux Security and Hardening - Second Edition: Protect your Linux systems from intruders, malware attacks, and other cyber threats, 2nd Edition