You are on page 1of 13

B.E.Sixth Semester (Computer Technology) (C.B.S.

)
Computer Networks

P. Pages : 2 NKT/KS/17/7402
Time : Three Hours *0679* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness and adequate dimensions.
9. Illustrate your answers whenever necessary with the help of neat sketches.

1. a) What are the disadvantages of ISO/OSI model and how they are overcome in TCP/IP 7
model? Discuss.

b) Explain different network topologies with its advantages and disadvantages. 6

OR

2. a) Explain working of modem. 6

b) Explain the working and classification of fiber optic transmission media. 7

3. a) What is error detecting code? Explain with suitable example. 6

b) Explain Hamming code in data link layer. 7

OR

4. a) Explain in detail Go back N protocol. 6

b) Discuss the role of medium access sublayer in computer network. 7

5. a) What do you mean by datagram? Explain the working of datagram by taking suitable. 7
Example.

b) Discuss link state Routing. 7

OR

6. a) Discuss the different IP addressing methods. 6

b) An organization is granted a block of address with the beginning address 14.24.74.0/24. 8


The organization need to have 3 subblocks of address to use in its three subnets. One
subblock of 10 addresses, one subblock of 60 addresses and one subblock of 120 Addresses.
Design the subblocks.

NKT/KS/17/7402 1 P.T.O
7. a) What is socket? What are its components? Explain its use. 7

b) Explain quality of service in transport layer. 6

OR

8. a) Explain the services provided by transport layer to other layer. 7

b) Explain how multiplexing is achieved in transport layer. 6

9. a) Discuss the authentication and their ways. 7

b) Write a short note on domain naming system. 7

OR

10. a) Explain in detail working of firewall. 6

b) Write a short note on working of SNMP. 7

11. a) Explain the working of Bluetooth protocol. 7

b) What is ISDN? List and explain services provided by ISDN. 7

OR

12. Write short note on-

a) Sonet. 3

b) VLANS. 3

c) Cellular telephony. 4

d) IEEE 802.11. 4

*************

NKT/KS/17/7402 2
B.E. (Computer Technology) Sixth Semester (C.B.S.)
Computer Networks

P. Pages : 2 NIR/KW/18/3486
Time : Three Hours *1267* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
7. Solve Question 11 OR Questions No. 12.
8. Assume suitable data whenever necessary.

1. a) Explain a Topology? Describe a Lan Topology with advantages and disadvantages of 8


Mesh Topology?

b) Write down about any five Computer Networking Components. 5


OR
2. a) What do you mean by line coding? Define a following line Coding Techniques with 7
diagram.
a) Polar NRZ – L
b) AMI and Differential Manchester

b) Differentiate between : 6

i) TCP/IP model Vs OSI

ii) Connection oriented service and connection less service.

3. a) Explain a Duties of Data Link layer and explain error control methods? 6

b) What are the 3 kinds of frames in HDLC? Explain each one in detail? 7

OR

4. a) Explain about Static and Dynamic channel allocation? 4

b) List the types of LCP packets in PPP protocols. 4

c) Explain in detail Go – back – n protocol. 5

5. a) What is an IP address? What are the different classes of an IP address? What is difference 7
b/w. IPV4 and IPV6 ?

b) Differentiate between Adaptive & non adaptive routing algorithms? 6

OR

NIR/KW/18/3486 1 P.T.O
6. a) Explain Link State Routing and define a Link State Routing Protocols? (any one). 7

b) Explain Token Bucket and Leaky Bucket algorithm stating difference between them? 6

7. a) Explain TCP, why connection oriented and connection – less transport protocols are 7
needed?

b) Discuss in brief different quality of service (QOS) parameters used in transport layer? 7

OR

8. a) Draw the TCP segment format. Explain each field in detail? 7

b) What is the difference between TCP and UDP? 3

c) Short note on Multiplexing? 4

9. a) Explain about DNS in Internet? 5

b) Short note on Internet Security? 3

c) What is Difference between Symmetric Encryption key algorithm and Asymmetric 6


Encryption key algorithm?

OR

10. a) Explain a Security Services in detail? 6

b) Encrypt the following plaintext using Caesar Cipher (3 shift letter) Substitution Techniques: 3
Plaintext : COMPUTER

c) Explain firewall and define a types of Firewall in detail? 5

11. a) What is ISDN? List and explain services provided by ISDN? 7

b) Brief about Satellite Network and Cellular Telephony? 6

OR

12. Write a short note on : 13

1) Bluetooth technology. 2) Wireless LAN.

3) VLAN 4) ATM

************

NIR/KW/18/3486 2
www.rtmnuonline.com

B.E. Sixth Semester (Computer Technology) (C.B.S.) -


Computer Networks

P. Pages : 2 KNT/KW/16/7402
Time : Three Hours *0130* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
7. Solve Question 11 OR Questions No. 12.
8. Assume suitable data whenever necessary.

1. a) Explain following terms with suitable diagram. 8

om
1) Coaxial Cable

e.c
2) Fiber optics

lin
on
nu
b) Explain advantages and disadvantages of

m
i) Star topology. 3
.rt
ii) Mesh topology. w 2
w
w

OR
2. a) Explain RS232 interfacing sequence with diagram. 6

b) What are the important design issues for the layers in computer Networking? 7

3. a) Write a note on following flow control methods: 8


om

1) Stop-and -wait
e.c

2) Sliding window
lin
on

b) Explain any one of the following in detail with suitable diagram 6


nu
m

1) Token Bus 2) Token ring 3) IEEE 802.3


.rt
w
w

OR
w

4. a) Explain in short about:


i) 1-persistent CSMA 3
ii) P-persistent CSMA 3
iii) Non persistent CSMA 3

b) Detect the error if any from following hamming code message and give the corrected 5
message. Assume even Parity 1011001011

5. a) What is an IP address? What are the different classes of an IP address? Give an example 6
of any three special IP address and explain their meaning.

b) What is congestion? How it is caused? Explain any one of congestion control algorithm. 7

OR

KNT/KW/16/7402 1 P.T.O

www.rtmnuonline.com
www.rtmnuonline.com

6. a) Brief about following terms:


1) Datagram approach 2

2) Subnetting 2

3) Packet switching 2

b) Explain distance vector routing algorithm in detail. 7

7. a) Discuss in brief different Quality Of Service (QOS) parameters used in the transport layer. 6

b) Explain TCP segment with proper diagram. 7

OR
8. a) Explain process to process communication of user Datagram Protocol (UDP). 7

b) Explain duties of transport layer in detail. 6

om
e.c
9. a) State the difference between secrete key encryption and public key encryption scheme in 7

lin
detail.

on
nu
m
b) Write a short note on
1) Substitution cipher
.rt 4
w
w
w

2) Digital signature 3

OR
10. a) Write a short note on 7
1) SNMP
om

2) DNS
e.c
lin

b) Draw and explain working of firewall. 7


on
nu

11. a) Brief about cellular telephony and satellite network. 6


m
.rt
w

b) Explain working of wireless LAN. 7


w
w

OR
12. Write a short note on:
1) Bluetooth technology 5

2) Sonet 4

3) DSL Technology 4

*********

KNT/KW/16/7402 2

www.rtmnuonline.com
B.E. (Computer Technology) Sixth Semester (C.B.S.)
Computer Networks
P. Pages : 2 TKN/KS/16/7489
Time : Three Hours *0832* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness.
9. Assume suitable data whenever necessary.
10. Diagrams should be given whenever necessary.
11. Illustrate your answers whenever necessary with the help of neat sketches.

1. a) What do you mean by line coding ? What are the advantages of using different line codes ? 7
Explain any three line coding techniques with diagram.

b) What is the difference between a physical and logical topology ? Define different physical 7
topologies that are used in network.

OR

2. a) What are the main components of Network ? List and explain. 4

b) Match the following to one or more layers of the OSI model. 10


i) Communicating directly with user's application program.
ii) Error Correction and retransmission.
iii) Mechanical, electrical and functional interface.
iv) Log-in and Log-out procedures.
v) Route determination.
vi) Provides access for the end user.
vii) Interface to transmission media.
viii) Process to process delivery.
ix) Provides user services such as email and file transfer.
x) Carrying frames between adjacent nodes.

3. a) The following character encoding is used. 9


A:01000111 B:11100011
FLAG:01111110 ESC:11100000
Show the bit sequence transmitted (in binary) for the above four-character frame: A B
ESC FLAG with each of the following framing methods.
i) Character count.
ii) Flag bytes with byte stuffing.
iii) Starting and ending flag bytes with bit stuffing.

b) Explain any limited contention protocol by giving diagrammatic representation. 4

OR

TKN/KS/16/7489 1 P.T.O
www.rtmnuonline.com
4. a) A bit stream1011101 is transmitted using the standard CRC method. The generator 9
3
polynomial is x  1 . Show the actual bit string transmitted. Suppose the third bit from the
left is inverted during transmission. Show that this error is detected at the receiver's end.

b) Explain the concept of Go-Back-N. 4

5. a) What are the three phases in the virtual circuit approach to switching ? Explain each phase. 8
b) What is a Router ? List and explain any four functions of Router. 5
OR
6. a) An organization is granted a block of addresses with the beginning address 14.24.74.0/24. 8
The organization need to have 3 Subblocks of addresses to use in its three subnets: One
subblock of 10 addresses, one subblock of 60 addresses and one subblock of 120 addresses.
Design the subblocks.

b) Discuss the problems associated with Distance Vector routing in detail. 5

7. a) What is Socket ? What are its components ? Explain its use. 7


b) Draw TCP segment format. Explain each field in detail. 7
OR
8. a) Draw and explain TCP state transition diagram in detail. 9
b) What do you mean by Quality of Services ? Describe various Quality of Services for 5
networking.

9. a) Define the type of attack in each of the following cases: 7


i) A student breaks into a professor's office to obtain a copy of the next test.
ii) A student gives a check for Rs. 50/- to buy a used book. Later the student finds out
that the check was cashed for Rs. 100/-
iii) A student sends hundreds of e-mails per day to the school using a phony return
e-mail address.

b) Explain File Transfer Protocol. 6


OR
10. a) Discuss authentication and their ways. 6
b) Write short notes and working of SNMP. 7

11. a) Explain concept and working of VLAN. 7


b) What is ISDN ? List and explain services provided by ISDN. 6
OR
12. Write note on:
i) ATM. 3
ii) Cellular Telephony. 3
iii) Satellite Network. 4
iv) Sonet. 3
***********

TKN/KS/16/7489 2

www.rtmnuonline.com

You might also like