You are on page 1of 2

Birla Vishvakarma Mahavidyalaya (Engineering College)

(An Autonomous Institution)


Second Year, B.Tech (Computer Engineering)
st
1 Mid Semester Examination (Online),Even Semester, AY 2020-21

Course Code:2CP07 Course Title:Computer Networks


Date: 25.02.2021 Time: 03:30 pm to 4.30 pm Maximum Marks: 30
Instructions:
 Exam will be conducted by ‘Online’ Mode through MS Teams only.
 Write ID No., Name, Course Code, Course Title, Date of Exam, Signature and Page Nos. on
each answer page in the ‘title block’ provided in format. The format of answer page is available
on website ‘notice board’.
 Students have to upload answer sheet through “single pdf file” in MS Teams within the
stipulated time. Students will get additional 15 minutes to upload answer sheet pdf file. Refer
the detailed instructions on website ‘notice board’.
 Give the name to pdf file as: “ID No._Course Code_Name of Exam _Date of Exam” (For
example, 12AB001_CD101_Mid Exam_16.1.21)
 Numbers in the square brackets to the right indicate maximum marks.
 The text just below marks indicates the CO(s) followed by the Bloom’s level of the question,
i.e., R: Remember, U: Understand, A: Apply, N: Analyze, E: Evaluate, C: Create

Q. 1 (a) Justify your answer in each only selecting right option want carry any [05]
marks. 1,2
1) When the speed of the incoming packets at a router exceeds the outgoing 3,RN
link data rate, which of the following may occur?
a) Transmission delay b) Queuing delay c) Packet loss d) All mention in a,b,c

2) Which of the following applications will effectively run on UDP?


a) Email b) File transfer c) Web d) Multimedia streaming

3) Which type of topology is best suited for large businesses which must
carefully control and coordinate the operation of distributed branch outlets?
a) Ring b) Local area c) Hierarchical d) Star

4) What kind of transmission medium is most appropriate to carry data in a


computer network that is exposed to electrical interferences?
a) Unshielded twisted pair b) Optical fiber c) Coaxial cable d) Microwave

5) Which of the statement is correct with regard to Time Division


Multiplexing (TDM) and its variants?
a) Statistical TDM makes efficient use of the bandwidth only if the arrival
pattern of the data stream is probabilistic.
b) TDM requires the transmitter and receiver to be synchronized
periodically.
c) TDM performs efficiently if the arrival pattern of the data stream is
probabilistic.
d) Statistical TDM is efficient if the data stream is deterministic.
Page 1 of 2
(b) A channel has a total bandwidth of 1 Gbps is shared using the synchronous [05]
time division technique. A period is divided into 640 time slots. 1,3,4
What is the smallest unit of bandwidth reservation that you can make on this A
system?
A user wants to reserve 50 Mbps transmission capacity on this channel
How many time slots must we reserve to provide this amount of bandwidth
reservation?
(c) Prove that the Stop-and-Wait protocol will operate correctly using only 2 [03]
different sequence number 4U
I.e.: you only need to label the frame in Stop-and-Wait using sequence
numbers: 0 and 1.
(d) What is the main reason the OSI model was created? [02]
Acknowledgements, sequencing, and flow control are characteristics of which 1U
OSI layer?
OR OR OR
(d) Compare and contrast a circuit-switched network and a packet-switched [02]
network. 4R
Q.2 (a) For each of the following networks, discuss the consequences if a connection [03]
fails. 1U
a. Five devices arranged in a mesh topology
b. Five devices arranged in a star topology (not counting the hub)
c. Five devices arranged in a bus topology
OR OR OR
(a) Which of the four digital-to-analog conversion techniques (ASK, FSK, PSK [03]
or QAM) is the most susceptible to noise? Defend your answer. 2U
(b) 1) Suppose a computer sends a frame to another computer on a bus topology [03]
LAN. The physical destination address of the frame is corrupted during the 2U
transmission. What happens to the frame? How can the sender be informed
about the situation?
2) Suppose a computer sends a packet at the network layer to another
computer somewhere in the Internet. The logical destination address of the
packet is corrupted. What happens to the packet? How can the source
computer be informed of the situation?
(c) A file contains 2 million bytes. How long does it take to download this file [02]
using a 56-Kbps channel? 1-Mbps channel? 3A
(d) We need to upgrade a channel to a higher bandwidth. Answer the following [02]
questions: 2,3
a. How is the rate improved if we double the bandwidth? A
b. How is the rate improved if we double the SNR?
(e) Assume that a voice channel occupies a bandwidth of 4 kHz. We need to [02]
multiplex 10 voice channels with guard bands of 500 Hz using FDM. 2,3
Calculate the required bandwidth. A
(f) Compare and contrast byte-stuffing and bit-stuffing. Which technique is used [03]
in byte-oriented protocols? Which technique is used in bit-oriented protocols? 4
Bit-stuff the data in bit sequence: U,A
1000111111100111110100011111111111000011111

Page 2 of 2

You might also like