You are on page 1of 45

COMP 204

KATHMANDU LINIVERSITY Marks scored:


End Semester Examination [(C]
December, 2018
Level : BLE. /B.Se. Course : COMP 204
Year <I] Semester: II
Exam Roll No. : Time: 30 mins, FM. :10
Registration No.: Date DEC 30 20a
=

(20. «0.3 = 10 marks]


Choose and tick (¥) the most appropriate answer:
Ina connection, more than two devices can share a single link.
(a) point-to-point — [b ] multipoint ( ¢ ) primary [4] secondary

Communication between a computer and a keyboard involves


[ a] simplex [b ] half-duplex [¢ ] full-duplex [ di ] automatic
Bits can be sent over guided and unguided media as analog signal by
[a] digital modulation (6 ] amplitude modulation
[¢] frequency modulation [4] phase modulation

When two (2) or more bits in a data unit is changed during the transmission, it is called
[4] tandom error —[ b | burst error [¢] inverted error [dl ) run-time error

Automatic repeat request error management mechanism is provided by


[4] logical link control subtayer [ b] media access control sublayer
[¢ ) network interface contro! sublayer [d] physical layer
User datagram protocol is called connectionless because
[4] all UDP packets are treated independently by transport layer
(6)it sends data as a stream of related packets
[¢]itis received in the same order as sent order
[4] itkeeps track of the lost packets

What is the port numbof SMTP?


er
[ap 23 [b] 25 Le] 2021 [4] 27960
When a host on network A sends a message to a host on network B, which address does
the router look at?
[a] port [ b } logical [¢ ] physical [4 ] socket
Parameter that refers to uneven delay of data packets in delivery is
[a] Jitter [>] Timelessness
[¢ ] Accuracy [d] Transmission medium

The 32-bit intemet address |ODDDO00 ODMH 010 00000010 00011110 will
be written in
dotted decimal notation ns ;
[ap W4820.2.50 0 [bp 164100961 = [ec] 21020264 = [dd] 128.10.2.30

If Five (5) files are transferred from server A to client B in the same session then the
number of TCP connections between A and B is
[a]s [b} 10 [e]2 [d]é
The translates internet domain and host names
to IP address.
[ a] domain name system [ 6 | routing information protocol
[ ¢ ] network time protocol [ d ] internet relay chat

An attempt to make a computer resource unavailable to its intended users is called


[a] Denial-of-service attack { &) Virus attack
(¢ | Worms attack | d] Botnet process

The field used to detect errors over the entire user datagram is
[a] UDP header [b ] Checksum [ ¢ | Source port (4) Destination
port

Suppose two [Pvé nodes want to interoperate using [Pv6 datagrams but are connected to
each other by intervening [Pv routers, The best solution bere is
[a] Use dual-stack approach [ 6) Tunneling
[¢ ] No solution [d ] Replace
the system

In a simple echo-request message, the value of the sum is 01010006 01011100. Then, the
value of checksumis
Ca} 101111) 10100011 [6] GLOL0000 01011100
De] WO1O111T 01011100 [4] O1010000 10700011

In asymmetric key cryptography, the private key is kept by


[ a] sender (|b | senderand receiver
[© J all the connected devices to the network
| d | receiver

The computation of the shortest path in OSPF is uswally done by


[a] Bellman-ford algorithm [6 | Routing information protocol
[¢ | Dijkstra’s algorithm [4] Distance vector routing
1, MUINIpIEXing 1s used In
[a] Packet switching ~— [b] Data switching
[c ] Circuit switching [4 ) Frame seritching

20. HTTP client requests by esiablishinga connection to a particular port on


the server,
[a] user datagram protocol [b| broader gateway protocol
[ ¢] file transfer protocel (d | wansmission contre! protece!

KATHMANDU UNIVERSITY
End Semester Examination [C]
December, 2018 pec 30 2018
Level |; BLE. /B.Se.
Course : COMP 204
Year il
Semester: |]
Time :2 hrs.30 mins, FM. :40
SECTION “BY
[6 Q. © 4 = 24 marks]
Attempt ANY SEY questions.

1: What is modulation? Describe modulation techniques in brief.


[1+3]
2. Explain different types of variable size framing.
[4]
3, Describe Dijkstra's Algorithm. Find the shortest path of the followi
une from source:
Ato destination H. =o [4]

8 7 c
i Da
hah\ SE” a
ha “0
‘ty é ‘sy
“ey” = ‘ :
G

4. Distinguish between TCP and UDP. 4]


3 Describe the [Pr datagram format in brief,
4]
6. What is cryptography? Describe different calcgories of cryptography.
[143]
7. Write short notes on :
[2+2]
a. Twisted Pair Cable
b. Coaxial Cable
SECTION “C*
[2.Q.= 4= 16 marks]
Altempt ANT THO questions,

&. What is Protocol? What are the key elements ofa Protocol? Briefly
describe
the OS]
Reference Model.
[1+2+5]
9, What are the functions of Media Access Control’? Briefly describe the types
of Random
Access Protocol. [1+]
10. Suppose that there are 4 DepartmentsA (23 Hosts), B (16 Hosts), C (28 Hosts), D (13
Hosts). Given a network 202.70.64.0/24, perform sub-netting in such way that IP wastage
in each sub-network is minimum. Find Subnet mask, First address, last
address, and
usable host range for each network.
[8]
KATHMANDU Marks Scored:
UNIVE RSITY
End Semester Examination [C]
January, 2018
Level : B.E/B. Sc.
Year : il Course : COMP 204.
Exam Roll No. : Semester: II
Time: 30 mins, F.M. :10
Registration No.: U4 2018
Date Hh By
[20Q. * 0.5 = 10 marks]

Choose the most appropriate answer,

L BUS, RING and STAR TOPOLOGIES


are mostly used in
a. LAN b. MAN c. WAN d. Intemetwork
2. Both stations can transmit and receive
data Simultaneously in
a. Simplex Mode
©. Half Duplex Mode b. Half Simplex Mode
d, Full Duplex Mode
a, Layer that are used to deal with mecha
nical and electrical specifications are
a Physical Layer — b. Data Link Layer c¢.Network Layer Transport Layer
4, A network with bandwidth of 10 Mbps
can pass only an average of 12,000 frame
minute with each frame carrying an ave s per
rag
of 5,000
e bits, Throughput of the network
iiidemsintcienigs
a& =| Mbps. b. 2 Mbps, c.3 Mbps. d. 4Mbps,
5. What is the transmission time fora 2.5 kilobyte message if the bandwidth
is | Gbps? Assume that the distance of the network
between the sender and the receiver
and the light travels -at 2.4. 10" ms’! is 12,000 km
a. 0.01 ms. b. 0.02 ms, ¢. 0,03 ms. d. 0.04 ms,
6. During transmission if SNR=3dB, the signal
4. is attenuated PARDO ARNO MALES bs dmved dem
¢. remains unchanged b. is amplified
4. first is attenuated and then amplified
7. For the data bit of 0110001} 10101
010011111 100100101, after bit stuff
message will be of? ing the actual
a 01100011 101010100) HIOMOO1O
0IOI b..a1 100011 1010101001
a O1100011 1010101001011 11160 11011 100100101
100101 d. 01100011 101010100110
1 11100100101
a. Which of the following media access
control uses channelization?
a. FDMA b. CDMA c. Polling d, Token Passing
9, Packet data unit of Data link
layer is called
a Packet b, Frame c. Header d. Segment
10. During Sliding Window Flow Control,
if the size of header is ofx bit then
numb will beer
from the the sequence
a. Oto 2" b. 1 to 2*-] ¢. Oto 2"-] d.lio?

11. [fa noiseless channel with a bandwidth of 3000 Hz transmit


ting a signal with 4 signal
levels maximum Bit rate would be
a, 12000 bps b. 16000 bps c, 601) bps d. 3000 bps
12. In byte stuffing, the trailer contains
a. data ;
b. source address ¢. destination address d. redundant bits
13. The technique of temporarily delaying outgoing acknowledgem
hooked onto the next outgoi
ents so that they can be
ng data frame is called
4a. piggybacking b, cyclic redundancy check
¢. fletcher's checksum d. parity
14. What is the vulnerable time for Pure ALOHA where
T pp = Average transmission time for a frame &T, = Backof
f time?
a2XT pp bX T py 0. T pr d.2x Ty
15. What is the address range of a class B network in binary?
a. Olxxxaxx 5
b. Oxxxxnxx c. lOxxxxxx d. 1 10xxxxx

1A Tha neh melden bele bi ae


sane Say MOSES WN ATE CAI FLFR IB CAIIEG IHG cas scccissseesssoeese eos, RGree.
a. Limited-broadcast b, Loopback ¢, Private d. Multicast

17. The first address of a given ip address 223.15, 18.17/28 is


..... peti ihibags
a 233,15.18,17 b. 223,15.18.0 ©. 223,15,18,12 dd. 223.15.18.22
18. The technique that requires no network information is ne
a. Flooding b, Variable routing ¢. Fined routing d. Random routing
19. Transport layer protocols deals with..........ccc.sss... avs
‘ a application to application communication
6. process to process communication
©. node to node communication
d. session to session communication
20. We use Cryptography term to make them secure and
immune to
a. Change b, Idle c. Attacks d. Defend

KATHMANDU UNIVERSITY
End Semester Examination [Cc]
2g
Level : B.E./B. Se.
January, 2018 san-0 9:2
Year : lll Course : COMP 204
Time: 2 hrs, 30 mins, Semester : [Il
F.M. :40

Attempt ANY SLX questions.


[6Q = 4= 24 marks]
I. Discuss the advantages and limitations of Bus
topology and Ring Topology in detail,
2. Explain different propagation modes of Optical
Fiber cable.
43. Explain the working mechanism of Go-Back-N
ARQ with suitable flow diagram,
4, Explain Checksum error detecting method
with the help of suitable example,
5, Explain the traffic shaping techniques perform
ed by network layer in data
communication.

6. Differentiate between TCP and UDP. Explain


three way handshake protocol with clear
flow diagram.
7. Write short notes on (ANF TWO)
a. Distance Vector Routing Algorithm
b. Half Duplex & Full Duplex Communication
¢. Electronic Mail
SECTION “C*
(2Qx 8 =16 marks)
Attempt ANY TWO questions,

§. a. Explain OS! Reference Model in


brief,
b. Implement Cyclic redundancy check for the [4]
polynomial for the dataword is (x?+x+1 yix"xPolynom
74x41)
ial for the divisor is; x°+x2+1 & The
i. Show the checking of the codeword
at
[4]
occurred,
the receiver side assuming no error has
ii. What is the syndrome at the receiver end if the dataword has an error
Position counting from the right? in the 2™ bit
9 Differentiate between Circuit Switched Networ
b. Differentiate between public key cryptog k and Packet Switched Network,
raphy and Private key cryptography. [4]
Procedure of private key cryptography in brief. Explain
4]
10. An ISP is granted block of addresses starting
distribute these addresses to three grou with 190,80.0.0/16, The ISP needs to
ps of customers as follows:
a. The first group has 50 customers, each
b. The seco needs 256 addresses,
nd group has 200 customers, each
©. Design the subblocks and find out how needs 32 addresses,
allocations, many addresses are still available after these
[3+3+2]
—_——_—,
Marks Obtained:

KATHMANDU USIVERSITY "


End-Semester Examination [C]
July, 2017
Lewel : BL Se. Course : COMP 24
Year lll Semester ll
Exam Rall No, Tire: 34 mins, F, M, 710

Registration No,: Date UL 1 on


~ SECTION“A"
[2009, « 0.5 = 10 marks)
Ticki
+) the best alternativers).

Which one of the following operations is not performed in data link layer?
[a] Framing. |b] error control [c| flow control [d] channel coding

CIDR is helps to
[a] Efficiently addressing (b] Waste less addressing:
[e) Error less addressing [d] Dynamic addressing

The conditional GET mechanism


{a) Imposes conditions on the objects to be requested
(b) Limits the number of response irom a server
[c) Helps to keepa cache upto dace
{d) None
of the mentioned

Which
of the following isa form of DoS amack ?
(a) Vulnerability attack [b] Bandwidth Msling
fc] Connection flooding [d] All of the mentioned

Bir atutling refers to


[a] inserting a ‘O° in user stream to differentiate it with a lag
[b] inserting a ‘0’ in lag stream to avoid ambiguity
[c] appending a nibble to the lag sequence
[d] appending a nibble to the use data stream

Frequency range at which the land coaxial cables are used. is


[a] 106 to 108Hz [b] 100000 (hl) He fe] 103 to 1die |d] None
of these

Start and stop bits are used in serial communication for


fa) error detection (5) error correetion
[ce] slowing down the communication [dl] synchronization

Routers operate in which layer of the OSI mexiel?


[a] Physical layer = [b] Data link layer = fe] Network Layer [al] Transport Layer

In which network topology there are bidirectional links between each possible node?
[a] Star |b) Bus fc] Mesh {d] Ring

Which of the following media access control is uses channelization?


[a] FOMA [b] CDMA [e] Polling [d] Token Passing
Which of the following routing technique uses Bellman Ford algorithm’?
[a] Shortest Path [b] Link State {c] Distance Vector = [d] Hierarchical

What is the maximum number of [P addresses that can be assigned to hosts on a bocal
subnet that uses the 255,255,255,224 subnet mask?
[a] 14 [b] 15 [c} 16 [d] 30

You need to subnet a network thal has § subnets, ench with ot least 16 hosts. Which
clasaful subnet mask would you use’?
[a] 235.253.255.192 [b] 259.255.245.224 fe] 285.255.255.240 [i] 255.255.255.248

Digital signature uses


[a] Asymmetric cipher [b] Symmetric cipher
{c] Multicharacter symmetric cipher {d| Single character symmetric cipher

Whieh of the folkewing in not an application Laver protocol?


[a] HTTP [b] FTP fc] SMTP {ul UDP
Redundancy code in data link layer is used to
[a] Redundancly sends the data to receiver
|b] Send Extra information ta the receiver about data
Je] Detect and correct errors during transmission
|) Detect errors during transmission

Token bucket algorithms has advantage of over leaky bucket algorithms,


fa] Uniform output rate [hk] Burst error
fc) Handling bulky packets (dl) Fast transmission

medium with having beast raic ot data transmission is


[a] Shielded Twisted pair (b] Unshielded Twisted pair
[c] Fibre optics {d] Coaxial cable

Packet dita unit of Dita link laver is called


ja] Packet jb] Frame Le] Feeder [dl] Segment
The technique of temporarily delaying ourcoing acknowledgements so that they can be
hooked onto the next outgoing data frame is called
[a] Piggy backing [b] cyclic redundancy check
[e] Metcher’s checkeum [4] none of the mentioned
KATHMANDU UNIVERSITY
End-Semester Examination [C]
July, 2017 ju, 14 20u
Course COMP 204
aoa “ta Sermester afl
EM.
Tire:
poe 2ee hrs. 30 mins,
ma
[60 = 4 = 24 marks]
Attempt ANY SY questions.

L. Explain basic features and characteristics of data communication and networking. [+]

2 What is IP addressing? Why and How is subnet addressing performed? ed |

3. Discuss data rate limit theorem in digital wansmission. What is the theoretical highest bit
rate of a regular telephone line havinga bandwadth of MMM) He (300 He to 3400 Hz). The
signal-to-nease rath is usually 35 dB (3162) on up-link channel, (2+2]

4. Explain in detail abot CSMASCU Protacn, blow does it detect the collisions? [4]

5. Describe in brief about COMA Media Access control, i]

A What advantages docs fiber optics have over other media? Explain in brief about working
mechanism of fiber optics. [I+3]

7. Explain in brief aboud the working procedure of error correction techniques in checksum
procedure. [4]
SECTION *C"
(2) = £= 16 marks]

Arempt ANY TIPO questions.

& Explain the traffic shaping techniques performed by network Layer in deta
communication. [3]
9. Define briefly about operation of sliding window protocol, What are the advantages
of
selective repeat ARQ over other ARQ? Discuss the working mechanism of Selective
Repeat ARQ. [24264]

1. Briefly describe about the factors that define quality of service of Dats Communication
and Networking. Discuss three fundamental aspects of security in data coenmunication
and networking. [244]
ll. What is the address _ ofa class C network in binary?
a. O1XXxXXXX b. Oxxxxnnx c. [OMMxXAX d. 1 }0xxaucx

means that the signal changes its form


or shape.
a. Attenuation b. Distortion c. Noise d, Crosstalk

The only address in the block 127,0.0,0/8 is called the address,


a. Limited-broadeast b, Loopback c. Private d, Multicast

Which of the following IP Network addresses is a reserved address?


a. 127.5.0.0 b. 223.50.7.0 c. 197.65.10.0 d. 240.5.1.0

What is the vulnerable time for Pure ALOHA?


a2 Thr b. 4 = Thr c. Tir d. None of above

443 is the port of


a. HTTP b. DNS c. HTTPS d. FTP

What are the three security goals?


a. Traffic Analysis, Modification and Masquerading
b. Confidentiality, Integrity and Availability
c. Integrity, availability and Modification
d. Confidentiality, Integrity and Modification

For m size header the size of receive slide window for selective repeal protocol is
a.2m b. 2" eam d, 2=!

The values of SNR and SNRap for a noiseless channel are ;


a. SNR =0, 5NRa = 0 b. SNR =0, SNR =
c. SNR = oo, SNRa = 99 d. SNR =, SNRo = 0

20. The first and the last IP address


of a given ip address 290.15.18.3 1/28 is
a. 223.15.18,17 and 223.15.18.22 b, 223.15.18.16
and 223.15.18.31
c. 223.15.18.1 and 223.15.18.90 and 223.15. 18.1
dd. 223.15.18.30
KATHMANDU UNIVERSITY
End Semester Examination > 1u 20
August/September, 2017 ot
Level ;B, EJ B, Se, Course : COMP 204
Year <1 Semester: IT
Time : 2 hrs.
30 mins. F. M. 240
NB"
[6.Q. x 4=24 marks]
Attempt
ANT SEX questions:

I. Compare between TCP/IP model and OS! model, [4]

2. Explain guided media and its types with suitable diagram. [4]

3. What do you mean by transmission impairment? Write in brief the factors that causes the
transmission impairment. [143]

4. Explain with suitable diagram how Pure ALOWA works. What is the vulnerable time of
pure ALOHA? Explain how the efficiency of pure ALOHA protocol be increased.
[1.5+1+1.5]
5. An organization is granted a block of addresses with (he beginning address
14.24.74.024. The organization needs to have 3 subblocks of addresses
to use in its three
subnets. First subblock of 10 address, second subblock of 60 addresses and third
subblock of 120 addresses. Design the subblocks. 14]
6. Explain the working mechanism of Go-Rack-N ARQ with suitable flow diagram. [4]

i Write short notes on (ANY THO) [(2+2]


a. Denial of Service
b. DNS
c. Bellman-Ford routing algorithm
d Network Address Translation (NAT)

SECTION “C™
(2.0. x 8 =16 marks}
Attempt ANF TWO Questions:

a. Explain the working mechanism of COMA and write down its associated properties,
Finds the chipsfor a network with two stations. (2+541]
9. a. How does a single-bit error differ from a burst error? Find the Hamming distance
between A000, 011) and a 10101, 11110). (2+1)
b, Explain the working of simple parity check code with diagram for encoder and decoder.
Assuming4 bit data word generate all possible codeword showing that simple parity
check guarantees to detect any even number of errors. [2+142]

10. a, Explain three way handshake protocol with clear flow diagram, [4]
b, Explain “count to infinity” problem with suitable example. [3]
. Ifa periodic signal is decomposed into five sine waves with frequencies of 100, 300, 500,
700 and 900 Hz, what is the bandwidth? (]
Marks Seared:
KATHMANDU UNIVERSITY
End Semester Examination
August'September, 2016
Level:B.E./B.Se¢, 46 Course ; COMP 204
Year: Il ‘A 5 AvG 20tb Semester: Il]
Exam Roll No. : Time: 30 mins. FM. :10

Registration No.: Date

[200). «0.5 = 10 marks]

Enciecle the alphabet with correct answer.

lL Network is measured by the frequency of failure,the tine it takesa linklo


recover from a failure, and the network's robustness in a calastrophe.
a. Scalability b. Security e. Reliability d. Performance

2 Which
of the following cable type is mostly used w connect
two routers that are located
far away?
a. Copper straight through cable &. Copper
cross over cable
c. [MCE cubke d. DTE cable

3 Assume that SNRdb = 36 and the channel bandwidth is 2MHz. What is the theoretical
channel 7
a 12 Mbps b, 24 Mbps: c. J Mbps d, 48. Mbps

4. What are the propagation time and the transmission time fora 24 kilobyte message if the
bandwidth of the network is | Gbps? Assume that the distance between the sender and
the receiver is 12,000 km and the light travels at 2.4% 10" ms?
a 20msand 0.012 ms 6. 30 ms and 0,010 ms
c. §0ms and 0.020 ms d@. 10m and 0,030 ms

5 Which of the following technologies fall under the Extremely High Frequency(EHF}?
a RADAR b. FM radio c. Cellular phones = od. WHF T¥

6. In CRC, fora data of 12 bits and the divisor being


4" power of x, the transmitted dasa
will be of
a | byte b. 2 byte &. 3 byte di, 4 byte

T For the data bit ofC1 10001 11010001 TTT 100100101, after bit stuffing the actual
will be of?
a OLLOOOL 1 OLOIO LOOT) 101 1OOTOO1O1
b. OLOOOLLTONO1O
O01 11001 POO 1MO10T
& GLOOD1 LIOIOIO L001 1011 1 LOOL00101
d. OLID00L 1101010010111
POO TOOnOT

g. A sloned ALOMAnetwork transmits 200 bit frames usinga shared channel with a 200
kbps bandwidth, What is the throughput ifthe system produces 540 frames per second’?
a. 135 frames survival b. 151 frames survival
c. 173 frames survival d. 191 frames survival
15 AUG 2016
The mapped [Pwé address equivalent to 192, 168.1.1 is
a. O00:00020:FFFF:B1A8:010 b. 0:60:00: FFFF:OOA8: 101
e. OohO:000:FFFFSALAGO1O di. O:0:0:0:0:FFFF:C
LAS: 101

The purpose of NAT is to allow a site to use a set of addresses for


internal communication and a set of global internet addresses (at least one) for
communication with the rest of the world.
a. Private b. Public é, Reserved d, None ofthe abowe

Ifthe size of header is of x bit, then the sequence number will be from the range
a Om? b. 1 to 21 6, Ot 21 dL to"

Go BackN protocol can also be called as


a. Wiring b. Mining c, Streaming d. Pipelining

For m size header size the size of receive slide window for selective repeat protocol is___
a 2m b.2” qa a
The technique that requires mo network information is:
a Flooding 6. Variable routing = c. Flwad routing d. Random routing

A eomevunication device that combines transmission from several 10 devices into one
ling is a. : _————
a. Concentrator b. Modifier c, Multiplexer d. Full duplex mode

The management of data flow between computers or devicesor berween nodes iin a
network
is called
a Data control b. Flaw control c. Data management d. Data management

A _ is an extension of an enterprise's private intranet across a public


Network such as the Internet across a public network, crewting a secure private
connection.
a. VNP b. VPN c. VSN d. VSNP

[fa noiseless channel] with a bandwidth of 3000 Hz transmitting a signal with two signal
levels maximum Bit rae would be
a. 12000 bps b. 16000 bps c. 6DDbps d. S000 bps

For RSA to work, the value of P must be less than value of


a Pp bq er dn

In Code Division Multiple Access, othagonal sequence is unique for each


a. Channel b. Token , Station d, Vink
KATHMANDU UNIVERSITY
End Semester Examination
August/September, 2016
Level:B.E./B.5c. Course =: COMP 204
Year: I V2 AUG 2ui5 Semester: Il
Time : 2 hrs. 30 mins, F.M. 0
SECTION "5"
[GQ » 4 = 24 marks]
Attempt
ANF SLY questions.

1. Explain in detail about transmission medium with clear diagram. 4]

2, What do we mean by flow control? Explain how Stop and Wait ARQ works along with
its flow diagram. What are the disadvantagesof Stop and Wait ARQ protocol? {4]

a. Explain how are errors detected and corrected using Hamming Code H(7,4). (4
4, Describe distance vector routing algorithm. Explain the worst case problem that distance
veetor routing algorithm might face. [2+2]
5. Differentiate between TCP and UDP. Explain three way handshake protocol with clear
flow diagram. [15+ 24]

4. Explain how RSA works with example. (4

7. Write short notes on (ANF THO}: [2+2]


a.
Transposition Cipher
b.
DNS
c.
Diffie-Hellman Key Exchange Protocol
d.
SMTP
SECTION “C~
[2Q = B= 16 marks)
Aucmpt ANY TWO questions.

& a Explain the TCP/IP protocol suit with layered diagram. [5]
b, Assume a system uses five protocol layers. If the application program creates a message
of 130 bytes and cach layer (including
the fifth and the first) adds a headerof 20 bytes to
the dara unit,
what is the efficiency (the ratio of application layer bytes wo the number
of
bytes transmitted) of the system? [3]

9. a. Explain the parameters used to measure the good quality of services. Elaborate in detail
how we can achieve good quality of services. [+2]
b, An organization is granted a block of addresses with the beginning address 14.24.7224.
The organization needs to have3 subblocks of addresses to use in its three subnets: one
subblock of 10 addresses, one subblock of 60 addresses, and one subblock of 120:
addresses. Design the sub-black. [4]
10.4. What do we mean
by channel allocation problem? Explain the method how channel
allocation problem can be solwed? Also elaborate how we can increase the efficiency. [5]
b, One hundred stations on a pure ALOHA network sharea |-Mbps channel. If frames ane
100M) bits long, find the throughput if cach station is sending 10 frames per second, [3]
Marks Scored:

KATHMANDU UNIVERSITY
End Semester Examination [C]
January, 2016
Level :B.E./ B.Sc. Course : COMP 204
Year ill Semester : II
Exam Roll No, : Time: 30 mins. F.M. : 10

Registration No.: Date 2.4 AUL Zula


SECTION *A”
[20 Q x 0.5 = 10 marks]

Encircle the alphabet having correct answers.

In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?
[A] 0 to 63 [C] 0 to 64
[B] | to 63 [D] | to 64

Mii ee eed estrus beandes framing, we need a delimiter (flag) to define the boundary of two frames.
[A] Fixed-size [C] Variable-size
[B] Standard [D] None of the above

In Selective Repeat ARQ, if 5 is the number of bits for the sequence number, then the
maximum size of the receive window must be .......... .
[A] 15 [C] 16
[B] 31 [D] 1

In a broad sense, a railway track is an example of


[A] Simplex [C] Full Duplex
[B] Half duplex [D] All of these

In which routing method do all the routers have a common database?


[A] Distance Vector [C] Shortest Path
[B] Link Vector [D] Link State

A noiseless 3 KHz channel transmits bits with binary level signals. What is the maximum
data rate’?
[A] 3 kbps [C] 6 kbps
[B] 12 kbps [D] 24 kbps
If the hamming distance between a dataword and the corresponding codeword is three, there
are........... bits in error
[A] 3 [c] 4
[B] 5 [D] 6
A signal travels through a medium and its power is reduced to two-third. The attenuation
is...
[A] -1.67dB [C] -1.76 dB
[B] -2.15dB [D] -2.51dB

In hamming code C(7,4) with dmin=3, three bit syndromes creates eight different bit patterns
that creates eight different conditions. Which of the following option shows no error or the
error in parity bit only
[A] 000, 001, 010, 100 [C] O11, 101, 110, 111
[B] 001, 010, 011, 101 (D] 100, 101, 110, 111

10. A generator having message 10011010000 having generator 1101 will give the remainder
[A] 111 [Cc] 110
[B] 101 [D) 000

Contention is :
[A] One or more conductors that serve as a common connection for a related group of
devices
[B] a continuous frequency capable of being modulated or impressed with a second signal
[C] the condition when two or more stations attempt to use the same channel at the same time
[D] a collection of interconnected functional units that provides a data communications
service among stations attached to the network

12. During bit stuffing, after how many consecutive | bits followed by a zero, a zero bit is
added?
[A] 3 [B]5 [c] 4 [D] 6

Unauthorized access to or interception of data is called


[A] Snooping [C] Masquerading
{B] Repudiation [D] Modification

14, Which one the following attack threatens availability


[A] Traffic Analysis {C] Snooping
[B] Masquerading (D] Denial of Services

15. Posi stentrs eight beens pen npremenis, eines os kee ee, does not substitute one symbol for another;
instead it changes the location of the symbol.
[A] Monoalphabetic cipher [C] Polyalphabetic cipher
[B] Transposition cipher [D] Block cipher
CRC can detect all bursts of upto m errors if generator polynomial G(x) is of degree
[A] One [C] m
[B]m-1 [D] m+1
In cyclic redundancy checking CRC is the,
[A] Divisor [C] Quotient
(B] Dividend [D] Remainder

Which of the following is not a service primitive?


[A] Listen [C] Connect
(B) Sound (D] Send

Which of the following cables can transmit data at high speeds?


[A] Coaxial cables [C] Optical Fibre cables
(B] UTP [D] Twisted pair cable

20. In Cyclic Redundancy Checking the divisor is ..............0.0.0000008 the CRC


[A] The same size as [C] One bit less than
[B] One bit more than [D) None of the above
KATHMANDU UNIVERSITY
End Semester Examination [C]
January, 2016
Level : B.E./B.Sc, Course : COMP 204
Year : Il 24 AUL Pui
Time _:2 hrs.
30 mins. 4 Aub 2ui5
Semester : [I
FM. :40
SECTION “B”
([6Q. x 4=24 marks]
Attempt ANY SEY questions.

1. Differentiate between connection


oriented and connectionless services. [4]
2. Explain why is Shannon Capacity more practical than Nyquist
Bit Rate? A line has a Signal
to Noise Ratio(SNR) of 2000 anda bandwidth of $000 KHz. What is the maximum
data rate
supported by this line?
[242]
3, Explain why Selective Repeat ARQ is more efficient than Go-Back-N ARQ.
[4]
4. Mention the techniques for achieving good Quality of Services. Differentiate
between Token
Bucket Algorithm and Leaky bucket Algorithm.
[242]
5. Define Symmetric Key Cryptography. You are given the following information:
Prime number 23, a random number 5, Person A private number 3, Person
B private number
6. Compute Diffie-Hellman algorithm to find the shared Key. This key is used
as a shift key
for Caesar cipher, Enerypt the text message “I AM NEPALI” using this key.
[1+3]
6, Demonstrate the working mechanism of Shortest Path Routing with a subnet consisting
of at
least six nodes with cost size defined by you.
{4]
7. Write Short Notes On (Any Two):
[242]
a. IPV6
b. Piggybacking
c. Pure ALOHA
d. Network Address Translation (NAT)

SECTION “C"
[2 (Q. x 8 = 16 marks]
Attempt ANT THO questions:
8.
a. Explain why collision is an issue in random access protocols but not
in controlled access
protocols? Also explain how collision is detected in CDMA/CD scheme.
[2.5 + 2.5]
b, Assume the propagation delay in a broadcast network is 3 microsecond
and the frame
transmission time is 5 microsecond. Can the collision be detected no
matter where it
occurs?
[3]

BS tu, duis

Explain Cyclic Redundancy Check (CRC) with encoder and decoder diagram, How are
cyclic codes represented by polynomials? What should be the structure of g(x) to guarantee
the detection of single bit error? [Use at least three g(x) values to prove your answer]
[44242]

Define Network Security? Briefly explain the properties of $-Box and P-Box. Explain the
working mechanism of DES with round function(Round,) and f(R,, K,) with diagram.
[14245]
Mark seared-
KATHMANDU UNIVERSITY
End Semester Examination [C]
November, 2016
Level: BLE. / B. Se,
Course - COMP 204
Year: I Semester: Ill
Exam Roll No,
_
; Time: 30 mins. FM. 210
Registration No.: Date Ov UL 2016
ON A"
(20.0. = 0.4= 10 marka]

Encircle the alphabetical letter


of the most appropriate answer.

In asynchronous transmission, the gap time between bytes ix


[a] varioble [b] fined
[ce] zero [qd] @ function of the data rate

Ifthe frequency spectrum ofa signal has a bandwidth of $00 Hz with the highest
frequency at 600 Hz, whar should be the sampling rate, according
wo the Nyquist
iheorem?
[a] 200 samples’s [bh] 41K) samplesis [c] 1000sampless fd) 1200 samples!
The _ Tate defines the number of data elemensent
ts in Is:the ratteis the
number of signal elemencs sent in 1s.
[a] signal; data [b] data: signal [ce] baud; bit [d] none of the above
Block coding can help in _ atthe receiver,
[a] Synchronization [b] Error detection fc] Attenuation [qd] [a] and fb]

Fora channel, the Nyquist bit rate formula defines the theoretical maximum bit
ale.
[a] low-pass [6] bandpass [ec] noisy [d] noiseless
Given two sine waves A and ff, ifthe frequency of
A is twice that of B, then the period of
Bis _ thatof A.
[a] one-half [b] twice [c] the same as [4] indeterminase from:
_ is a type of transmission impairment in which the signal
the resist loses strength due to
of the anc
transmission
e medium.
fa] Distortion [b] Noise fe] Attenuation [d] Decibel
— consists ofa central conductor and a shield,
[a] Twisted-pair [b] Coaxial [ce] Fiber-optic [d) none of the above
ae used for cellular phone, satellite, and wireless LAN communic
[a] Radio waves — [b] Infrared waves [c] Microwaves ations,
[d] none of the above
Signals with a frequency below 2 MHz use 7
Propagation.
[a] line-of-sight |b) sky [e] ground [d] none of the above
o7 CEC 2016

In a fiber-optic cable, the signal is propayated along the inner core by i


[a) refraction [b] reflection [ce] medulation [d] none of the above

In Go-Hack-N ARQ, if 5 is the number


of bits for the sequence number, then the
Maximum site of the receive window must be i
fa] 1 fb) 15 ie] 16 [a] 31
In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the receiver may
send an ACK, to the sender.
[a] 6 [b] 7 le] 5 [d] any of the above

In Stop-and-Wait ARQ, the acknowledgment number always announces in


anthmetic the sequence number of the next frame expected.
[a] maodulo-2 [b] madulpt [ec] modulo-m [d] none of the above

Control refers to 0 set of procedures used to restrict the amount of data that the
sender can send before waiting for acknowledgment,
[a] Flow [b] Error {¢] Tronsmission [id] none of the above

Ina Gio-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?
[a] 11063 [b] | to 64 [ce] 90 63 [4] O10 64

Byte stuffing means addinga special byte io the data section of the frame when there is a
character with the same pattern as the ‘
[a] trailer |b] May fc] header {d] none of the above

—= framing uses two categories of protocols; character-orlented und bit-oriented.


[a] Standard [b] Fixed-size [ec] Variable-size = [J] None of the above

Which error detection meahad uses one's complement arithmetic?


[a] CRC {b] Checksum
[ec] Simple parity check [a] Two-dimensional parity check

20. In block coding, ifk = 2 and n= 3, we have invalid codewords.


la] 4 (b] 8 [sc] 2 [d) 6
KATHMANDL UNIVERSITY
End Semester Examination [C] O2 dec 2016
Novernber, 2016
Level Course COMP 204
Year Semester :Il
Time F. M. 740
SECTION “B"
[6Q. x 4= 24 marks]
Attempt
AY S2Y questions.

1. a. Explain the five component of a data communication system. U1]


b. A signal with 200 milliwatts power passes through 20 devices, each with an average
noise of2 microwatts. What is the SNK and SNRdB? [3]
z. Explain different types of transmission medium.

3. Which of the following CRC ganersiors guraranies the detection of single bil error?
a x'txtl bo wt cl dtl
4. What do we mean by byte stulling? Explain how byte stuffing is implemented with
all possible scenario.

a. Explain leaky bucket and token bucket algorithm. relly explain which among the
two is more efficient and why?

. Explain the necessity of TPv6 over [Pv4. 22]


Pp

Given an IP address 203.5025. 14/26, calculate the first address, last address and
number of address. 2]
te Explain with suitable example om how error can be detected using Checksum. i]

SECTION “C™
[2 QO» 8 = 16 marks]
Attempt ANY TAG questions.

&. Explain the working mechanism of COMA in detail along with the properties,
Recessary assumptions and an example [3]

9. a. Explain the advantage of slotted ALOHA protocol over pure ALOHA protocol, [4]
b. Ing bus CSMA/CD network with a data rate of 10 mbps, a collision occurs 20s
after the first bit of the frame leaves
the sending station. What should the length of
the frame: be sev that the sender can detect
the collision? 4]

10. Explain Data Encryption Standard algorithm in detail with suitable working
diagram. [3]
KATHMANDU UNIVERSITY Marks Scored:
End Semester Examination
August'September, 2015
Level :B.E/ BSc. Q4 SEP 2015 Course : COMP 204
Year ‘Hl Semester : Il
Exam Roll No. : Time: 30 mins. F.M. : 10

Registration Ni.: Date


SECTION *A"
[20
Q = 0.5 = 10 marks]
Encirele the correct answers.
I. What is the loss in signal power as light travels down the fiber?
a Allenualion b. Progragation ¢. Scattering dimeruption

2. While transmitting odd-parity coded symbols, the number of zeros in each symbol is
a Odd b, Even c, aand b both d. unknown

3. Which of the follawing is possible in a token passing bus network’?


a. In-service expansion ¢. Both (a) and (b)
b. Unlimited number of station d. Unlimited distance
4. What does bit stuffing refer ?
a Inserting a ‘0" in user stream to differentiate ie with a flag
b. Insertinga “0° in flag stream to avoid ambiguity
c. Appending a nibble to the May sequence
d. Appending a nibble to the use data stream

5. Ifanetwork designer wants to connect 5 routers as point-to-point simplex line, then total
number
of lines required would be
a 5 b. I c. 20 d.32

6. Five bits are used for packed sequence numbering in a sliding window protocol used ina
computer network. What is the maximum window size?
a 15 b. 16 gal d.J2

7. Slotted ALOHA
a@. Divide time into discrete intervals c¢, Both (a) and (b)
b. Require global time synchronization —d. None of these

8. Start and stop bits are used in serial communication for


a. Errordetection b.Ertorcorrection —c. Sequencing d. Synchronization

9. In cartier sense network, if prevailing condition is a “channel busy” then technique used is
a. Non-persistance
then it results in randomized walt and sense
b. I -persistance then the channel is continuously sensed
c. p-persistance then randomized retransmission is done
d. Both (a) and (b)
QA SEP 215
10. The maximum data rate ofa channel fora noiseless 3 KHz channel having level 2 is:
a. 3000 bps b. 1500 bps c, 6000 bps d. 1200 bps

In which ARQ, when a NAK is received. all frames sent since the last frame acknowledged
are retransmitted again?
a. Stop and wait ¢. Go - Back
N ARQ
b. Stop and wait ARQ d, Selective repeat ARQ

Maximum data rate ofa channel of 3000 Hz bandwidth and SNR of 30db is:
a. 30,000 b. 40,000 cc. 30.C00) d. 60.000

In which communication. poll/select method is used to determine control of the line?


a. Peerto peer b. Primary to peer c. Peer to secondary d. Primary to secondary

The even parily bit for 100101) would be


a | b.0 eZ d, None

If the value of checksum is 0, then the message |s


a Accepted h, Rejected c. Sent hack d. Resend

In isolated double errors of the cyclic cade, the generator cannot divide the term x! + | where |
is in between
a OQandn-2 b. Qand n+] ec. and n-2 d. Oand n-!

WWgenerator of the cyclic code has af [cast two terms and the rightmost bit is | then error
cannot be divided by
a. Syndrome b. Dataword ¢, Generator al. Error

Eneryption and decryption provides secrecy or confidentiality but not


a. Authemticntion b. Integrity c. Keyy d, Frames

The cryptography can provide


a. Entity authentication ¢. Confidentiality
b. Non repudiation of message d. All of them

20. The Advanced Encryption Standard has three dilTerent configuration with respect to the
number of rounds and
a. Data size b. Round size c. Key size d. Eneryption size
KATHMANDL UNIVERSITY
End Semester Examination
August/September, 2015

Level: B.EVB.Se. G4 seP ais Course |: COMP 204


Year :ll Semester : Il
Time =: 2 hrs. 30 mins. FM. :40
SECTION “B"
[6Q, * 4 24 marks]

Altempt Any SLX questions (Question number THREE is compulsory).

L Explain OSI reference model focusing on three broad concepts of Services, Interfaces and
Protacal, [4]

Explain different data transmission modes with diagram. [4]


fe

3. A bit stream 1001101 is transmitied using the standard CRC method. The generator
polynomial is x'+L. Show the actual bit string transmimed. Suppose the third bit from the left
is inverted during transmission, Show thal this error is detected at the receivers end. 4]

4. State and prove optimality principle. Explain “count to infinity” problem with suitable
example. [2+2)

4. Detine Quality of Service (Qo8), Define different parameters used to measure good quality of
service, Describe traffic shaping schemes, (lel+3]

6. Define subnetting. Explain why subnetting is required with suitable example. Find the first
and last address of 200.107.16.17/27 [4]

Te Write short notes on (Any WO): [2+2]


a& Hierarchical routing
b. Fiber optic cable
ce. Piggybacking
d. Spoofing

[2.Q. « & = 16 marks]

Attempt Any TWO questions:

8. a, Explain the working mechanism of CSMA/CD with flow diagram. State reasons that
CSMA/CD cannot be used in a wireless LAN.
b. Ina COMA/CD network, assume we have a bus network topology with only two stations,
A and B in which Tfr = 40 ws and Tp= 25 ps. Station A starts sending a frame at time
t= 0.0 us and station B starts sending a frame at t= 23.0 us. Answer the following question:

04 SEP 2015
(i) Do frames collide?
(ii) Ifthe answer to part a is yes, does station A detect collision, justify your answer,
(ii) If the answer to part a is yes, does station B detect collision. justify your answer.

a. Explain Diffie-Hellman Key exchange protocol with suitable mathematical example,


6. Atbash was a popular cipher among Biblical writers. In Atbash, “A” is encrypted as “7”,
“B" is encrypted as “¥" and so on, Similarly, “2” is encrypted as “A”, “Y" is encrypted as
“B" and so on. Suppose that the alphabet is divided into halves and the letters in the first
half'are encrypted as the letters in the second and vice versa. Find the type of Cipher and
Key. Encipher the plaintext “EARTHQUAKE” using the Atbash cipher,

10. Explain the hamming code for one bit error correction with detail process and diagram of both
ends. Also demonstrate how two bit error in this case cannot be corrected,
KATHMANDU UNIVERSITY
End § Examinati Marks scored:

2008
Level : BE. Course : COMP 204
Year -II Semester:I

Roll No.: Tome :30 mins.

Date FM -:10

~ SECTION “A”
(20 Q.«0.5 = 10 marks]

Choose and tick che most appropriate answer.


L provides transparent transfer of data between end users, providing
Telable data transfer services to the upper layers.
1 Session layer iL Network layer
ui Transport layer Tv. Data-lnk layer

Infared signal with frequencies ranging between 300 GHz to 400THz can be used for
1 Short-range communication iL Long-range communication
ii. Medium-range communication Tv. None of the above

is the method to keep a fast sender from swamping a slow receiver


with data.
L Congestion control iL Congestion
in. Exror-contral tv. Flow-control

defines the primitive operations and services the lower layer makes
available
to the upper one.
1 Interface u. Protocol stack

Neither the internet nor the world-wide


web is a computer network. Tme/False

Collection of dependent computers interconnected by a single technology is called


computer network. True/False

Tefers to the way in which a network is laid out physically.

Switching computers are also called

In hamming distance, to detect d errors, you need a distance of code.


i ad-1 in ad iid iv. d-1

10. Distance vector routing is routing algorithm.


i Static i. M
ii. Static and Dynamic Iv. None of the above
11. Full form of IANAis

Programs done in networking to establish commection are called -

control packet generated


at a congested node
and transmitted back to the source node to restrict traffic flow.
i. Echo packet iL Congestion control
iii Choke packet Tv. All of the above

14 method of broadcast
routing make
excellent
use of bandwidth.
i Source iL Spanning tee
= Rinodi
iv. Multidestination Routing

Fund, seq and ack in elementary data lnk protocol are collectively called

16. In special character such as ESC is used along with the data flag
character.
i Bit stuffing i Character count
ii. Byte stuffing Tv. Physical layer coding violations

17. is concerned with getting packets from the source all the way to the
destination.
i. Transport layer i Physical layer
it. Network layer tv. DataLink layer

The methods of framing in the Data Link layer is /are:


1 Character count iL Byte stuffing
ii. Bit stuffing Tv. All of the above

What type of communications path alternates in two directions, but is restricted at only
one direction
at a time?
i Simplex i Half-simplex
ii. Full-duplex iv. Half-duplex

The TCP/IP Reference Model does not consists of


i Session layer it Internet layer
i. Transport layer tv. Application layer
KATHMANDU UNIVERSITY
End Semester Examination
2008
Level :- BE. Course - COMP 204
Year <I Semester:I
Time : 2 brs.
30 mins. FM : 50
SECTION “B”
[9 Q. x4 = 36 marks]

1. Whiat are the principal differences between commectionless communication and


connection oriented communication?

2. List two ways im which the OS] reference model and the TCP/IP reference are the same.
Now lst two ways in which they differ.

3. Describe count-to infinity problem. Explain one possible solution to the count-to-infimity
problem.

4. Describe why an application developer may choose to run its application over UDP rather
than TCP.

3. Explain the milk and wine policy with suitable example.

6. What is multicasting? State the condition where multicasting is more preferable.

F. Differentiate
Analog and Digital Transmssion.

8. Explain the importance of link state routing.

9. Write down the difference between an Unrestricted Simple Protocol and A Simplex Stop-
and-Wait Protocol?

10. = White short notes on:


L (Crash recovery it Network Topology

SECTION “C*
[2 Q. x7 = 14 marks]
Arempt
any TWO questions:

11. What does it mean by congestion control? Define Traffic shapimg


with the differences
between “The Leaky Bucket Algorithm” and “The Token Bucket Algonthm™?

12. Explain OSI Reference Model with functions of each of the layer.

13. Define Cryptography. What are its specific security requirements? Explain different types
of cryptography.
COMP 204

Transport layer
RE Sema ewe

Flow control
SERBIShER
KATHMANDU UNIVERSITY [ark obtained.
End Semester Examination
2009
Level - BE. Course : COMP 204
Year -Il Semester: I]

Roll No.: Time - 30 mins.


Date FM. 710

~ SECTION “A”
[20 Q.* 0.5=10 marks]
Fill in the blanks with most appropriate word/phrase or choose the most appropriate answer from the
given alternatives for the following questions.

1. Which field im the IP header ensures that packets will not loop endlessly on a network?
[a] CRC [b] TOS [c] TTL [d] checksum

What is the top level domain of the URL shown?


2 Awww.cisco.com/weblearnii htm!
[a] cisco.com [b] com [c] netacad [d] waew

End systems use port numbers to select the proper application. What is the smallest port
number that can be dynamically assigned by a host system?
[a] 143 [b] 128 [c] 512 [d] 1024

Which protocolis connectionless?


[a] TCP [b] FIP [c] UDP [d] SMTP

Where is router specified in the OSI model?


[a] datalink layer [b] application layer
[c] network layer [d] physical layer
What ts the address
range of a class C network address m binary?
[a] Olxxxxxx [b] Osocmom [ce] 10xxxxxx [d] 110:o0mx

Broadband wireless is described in IEEE............


[a] 802.3 [b] 802.16 [c] 802.4 [d] 802.5

How many collision domains is/are created when you segment a network with a 12 port
switch?
[a] 1 [b] 12 [c]2 [d]5
Which mechanism can be used to avoid a count to infinity loop?
[a] split horizon [b] route poisommg == [c] holddown timers = [d] triggered updates

10. Whatts the subnetwork address for a host with the IP address 200.10.5.68/28?
[a] 200.10.3.56 [b] 200.10.5.32 [ec] 200.10.5.0 [d] 200.10_5.64
11. Which address type has all host bits set to 1?
[a] broadcast [b] host [c] network [d] unicast

What best describes the purpose of the physical layer?


[a] Ensures reliable transmission of data across a physical link
[b] Determines connectivity and path selection between two end systems,
[c] Establish the physical addressing, network topology and media access.
[d] Defines the functional specifications for link between end systems and the electrical,
optical and radio signals.

What is achieved by the encapsulation at the datalink layer?


[a] Packets
are put into frames
[b] Data is packaged into a packet
[c] Packets are divided into segments.
[d] Data is converted for internet transmission.

14. What is the purpose of TCP/UDP port numbers?


[a] Indicate
the beginning of a three-way handshake
[b] Reassemble the segments into the correct order
[c] Identify the number of data packets that may be sent without acknowledgement
[d] Track different conversations crossing the network at the same time

Which statement is t rue regarding metrics used by routing protocol?


[a] Metrics are only used by dynamic routing protocol.
[b] A metric is a qualitative value a routing protocol uses to measure a piven route.
[c] Metrics are used by the router to determine if a packet has an error and should be
dropped.
[d] All of the above.

16. Which of the following commandis used to query the Domam Name Service for
information about domain names and IP address?
[a] ping [b] nslookup [c] tracert [d] ipconfig
17. A noweless...._....Hz channel cannot transmit quaternary (four level) signals at the rate
exceeding 5000bps.

veeeeeeeeee
Cable is used to comnect a computer directly to another computer.

A channel of 3000Hz bandwidth with a signal to thermal noise ratio of 30dB can never
transmit much more than...........bps.

All fragments except the last one im the IP datagram must be a multiple of. ........ bytes.
End Semester Examination
2009
Level : BE. Course : COMP 204
Year -II Semester:
II
Time =: 2 brs.
30 mins. FM. :50
SECTION “B*
(8 Q.=4=36 marks)
Attempt any NINE questions
only.
1. What do you understand by network topology? Explam the different network topologies
in brief.
2. Draw and expla the TCP header.
List the components of a data communication
system. Bnefly explain
each of them.
fa

Suppose abo@kueduop wants to send an email to xyz@hotmailcom. Descnbe the


-

various steps it takes for the mail to reach the destination.


5. What is network congestion? Explain hop-by-hop choke packet method of Congestion
control
in brief.
6. What are the two different types of service layers can offer to the layers above them?
Explain
with example.
7. What is flow control and error control? We have to design a codeword for transmission
using Hamming codes. The message bit is 1011011. Calculate the check bits. Write the
final codewordwath check bits. (Assume even parity is used in the Hamming code.)
8. What is internetworking? Explain comnectionless internetworking with suitable diagram.

9. What
is framing? Explain Starting and ending flags, with bit stuffing method of framing
in brief.
10. White short notes
a) The Leaky Bucket Algorithm
b) Jitter control

SECTION “C*
(2. Q.*7=14 marks]
Attempt any TWO questions only.
11. 1 late between routing and forwarding. Explain lnk state routing with suitable
example.
12.) What are the advantages of using the layered architecture? Explain OSI reference model.
Boefly compare OSI and TCP/IP reference model.
13. Explain the importance of Transport service access poimt (TSAP) im communication.
What do you understand by three-way handshake in transport layer? Explain symmetric
and asymmetric release of commection.
ANSWER TO OBJECTIVE QUESTIONS.
KATHMANDU UNIVERSITY ark opeained:
End Semester Examination
2009
Level - BE. Course - COMP 204
Year -II Semester: II

Roll No.: Time : 30 mins.


Date FM :10

~ SECTION “A”
(20 Q.= 0.5=10 marks]

Fill in the blanks with most appropriate word/phrase or choose the most appropriate answer from the
given alternatives for the following questions.

1. Which field in the IP header ensures that packets will not loop endlessly on a network?
[a] CRC [b] TOS [c] TIL (d] checksum

What is the top level domain of the URL shown?


iiwww.cisco.com/ web learn hem
[a] cisco.com [b] com [ec] netacad [d] www

End systems use port numbers to select the proper application. What is the smallest port
number that can be dynamically assigned by a host system?
[a] 143 [b] 128 [c] 512 [d] 1024

Which protocol
is connectionless?
[a] TCP [b] FTP [c] UDP [d] SMTP

Where is router specified


in the OSI model?
[a] datalink layer [b] application layer
[c] network layer [d] physical layer

What is the address


range of a class C network address in binary?
[a] Olxxxxxx [b] Oxxxxxxx [c] 10xxxxxx [d] 110sx—xx

Broadband wireless is described m IEEE ............


[a] 802.3 [b] 802.16 [c] 802.4 [d] 802.5

How many collision domains is/are created when you segment a network with a 12 port
switch?
[a] 1 [b] 12 [c]2 [d]5
Which mechanism can be used
to avoid a count to infinity loop?
[a] split horizon [b] route poisoning §=[c] holddown timers [d] triggered updates

10. What is the subnetwork address for a host


with the IP address 200.10.5.68/28?
[a] 200.10.5.56 [b] 200.10.5.32 [ce] 200.10.5.0 (d] 200.10.5.64
11. Which address type has all host bits set to 1?
[a] broadcast [b] host [c] network [d] unicast

What best describes the purpose of the physical layer?


[a] Ensures reliable transmission of data across a physical link
[b] Determines connectivity and path selection between two end systems,
[c] Establish the physical addressing, network topology and media access.
[d] Defines the functional specifications for lmk between end systems and the electrical,
opticaland radio signals.

What is achieved by the encapsulation


at the datalink layer?
[a] Packets
are put into frames
[b] Data is packaged into a packet
[c] Packets are divided into segments.
[d] Data is converted for intermet transmission.

14. What is the purpose of TCP/UDP port numbers?


[a] Indicate
the beginning of a three-way handshake
[b] Reassemble the segments into the correct order
[c] Identify the number of data packets that may be sent without acknowledgement
[d] Track different conversations crossing the network at the same time

Which statement is t rue regarding metnics used by route protocol?


[a] Metrics are only used by dynamuc routing protocol
[b] A metricis a qualitative value a routing protocol uses to measure a given route.
[c] Metrics are used by the router to determme if a packet has an errorand should be
dropped.
[d] All of the above.

16. Which of the following command is used to query the Domain Name Service for
information about domain names and IP address?
[a] ping [b] nslookup [c] tracert [a] ipconfig
17. Anoiseless......... Hz channel cannot transmit quaternary (four level) signals at the rate
exceeding S000bps.

wo--------- Cable is used to connect a computer directly to another computer.

channel of 200082 bandwidth with a signal to thermal noise ratio of 300B can never
transmitmuch more than...........bps.

All fragments except the last one in the IP datagram must be a multiple of......... bytes.
End Semester Examination
2009
Level - BE. Course : COMP 204
Year <I Semester:
IT
Time : 2 brs.
30 mins. FM. 250
SECTION “B”
(9 Q.4=36 marks]
Attempt any NINE questions
only.
1. What do you understand by network topology? Explain the different network topologies
in brief.
2. Draw and explain the TCP header.
List the components of a data communication system. Briefly explain each of them.
fe

Suppose abc@kuedunop wants to send an email to xy2@hotmallcom Descnbe the


>

various steps it takes for the mail to reach the destination.


3. What is network congestion? Explam hop-by-hop choke packet method of Congestion
control
im bnef.
& What are the two different types of service layers can offer to the layers above them?
Explain
with example.
7. What is fow control and error control? We have to design a codeword for transmission
using Hamming codes. The message bit is 1011011. Calculate the check bits. Write the
final codeword with check bits. (Assume even parity is used in the Hamming code.)
8. Whiat is internetworking? Explain comnectionless internetworking with suitable diagram.

9. What
is framing? Explain Starting and ending flags, with bit stuffing method of framing
in brief.
10. ‘Write short notes
a) The Leaky Bucket Algorithm
b) Jitter contrel

SECTION “C”
[2 Q.=7=14 marks]
Attempt any TWO questions only.
11. I late between routing and forwarding. Explain lnk state routing with suitable
example.
12. What are the advantages of using the layered architecture? Explain OSI reference model.
Bnefly compare OS] and TCP/IP reference model.
13. Explain the importance of Transport service access pomt (TSAP) m communication.
What do you understand by three-way handshake im transport layer? Explain symmetric
and asymmetric release of connection.
ANSWER TO OBJECTIVE QUESTIONS.
KATHMANDU UNIVERSITY
End Semester Examination Mark scored:
2010
Level : BE. Course : COMP 204
Year -I Semester: IT

Roll No.: Time - 30 mins.


Date FM. -:10

~ SECTION “A”
[20 Q.x0.5=10 marks]
Fill in the blanks with most appropriate word/phrase or choose the most appropriate answer from the
given alternatives for the following questions.

1. What address type does a switch use to make forwarding decisions?


[A] source IP [B] destination TP = [C] source MAC [D) destination MAC

What is achieved by the encapsulation process at the data link layer?


[A] packets are put into frames
[B] data is packaged into a packet
[C] packets are divided into segments
(D] data is converted for internet transmission

What information is contamed in LSP’s sent by lnk state routers to them neighbors?
[A] 4 copy of the routing table [B] the state of directly connected Imks
[C] a copy of the topology database [D] all of the above
Which portion of the IP address does the prefix represent?
[A] broadcast [B] host [C] network [D] umicast

Where is hub specified in the OSI model?


[A] data link layer [B] application layer
[C] network layer [D] physical layer
(Class B network address starts with .............m
binary
[A] Olxxxaxs [B] Ooracomx [C) 10sccumx [D) 110sccu:

Any process wishing to establish a commection to a host to transfer a file using FTP can
connect to the destmation
host's port........... to contact
its FTP daemon.
[A] 21 [B] 25 [C] 68 [D] 80
How many broadcast domams is/are created when you segment a network with a 5 port
switch?
[A] 1 [B] 12 [C]2 [D]5
What ts the primary reason for development of [Pwo?
[A] security [B] header format simplification
[C] expanded addressing capabilities [D] addressing simplification
10. Which field in the IP header ensures that packets will not loop endlessly on a network?
[A] CRC [B] TOS [C] TIL [D] checksum

11. Which address type has all host bits set to 1?


[A] broadcast [B) host [C] network [D] unicast

What is the primary function of CSMA/CD in an Ethernet network?


[A] Assigns MAC addresses to hosts
[B] Maps an IP address to a MAC address
[C] Provides a method to determine when and how hosts access the Ethernet medium
(D] Defines the area in which collision can occur

When is a straight-through cable used in a network?


[A] When connecting a router through the console port
[B] When connecting one switch to another switch
[C] When connecting
a host to a switch
[D] When connecting a router to another router

14. What determines how much data a sending station rummng TCP/IP can transmit before it
Must receive an acknowledgement?
[A] Window size [B] Transmission rate
[C] Bandwidth [D] Segment size

What is an advantage of static routing dynamic routing?


[A] Configurationis less error prone
[B] More secure because routers do not advertise routes
[C] Administrator has less work maintaining the configuration
[D] Growing the network usually does not present a problem

16. Reliability and Delay parameters requirements for E-mail application is............-..
[A] high, low [B] high, high [C] low, high [D] low, low
17. The 32-bit hexadecimal address CO290614 is written as .......... in dotted decimal notation.

Dialog control, token management and synchronization are done im -........... __ layer
of the
OSI reference model.
[A] Application [B] Presentation [C] Transport [D] Session

Achannel of 3000Hz bandwidth with a signal to thermal noise ratio of 20dB


can never
transmit much more than....................bps.

The maximum value of IHL im IPw4 header is................2.... bytes.


End Semester Examination
2010
Level - BE. Course - COMP 204
Year <I Semester: II
Time - 2?hrs.
30 mins. FM -:30
SECTION “B"
[8 Q.2.5=20 marks]
Attempt any EIGHT questions only.

1. List the components of a data communication system. Briefly explain each of them.

2. What are the advantages of using the layered architecture? Two networks each provide
Tehable connection-oriented service. One of them offers a reliable byte stream and the other
offers a reliable message stream: Are these identical? If so, why is the distinction made? If
not, give an example of how they differ?

3. You are given a network address of 193.169.10.0 and submet mask of 255.255.255.240.
Find the number of subnets, the valid host range and the broadcast address of each.

4. What is media mode? Explain the guided transmission media in brief

5. Datagram fragmentation and reassembly are handled by IP and are invisible to TCP.
Does this mean that TCP does not have to worry about data arriving in the wrong order?
Explain.
6. A bit stream 10011101 ts transmitted using the standard CRC method. The generator
polynomialis x3+1. Show the actual bits transmitted. Suppose the third bit form the left is
inverted during transmission. Show that this error is detected at the receiver's end.

7. What is the difference between congestion control and flow control? List the various
factors that bring congestion
in a network.

8. Differentiate between virtual circuit subnet and datagram subnet.

9. White short notes


a) Token mng
b) Domain Name System

SECTION “C*
[2 Q.=5=10 marks]
Attempt any TWO questions only.

10. 1) The following character encoding is used im a data link protocol:


A: 01000111;
B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted
(m binary) for the four-character frame: A B ESC FLAG when each of the following
framing methods are used:
(a) Character count.
(b) Flag bytes with byte stuffing.

(c) Starting and ending flag bytes, with bit stuffing


ii) One of your classmates has pointed out that it is wasteful to end each frame with a flag
byte and then begin the next one with a second flag byte. One flag byte could do the job
as well, and a byte saved is a byte earned. Do you agree? Explain.

11. Differentiate between Distance Vector and Link State Routing. Explain the Count-to-
infinity problem wath suitable example. Explam any one techmique you know to address

What is the importance of Transport service access pomt (TSAP)


in communication?
ExplainTCP header in brief.
KATHMANDU UNIVERSITY
End Semester Exam
2010
Level - BE ‘Course :- COMP 204
Year -II Semester: II

Roll No: Tome : 30 mins.


Date : FM. 710

SECTION “A”
(20Q. * 0.5=10 marks]
Fill in the blanks with most appropriate word/phrase or choose the most appropriate answer from the
given alternatives for the following questions.
1. What address type does a switch use to make forwarding decisions?
[A] source IP [B] destination
IP

2. What is achieved by the encapsulation


process at the data link layer?
[A] packets are put into frames [B]data is packaged
into a packet

3. What information is contamed im LSP’s sent by link state routers to their neighbors?
[A] A copy of the routing table [B) the state of directly connected links
[C] a copy of the topology database (Dall
of the above

4. Which portion of the IP address does the prefix represent?


[A] Broadcast [B] host

3. Where is hub specified


im the OSI model?
[A] data link layer [B] application layer
[C] network layer [D] physical layer

6. Class B network address starts with -........... in binary


[A] Olsxaco [B] Oxxxxo
(C) coo (D] 110scmxx

7. Any process wishing to establish a connection to a host to transfer a file using FTP can
connect to the destmation host's port...........0 contact its FTP daemon.
[A] 21 [By25
[C] 65 [D] 80
§&. How many broadcast domains is/are created when you segment a network with a 5 port
switch?
[A]1 [Byi2
[C]2 [D]5

9. What is the primary reason for development of IPvi?


[A] security [B] header format simplification
10. Which field m the IP header ensures that packets will not loop endlessly on a network?
[A] CRC (B]Tos
(C] TTL (BD) checksum

11. Which address type has all host bits set to 1?


[A] broadcast {B] host
[C] network (D] umicast

12. What is the primary function of CSMA/CD im an Ethemet network?


[A] Assigns MAC addresses to hosts
[B] Maps an IP address to a MAC address
[C] Provides a method to determine when and how hosts access the Ethernet medium
[D) Defines the area in which collision can occur

13. When is a straight-throughcable used m a network?


[A] When connecting a router through the console port
[B] When connecting one switch to another switch
[C] When connecting a host to a switch
[D] when commecting a router to another router

14. What determines how much data a sending station runing TCP/TP can transmit before it
Toust receive an acknowledgement?
[A] Window size
[B] Transmission
rate
[C] Bandwidth
[D] Segment size

15. What is an advantage of static routing dynamic routing?


[A] configuration
is less error prone
[B] more secure because routers do not advertise routes
[C] Administratorhas less work maintaining the configuration
[D] growing the network usually does not present a problem

16. Reliability and Delay parameters requirements for E-mail application is...............
[A] high, low [B] high, high
[C]low, high [D] low, low
17. The 32-bit hexadecumal
address CO290614 is written as ..........1n
dotted decimal notation -
{ 192.41.6.20)

18. Dialog control, token management and synchronization are dome im .............. layer
of the
OSI reference model.

19. A channel of 3000Hz bandwidth with a signal to thermal noise ratio of 20dB can never
transmitmuch more than.........1 bps.(19974.63)

20. The maximum value of IHL im [Pv4 header is................brytes.(60)


Marks Scared:
KATHMANDU UNIVERSITY
End Semester Examination
August/September,2015

Level : BLE. Course :ETEG 303


Yer <I Semester
: IT
Exam Roll No. : Time: 30 mums. FLL 720

Registration No. Date


SECTION “A™
[20 = 1 = 20 marks]
Encircle the most suitable answer to the following questions:

QD
F

a) Mesh b) Ring c) Star 4) Bus


15 2 Communication path that transfers data from one point to another.
a) Link b) Node c) Mednm d) Topology

3) Layer of the TCP/IP protocel suite are involved


in a link layer switch.
a) Application 6) physical c) data link di) metwork

4) Effective bandwidth is the bandwidth that a networks needs to allocate


for the

3) Flowofdata = b) FlowofProtocol c)Flowoftaffic —d) Flow


of amount
A packet is sent by a mode to a source to infonm compestion.
a) Congestion b) Choke c) Change @) Control

Pigevbacking is a technique used for -


a) ACK: b) NAKs c) both a and b d) REJ

The throughput of Slotted ALOHA is .


a) Gtexp-G) —b)Gtexp-2G) sc) G*empl-10G) —d) (G2)
* expi-c)
is the term that refers to start of communication in tramzition phase.
a) authenticate b) establizh C) network d) temminate

The amd are used a Authentication


Protocols in PPP link
a) PAP. CHAP b) PAP, HDLC c) IPCP, HDLC d) LCP, IPCP

To guarantes detection of wp to 3 rors in all cases, minimum hamming distance in 2 block code
must be -
aj) = bys-1 cys-1 do
1) ig a command for assigning ip address to a router in interface Fast Ethemet
Ol.
a) FaQvl, ipaddress
by) interface FastEthemet)/1, ip address
C) interface fast)/1, ipaddress
d) interface fastethemeti 1, ipaddress

12) ig the class for 130.35.54.12 classful addresz.


a) ClasA b) Class B c) Clas C ) Malticasting
13) Tf generatorof cyclic code has at least
two terms and rightmost
bit is 1 then error cannot
be divided by -
2) Syndrome b) error c} data word dj) generator

14) Carrier Sense Multiple Access (CSMLA) is based on medium called


a) Listen before talk b) listen before collision
ch} sense before tranemit di) sense before collision

15) Tn classless addresting, there are no classe: but addresses are still zranted in
a) IPs b) Blocks. c) Codes d) Sizes

16) maps the IP Address of next hop into MAC Address.


3} NAT *) DHCP } ARB Dicmp
1) Address FES0::12 ig a
a) Link local address b) Site local address
c) Multicast Address d) Loop back Address

18) Data section of frame has am extra byte is called the -


a) Bit stuffing b) Byte Stuffing Cc) escape character df) flag

18) In multiple Point to Point Protocol, value of protocol field is -


a) 0% 003b b) Os 003c c) O09 a) 0» 003£

In High-level Data Link Control (HDLC), frame that iz used only to transport control
information is called -
a) T-irame b) S-trame cc) V-frame id) pigeybackme
EATHMANDU UNIVERSITY
End Semester Examination
August/September,2016
Level = BE. Course :ETEG303
Year :I Semester
: II
Time =: 2 bos.30) min. FLA 233
SECTION “B*

Attempt 4VF FIVE questions. Assume anv suitable data if mecessary. Figure:
mm margin mdicate
full marks for each question.

1. a} Explain the characteristics of Line Coding technique. (4)


b) Show the lavers in TCP/IP protocol suite and the flow of data when two hosts, one on the
Errstmagar and other on the Dhulikhel exchanges messages. 4)
c} We need to send 263kbps over noiseless channel with a bandwidth of 20 kHz How many
signal levels do we need. B]

2. a} Compare between packet svdtching and circuit switching im term: of efficiency and delay
with appropriate figures. 7 E]
by) A slotted ALOHA network tramemits 200-bit ames using a shared channel with a 200-
kbps bandwidth Find the throughput if the system produces
Ls 1000 frames per second.
iL 300 frames per second.
iii, 250 frames per second. EB]
c) Define Data Rate Management in TOM. How can it be handled? 6]

3. a) How can a list of five 4 bit numbers (7, 11, 12,0, 6) be send to a destination.
Apply
(Checksum error-detecting technique. |
by Explain with flow diseram to how the alzorithm for calculation of the checksum.
4]
c} Draw the frame exchange timeline for CSMA/CAprotocol Explain Network Allocation
Vector. BE]

4. a) Am ISB is granted the block 16.12.64.0/20. The ISP needs to allocate addresses for &
Organizations, each with 256 addresses. BE]
iL Find the number and range of addresses in the ISP block.
iL Find the range of addresses for each organization
iii. Show the outline of address distribution and forwarding table.
by) What is Congestion and how can congestion be controlled m Network Layer. Explam m
detail with appropriate figures EB]
ch Draw a flow diagram using following scenario B]
Lo Frame 0 is sent, but lost
ii Frame 0 is resent and
iii. Frame | is sent and acknowledge, but the acknowledgement
is lost
iv. Frame 1 is resent and acknowledged.

3. a) How can a set of private addresses be allowed to communicate with a set of universal
addresses. B]
b) Find the shortest available path for all possible destinations starting for mode s = 0 using
Bellman Ford Algorithm. Assume weights to be equal in both directions. [4]
ae
. > |
Pew

6. a) Using the following specifications, draw a finite state machine with three states
(I, 0, and II), st events, and four actions.
LosoIf the machine ic in state 1, two events cam occu. If event 1 occurs, the machine
moves to state IL If event 3 occurs, the machine perform: action 2 and 4 and moves
to state IL
j- If the machine is im state I, two events can occur. If event 4 occu, the machine
Temains in state IL If events 6 occur, the machine perfonms actions 1 and 2 and moves
to state IT.
k. Tithe machine is im state I, three events can occur. If event 2 occurs, the machine
Temains in state I. If evant 6 occurs, the machine perfonms actions 2, 3, 4 and 5
moves to state 1 if event 4 occurs, the machine performs actions ] and 2 and moves.
to state [. Bi]
by Write short note: om (amy three) [2x3=6]
i FHSS

You might also like