Professional Documents
Culture Documents
When two (2) or more bits in a data unit is changed during the transmission, it is called
[4] tandom error —[ b | burst error [¢] inverted error [dl ) run-time error
The 32-bit intemet address |ODDDO00 ODMH 010 00000010 00011110 will
be written in
dotted decimal notation ns ;
[ap W4820.2.50 0 [bp 164100961 = [ec] 21020264 = [dd] 128.10.2.30
If Five (5) files are transferred from server A to client B in the same session then the
number of TCP connections between A and B is
[a]s [b} 10 [e]2 [d]é
The translates internet domain and host names
to IP address.
[ a] domain name system [ 6 | routing information protocol
[ ¢ ] network time protocol [ d ] internet relay chat
The field used to detect errors over the entire user datagram is
[a] UDP header [b ] Checksum [ ¢ | Source port (4) Destination
port
Suppose two [Pvé nodes want to interoperate using [Pv6 datagrams but are connected to
each other by intervening [Pv routers, The best solution bere is
[a] Use dual-stack approach [ 6) Tunneling
[¢ ] No solution [d ] Replace
the system
In a simple echo-request message, the value of the sum is 01010006 01011100. Then, the
value of checksumis
Ca} 101111) 10100011 [6] GLOL0000 01011100
De] WO1O111T 01011100 [4] O1010000 10700011
KATHMANDU UNIVERSITY
End Semester Examination [C]
December, 2018 pec 30 2018
Level |; BLE. /B.Se.
Course : COMP 204
Year il
Semester: |]
Time :2 hrs.30 mins, FM. :40
SECTION “BY
[6 Q. © 4 = 24 marks]
Attempt ANY SEY questions.
8 7 c
i Da
hah\ SE” a
ha “0
‘ty é ‘sy
“ey” = ‘ :
G
&. What is Protocol? What are the key elements ofa Protocol? Briefly
describe
the OS]
Reference Model.
[1+2+5]
9, What are the functions of Media Access Control’? Briefly describe the types
of Random
Access Protocol. [1+]
10. Suppose that there are 4 DepartmentsA (23 Hosts), B (16 Hosts), C (28 Hosts), D (13
Hosts). Given a network 202.70.64.0/24, perform sub-netting in such way that IP wastage
in each sub-network is minimum. Find Subnet mask, First address, last
address, and
usable host range for each network.
[8]
KATHMANDU Marks Scored:
UNIVE RSITY
End Semester Examination [C]
January, 2018
Level : B.E/B. Sc.
Year : il Course : COMP 204.
Exam Roll No. : Semester: II
Time: 30 mins, F.M. :10
Registration No.: U4 2018
Date Hh By
[20Q. * 0.5 = 10 marks]
’
Choose the most appropriate answer,
KATHMANDU UNIVERSITY
End Semester Examination [Cc]
2g
Level : B.E./B. Se.
January, 2018 san-0 9:2
Year : lll Course : COMP 204
Time: 2 hrs, 30 mins, Semester : [Il
F.M. :40
Which one of the following operations is not performed in data link layer?
[a] Framing. |b] error control [c| flow control [d] channel coding
CIDR is helps to
[a] Efficiently addressing (b] Waste less addressing:
[e) Error less addressing [d] Dynamic addressing
Which
of the following isa form of DoS amack ?
(a) Vulnerability attack [b] Bandwidth Msling
fc] Connection flooding [d] All of the mentioned
In which network topology there are bidirectional links between each possible node?
[a] Star |b) Bus fc] Mesh {d] Ring
What is the maximum number of [P addresses that can be assigned to hosts on a bocal
subnet that uses the 255,255,255,224 subnet mask?
[a] 14 [b] 15 [c} 16 [d] 30
You need to subnet a network thal has § subnets, ench with ot least 16 hosts. Which
clasaful subnet mask would you use’?
[a] 235.253.255.192 [b] 259.255.245.224 fe] 285.255.255.240 [i] 255.255.255.248
L. Explain basic features and characteristics of data communication and networking. [+]
3. Discuss data rate limit theorem in digital wansmission. What is the theoretical highest bit
rate of a regular telephone line havinga bandwadth of MMM) He (300 He to 3400 Hz). The
signal-to-nease rath is usually 35 dB (3162) on up-link channel, (2+2]
4. Explain in detail abot CSMASCU Protacn, blow does it detect the collisions? [4]
A What advantages docs fiber optics have over other media? Explain in brief about working
mechanism of fiber optics. [I+3]
7. Explain in brief aboud the working procedure of error correction techniques in checksum
procedure. [4]
SECTION *C"
(2) = £= 16 marks]
& Explain the traffic shaping techniques performed by network Layer in deta
communication. [3]
9. Define briefly about operation of sliding window protocol, What are the advantages
of
selective repeat ARQ over other ARQ? Discuss the working mechanism of Selective
Repeat ARQ. [24264]
1. Briefly describe about the factors that define quality of service of Dats Communication
and Networking. Discuss three fundamental aspects of security in data coenmunication
and networking. [244]
ll. What is the address _ ofa class C network in binary?
a. O1XXxXXXX b. Oxxxxnnx c. [OMMxXAX d. 1 }0xxaucx
For m size header the size of receive slide window for selective repeal protocol is
a.2m b. 2" eam d, 2=!
2. Explain guided media and its types with suitable diagram. [4]
3. What do you mean by transmission impairment? Write in brief the factors that causes the
transmission impairment. [143]
4. Explain with suitable diagram how Pure ALOWA works. What is the vulnerable time of
pure ALOHA? Explain how the efficiency of pure ALOHA protocol be increased.
[1.5+1+1.5]
5. An organization is granted a block of addresses with (he beginning address
14.24.74.024. The organization needs to have 3 subblocks of addresses
to use in its three
subnets. First subblock of 10 address, second subblock of 60 addresses and third
subblock of 120 addresses. Design the subblocks. 14]
6. Explain the working mechanism of Go-Rack-N ARQ with suitable flow diagram. [4]
SECTION “C™
(2.0. x 8 =16 marks}
Attempt ANF TWO Questions:
a. Explain the working mechanism of COMA and write down its associated properties,
Finds the chipsfor a network with two stations. (2+541]
9. a. How does a single-bit error differ from a burst error? Find the Hamming distance
between A000, 011) and a 10101, 11110). (2+1)
b, Explain the working of simple parity check code with diagram for encoder and decoder.
Assuming4 bit data word generate all possible codeword showing that simple parity
check guarantees to detect any even number of errors. [2+142]
10. a, Explain three way handshake protocol with clear flow diagram, [4]
b, Explain “count to infinity” problem with suitable example. [3]
. Ifa periodic signal is decomposed into five sine waves with frequencies of 100, 300, 500,
700 and 900 Hz, what is the bandwidth? (]
Marks Seared:
KATHMANDU UNIVERSITY
End Semester Examination
August'September, 2016
Level:B.E./B.Se¢, 46 Course ; COMP 204
Year: Il ‘A 5 AvG 20tb Semester: Il]
Exam Roll No. : Time: 30 mins. FM. :10
2 Which
of the following cable type is mostly used w connect
two routers that are located
far away?
a. Copper straight through cable &. Copper
cross over cable
c. [MCE cubke d. DTE cable
3 Assume that SNRdb = 36 and the channel bandwidth is 2MHz. What is the theoretical
channel 7
a 12 Mbps b, 24 Mbps: c. J Mbps d, 48. Mbps
4. What are the propagation time and the transmission time fora 24 kilobyte message if the
bandwidth of the network is | Gbps? Assume that the distance between the sender and
the receiver is 12,000 km and the light travels at 2.4% 10" ms?
a 20msand 0.012 ms 6. 30 ms and 0,010 ms
c. §0ms and 0.020 ms d@. 10m and 0,030 ms
5 Which of the following technologies fall under the Extremely High Frequency(EHF}?
a RADAR b. FM radio c. Cellular phones = od. WHF T¥
T For the data bit ofC1 10001 11010001 TTT 100100101, after bit stuffing the actual
will be of?
a OLLOOOL 1 OLOIO LOOT) 101 1OOTOO1O1
b. OLOOOLLTONO1O
O01 11001 POO 1MO10T
& GLOOD1 LIOIOIO L001 1011 1 LOOL00101
d. OLID00L 1101010010111
POO TOOnOT
g. A sloned ALOMAnetwork transmits 200 bit frames usinga shared channel with a 200
kbps bandwidth, What is the throughput ifthe system produces 540 frames per second’?
a. 135 frames survival b. 151 frames survival
c. 173 frames survival d. 191 frames survival
15 AUG 2016
The mapped [Pwé address equivalent to 192, 168.1.1 is
a. O00:00020:FFFF:B1A8:010 b. 0:60:00: FFFF:OOA8: 101
e. OohO:000:FFFFSALAGO1O di. O:0:0:0:0:FFFF:C
LAS: 101
Ifthe size of header is of x bit, then the sequence number will be from the range
a Om? b. 1 to 21 6, Ot 21 dL to"
For m size header size the size of receive slide window for selective repeat protocol is___
a 2m b.2” qa a
The technique that requires mo network information is:
a Flooding 6. Variable routing = c. Flwad routing d. Random routing
A eomevunication device that combines transmission from several 10 devices into one
ling is a. : _————
a. Concentrator b. Modifier c, Multiplexer d. Full duplex mode
The management of data flow between computers or devicesor berween nodes iin a
network
is called
a Data control b. Flaw control c. Data management d. Data management
[fa noiseless channel] with a bandwidth of 3000 Hz transmitting a signal with two signal
levels maximum Bit rae would be
a. 12000 bps b. 16000 bps c. 6DDbps d. S000 bps
2, What do we mean by flow control? Explain how Stop and Wait ARQ works along with
its flow diagram. What are the disadvantagesof Stop and Wait ARQ protocol? {4]
a. Explain how are errors detected and corrected using Hamming Code H(7,4). (4
4, Describe distance vector routing algorithm. Explain the worst case problem that distance
veetor routing algorithm might face. [2+2]
5. Differentiate between TCP and UDP. Explain three way handshake protocol with clear
flow diagram. [15+ 24]
& a Explain the TCP/IP protocol suit with layered diagram. [5]
b, Assume a system uses five protocol layers. If the application program creates a message
of 130 bytes and cach layer (including
the fifth and the first) adds a headerof 20 bytes to
the dara unit,
what is the efficiency (the ratio of application layer bytes wo the number
of
bytes transmitted) of the system? [3]
9. a. Explain the parameters used to measure the good quality of services. Elaborate in detail
how we can achieve good quality of services. [+2]
b, An organization is granted a block of addresses with the beginning address 14.24.7224.
The organization needs to have3 subblocks of addresses to use in its three subnets: one
subblock of 10 addresses, one subblock of 60 addresses, and one subblock of 120:
addresses. Design the sub-black. [4]
10.4. What do we mean
by channel allocation problem? Explain the method how channel
allocation problem can be solwed? Also elaborate how we can increase the efficiency. [5]
b, One hundred stations on a pure ALOHA network sharea |-Mbps channel. If frames ane
100M) bits long, find the throughput if cach station is sending 10 frames per second, [3]
Marks Scored:
KATHMANDU UNIVERSITY
End Semester Examination [C]
January, 2016
Level :B.E./ B.Sc. Course : COMP 204
Year ill Semester : II
Exam Roll No, : Time: 30 mins. F.M. : 10
In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?
[A] 0 to 63 [C] 0 to 64
[B] | to 63 [D] | to 64
Mii ee eed estrus beandes framing, we need a delimiter (flag) to define the boundary of two frames.
[A] Fixed-size [C] Variable-size
[B] Standard [D] None of the above
In Selective Repeat ARQ, if 5 is the number of bits for the sequence number, then the
maximum size of the receive window must be .......... .
[A] 15 [C] 16
[B] 31 [D] 1
A noiseless 3 KHz channel transmits bits with binary level signals. What is the maximum
data rate’?
[A] 3 kbps [C] 6 kbps
[B] 12 kbps [D] 24 kbps
If the hamming distance between a dataword and the corresponding codeword is three, there
are........... bits in error
[A] 3 [c] 4
[B] 5 [D] 6
A signal travels through a medium and its power is reduced to two-third. The attenuation
is...
[A] -1.67dB [C] -1.76 dB
[B] -2.15dB [D] -2.51dB
In hamming code C(7,4) with dmin=3, three bit syndromes creates eight different bit patterns
that creates eight different conditions. Which of the following option shows no error or the
error in parity bit only
[A] 000, 001, 010, 100 [C] O11, 101, 110, 111
[B] 001, 010, 011, 101 (D] 100, 101, 110, 111
10. A generator having message 10011010000 having generator 1101 will give the remainder
[A] 111 [Cc] 110
[B] 101 [D) 000
Contention is :
[A] One or more conductors that serve as a common connection for a related group of
devices
[B] a continuous frequency capable of being modulated or impressed with a second signal
[C] the condition when two or more stations attempt to use the same channel at the same time
[D] a collection of interconnected functional units that provides a data communications
service among stations attached to the network
12. During bit stuffing, after how many consecutive | bits followed by a zero, a zero bit is
added?
[A] 3 [B]5 [c] 4 [D] 6
15. Posi stentrs eight beens pen npremenis, eines os kee ee, does not substitute one symbol for another;
instead it changes the location of the symbol.
[A] Monoalphabetic cipher [C] Polyalphabetic cipher
[B] Transposition cipher [D] Block cipher
CRC can detect all bursts of upto m errors if generator polynomial G(x) is of degree
[A] One [C] m
[B]m-1 [D] m+1
In cyclic redundancy checking CRC is the,
[A] Divisor [C] Quotient
(B] Dividend [D] Remainder
SECTION “C"
[2 (Q. x 8 = 16 marks]
Attempt ANT THO questions:
8.
a. Explain why collision is an issue in random access protocols but not
in controlled access
protocols? Also explain how collision is detected in CDMA/CD scheme.
[2.5 + 2.5]
b, Assume the propagation delay in a broadcast network is 3 microsecond
and the frame
transmission time is 5 microsecond. Can the collision be detected no
matter where it
occurs?
[3]
BS tu, duis
Explain Cyclic Redundancy Check (CRC) with encoder and decoder diagram, How are
cyclic codes represented by polynomials? What should be the structure of g(x) to guarantee
the detection of single bit error? [Use at least three g(x) values to prove your answer]
[44242]
Define Network Security? Briefly explain the properties of $-Box and P-Box. Explain the
working mechanism of DES with round function(Round,) and f(R,, K,) with diagram.
[14245]
Mark seared-
KATHMANDU UNIVERSITY
End Semester Examination [C]
November, 2016
Level: BLE. / B. Se,
Course - COMP 204
Year: I Semester: Ill
Exam Roll No,
_
; Time: 30 mins. FM. 210
Registration No.: Date Ov UL 2016
ON A"
(20.0. = 0.4= 10 marka]
Ifthe frequency spectrum ofa signal has a bandwidth of $00 Hz with the highest
frequency at 600 Hz, whar should be the sampling rate, according
wo the Nyquist
iheorem?
[a] 200 samples’s [bh] 41K) samplesis [c] 1000sampless fd) 1200 samples!
The _ Tate defines the number of data elemensent
ts in Is:the ratteis the
number of signal elemencs sent in 1s.
[a] signal; data [b] data: signal [ce] baud; bit [d] none of the above
Block coding can help in _ atthe receiver,
[a] Synchronization [b] Error detection fc] Attenuation [qd] [a] and fb]
Fora channel, the Nyquist bit rate formula defines the theoretical maximum bit
ale.
[a] low-pass [6] bandpass [ec] noisy [d] noiseless
Given two sine waves A and ff, ifthe frequency of
A is twice that of B, then the period of
Bis _ thatof A.
[a] one-half [b] twice [c] the same as [4] indeterminase from:
_ is a type of transmission impairment in which the signal
the resist loses strength due to
of the anc
transmission
e medium.
fa] Distortion [b] Noise fe] Attenuation [d] Decibel
— consists ofa central conductor and a shield,
[a] Twisted-pair [b] Coaxial [ce] Fiber-optic [d) none of the above
ae used for cellular phone, satellite, and wireless LAN communic
[a] Radio waves — [b] Infrared waves [c] Microwaves ations,
[d] none of the above
Signals with a frequency below 2 MHz use 7
Propagation.
[a] line-of-sight |b) sky [e] ground [d] none of the above
o7 CEC 2016
Control refers to 0 set of procedures used to restrict the amount of data that the
sender can send before waiting for acknowledgment,
[a] Flow [b] Error {¢] Tronsmission [id] none of the above
Ina Gio-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?
[a] 11063 [b] | to 64 [ce] 90 63 [4] O10 64
Byte stuffing means addinga special byte io the data section of the frame when there is a
character with the same pattern as the ‘
[a] trailer |b] May fc] header {d] none of the above
3. Which of the following CRC ganersiors guraranies the detection of single bil error?
a x'txtl bo wt cl dtl
4. What do we mean by byte stulling? Explain how byte stuffing is implemented with
all possible scenario.
a. Explain leaky bucket and token bucket algorithm. relly explain which among the
two is more efficient and why?
Given an IP address 203.5025. 14/26, calculate the first address, last address and
number of address. 2]
te Explain with suitable example om how error can be detected using Checksum. i]
SECTION “C™
[2 QO» 8 = 16 marks]
Attempt ANY TAG questions.
&. Explain the working mechanism of COMA in detail along with the properties,
Recessary assumptions and an example [3]
9. a. Explain the advantage of slotted ALOHA protocol over pure ALOHA protocol, [4]
b. Ing bus CSMA/CD network with a data rate of 10 mbps, a collision occurs 20s
after the first bit of the frame leaves
the sending station. What should the length of
the frame: be sev that the sender can detect
the collision? 4]
10. Explain Data Encryption Standard algorithm in detail with suitable working
diagram. [3]
KATHMANDU UNIVERSITY Marks Scored:
End Semester Examination
August'September, 2015
Level :B.E/ BSc. Q4 SEP 2015 Course : COMP 204
Year ‘Hl Semester : Il
Exam Roll No. : Time: 30 mins. F.M. : 10
2. While transmitting odd-parity coded symbols, the number of zeros in each symbol is
a Odd b, Even c, aand b both d. unknown
5. Ifanetwork designer wants to connect 5 routers as point-to-point simplex line, then total
number
of lines required would be
a 5 b. I c. 20 d.32
6. Five bits are used for packed sequence numbering in a sliding window protocol used ina
computer network. What is the maximum window size?
a 15 b. 16 gal d.J2
7. Slotted ALOHA
a@. Divide time into discrete intervals c¢, Both (a) and (b)
b. Require global time synchronization —d. None of these
9. In cartier sense network, if prevailing condition is a “channel busy” then technique used is
a. Non-persistance
then it results in randomized walt and sense
b. I -persistance then the channel is continuously sensed
c. p-persistance then randomized retransmission is done
d. Both (a) and (b)
QA SEP 215
10. The maximum data rate ofa channel fora noiseless 3 KHz channel having level 2 is:
a. 3000 bps b. 1500 bps c, 6000 bps d. 1200 bps
In which ARQ, when a NAK is received. all frames sent since the last frame acknowledged
are retransmitted again?
a. Stop and wait ¢. Go - Back
N ARQ
b. Stop and wait ARQ d, Selective repeat ARQ
Maximum data rate ofa channel of 3000 Hz bandwidth and SNR of 30db is:
a. 30,000 b. 40,000 cc. 30.C00) d. 60.000
In isolated double errors of the cyclic cade, the generator cannot divide the term x! + | where |
is in between
a OQandn-2 b. Qand n+] ec. and n-2 d. Oand n-!
WWgenerator of the cyclic code has af [cast two terms and the rightmost bit is | then error
cannot be divided by
a. Syndrome b. Dataword ¢, Generator al. Error
20. The Advanced Encryption Standard has three dilTerent configuration with respect to the
number of rounds and
a. Data size b. Round size c. Key size d. Eneryption size
KATHMANDL UNIVERSITY
End Semester Examination
August/September, 2015
L Explain OSI reference model focusing on three broad concepts of Services, Interfaces and
Protacal, [4]
3. A bit stream 1001101 is transmitied using the standard CRC method. The generator
polynomial is x'+L. Show the actual bit string transmimed. Suppose the third bit from the left
is inverted during transmission, Show thal this error is detected at the receivers end. 4]
4. State and prove optimality principle. Explain “count to infinity” problem with suitable
example. [2+2)
4. Detine Quality of Service (Qo8), Define different parameters used to measure good quality of
service, Describe traffic shaping schemes, (lel+3]
6. Define subnetting. Explain why subnetting is required with suitable example. Find the first
and last address of 200.107.16.17/27 [4]
8. a, Explain the working mechanism of CSMA/CD with flow diagram. State reasons that
CSMA/CD cannot be used in a wireless LAN.
b. Ina COMA/CD network, assume we have a bus network topology with only two stations,
A and B in which Tfr = 40 ws and Tp= 25 ps. Station A starts sending a frame at time
t= 0.0 us and station B starts sending a frame at t= 23.0 us. Answer the following question:
04 SEP 2015
(i) Do frames collide?
(ii) Ifthe answer to part a is yes, does station A detect collision, justify your answer,
(ii) If the answer to part a is yes, does station B detect collision. justify your answer.
10. Explain the hamming code for one bit error correction with detail process and diagram of both
ends. Also demonstrate how two bit error in this case cannot be corrected,
KATHMANDU UNIVERSITY
End § Examinati Marks scored:
2008
Level : BE. Course : COMP 204
Year -II Semester:I
Date FM -:10
~ SECTION “A”
(20 Q.«0.5 = 10 marks]
Infared signal with frequencies ranging between 300 GHz to 400THz can be used for
1 Short-range communication iL Long-range communication
ii. Medium-range communication Tv. None of the above
defines the primitive operations and services the lower layer makes
available
to the upper one.
1 Interface u. Protocol stack
14 method of broadcast
routing make
excellent
use of bandwidth.
i Source iL Spanning tee
= Rinodi
iv. Multidestination Routing
Fund, seq and ack in elementary data lnk protocol are collectively called
16. In special character such as ESC is used along with the data flag
character.
i Bit stuffing i Character count
ii. Byte stuffing Tv. Physical layer coding violations
17. is concerned with getting packets from the source all the way to the
destination.
i. Transport layer i Physical layer
it. Network layer tv. DataLink layer
What type of communications path alternates in two directions, but is restricted at only
one direction
at a time?
i Simplex i Half-simplex
ii. Full-duplex iv. Half-duplex
2. List two ways im which the OS] reference model and the TCP/IP reference are the same.
Now lst two ways in which they differ.
3. Describe count-to infinity problem. Explain one possible solution to the count-to-infimity
problem.
4. Describe why an application developer may choose to run its application over UDP rather
than TCP.
F. Differentiate
Analog and Digital Transmssion.
9. Write down the difference between an Unrestricted Simple Protocol and A Simplex Stop-
and-Wait Protocol?
SECTION “C*
[2 Q. x7 = 14 marks]
Arempt
any TWO questions:
12. Explain OSI Reference Model with functions of each of the layer.
13. Define Cryptography. What are its specific security requirements? Explain different types
of cryptography.
COMP 204
Transport layer
RE Sema ewe
Flow control
SERBIShER
KATHMANDU UNIVERSITY [ark obtained.
End Semester Examination
2009
Level - BE. Course : COMP 204
Year -Il Semester: I]
~ SECTION “A”
[20 Q.* 0.5=10 marks]
Fill in the blanks with most appropriate word/phrase or choose the most appropriate answer from the
given alternatives for the following questions.
1. Which field im the IP header ensures that packets will not loop endlessly on a network?
[a] CRC [b] TOS [c] TTL [d] checksum
End systems use port numbers to select the proper application. What is the smallest port
number that can be dynamically assigned by a host system?
[a] 143 [b] 128 [c] 512 [d] 1024
How many collision domains is/are created when you segment a network with a 12 port
switch?
[a] 1 [b] 12 [c]2 [d]5
Which mechanism can be used to avoid a count to infinity loop?
[a] split horizon [b] route poisommg == [c] holddown timers = [d] triggered updates
10. Whatts the subnetwork address for a host with the IP address 200.10.5.68/28?
[a] 200.10.3.56 [b] 200.10.5.32 [ec] 200.10.5.0 [d] 200.10_5.64
11. Which address type has all host bits set to 1?
[a] broadcast [b] host [c] network [d] unicast
16. Which of the following commandis used to query the Domam Name Service for
information about domain names and IP address?
[a] ping [b] nslookup [c] tracert [d] ipconfig
17. A noweless...._....Hz channel cannot transmit quaternary (four level) signals at the rate
exceeding 5000bps.
veeeeeeeeee
Cable is used to comnect a computer directly to another computer.
A channel of 3000Hz bandwidth with a signal to thermal noise ratio of 30dB can never
transmit much more than...........bps.
All fragments except the last one im the IP datagram must be a multiple of. ........ bytes.
End Semester Examination
2009
Level : BE. Course : COMP 204
Year -II Semester:
II
Time =: 2 brs.
30 mins. FM. :50
SECTION “B*
(8 Q.=4=36 marks)
Attempt any NINE questions
only.
1. What do you understand by network topology? Explam the different network topologies
in brief.
2. Draw and expla the TCP header.
List the components of a data communication
system. Bnefly explain
each of them.
fa
9. What
is framing? Explain Starting and ending flags, with bit stuffing method of framing
in brief.
10. White short notes
a) The Leaky Bucket Algorithm
b) Jitter control
SECTION “C*
(2. Q.*7=14 marks]
Attempt any TWO questions only.
11. 1 late between routing and forwarding. Explain lnk state routing with suitable
example.
12.) What are the advantages of using the layered architecture? Explain OSI reference model.
Boefly compare OSI and TCP/IP reference model.
13. Explain the importance of Transport service access poimt (TSAP) im communication.
What do you understand by three-way handshake in transport layer? Explain symmetric
and asymmetric release of commection.
ANSWER TO OBJECTIVE QUESTIONS.
KATHMANDU UNIVERSITY ark opeained:
End Semester Examination
2009
Level - BE. Course - COMP 204
Year -II Semester: II
~ SECTION “A”
(20 Q.= 0.5=10 marks]
Fill in the blanks with most appropriate word/phrase or choose the most appropriate answer from the
given alternatives for the following questions.
1. Which field in the IP header ensures that packets will not loop endlessly on a network?
[a] CRC [b] TOS [c] TIL (d] checksum
End systems use port numbers to select the proper application. What is the smallest port
number that can be dynamically assigned by a host system?
[a] 143 [b] 128 [c] 512 [d] 1024
Which protocol
is connectionless?
[a] TCP [b] FTP [c] UDP [d] SMTP
How many collision domains is/are created when you segment a network with a 12 port
switch?
[a] 1 [b] 12 [c]2 [d]5
Which mechanism can be used
to avoid a count to infinity loop?
[a] split horizon [b] route poisoning §=[c] holddown timers [d] triggered updates
16. Which of the following command is used to query the Domain Name Service for
information about domain names and IP address?
[a] ping [b] nslookup [c] tracert [a] ipconfig
17. Anoiseless......... Hz channel cannot transmit quaternary (four level) signals at the rate
exceeding S000bps.
channel of 200082 bandwidth with a signal to thermal noise ratio of 300B can never
transmitmuch more than...........bps.
All fragments except the last one in the IP datagram must be a multiple of......... bytes.
End Semester Examination
2009
Level - BE. Course : COMP 204
Year <I Semester:
IT
Time : 2 brs.
30 mins. FM. 250
SECTION “B”
(9 Q.4=36 marks]
Attempt any NINE questions
only.
1. What do you understand by network topology? Explain the different network topologies
in brief.
2. Draw and explain the TCP header.
List the components of a data communication system. Briefly explain each of them.
fe
9. What
is framing? Explain Starting and ending flags, with bit stuffing method of framing
in brief.
10. ‘Write short notes
a) The Leaky Bucket Algorithm
b) Jitter contrel
SECTION “C”
[2 Q.=7=14 marks]
Attempt any TWO questions only.
11. I late between routing and forwarding. Explain lnk state routing with suitable
example.
12. What are the advantages of using the layered architecture? Explain OSI reference model.
Bnefly compare OS] and TCP/IP reference model.
13. Explain the importance of Transport service access pomt (TSAP) m communication.
What do you understand by three-way handshake im transport layer? Explain symmetric
and asymmetric release of connection.
ANSWER TO OBJECTIVE QUESTIONS.
KATHMANDU UNIVERSITY
End Semester Examination Mark scored:
2010
Level : BE. Course : COMP 204
Year -I Semester: IT
~ SECTION “A”
[20 Q.x0.5=10 marks]
Fill in the blanks with most appropriate word/phrase or choose the most appropriate answer from the
given alternatives for the following questions.
What information is contamed in LSP’s sent by lnk state routers to them neighbors?
[A] 4 copy of the routing table [B] the state of directly connected Imks
[C] a copy of the topology database [D] all of the above
Which portion of the IP address does the prefix represent?
[A] broadcast [B] host [C] network [D] umicast
Any process wishing to establish a commection to a host to transfer a file using FTP can
connect to the destmation
host's port........... to contact
its FTP daemon.
[A] 21 [B] 25 [C] 68 [D] 80
How many broadcast domams is/are created when you segment a network with a 5 port
switch?
[A] 1 [B] 12 [C]2 [D]5
What ts the primary reason for development of [Pwo?
[A] security [B] header format simplification
[C] expanded addressing capabilities [D] addressing simplification
10. Which field in the IP header ensures that packets will not loop endlessly on a network?
[A] CRC [B] TOS [C] TIL [D] checksum
14. What determines how much data a sending station rummng TCP/IP can transmit before it
Must receive an acknowledgement?
[A] Window size [B] Transmission rate
[C] Bandwidth [D] Segment size
16. Reliability and Delay parameters requirements for E-mail application is............-..
[A] high, low [B] high, high [C] low, high [D] low, low
17. The 32-bit hexadecimal address CO290614 is written as .......... in dotted decimal notation.
Dialog control, token management and synchronization are done im -........... __ layer
of the
OSI reference model.
[A] Application [B] Presentation [C] Transport [D] Session
1. List the components of a data communication system. Briefly explain each of them.
2. What are the advantages of using the layered architecture? Two networks each provide
Tehable connection-oriented service. One of them offers a reliable byte stream and the other
offers a reliable message stream: Are these identical? If so, why is the distinction made? If
not, give an example of how they differ?
3. You are given a network address of 193.169.10.0 and submet mask of 255.255.255.240.
Find the number of subnets, the valid host range and the broadcast address of each.
5. Datagram fragmentation and reassembly are handled by IP and are invisible to TCP.
Does this mean that TCP does not have to worry about data arriving in the wrong order?
Explain.
6. A bit stream 10011101 ts transmitted using the standard CRC method. The generator
polynomialis x3+1. Show the actual bits transmitted. Suppose the third bit form the left is
inverted during transmission. Show that this error is detected at the receiver's end.
7. What is the difference between congestion control and flow control? List the various
factors that bring congestion
in a network.
SECTION “C*
[2 Q.=5=10 marks]
Attempt any TWO questions only.
11. Differentiate between Distance Vector and Link State Routing. Explain the Count-to-
infinity problem wath suitable example. Explam any one techmique you know to address
SECTION “A”
(20Q. * 0.5=10 marks]
Fill in the blanks with most appropriate word/phrase or choose the most appropriate answer from the
given alternatives for the following questions.
1. What address type does a switch use to make forwarding decisions?
[A] source IP [B] destination
IP
3. What information is contamed im LSP’s sent by link state routers to their neighbors?
[A] A copy of the routing table [B) the state of directly connected links
[C] a copy of the topology database (Dall
of the above
7. Any process wishing to establish a connection to a host to transfer a file using FTP can
connect to the destmation host's port...........0 contact its FTP daemon.
[A] 21 [By25
[C] 65 [D] 80
§&. How many broadcast domains is/are created when you segment a network with a 5 port
switch?
[A]1 [Byi2
[C]2 [D]5
14. What determines how much data a sending station runing TCP/TP can transmit before it
Toust receive an acknowledgement?
[A] Window size
[B] Transmission
rate
[C] Bandwidth
[D] Segment size
16. Reliability and Delay parameters requirements for E-mail application is...............
[A] high, low [B] high, high
[C]low, high [D] low, low
17. The 32-bit hexadecumal
address CO290614 is written as ..........1n
dotted decimal notation -
{ 192.41.6.20)
18. Dialog control, token management and synchronization are dome im .............. layer
of the
OSI reference model.
19. A channel of 3000Hz bandwidth with a signal to thermal noise ratio of 20dB can never
transmitmuch more than.........1 bps.(19974.63)
QD
F
To guarantes detection of wp to 3 rors in all cases, minimum hamming distance in 2 block code
must be -
aj) = bys-1 cys-1 do
1) ig a command for assigning ip address to a router in interface Fast Ethemet
Ol.
a) FaQvl, ipaddress
by) interface FastEthemet)/1, ip address
C) interface fast)/1, ipaddress
d) interface fastethemeti 1, ipaddress
15) Tn classless addresting, there are no classe: but addresses are still zranted in
a) IPs b) Blocks. c) Codes d) Sizes
In High-level Data Link Control (HDLC), frame that iz used only to transport control
information is called -
a) T-irame b) S-trame cc) V-frame id) pigeybackme
EATHMANDU UNIVERSITY
End Semester Examination
August/September,2016
Level = BE. Course :ETEG303
Year :I Semester
: II
Time =: 2 bos.30) min. FLA 233
SECTION “B*
Attempt 4VF FIVE questions. Assume anv suitable data if mecessary. Figure:
mm margin mdicate
full marks for each question.
2. a} Compare between packet svdtching and circuit switching im term: of efficiency and delay
with appropriate figures. 7 E]
by) A slotted ALOHA network tramemits 200-bit ames using a shared channel with a 200-
kbps bandwidth Find the throughput if the system produces
Ls 1000 frames per second.
iL 300 frames per second.
iii, 250 frames per second. EB]
c) Define Data Rate Management in TOM. How can it be handled? 6]
3. a) How can a list of five 4 bit numbers (7, 11, 12,0, 6) be send to a destination.
Apply
(Checksum error-detecting technique. |
by Explain with flow diseram to how the alzorithm for calculation of the checksum.
4]
c} Draw the frame exchange timeline for CSMA/CAprotocol Explain Network Allocation
Vector. BE]
4. a) Am ISB is granted the block 16.12.64.0/20. The ISP needs to allocate addresses for &
Organizations, each with 256 addresses. BE]
iL Find the number and range of addresses in the ISP block.
iL Find the range of addresses for each organization
iii. Show the outline of address distribution and forwarding table.
by) What is Congestion and how can congestion be controlled m Network Layer. Explam m
detail with appropriate figures EB]
ch Draw a flow diagram using following scenario B]
Lo Frame 0 is sent, but lost
ii Frame 0 is resent and
iii. Frame | is sent and acknowledge, but the acknowledgement
is lost
iv. Frame 1 is resent and acknowledged.
3. a) How can a set of private addresses be allowed to communicate with a set of universal
addresses. B]
b) Find the shortest available path for all possible destinations starting for mode s = 0 using
Bellman Ford Algorithm. Assume weights to be equal in both directions. [4]
ae
. > |
Pew
6. a) Using the following specifications, draw a finite state machine with three states
(I, 0, and II), st events, and four actions.
LosoIf the machine ic in state 1, two events cam occu. If event 1 occurs, the machine
moves to state IL If event 3 occurs, the machine perform: action 2 and 4 and moves
to state IL
j- If the machine is im state I, two events can occur. If event 4 occu, the machine
Temains in state IL If events 6 occur, the machine perfonms actions 1 and 2 and moves
to state IT.
k. Tithe machine is im state I, three events can occur. If event 2 occurs, the machine
Temains in state I. If evant 6 occurs, the machine perfonms actions 2, 3, 4 and 5
moves to state 1 if event 4 occurs, the machine performs actions ] and 2 and moves.
to state [. Bi]
by Write short note: om (amy three) [2x3=6]
i FHSS