You are on page 1of 2

51

4C

7B

E7
1
BD
7B
5E

49
48
51
4C

7B
67

D1

E
7B
1D

5E

49
48
1B
4C

7B
67

D1
44

5
W - 4039

7B
D

5E
AC

8
B

4
1

1
4C
67

D1
44

B5
FB

1D

E
AC
Total No. of Printed Pages: 02

1B
C7
DD

5
67
4

B5
FB
SUBJECT CODE NO: - W - 4039

E4

D
4
75

D
C

1B
C7
DD

75
1
BA
FACULTY OF SCIENCE AND TECHNOLOGY

9E

44

B5
6

E4
B4

75

1D
DF
B.Sc. (Computer Science) T.Y. (Sem- V)

7
75
BA
9E

4C
87

44
D
Examination March / April - 2023

6
4

5
14

5E
DF

C
B

E7
Advanced Networking- CS508-T

41
BA
BD

87

67
5D
9

4
4
4
4

1D

5E
F

AC
51

E7
D1

DD
87

67
7B

44
[Time: 1:30 Hours] [Max. Marks: 50]

FB
49
B

75
14

D
AC
1
4C

DD
Please check whether you have got the right question paper.

1
9E
BD

7
7B

44
5E

B
8
N. B 1) Attempt all questions.

75
4

DF

C
1
C

7B
67

D1
B5

BA
E
4
2) All questions carry equal marks.

5D
1D

5E

49
48
B

4
7

DF

AC
1
4C

B
7

E7
1
44

B5
6

BD

87

5D
1D

5E

FB
AC

9
C7
Q1 Choose the correct option for the following. 10

B4
14
51
67

E7
44

DD
FB

E4

87
7B
1) The __________ layer is responsible for process delivery.
D
AC

49
B
DD

75

75
14
1

51
4C

7B
4

a) Network b) transport c) session d) data link


B

D6

9E
BD
4

7B
75

E
DF

48

B4
5
1
A
9E

1
C
67

D1
44
D

B5
B

E4

87
2) In ____________ framing, there is no need for defining the boundaries of
B4

D
F

1B
7

C7
DD

14
1
BA
9E
87

frames. 7
4

B5
D6

E4

BD
4
B4

5
4

AC
E7

a) Variable size b) Standard c) Fixed size d) None of the above


D1

C7
DD

5
1

51
87

67
44
FB
49

E4
1B

7B
75
14

1D
C
7B

DD

75
B5

BA
E
BD

4C
3) The data link layer divide the stream of bits received from network layer into
4
9
8

D6
C4
C7

75
4

5E
DF
51

data units is known as _____________.


B
1

41
A
9E
E4

BD

87

67
7B

5D

FB

C4

a) Datagrams b) message c) segment d) frame


B4
75

14

1D
51
4C

E7

DD

BA
D6

87
7B

44
5E

9
B

5
14
41

AC
1
4C

4) A sender has a sliding window of size 15. The first 15 frames are sent The ACK
B
67

DD
B5

E
BD
C4

87
1D

5E

FB
49

received is ACK 15 what frame (s) has the receiver accepted.


7

75
14
BA

1
4C

7B
67
44

DD
B5

a) Frame 15 b) Frame 14 c) Frames 0 to 15 d) Frames 0 to 14


D
1D

5E
DF

AC

49
48
B
7

75
1
4C

B
67

D1
44

B5
FB

9E
87
1D

5E
AC

5) How many bits are in Version 6 of IP address?


1B
7
DD

B4
4
4C
67

1
44

B5
FB

a) 64 bits b) 32 bits c) 128 bits d) 256 bits


BD

87
75

E
AC

C7
DD

14
1
9E

1
7
4

5
FB

D6

E4

BD
4

7B
B4

6) The OSPF protocol is an intra-domain routing protocol based on ________


AC
E7

DD

75
1

51
4C
44

routing.
FB
49

7B
75

5E
C
7B

DD

41

a) Distance vector b) Link state c) Path vector d) Non distance vector


BA
9E

4C
7
48

D6
4
B4

75

5E
DF

C
D1

1
A
9E
87

67
44
D

7) TCP and UDP are called ___________.


FB
1B

B4

75
14

1D
AC
DD

a) Application Protocols b) Session protocols


9E
BD

87

44
FB
B4

75

c) Transport protocols d) Network protocols


14

AC
51

DD
E
BD

87
7B

FB
49

75
14
51
C

7B

8) What is the main advantage of UDP?


DD
E
E4

BD
7B

49
8

a) More overload b) Reliable c) Low overhead d) fast


75

75
14
51
4C

9E
BD

87
7B
5E

B4
14
51
C
67

1
E4

BD

87
7B
1D

75

14
51
4C
44

D6

BD
7B
5E
AC

41

51
4C
67
C4

7B
1D

5E
BA

DFBAC441D675E4C7B51BD1487B49E75D
4C
67
44
51
4C

7B

E7
1
BD
7B
5E

49
48
51
4C

7B
67

D1

E
7B
1D

5E

49
48
1B
4C

7B
67

D1
44

5
W - 4039

7B
D

5E
AC

8
B

4
1

1
4C
67

D1
44

B5
FB

1D

E
AC

1B
9) We add 'r' redundant bits to each block to make the length n = k+r. The resulting

C7
DD

5
67
4

B5
FB

E4

D
4
n-bit blocks are called _________.

75

D
C

1B
C7
DD

75
1
BA
9E
a) Data words b) Block words c) Code words d) None of these

44

B5
6

E4
B4

75

1D
DF

7
75
BA
9E

4C
87

44
D

6
10) What is the usable size of Network bits in class B of IP address?

5
14

5E
DF

C
B

E7

41
BA
BD
a) 04 b) 08 c) 14 d) 16

87

67
5D
9

4
4
4
4

1D

5E
F

AC
51

E7
D1

DD
87

67
7B

44
FB
49
B
Q2 a) What is the need of OSI model? Explain in brief. 05

75
14

D
AC
1
4C

DD
5

1
9E
BD

7
b) Explain bit staffing framing method with example. 05
7B

44
5E

B
8

75
4

DF

C
1
C

7B
67

OR

D1
B5

BA
E
4

5D
1D

5E

49
48
B

4
c) Explain Cyclic Redundancy Check (CRC) error detection method with example. 10
7

DF

AC
1
4C

B
7

E7
1
44

B5
6

BD

87

5D
1D

5E

FB
AC

9
C7

B4
14
51
67

E7
44

Q3 a) What is the need of NAT? Explain in brief. The concept of NAT. 05

DD
FB

E4

87
7B
D
AC

49
B
b) What is the difference between classful addressing and classless addressing in 05
DD

75

75
14
1

51
4C

7B
4
B

D6

9E
BD
4

7B
IPV4?
75

E
DF

48

B4
5
1
A
9E

1
C
67

D1
OR
44
D

B5
B

E4

87
B4

D
F

1B
7

c) Explain distance vector routing in detail. 10

C7
DD

14
1
BA
9E
87

7
4

B5
D6

E4

BD
4
B4

5
4

AC
E7
D1

C7
DD

5
1

51
87

67
44

Q4 a) Explain token bucket algorithm for congestion control. 05


FB
49

E4
1B

7B
75
14

1D
C
7B

DD

75
b) Explain the working of Electronic mail. How SMTP is used in Email 05
B5

BA
E
BD

4C
4
9
8

D6
C4
C7

application.
75
4

5E
DF
51

B
1

41
A
9E
E4

BD

87

67
7B

5D

OR
FB

C4
B4
75

14

1D
51
4C

E7

c) Discuss features of HTTP Protocol and also discuss how HTTP works. 10
DD

BA
D6

87
7B

44
5E

9
B

5
14
41

AC
1
4C

B
67

DD
B5

E
BD
C4

87
1D

5E

Q5 Write short notes. (Any two) 10


FB
49
7

75
14
BA

1
4C

7B
67
44

DD
B5

a) IPV6
E
D
1D

5E
DF

AC

49
48
B
7

75

b) ARP
1
4C

B
67

D1
44

B5
FB

9E
87

c) Go back N-ARQ
1D

5E
AC

1B
7
DD

B4
4
4C
67

1
44

B5
FB

BD

87
75

E
AC

C7
DD

14
1
9E

1
7
4

5
FB

D6

E4

BD
4

7B
B4

AC
E7

DD

75
1

51
4C
44
FB
49

7B
75

5E
C
7B

DD

41
BA
9E

4C
7
48

D6
4
B4

75

5E
DF

C
D1

1
A
9E
87

67
44
D

FB
1B

B4

75
14

1D
AC
DD
9E
BD

87

44
FB
B4

75
14

AC
51

DD
E
BD

87
7B

FB
49

75
14
51
C

7B

DD
E
E4

BD
7B

49
8
75

75
14
51
4C

9E
BD

87
7B
5E

B4
14
51
C
67

2
E4

BD

87
7B
1D

75

14
51
4C
44

D6

BD
7B
5E
AC

41

51
4C
67
C4

7B
1D

5E
BA

DFBAC441D675E4C7B51BD1487B49E75D
4C
67
44

You might also like