0% found this document useful (0 votes)
18 views2 pages

Kca303 Computer Network 24 25

This document outlines the MCA (SEM III) Theory Examination for Computer Networks, detailing the structure of the exam, including sections with various questions on topics such as transmission modes, IPv4 addressing, and network protocols. It includes specific questions categorized by difficulty level and marks allocation. The exam covers a wide range of computer networking concepts, requiring students to demonstrate their understanding through both theoretical explanations and practical applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views2 pages

Kca303 Computer Network 24 25

This document outlines the MCA (SEM III) Theory Examination for Computer Networks, detailing the structure of the exam, including sections with various questions on topics such as transmission modes, IPv4 addressing, and network protocols. It includes specific questions categorized by difficulty level and marks allocation. The exam covers a wide range of computer networking concepts, requiring students to demonstrate their understanding through both theoretical explanations and practical applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Printed Page: 1 of 2

Subject Code: KCA303


0Roll No: 0 0 0 0 0 0 0 0 0 0 0 0 0

MCA
(SEM III) THEORY EXAMINATION 2024-25
COMPUTER NETWORK
TIME: 3 HRS [Link]: 100
Note: Attempt all Sections. In case of any missing data; choose suitably.

SECTION A
1. Attempt all questions in brief. 2 x 10 = 20
Q no. Question CO Level
a. Discuss Jitter with the help of an example. 1 K2
b. Explain the various types of transmission modes. 1 K2
c. Differentiate between single bit and burst error. 2 K2
d. Write difference between Pure Aloha and Slotted Aloha. 2 K1
e. Explain the difference between a public and a private IPv4 address. 3 K2
f. What does CIDR notation /24 mean in IPv4 addressing? 3 K1
g. Explain port address. 4 K2
Differentiate between Open Loop and Closed loop techniques of 4 K2
h.
Congestion control.
How NVT is helpful at the time of data transmission in Telnet. 5 K1

1
i.

13
j. 90
Write the port number used in File Transfer Protocol. 5 K1

2.
_2
SECTION B

24
P1

2. Attempt any three of the following: 10 x 3 = 30

5.
a. Explain the advantages and disadvantages of ISO-OSI model. 1 K2
5D

.5
A message 110101 is to be transmitted using CRC with a generator

17
b. polynomial x³ + x + 1. Show the steps to calculate the CRC codeword 2 K3
P2

and verify it at the receiver's end. |1


Q

Illustrate the DHCP (Dynamic Host Configuration Protocol) and its


c. 3 K3
function in the assignment of IP addresses to network devices.
PM

Describe the structure of a TCP segment. Highlight and explain the


purpose of important fields in the TCP header, such as source port,
d. 4 K2
7

destination port, sequence number, acknowledgment number, flags,


:5

window size, and checksum.


32

Discuss various types of Email Architectures with the help of neat


e. 5 K2
1:

diagram.
25

SECTION C
20

3. Attempt any one part of the following: 10 x 1 = 10


Explain the various types of topologies with their advantages and
n-

a. 1 K2
disadvantages.
Ja

Explain various types of guided transmission media with the help of neat
b. 1 K2
diagram.
8-
|1

4. Attempt any one part of the following: 10 x 1 = 10


Given the 4-bit data 1011, calculate the Hamming code (7-bit codeword)
for the given data. Show the following steps:
a.  Determine the positions for the parity bits. 2 K3
 Calculate the parity bits for the codeword.
 Write the final 7-bit Hamming code.

1|Page
QP25DP1_290 | 18-Jan-2025 [Link] PM | [Link]
Printed Page: 2 of 2
Subject Code: KCA303
0Roll No: 0 0 0 0 0 0 0 0 0 0 0 0 0

MCA
(SEM III) THEORY EXAMINATION 2024-25
COMPUTER NETWORK
TIME: 3 HRS [Link]: 100
What is the significance of the persistence strategy (1-persistent, non-
b. persistent, and p-persistent) in CSMA protocols? Explain with 2 K2
examples.

5. Attempt any one part of the following: 10 x 1 = 10


The organization has been assigned the IP address [Link]/26 by
the Internet Service Provider (ISP). The goal is to efficiently divide this
a. network into smaller 3 subnets i.e. 32, 16, 16 addresses. Calculate the 3 K3
network address, last usable address, and number of addresses for each
subnet.
Explain the basic concept of distance vector routing. How do routers
b. 3 K2
exchange routing information using this protocol?

6. Attempt any one part of the following: 10 x 1 = 10


Demonstrate the role of the checksum field in the UDP header with the
a. 4 K3

1
help of an example

13
90
Illustrate the process of TCP connection establishment using the Three-
b. Way Handshaking process. Describe each of the three steps involved in 4 K3

2.
_2
establishing a TCP connection.

24
P1

5.
7. Attempt any one part of the following: 10 x 1 = 10
5D

.5
a. Define cryptography. Give the classification of cryptography. 5 K2

17
Discuss functions of network management. Explain the working of
P2

b. 5 K2
Simple Network Management Protocol.
|1
Q

PM
7
:5
32
1:
25
20
n-
Ja
8-
|1

2|Page
QP25DP1_290 | 18-Jan-2025 [Link] PM | [Link]

You might also like