Computer Networks-Sem5-Sept-2019

                                                                       



Name   ……………………………
Roll No ……………………….


SAINTGITS COLLEGE OF APPLIED SCIENCES
INTERNAL ASSESSMENT EXAMINATION, SEPTEMBER2019
Department of BCA, Semester 5
COMPUTER NETWORKS
Total   : 80 marks                                                                        Time:3Hours
Section A
Answer any 10 questions. Each question carries 2 marks.


1.what is Cryptography?
                                Cryptography involves creating written or generated codes that allow information to be kept secret. ... Information security uses cryptography on several levels. The information cannot be read without a key to decrypt it. Symmetric and Asymmetric key cryptography.
2.What is datagram?
                     datagram is a basic transfer unit associated with a packet switched network. Datagram are typically structured in header and payload sections. Datagram provide a connectionless-communication service across a packet-switched network. The delivery, arrival time, and order of arrival of datagram need not be guaranteed by the network.

3.What is peak amplitude?
The peak amplitude of a signal is the absolute value of its highest intensity, proportional to the energy it carries.
4.What is Bluetooth?
        Bluetooth is a wireless LAN  technology designed to connect devices of different functions such as telephones, notebooks, computers, cameras, and so on. A Bluetooth network is an ad-hoc network, which means that the network is formed spontaneously.

5.What is Roaming?
       Roaming is a wireless telecommunication term typically used with mobile devices (like mobile phones). It refers to the mobile phone being used outside the range of its home network and connects to another available cell network.
6. What is DNS?
·         Domain Name System(.5)
·         Domain name space-label ,fully and partially qualified domain name eg(1.5)
7. What is FTP ?
·         File Transfer protocol.(.5)
·         Popular protocol involved in transferring files(.5)
·         Control connection and data connection(1)
8.What is Hard Hands-off?
hard handoff is a handoff technique used with cellular networks that requires the user's connection to be entirely broken with an existing base station   before being switched to another base station.
9. What is public and private key?
·         private key is a tiny bit of code that is paired with a public key to set off algorithms for text encryption and decryption. It is created as part of public key cryptography during asymmetric-key encryption and used to decrypt and transform a message to a readable format. .. A private key is also known as a secret key.
·         Public key is announced to public. it is used in asymmetric key cryptography.

10.What is unicast addressing?
unicast refers to a one-to-one transmission from one point in the network to another point; that is, one sender and one receiver, each identified by a network address.
11. What is bitrate and baudrate?
      The bit rate is the number of bits transmitted per second, whereas, the baud rate is the number of signal units transmitted per second and one signal unit is able to represent one or more bits. Therefore, baud rate is always less than or equal to the bit rate but never greater.

12.What is NAT?                    (10x2=20)
NAT  enables private IP networks that use unregistered IP addresses to connect to the Internet
                     Section B
Answer any six of the following. Each question carries 5 marks.

13.Explain twisted pair cable?
Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. To reduce crosstalk or electromagnetic induction between pairs of wires, two insulated copper wires are twisted around each other. Each connection on twisted pair requires both wires.
14. Explain transmission impairments.
·         Attenuation ,distortion and noise  Definition with figure(1.5+1.5+2)
15.Explain ALOHA Protocol?
16. Explain Variable size framing
·         Definition-framing(1)
·         Character –oriented(2)
·         Bit-oriented(2)
17.Explain Multiplexing?
18. Explain different topologies
·         Definition-topology(1)
·         Ring, mesh, star ,bus, topologies with figures(4)
19.Explain unguided media?
An unguided transmission transmits the electromagnetic waves without using any physical medium
20.Explain TCP/IP  protocol Suit.
·         Figure with  four layers(2.5)
·         Explanation of Protocols in each layer(2.5)
21.Explain IPV4?
Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production in the ARPANET in 1983.
                                                                (6x5=30)

         
Section C.
Answer any two of the following.
Each question carries 15 marks
22.Explain various layers of ISO OSI reference model.
·         Different Layers-physical,datalink,network,transport,session,presentation,application (3)
·         Functions of each layer   (9)
·         Figure (3)
23. Explain guided and unguided transmission media.
Guided − In guided media, transmitted data travels through cabling system that has a fixed path. For example, copper wires, fiber optic wires, etc. Unguided − In unguided media, transmitted data travels through free space in form of electromagnetic signal. For example, radio waves, lasers, etc.
24.Explain different multiple  access protocols
The multiple control access methods can be divided into sub-categories:
The random access methods are:
  • Aloha
  • Pure Aloha
  • CSMA/CD
  • CSMA/CA

25.Explain simple parity check code and hamming code.
·         Block coding  and Linear block coding Definition with general figure  (5)
·         Simple parity check code with figure(5)
·         Hamming code(5)






_____________________

Comments

Popular posts from this blog

UG, S1 BCA, First internal examination, Introduction to Problem Solving and Web Designing, September 2024