Exam Details
Subject | computer communication network | |
Paper | ||
Exam / Course | m.sc. computer science | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | April, 2018 | |
City, State | maharashtra, solapur |
Question Paper
M.Sc. (Semester II) (CBCS) Examination Mar/Apr-2018
Computer Science
COMPUTER COMMUNICATION NETWORK
Time: 2½ Hours
Max. Marks: 70
Instructions: Question No. 1 and 2 are compulsory. Attempt any 3 questions from Q. no. 3 to Q. no. 7. Figures to the right indicate full marks.
Q.1
Choose correct alternatives.
10
In a connection, more than two devices can share a single link
Point-to-point
Multipoint
Primary
Secondary
A is a data communication system within a building, plant, or campus, or between nearby buildings.
MAN
LAN
WAN
None of the above
Which one of the following is the multiple access protocol for channel access control?
CSMA/CD
CSMA/CA
Both and
None of the mentioned
The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called
Piggybacking
Cycling redundancy check
Fletcher's checksum
None of the mentioned
Which one of the following algorithm is not used for congestion control?
Traffic aware routing
Admission control
Load shedding
None of the mentioned
CMP is primarily used for
Error and diagnostic functions
Addressing
Forwarding
None of the mentioned
A is a TCP name for a transport service access point.
Port
Pipe
Node
None of the mentioned
Which one of the following is a transport layer protocol?
Stream control transmission protocol
Internet control message protocol
Neighbor discovery protocol
Dynamic host configuration protocol
E-mail is
Loss-tolerant application
Bandwidth-sensitive application
Elastic application
None of the mentioned
Page 2 of 2
SLR-UG-273
10) Which of the following is an application layer service?
Network virtual terminal
File transfer, access and management
Mail service
All of the mentioned
Fill in the blanks.
04
is a collection of many separate networks.
To deliver a message to the correct application program running on a host, the address must be consulted.
is the multiple access protocol for channel access control.
Subnet of 194.24.0.8/22 is
Q.2
Solve following.
08
A computer on a 6 Mbps network is regulated by token bucket. The token bucket is filled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long can the computer transmit at the full 6Mbps?
What is the CRC code of Frame 1 1 0 1 0 1 1 0 1 1 Using the generator code 1 0 0 1 1
Write a short note on.
06
Jitter Control
Piggybacking
Q.3
Answer the following.
14
An 8-bit byte with binary value 10101111 is to be encoded using even-parity Hamming code. What is the binary value after encoding?
What is the static web document? Explain how to use HTML in web development.
Q.4
Answer the following.
14
Explain the TCP Connection Management Modeling in details.
Explain the Term Transport protocols, Addressing, Connection Rerelease.
Q.5
Answer the following.
14
What are the IP address and subnets? Explain with example.
Write a note on RARP, BOOTP and DHCP
Q.6
Answer the following.
14
What are the conjunction factors in computer network? Explain any two with example.
What is network? Explain the uses of computer network.
Q.7
Answer the following.
14
What is the principal of ICMP message? Explain the ARP.
What is sliding windows protocol? Explain one-bit sliding windows protocol.
Computer Science
COMPUTER COMMUNICATION NETWORK
Time: 2½ Hours
Max. Marks: 70
Instructions: Question No. 1 and 2 are compulsory. Attempt any 3 questions from Q. no. 3 to Q. no. 7. Figures to the right indicate full marks.
Q.1
Choose correct alternatives.
10
In a connection, more than two devices can share a single link
Point-to-point
Multipoint
Primary
Secondary
A is a data communication system within a building, plant, or campus, or between nearby buildings.
MAN
LAN
WAN
None of the above
Which one of the following is the multiple access protocol for channel access control?
CSMA/CD
CSMA/CA
Both and
None of the mentioned
The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called
Piggybacking
Cycling redundancy check
Fletcher's checksum
None of the mentioned
Which one of the following algorithm is not used for congestion control?
Traffic aware routing
Admission control
Load shedding
None of the mentioned
CMP is primarily used for
Error and diagnostic functions
Addressing
Forwarding
None of the mentioned
A is a TCP name for a transport service access point.
Port
Pipe
Node
None of the mentioned
Which one of the following is a transport layer protocol?
Stream control transmission protocol
Internet control message protocol
Neighbor discovery protocol
Dynamic host configuration protocol
E-mail is
Loss-tolerant application
Bandwidth-sensitive application
Elastic application
None of the mentioned
Page 2 of 2
SLR-UG-273
10) Which of the following is an application layer service?
Network virtual terminal
File transfer, access and management
Mail service
All of the mentioned
Fill in the blanks.
04
is a collection of many separate networks.
To deliver a message to the correct application program running on a host, the address must be consulted.
is the multiple access protocol for channel access control.
Subnet of 194.24.0.8/22 is
Q.2
Solve following.
08
A computer on a 6 Mbps network is regulated by token bucket. The token bucket is filled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long can the computer transmit at the full 6Mbps?
What is the CRC code of Frame 1 1 0 1 0 1 1 0 1 1 Using the generator code 1 0 0 1 1
Write a short note on.
06
Jitter Control
Piggybacking
Q.3
Answer the following.
14
An 8-bit byte with binary value 10101111 is to be encoded using even-parity Hamming code. What is the binary value after encoding?
What is the static web document? Explain how to use HTML in web development.
Q.4
Answer the following.
14
Explain the TCP Connection Management Modeling in details.
Explain the Term Transport protocols, Addressing, Connection Rerelease.
Q.5
Answer the following.
14
What are the IP address and subnets? Explain with example.
Write a note on RARP, BOOTP and DHCP
Q.6
Answer the following.
14
What are the conjunction factors in computer network? Explain any two with example.
What is network? Explain the uses of computer network.
Q.7
Answer the following.
14
What is the principal of ICMP message? Explain the ARP.
What is sliding windows protocol? Explain one-bit sliding windows protocol.
Other Question Papers
Subjects
- .net technology
- artifical intelligence
- computer communication network
- data mining and warehouse
- data structures
- dbms
- digital image processing
- distributed operating system
- finite automata
- internet of things
- java programming
- linux operating system (oet)
- mobile computing
- network security
- numerical analysis
- object oriented programming using c++
- office automation (oet)
- operating system
- operations research
- soft computing
- software engineering
- software testing
- uml