Exam Details

Subject computer communication network
Paper
Exam / Course m.c.a.science
Department
Organization solapur university
Position
Exam Date November, 2017
City, State maharashtra, solapur


Question Paper

M.C.A. (Semester III) (CBCS) Examination Oct/Nov-2017
Science
COMPUTER COMMUNICATION NETWORK
Day Date: Thursday, 23-11-2017 Max. Marks: 70
Time: 02.30 PM to 05.00 PM
Instructions: Questions No.1 and 2 are Compulsory.
Attempt any three questions from Q.No.3 to Q.No.7
Figures to the right indicate full marks.
Q.1 Choose the correct alternative given in the bracket. 10
The data link layer takes the packets from and
encapsulates them into frames for transmission.
Network Layer Physical Layer
Transport Layer Application Layer
2 Which data communication method is used to transmit the data over a
serial communication link?
Simplex Half duplex
Full duplex All of the above
3 The network layer concerns with
Bits Frames
Packets None of the mentioned
4 Which one of the following is not a function of network layer?
Routing Inter-networking
Congestion control None of the mentioned
5 The 4 byte IP address consists of
Network address Host address
Both and None of the above
6 In virtual circuit network each packet contains
Full source and destination address.
A short VC number
Both and
None of the mentioned
7 A subset of a network that includes all the routers but contains no
loops is called
Spanning tree Spider structure
Spider tree None of the mentioned
8 After obtaining the IP address, to prevent the IP conflict the client may
use
Internet relay chat Broader gateway protocol
Address resolution protocol None of the mentioned
9 In open-loop control, policies are applied to
Remove after congestion occurs
Remove after sometime
Prevent before congestion occurs
Prevent before sending packets
Page 2 of 2
SLR-SM-20
1 In Go-Back-N window, when the timer of the packet times out, several
packets have to be resent even some may have arrived safe, where
as in Selective Repeat window, tries to send
Packet that have not lost
Packet that have lost or corrupted
Packet from starting
All the packets
State True/False 04
You have a network that needs 29 subnets while maximizing the
number of host addresses available on each subnet. 254 bits must you
borrow from the host field to provide the correct subnet mask.
User datagram protocol is called connectionless because all UDP
packets are treated independently by transport layer.
The IMEI standards documents are called Request For Comments.
The 64 byte IP address consists of network address and host address.
Q.2 Write a short note on following: 08
Go Back N Protocol
Congestion Control
Explain the following terms? 06
How to control error in data link between layer justify with example?
What are the difference between IPV4 and IPV6?
Q3 Answer the following:
When use simple protocol in computer network explain with suitable
example?
07
What are the benefits of computer network in home and business explain
with suitable example?
07
Q4 Answer the following:
What are the issues in designing of network layer? Explain any two with
example.
07
What are the policies to prevent network transmission load? Explain in
details load shedding.
07
Q.5 Answer the following:
What is Berkeley socket? Explain in details transport primitive. 07
Explain E-mail architecture and services in details. 07
Q.6 Answer the following:
Describe in details TCP connection establishment and connection release. 07
What are the differences between static and dynamic web documentation?
Explain with suitable examples.
07
Q.7 Answer the following:
How to find optimal path for establishment of network path? Explain one of
the method with example.
07
Explain Connection-oriented and connectionless services primitive in details. 07


Subjects

  • .net
  • artificial intelligence
  • computer communication network
  • computer graphics
  • computer oriented statistics
  • data mining and warehouse
  • data structures
  • database management system
  • digital circuits and microprocessors
  • digital image processing
  • discrete mathematical structures
  • distributed operating system
  • finite automata
  • introduction to computers
  • java programming
  • management
  • mobile computing
  • network security
  • numerical analysis
  • object oriented programming using c++
  • opeartions research
  • operating system
  • pattern recognition mobile computing
  • programming using - c
  • programming with php
  • software engineering
  • system software
  • uml
  • web design techniques
  • web technology