How To Exam?

a knowledge trading engine...


Tilka Manjhi Bhagalpur University 2007 M.C.A Networking - Question Paper

Thursday, 31 January 2013 09:10Web

COPYRIGHT RESERVED CS-32

2007

Time: three hours

full marks : 80

Candidates are needed to provide their ans in their own words as far as practicable.

The ques. are of equal value.

ans any 5 ques. in which Q. No. one is compulsory.

1.Choose the accurate ans out of different options provided beneath :

(a) Which 1 is not affect during transmission impairment?
(i) Attenuation
(ii) Delay Distortion
(iii) Noise
(iv) All of these

(b) The cabling efficiency is increased by the device:
(i) Router
(ii) Hub
(iii) Repeater
(iv) None of these

(c) Binary Exponential Back off Algorithm is used in:
(i) Pure Aloha
(ii) Slotted Aloha
(iii) CSMA/Cd
(iv) None of these

(d) Which 1 kind of unguided media is used as 1 room system:
(i ) Radiowave
(ii) Microwave
(iii) Infrared wave
(iv) None of these

(e) The conversion of packet frame is called:
(i) Shifting
(ii) Destuffing
(iii) Routing
(iv) None of these

(f) IEEE 802.6 standard is used in:
(i) LAN
(ii) MAN
(iii) Aloha
(iv) All of these

(g) Which 1 is the example of Generic Domain?
(i) .com
(ii) .org
(iii) both (i) and (ii)
(iv) All of these

(h) Firewall is used for:
(i) Network Security
(ii) Layer Security
(iii) Computer Security
(iv) None of these

2.(a) What do you mean by Data Communication ?
elaborate their types? discuss with an example.

(b) What is Fibre optics cable? How it works?
provide details with the help of diagram.

(c) What is the maximum DTR of a digital signal having the range of frequency 10000-40000 HZ)?

3.What is data link layer? elaborate their applications? describe Framing. elaborate the algorithms used for framing?

4.What do you understand by sliding window protocol? elaborate the kinds of algorithm used in sliding window protocol?

5.Explain the principle of operation of CRC fault detection method? obtain out the CRC fault from the provided Frame and generator. What will be the accurate Frame?
F(x)=x7 + x5 +x +1
G(x)=x3 + 1
Where F(x) =Frame and G(x) =Generator polynomial.

6.What are the applications of MAC sublayer? What is dynamic channel allocation and protocol used in Dynamic Channel allocation method?
provide details

7. describe cryptography? elaborate public key algorithms and RSA algorithms?

8.What are the works of transport layer? provide details of connection management, crash recovery and window management.

9.Write short notes on any 5 of the following:
(i) Repeater
(ii) DNS
(iii) Digital signature
(iv) IEE 802.3
(v) Co-axial cable
(vi) Symmetric Encryption algorithm
(vii) Stop and wait protocol
(viii) Co-axial cable




( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Tilka Manjhi Bhagalpur University 2007 M.C.A Networking - Question Paper