V SEMESTER B.C.A. EXAMINATION NOV/DEC 2008
NEW SCHEME
COMPUTER SCIENCE
5 BCA 3 : COMPUTER NETWORKS - 1
Time : 3Hours Max.Marsk: 80
Instruction : Answer all sections
SECTION-A
Answer any eight of the following 8 X 3 = 24
1.What is the function of transport layer in OSI model ?
2.What is the purpose of twisting of wires in twisted pair ?
3.What is hamming distance ? Give its significance.
4.Define P- persistent CSMA ?
5.What is Optimality principal ? Explain.
6.Define RPC.
7.Explain user agent in E -mail ?
8.How piggy backing help in network model ?
9. What is upward and downward multiplexing ?
10.Mention the two fundamental cryptographic principles.
SECTION - B
Answe any four full questions of the following . 4 X 14 = 56
11.a) How data transmission occurs in ISO-OSI ? Explain .
b) Discuss physical coding violation techniques for framing 7 + 7
12.a) How do you allocate channels in LAN and WAN ? Discuss.
b) What is binary count down protocol ? State its advantages over bit map protocol
by giving an example. 7 + 7
13.a) Explain congestion control algorithm.
b) Describe the threee different sttes in CSMA/CD.
14.a) How do you implement addressing issues during conncection management ? explain
b) How do you handle crash recovery ? Explain the different strategies. 7 + 7
15.a) What are the three basic requirements the public key Encryption must meet to
generate the keys used in public key cryptography ? give the algorithm with example
b)Justify presentation Layers is vital in OSI model.
b) Justify presenetation layers is viatal in a OSI MODEL. 7 + 7
16.Write Short notes on
a)FDDI
b) Flooding
c) X.20. 5 + 5 + 4
NEW SCHEME
COMPUTER SCIENCE
5 BCA 3 : COMPUTER NETWORKS - 1
Time : 3Hours Max.Marsk: 80
Instruction : Answer all sections
SECTION-A
Answer any eight of the following 8 X 3 = 24
1.What is the function of transport layer in OSI model ?
2.What is the purpose of twisting of wires in twisted pair ?
3.What is hamming distance ? Give its significance.
4.Define P- persistent CSMA ?
5.What is Optimality principal ? Explain.
6.Define RPC.
7.Explain user agent in E -mail ?
8.How piggy backing help in network model ?
9. What is upward and downward multiplexing ?
10.Mention the two fundamental cryptographic principles.
SECTION - B
Answe any four full questions of the following . 4 X 14 = 56
11.a) How data transmission occurs in ISO-OSI ? Explain .
b) Discuss physical coding violation techniques for framing 7 + 7
12.a) How do you allocate channels in LAN and WAN ? Discuss.
b) What is binary count down protocol ? State its advantages over bit map protocol
by giving an example. 7 + 7
13.a) Explain congestion control algorithm.
b) Describe the threee different sttes in CSMA/CD.
14.a) How do you implement addressing issues during conncection management ? explain
b) How do you handle crash recovery ? Explain the different strategies. 7 + 7
15.a) What are the three basic requirements the public key Encryption must meet to
generate the keys used in public key cryptography ? give the algorithm with example
b)Justify presentation Layers is vital in OSI model.
b) Justify presenetation layers is viatal in a OSI MODEL. 7 + 7
16.Write Short notes on
a)FDDI
b) Flooding
c) X.20. 5 + 5 + 4
No comments:
Post a Comment