mca (revised) term-end examination december, 2oo7 mcs-042 ... · term-end examination december,...
TRANSCRIPT
MCA (Revised)
Term-End Examination
December, 2OO7
MCS-042: DATA COMMUNICATION AND
GOMPUTER NETWORKS
| ' ime : 3 hours Msximum Marks : 100
Note' ?;:::";,:,iT^i',i": :::::tsorY
AttemPt *nY
1. (a) Give the differences between Broadcast network
and Switched network.
(b) What is the required bandwidth of a low pass
channel to transmit 1 mbps by baseband
communication ?
MCS-O42 P . T . o .
Downloaded from www.paraman.in
(c) Consider the following
link cost. Use Dijkstra's
compute shortest path
network nodes.
network with the indicated
shortest path algorithm to
from source node 1 to all
1 0
(d) To send data 3 bits at a time at a bit rate of 3 mbps,
if the carrier frequency is 10 MHz, find number of
levels, baud rate and bandwidth
A network using CSMA /CO has a bandwidth of
10 mbps. If the maximum propagation time is
25'6 FS, what is the minimum size of the frame ?
(f) Describe briefly RSA algorithm
(g) l)escribe briefly Manchester encoding technique.
(h) Name two services defined by IEEE 802. 11.Distinguish between adhoc NA/V and infrastructure
network.
Explain how Link State Routing overcomes the
problem of Count-to-lnfinity for Distance Vector
Routing algorithm
(e)
(a)2 .
2 98
125 1
M CS-042
Downloaded from www.paraman.in
(b) Explain TcP segment Header format fields. Also
draw the Header format.
(c) Draw Constellation pattern for 4 PSK.
3. (a) Dlff erentiate between Radio communication and
:fi::" .:;-ff$:::":' ;:,l".:.,Ji T;"?';sensitivitY.
(b) Explain pipelining and its
suitable diagram.
(c) Draw pulse diagram for
the following bit stream.
001100110011
Differentiate between the following , 20
(i) Leak Bucket Traffic shaper and Token Bucket
Traffic Shaper
(ii) Distance Vector Routing and Link State Routing
(iii) Congestion Control and Flow Control
(iv) TCP and UDP .
1 0
5
use with an examPle and
NRZ-L, NRZ-I and RZ for
1 0
1 0
4.
(a)5.
(b)
(c)
A PURE ALOHA network transmits 200 bits
frames on a shared channel of 200 kbps' What is
the requirement to make this frame collision free ?
Explain how Nagle's algorithm reduces the wastage
of bandwidth
Irind CRC for data polynomial x4 + *2 + x + 1 with
generator polynomial x3 + 1.
MCS-O42 B,OOO
Downloaded from www.paraman.in
Downloaded from www.paraman.in
MCA (Revised)
Term-End Examination
June, 2OO7
lvlcs-042: DATA coMMUNtcATtoN ANDCOMPUTER NETWORKS
Time : 3 hours Maximum Marks : 700
Note : Quesf ion number I is compulsory. Attempt anythree questions from the rest.
l. {u) What is meant by a Pure ALOHA and a SlottedALOHA channel ? Also, explain why the channelthroughput is double in Slotted ALOHA comparedto Pure ALOHA 6
(b) Consider the following network. With the indicatedlink cost, use Dijkstra's shortest-path algorithm tocompute the shortest path from E to itt othernetwork nodes. Show the cornpl ete calculation . T
MCS-042 P.T.O.
Downloaded from www.paraman.in
(c)
(d)
(e)
(f)
Explain QPSK system by means of a block diagram.
Explain its operation and draw the constellation
diagram.
In Stop and Wait ARQ, why should the receiver
always send an ACK message each time it receives a
frame with wrong sequence number ?
Differentiate between Subnet and Classless
addressing.
Computing the checksum for the following data
frame, find the complete transmitted frame bit
pattern :
Data 1 1 0 1 0 1 1 0 1 1
Generated polynomial * 4 + x + 1
Write a note on error detection and correction
rnethods. Construct the Hamming Cpde for the bit
sequence 10011101.
Show by calculation how many hosts per network
each IP address A, B and C can have.
For 2O devices in a network, calculate the number of
cable links needed for the following topologies :
(i) Mesh
(iil Starl
(iii) Ring
(iv) Bus
(g)
(h)
2- (a)
MCS-042
Downloaded from www.paraman.in
(b)
(c)
Explain diffeient methods of broadcast routing.
What is the difference between network layer
delivery and transport layer delivery ?
Show the differences between Manchester encoding
and differential Manchester encoding for the bit
s t ream 10000101111.
Explain the problems of hidden station and exposed
station in a wireless LAN. Also, discuss the
MACAW algorithm.
Write the differences between parallel and serial
transmission
Explain the following cryptography function and give
algorithm name :
(i) Digital Signature
(ii) Public key encryption
(iii) Private key enc4ption
(iv) Key exchange
Explain the need of multiplexing in data
communicaiion. Also, €Xplain different types of
multiplexing techniques used for analog signals.
Explain the difference betwe en connectionless
unacknowledged service and connectionless!
acknowleged service. Also write the protocol that
supports these services.
(d)
3. (a)
4. (a)
(b)
(c)
(b)
P.T.O.MCS-042
Downloaded from www.paraman.in
(c) What is congestion ? How
algorithm control congestion
drawbacks of this overcome
algorithm ?
does leaky bucket
? How are the
in a token bucket
I
5. (a)
(b)
(c)
What is routing ? Discuss distance vector routingwith the help of a subnet topology. Explain what arethe different matrices used in the algorithm.
Explain, how the NFS works by invoking the remoteprocedure call.
What is IEEE 802.11 ? Explain the role andfunctions of each layer in IEEE 802. 11 protocolstack.
6,000MCS-042
Downloaded from www.paraman.in
Mcs-042o
MCA (Revised)
Term-End Enamination
June, 2OOB
MCS-042O : DATA COMMUNICATIONAND COMPUTER NETWORKS
Time : 3 hours Moximum Morks : 700
Nole : Question number 7 is compulsory. Attempt any
three questions lrom the rest'
1. (a) Obtain expression for throughput in Aloha and
Slotted Aloha protocols.
(b) b<plain GoBack N and Selectiw Rep€at protocol'
using diagrams.
(cI For hierarchical routing with 9600 routers, what
region and clust€r sizes should be chosen to minimlze
the size of the routing table for a three level
hierarchy ?
(d) State Nagle's algorithm and explain how does it
reduce the wastage of bandwidth.
10
1 0
1 0
1 0
MCS-042@ P . T . O .
Downloaded from www.paraman.in
2. (al How is congestion window adfusted in TCp usingslow-start algorithm ?
(b) What are the services pmvided by Data link layer toNetwork layer ? lllwtrate them.
3. (a) Explain 1-persistent and non-persistent CSMAprotocols using suitable diagrams. jO
(b) Draw the manchester and differential manchesterencoding for the following bltstream
1 0 0 0 1 1 1 1 . 5
(c) Why is packet fragmentation needed in Ip ? s
4. (a) An ATM network uses a token bucket scheme lortraffic shaping. A new token is put into the bucketevery 5 p sec. What is the maximum sustainable netdata rate ?
(b) How does 802.71 deal with the problem of noisychannel ? Explain.
5, (a) What is Time Division Multiplexing ? ExplainSynchronous time division multiplexing andStatistical time division multiplexing.
(b) Describe IP addressing classes.
1 2
1 0
1 0
10
1 0
MCS-o42o . 4,OOO
Downloaded from www.paraman.in
MCA (Revised)
Term-End Examination
June, 2OO8
MCS-042 : DATA COMMUNICATION AND
COMPUTER NETWORKS
Time : 3 hours Moximum Morks : 700
Note : Question number 7 is compulsory' Attempt dny
three questions Jrom the rest
r' (a)
(b)
(c)
(d)
(e)
How does PCM work ? Explain through a diagram'
What are its &awbacks ?
How are problems of Hidden Station and Exposed
Station resolved in wireless LAN ? Explain in detail'
E:<plain the 3-way handshake method' How is it
different from 2-way handshake method ?
Give any two reasons for PGP comptessing
messages,
Briefly explain llags in TCP Header'
1 0
7 0
70
t
J
MCS-O42 P.T .O .
Downloaded from www.paraman.in
2- (al
(b)
(c)
3. (a)
(b)
4. (a)
(b)
5. (a)
(b)
Explain the format of an Ethemet frame.
Explain the hnary exponential back off algorithm.
Describe Nyqrxst and Shannon's theorem with thehelp of examples.
Explain Siop and Wait ARe. What can be theproblem with this protocol ? How does goback Nresolve this problem ?
How does BGP work ? How does ii solve the Countto Infinity problem ?
Explain IPvn header fields.
Draw the general outline and details of one iterationof DES and explain its op€ration.
Explain the Leaky Bucket algoritlm.
Explain Bellman-Ford's shortest path algorithm.
J
1 0
10
1 0
1 0
10
1 0
1 0
MCS-042 9,OOO
Downloaded from www.paraman.in
MCA (Revised)
Term-End Examination
December, 2OO8
MCS-042 : DATA COMMUNICATION ANDCOMPUTER NETWORKS
Time :3 hours Maximum Marks: 700
Note : Question number 7 is compulsory. Attemptany three questions from the rest.
1. (a) Assume a binary signal is sent over a 8 KHz
channel, where S/N Ratio is 20 dB. Can it
carry 48 kbps data rate ? Show relevant
calculations.
Show the constellation diagram of QPSK.
Find CRC for the data polynomial
*9 + *7 + *3 + *2 + 1 with generator
p o l y n o m i a l x 3 + x + 1 .
(b)
(c)
MCS-042 P . T . O .
Downloaded from www.paraman.in
(d) Consider the following network, with theindicated link cost. Use Bellman Ford Algorithmto find the shortest paths from Source Node (A)
to all other nodes.
What is the advantage of QAM over ASKor PSK ? A constellation diagram consists of8 equally spaced points on the circle.lf the bitrate is 4800 bps, what is the baud rate ?
"Data link and Transport layer have somecommon functions like flow control and reliabledelivery." Is it a duplication of functions ?Explain your answer.
What is the maximum capacity of a Noiselesschannel whose bandwidth is 200 KHz and inwhich the value of the data transmitted may beindicated by one of 64 different amplitudes ?
7 0
(e)
(0
(g)
MCS-042
Downloaded from www.paraman.in
2. (a)
3. (a)
(b)
(b)
(c)
Discuss Link state routing. What are theproblems in Link state routing ?
Assume two prime numbers are p : 13 and
e = 11. Calculate the Public and Private keyfor RSA algorithm.
How is the efficiency in the use of bandwidth
increased by Selective Repeat ARe ? Give an
example.
Show the operation of Ethernet protocol.
Explain the purpose of the following TCp headerfields :
(i) SYN Flag
(ii) FIN Flas
(iii) Window size
(iv) Urgent Pointer
(v) Sequence Number
1 0
(c) Compare Synchronous TDM and Statistical
TDM in terms of efficiency, data rate andhardware requirement.
MCS-042 P.T .O .
Downloaded from www.paraman.in
4. Differentiate between the following :
(a) Packet and Circuit switching
(b) Bus and Star topology
(c) Isochronous and Synchronous communication
(d) Pure ALOHA and Slotted ALOHA
5. (a)
20
(b)
(c)
Assume the Maximum Transfer Unit (MTU) is1480 bytes, 20 bytes is the header and data is4980 bytes. Show the fragmentation proeessindicating the fragmentation field values at eachstage.
Make suitable assumptions. 10
Why is traffic shaping needed ? Write analgorithm for traffic shaping when the data rateis variable. 5
Explain how TCP provides reliability. 5
MCS-042 9,000
Downloaded from www.paraman.in
MCA (Revised)
Term-End Examination
December, 2OO8
MCS-O.ti} : ADVANGED DATABASE DESIGN
Time' : 3 hours Maximum Marks: 700
Note : Quesfion number 7 is compulgory. Answerany three questions from the rest.
1. (a) Consider the following relation R (A, B, C) :
R
Which of the following
hold ? Give reasons.
( i l A - + B(ii) A -+ -+ B
dependencies does not
(b) What is a data warehouse ? Describe the' process of ETL for a data warehouse 5
A B c1 2 34 2 35 3 35 3 4
MCS-043 P.T .O .
Downloaded from www.paraman.in
(c) What is timestamp ordering ? Explain
timestamp based protocol for serializable
schedule.
Consider the following requirements :
A car or truck can be a registered-vehicle. A
person, bank or company can own a registered
vehicle. Model this requirement using EER'
diagram
(e) Consider the following relations':
EMPLOYEE (Eno, Ename, Address, Phone,
Salary, Dnum)
DEPT (Dnum, Dlocation, Dname)
PROJECT (Pno, Dname, Dnum)
Find the. names of employees using relational
algebra who wor.k on all projects controlled by
Department Number 5.
How will you enforce Referential Integrity
Constraint in Oracle ? Explain with the help of
one example.
Create an object-oriented database using ODL
for' the following schema. Make suitable
assumptions about attributes.
5
5
(g)
MC5-043
Downloaded from www.paraman.in
(h) What are the common database security
failures ? What are the SQL commands for
granting permission ? Why are statistical
databases more prone to disclosure ?. Explain
with the help of an example. 5
2. .(a) What is the significance of cursors in embedded
SQL ? Explain with the help of an example.
(b) What are mobile databases ? Explain the
characteristics of mobile databases. ' ,
(c) What do you mean by deadlock ? How can we
prevent them ? Write an algorithm that checks
. whether the concurrently executing transactions
are in deadlock. 10
3. (a) What is data mining ? How is it different from
OLTP ? What is classification in context of data
mining ? 6
What are data-marts ? What is the significancg
4of creating them ?
What is XML ? How is it different from
HTML ? What are the advantages of XML ?
Create an XML schema for list of students and
their marks. 10
(b)
(c)
MCS-043 P.T .O .
Downloaded from www.paraman.in
4. (a) Compare dnd contrast Relational database
management systems, Object-relational
database management systems, Object-oriented
database management systems. Suggest one
application for each of these database
(b) Explain Join Dependency with the help. of an
example. To which normal form does it
correspond ? Functional dependencies and
multivalued dependencies are special type of
Join dependencies. Justify.
5.. (a) Explain the centralized Two-phase Commit
Protocol in Distributed Environment. Give the
algorithm for both coordinator and participants. 12
(b) Develop a query plan for the following query
and compute its cost .
.SALARY > 4OOOO (EMPLOYEE D< DEPARTMENT)'
Make suitable assumptions of your own about
the relation schema as well as the database
statistics.
1 0
1 0
MCS-043 9,000
Downloaded from www.paraman.in
rlo.)(oo
MCA (Revised)
Term-End Examination
December,2008
MCS-051 : ADVANCED INTERNETTECHNOLOGIES
Time : 3 hours Maximum Marks : L00
Note : Question number 1 is compulsory. Attempt any three
questions from the rest.
Write a MDB (Message Driven Bean) for
news agency that has to capture the data
from various news sources. The newly
written MDB should accept the XNIL format
of the news. The XML data needs to be
parsed and stored in the database. The
news format is as follows :
<news id> </newlid>
(source) </source>
<date> </ date>
<type-of-news> </type-of-news>
<priority> < / ptiority>
(news-content> </news-content>
What is Java Servlet ? Draw, to represent
the different phases of servlet life cycle.
(a)1 .
(b)
Downloaded from www.paraman.in
10(a)z .
1 0(b)
(a)
(") Explain the different types of Enterprisebeans.
(d) Explain Session Beans and Define their lifecycle.
(") \A/hat is a custom tags in JSP ? What arethe components that make up a tag libraryin ISP ?
(0 What are the different recovery proceduresin security implementation ?
What do you mean by session tracking ?Also, explain in brief different ways tohandle session tracking in servlet.
Explain SSL and TLS with their workingand'security measures.
Differentiate between the following :
(i) GET and POST
(ii) Context init Parameter and Servletinit Parameter
(ii| Servlet Engines and Servlet Chaining
(t") Data Integrity and System lntegrity
Create a custom JSP tags named as " SortedIterate Tags" that can iterate or process any
]ava collection. For example it shouldaccept the list of telephone numbers andprint them in sorted manner.
(b) 1 0
Downloaded from www.paraman.in
4. (a) Write an application to create a XMLdocument from a telephone directorydatabase. The XML document shouldcontain the name of a customer, address,telephone number and the last twelvemonths bill payment summary.
(b) Explain database handling in JSP using" type 2 and Wpe 4 drivers.
What are the different types of implicitobjects used in JSP ? Explain all in brief.
What are the different design anddevelopment Goals for XML and explain theusage of )GD/DTD in XML documents.
10
1 0
10(u)t .
1 0(b)
- o O o -
Downloaded from www.paraman.in
Downloaded from www.paraman.in
robD
l.n)
MCA (Revised)
Term-End Examination
june, 2009
MCS-042: DATA COMMUNICATION ANDCOMPUTER NETWORKS
Time : 3 hours Maximum Marks : 100
Note : Question number 1. is compulsory. Attempt any thtee
questions fto* the rest.-
1. (u) What is the difference between a port 3+2
address, a logical address and a physical
address, which type of address changes
from hop to hop.
(b) Assume we need to download a text 5
document at the rate of 1000 Pages of size
24 rows with 25 characters per row in a
page per minute. \uVhat is the required bit
rate of the channel ?
(c) Calculate channel capacity for a telephone 5
line which normally has a bandwidth of
300 to 3300 Hz. The S/N ts 3\62. In case
we have to transfer data with high rate,
what is required to be done ?
MCS-042 P.T.O.
Downloaded from www.paraman.in
(d)
(")
(f)
(u)3.
(b)
2 .
IAIhat is exposed station problem in wireless 5
LAN environment ? Explain.
For what purpose is leaky bucket algorithm 5
used? Explain the algorithm ?
What are the three phases in TCP's
congestion control mechanism? Explain
with the help of a diagram. How does the
size of a congestion window increase in the
first phase ? 2+5+3
(g) What is the essential property of Fiestel 5Cipher network ? Explain.
(u) What are d i f ferent var iants of po lar
encodings. Discuss through examples. What
are its advantages and disadvantages. 1+6+3
(b) Define piggybacking and pipelining. Why 5
there is no pipelining in stop and wait ARQ ?
(.) \rVhat are the uses of flooding algorithm ? 5
\AIhy has Ethernet imposed resfrictions on Eboth the minimum and maximum length ofa frame ? Explain.
How is Silly window Syndrome created bythe receiver ? What is the proposedsolution? Discuss. 3+1+3
(.) How does encryption and decryption take 8place in RSA ?
MCS-042
Downloaded from www.paraman.in
4. (u) Discuss and show the process of correctionestablishment and termination in TCP. Howdoes it handle delayed arrival of SYN andACK packets ?
(b) Draw and explain the flow diagram ofBellman Ford algorithm.
(.) Show the vulnerable time for pure Alohaprotocol and obtain an expression forthroughput.
5. (a) Discuss the difficulties that one encounterswhen trying to build a bridge between thevarious Ethernet, Token Ring and Token BusLANs.
(b) What is the main advantage of using BGPprotocol ? Explain through an example.
(c) Discuss the purpose of using various flagsand data offset in thet TCP header.
(d) Illustrate and compare circuit switching,message switching and packet switching.
- o O o -
MCS-042
Downloaded from www.paraman.in
Downloaded from www.paraman.in
MCS-042
MCA (Revised)
Term-End Examination
December, 2009
MCS-042 : DATA COMMUNICATION ANDCOMPUTER NETWORKS
Time : 3 hours Maximum Marks : 100
Note : Question number 1 is compulsory. Attempt any three
questions from the rest.
1. (a) Consider an error free 64 kbps satellite 6channel used to send 512 bytes data framesin one direction. Propagation time is 270 msec in one direction. Compare the windowsize assuming that the size ofacknowledgement is neghligible.
4Sketch the Manchester, DifferentialManchester, NRZ-L and NRZ-I for thefollowing bit stream :
0 0 0 1 1 1 0 1 0 1
A digital signalling system is required to 5
operate at 9600 bps. If a signal elementencodes a 4 bit word, what is the minimumrequired bandwidth of a noiseless channel ?
MCS-042
1 P.T.O.
Downloaded from www.paraman.in
Show the operation of MACA algorithm ? 5Will there be any collision here ? Justify.
Describe the operation of token bucket 5traffic shaper.
What happens in congestion avoidance andcongestion detection phases of TCP'scongestion control mechanism ? Discussthrough an illustration. How does the sizeof congestion window increase incongestion avoidance phase. 3+3+2=8Explain the Diffie Helman method for key 7exchange through an example.
2. (a) How does ADSL support high internet 5access over slow telephone lines ? Why it iscalled asymmetric ?
How does statistical TDM try to resolve 5shortcomings inherent in synchronus TDM ?
What is count to infinity problem ? Explain 5through an example.
(d) Show the status of sender's and receivers 5window of 4 bit sliding windowmechanism. How does it increase utilizationof channel bandwidth ?
3. (a) What is silly window syndrome ? How it iscreated by the sender ? What is theproposed solution ? Discuss. 2+3+3=8
MCS-042 2
Downloaded from www.paraman.in
Explain the operation of CSMA/CD.What happens when a station detects acollision ? 4+2=6
Discuss the Triple DES scheme. What type 6of attack can be avoided with thismechanism ?
4. (a) Compare the TCP header and the UDP 6header. List the fields in the TCP headerthat are missing from UDP header. Givethe reason for their absence.
List and discuss all the fields of IP datagram 6header which relate to fragmentation.
Draw the 802.11 protocol stock and explain 8its components in brief.
5. (a) Describe the operation of OSPF. 6
Illustrate quadrature amplitude modulation 5(QAM) using appropriate diagram.
Differentiate between the following : 9
Class A and Class B address
Visual circuit and diagram subner
(iii) Upward and Downwardmultiplexing.
- o 0 o -
MCS-042 3
Downloaded from www.paraman.in
MCS-042No. of Printed Pages : 3
MCA (Revised)
(N) Term-End Examination
June, 2010
MCS-042 : DATA COMMUNICATION ANDCOMPUTER NETWORKS
Time : 3 hours Maximum Marks : 100
Note : Question number / is compulsory. Attempt any threequestions from the rest.
1. (a) Explain different phases of Connection 6Oriented Transmission.Define cellular topology. Discuss 6advantages and disadvantages of cellulartopology in wireless data transfer.Discuss advantages and disadvantages of 5
-flooding routing protocols.A network with bandwidth of 10 Mbps can 5pass only an average of 12000 frames/minwith each frame carrying an average of10000 bits. What is throughput of thisnetwork ?Illustrate ideal, achievable, =congested and 5congested network characteristics usingappropriate diagram.
MCS-042
1 P.T.O.
Downloaded from www.paraman.in
Derive the expression to establish therelation between S and G in Pure Aloha ?
Explain and illustrate Sliding Window 8
Protocol.
2. How is network congestion controlled usingslow start in TCP ?
7
Describe how is MACAW an improvementover MACA ?
6
(c) What is the purpose of PCM ? Explaindifferent components of PCM encoder.
7
3. Why a fragmentation is needed in IPdatagram ? How are fragmentation andreassembly implemented in IP ?
7
What are features of tocken bucket trafficshaper ?
6
(c) Compare Dijkstra and Bellman Fordalgorithms for finding the shortest path.
7
4. How is OSPF implemented in IP network. 7
Illustrate.
Compare FDM and TDM. 6
(c) With the help of a suitable diagram explain 7Go Back N and compare it with selectiverepeat.
MCS-042 2
Downloaded from www.paraman.in
5. (a) With the help of suitable diagram, explain 7three way handshake mechanism.
Discuss different component of Network 7File System protocol.
What are the benefits of using digital 6certificate ?
MCS-042 3
Downloaded from www.paraman.in
Downloaded from www.paraman.in
Downloaded from www.paraman.in
Downloaded from www.paraman.in
MCS-042 No. of Printed Pages : 3
MCA (Revised) cV op Term-End Examination
tr) June, 2011 C
MCS-042 : DATA COMMUNICATION AND COMPUTER NETWORKS
Time : 3 hours Maximum Marks : 100
Note : Question number one is compulsory. Attempt any three questions from the rest.
1. (a) If a binary signal is sent over 3 MHz and 4 whose signal to noise ratio is 30 dB, what is the maximum achievable channel capacity ?
(b) Assume a data stream is made of "000000"
6 encode this stream using the following encoding schemes (Do any three).
(i) Manchester
(ii) Differential Manchester
UNI polar
(iv) Polar NR Z-I
(v) RZ
(c) Construct the Hamming code for the bit 5 sequences 10011010.
MCS-042 1 P.T.O.
Downloaded from www.paraman.in
(d) Consider the following network with the 10 indicated link cost. Use .Dijkstra's shortest path algorithm to find the shortest path from source node A to all other nodes.
(e) Explain the hidden station and exposed 5 station problems with illustration.
(f) How does TCP's congestion control 5 mechanism work ? Illustrate through an example.
(g) Explain encryption and decryption process 5 in Triple DES.
2. (a) What is Infrared ? Describe its characteristics 5 and its two applications.
(b) Compare byte stuffing and bit stuffing. 3+2 Also, "Bit Stuff" the following data frame.
000111111100110001111111100 (c) What is count to infinity problem in distance 5
vector routing algorithm ? (d) What happens if one of the stations is 5
unplugged in Bus topology and ring topology ?
MCS-042 2
Downloaded from www.paraman.in
3. (a) How does token bucket traffic shaper work ? 5 Explain through a diagram.
(b) What are the reasons for having a minimum 5 length frame in ethernet ? Explain.
(c) What kinds of applications are run over 5 UDP ? Justify.
(d) What is the important aspect that establishes 5 trust in digital signature ?
4. (a) What are the design foals of SSL 3.0 ? 5
(b) Explain the following TCP/IP header fields 10 • Source port • Urgent pointer • Sequence Number • Type of service • Fragment offset
(c) What is basic idea behind CIDR (classless 5 interdomain routing) ? Explain through an example.
5. (a) Explain the following concepts with respect 5 to multicasting : • Group management • Pruning
(b) What are the advantages of fragmentation 5 of frames is IEEE 802.11 ? Discuss.
(c) What are the problems of synchronous 5 TDM ? How does statistical TDM resolve the problem ?
(d) What are the differences between client/ 5 server and peer to peer architecture ? Discuss.
MCS-042 3
Downloaded from www.paraman.in