0% found this document useful (0 votes)
16 views3 pages

2018 (C) Comp 204

1. The document is an exam for a computer networks course containing 20 multiple choice questions covering topics like network topologies, transmission modes, OSI layers, bandwidth, error detection, and IP addressing. 2. It provides instructions for the exam including its duration, level, year, course, and date. The exam is worth a total of 40 marks and contains both multiple choice and long answer questions. 3. The multiple choice section is worth 10 marks and contains 20 questions. The long answer section is worth 24 marks and requires students to attempt 6 out of 8 questions provided. This summarizes the key details and structure of the exam.

Uploaded by

didow36570
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views3 pages

2018 (C) Comp 204

1. The document is an exam for a computer networks course containing 20 multiple choice questions covering topics like network topologies, transmission modes, OSI layers, bandwidth, error detection, and IP addressing. 2. It provides instructions for the exam including its duration, level, year, course, and date. The exam is worth a total of 40 marks and contains both multiple choice and long answer questions. 3. The multiple choice section is worth 10 marks and contains 20 questions. The long answer section is worth 24 marks and requires students to attempt 6 out of 8 questions provided. This summarizes the key details and structure of the exam.

Uploaded by

didow36570
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

KATHMANDU LINIVERSITY Marks Scored:

End Semester Examination


[CJ
January,20lg
Level : B.E./B. Sc.
Year : II Course : COMp 204
Exam RollNo. Semester: Il
:
Time: 30 mins.
F.M. :t0
No.
Date JAN,U $'2OtA
.3A)'

t20 e. x 0.5 = l0 marksl


Choose the most appropriate answer.

BUS, RING and STAR TOPOLOGIES


are mostly used in
a. LAN b. MAN
c. WAN d. Internetwork
2. Both stations can transmit and receive
-, data simurtaneousry in
a. Simplex Mode
c. Half Duplex Mode ?'I4.f-si'plex Mode
d. FullDuplex Mode
3. Layer that are used to dear with
mechanicar and erectricar specifications
a' Physical Layer
b. Data rink rayer are
c. Netrvork i;;;,
d. Transporr Layer
4. A network with bandwidth of r0 Mbps
can pass onry an average of 12,000
frame carrying un uu.iugiof 5,000 frames per
;:::::::::ieach uirc. ir,roughput of the network
a. I Mbps. b. 2 Mbps. c. 3 Mbps. d. 4Mbps.
5 what is the transmission time for
az.5 kirobyte message if the bandwidth
is I Gbps? Assume that the aistan of the network
e i"trreen the sender and
an! light travels.at2.4x 1ga [s:rr-- the receiver is 12,000 km
a. 0.01
lhe
ms. b. O.O2ms.
-
c.0.03 ms. d. 0.04 ms.
6 During transmission if SNR=3dB,
the signal
) a. is attenuated
b. is amplified
c. remains unchanged
d. first is attenuated and then
amplified
7.
r000r I r0r0r0r00r I r r r r00r00r0r,
l:::h'*fift:X1'; after bit sturnng the actuar
a'0l l000l l 10l0l0l00l l l l0l l00l00l0l
0l 10001 I l0l0l0l00l0l I r I rooi6orol 0u000l il0t0l0l00l l l0l l l00l00l0l
b.
c' d. 0l l00diiiorororo0r r0r
r r r00r00r0r
8. which of the forowing media
access contror uses
a. FDMA U. COVfa
channe rization?
c. polling d. Token passing
9 Packet data unit of Data
link layer is called
a. Packet b. Frame c. Header d. Segment
I0.
,f the size of header is of x bit
i,q{i}jfr;: Hf:# xi;.o,,'o,, then rhe sequence
a. 0 b 2x U. f to Z{T- c. 0 to 2*-l d,. I to Zx
ll. If a noiseless channel with a bandwidth of 3000 Hz transmitting a signal with 4 signal
levels maximum Bit rate would be
a. 12000 bps b. 16000 bps c. 6000 bps d. 3000 bps
t2. In byte stuffing, the trailer contains
a. data b. source address c. destination address d. redundant bits

t3 The technique of temporarilY delaying outgoing-


acknowledgements so that they can be
hooked onto the next outgoing data fr-ame
L.utt.a
a. piggybacking b. cyclic redundancy check
c. fletcher's checksum d. parity

t4 What is the vulnerable time for pure ALOFIA where


T f, = Average transmission time or
f a frame &Ts = Backof f ttme?
a.2xTyr b.%xTp c.Ty ;.2xT,
l5 what is the address range of
a.Olxxxxxx
a crass
b.0xxxxxxx
B network in binary?
c. lOxxxxxx d. ll0xxxxx
o
16. The only address in the block 127.0.0.0/g is called
the .address.
a. Limited-broadcast b. Loopback c. private d. Multicast

t7. The first address of a given ip address 2Z3.l5.lg.l7l2g


is .
a. 223.15.18.17 b. Zz3.tS.lB.O c.223.t5.18.12 d.223.15.t8.22
18. The technique that requires no network information
is
a. Flooding b. Variable routing c. Fixed routing d. Random routing
t9. Transport layer protocols deals with.......
a. application to application communication
b. process to process communication
c. node to node communication
d. session to session communication
o
20. we use cryptography term to make them secure and immune
to
a. Change b. Idle c. Attacks d. Defend

Y
KATHMANDU UNIVERSITY
End Semester Examination
[C]
January,20lg JAN'o 9'2ot8
Level : B.E./B. Sc.
Year : II Course : COMp 204
Time :2 hrs. 30 mins. Semester: Il
)t
F. M. :40

[6Q x 4 = 24 marks]
Attempt ANy sIX questions.
I' Discuss the advantages and limitations
of Bus topology and Ring Topology
in detail.
2' Explain different propagation modes
of opticar Fiber cabre.
3'
-t
Explain the working mechanism of
Go-Back-N ARe with suitable flow
diagram.
4' Explain checksum error detecting method
with the help of suitable example.
5' Explain the traffic shaping techniques
performed by network rayer in data
communication.

6' TCP and UDP. Explain three way handshake


ilffifi'rXfbetween protocol with clear

7. Write short n_ores on (ANy WO)


a. Distance Vector Routing Algorithm
b. Half Duplex & Full Ouilex bommunication
c. Electronic Mail
SECTION "C"
[2Qx 8 =16 marks]
Attempt ANy WO questions.

8. ?. Explain OSI Reference Model in brief.


I b. Implement Cyclic ,raura.n.v;;;;il.
pol'ynomiat ior the daraword
, i,
rhe nnt.,^^-;^r r^_
drylfi,tl+lill",lial
for 3L^
the divisor
. xi+x2+l
r:_.: is: 1 , a rrri
[4)

:Xr#J:
checking or the''coi;;[ ; ffi'llr.ir.. side assuming no Ill
ii' what is the syndrome at the receiver "*",
end if the dataword has an error
position counting from the right? in the 2rd bit

9' a' Differentiate between circuit switched Network


b. and packet Switched Network.
Differentiate between p;tii. t4l
try .rypo$ranhr and private cryptogr
procedure of private key cryptograprr/
in
"urili.
Pr I vaLE key
Ksy cryptography. Exprain
Ul
l0' An ISP is granted-block of addresses
starting with lg0.g0 .0.0/l6.The
distribute these addre.r.r to ir,i.. ISp needs to
groups of customers as foilows:
a. The first gfoup has 50 rrrtor.rr, each
needs 256 addresses.
b' The secoid s.;ut h;; id;";ffi"rers,
c' Design the subblbcks and rnJ'oril,o* rrretrJ
each needs 32 addresses.
rffiii.l.rr.,
allocations. still avatlab,
cL.Lrrsssss are stttt available after these
p*r*r1

You might also like