0% found this document useful (0 votes)
47 views3 pages

2017 (C) Comp 204

This document appears to be an exam from Kathmandu University assessing a student's knowledge of data communication and computer networks. It contains multiple choice and short answer questions testing topics like the OSI model, protocols, media access control, error detection, and quality of service. The exam is divided into three sections with Section A containing 20 multiple choice questions, Section B containing 6 short answer questions to attempt, and Section C containing 2 long answer questions.

Uploaded by

didow36570
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views3 pages

2017 (C) Comp 204

This document appears to be an exam from Kathmandu University assessing a student's knowledge of data communication and computer networks. It contains multiple choice and short answer questions testing topics like the OSI model, protocols, media access control, error detection, and quality of service. The exam is divided into three sections with Section A containing 20 multiple choice questions, Section B containing 6 short answer questions to attempt, and Section C containing 2 long answer questions.

Uploaded by

didow36570
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Marks Obtained

KATHMANDU UNIVERSITY
End-Semester Examination [C]
July. 201 7
Level : B. Sc. Course : COMP 204
Year : II Semester : tl
Exam RollNo. Time: 30 mins F.M l0

Registration No.: Date 4 2017


SECTION..A"
[20 Q'x 0'5: l0 marks]
Tick(r/) the best alternative(s).

l. Which one of the following operations is not performed in data link layer?
[a] Framing [b] error control [c] flow control [d] channel coding

2. CIDR is helps to
[a] Efficiently addressing [b] Waste less addressing
[c] Error less addressing [dl Dynamic addressing

3. The conditional GET mechanism


[a] lmposes conditions on the objects to be requested
[b] Limits the number of response from a server
[c] Helps to keep a cache upto date
[d] None of the mentioned

4. Which of the following is a form of DoS attack ?


[a] Vulnerability attack [b] Bandwidth flooding
[c] Connection flooding [d] All of the mentioned

5. Bit stufllng refers to


[a] inserting a'0' in user stream to differentiate it with a lag
[b] inserting a'0' in lag stream to avoid ambiguity
[c] appending a nibble to the lag sequence
[d] appending a nibble to the use data stream

6. Frequency range at which the land coaxial cables are used. is


[a] 106 to 108 Hz [b] l0l0 to l0ll Hz [c] 103 ro 104 Hz [d] None of these

7 Start and stop bits are used in serial communication for


[a] error detection [b] error correction
[c] slowing down the communication [d] synchronization

8 Routers operate in which layer of the OSI model?


[a] Physical layer [b] Data link layer
[c] Network Layer [d] Transport Layer

9 ln which network topology there are bidirectional links between each possible node?
[a] Star [b] Bus [c] Mesh [d] Ring

l0 Which of the fbllowing media access control is uses channelization?


[a] FDMA [b] CDMA [c] Polling [d] Token passing
ll Which of the following routing technique uses Bellman Ford algorithm?
[a] Shortest Path [b] Link State [c] Distance Vecror [d] Hierarchical

t2 What is the maximum number of IP addresses that can be assigned to hosts on a local
subnet that uses the 255.255.255.224 subnet mask?
[a] 14 [b] ls [c] 16 [d] 30

r3 You need to subnet a network that has 5 subnets, each with at least l6 hosts. Which
classful subnet mask would you use?
[a] 255.255.zss.192 [b)zss.2ss.2ss.224 {c]255.255.zss.240 [d12ss.2ss.2ss.248

14. Digital signature uses


[a] Asymmetric cipher [b] Symmetric cipher
[c] Multicharacter symmetric cipher [d] Single character symmetric cipher

l5 Which of the following in not an application layer protocol?


lal HTTP [b] FTP [c] SMrP ldl UDP
l6 Redundancy code in data link layer is used to
[a] Redundantly sends the data to receiver
[b] Send Extra information to the receiver about data
[c] Detect and correct errors during transmission
[d] Detect errors during transmission

t7 Token bucket algorithms has advantage of _ over leaky bucket algorithms.


[a] Unifbrm output rate [b] Burst error
[c] Handling bulky packets [d] Fast transmission

r8. medium with having least rate of data transmission is


[a] Shielded Twisted pair [b] Unshielded Twisted pair
[c] Fibre optics [d] Co-axial cable

t9 Packet data unit of Datalink layer is called


[a] Packet [b] Frame [c] Header [d] Segment

20. The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data fiame is called
[a] Piggybacking [b] cyclic redundancy check
[c] checksum
fletcher's [d] none of the mentioned
KATHMANDU UNIVERSITY
End-Semester Examination [C]
July, 201 7 JUL 1 4 201?
Level : B. Sc. Course COMP 204
Year : II Semester II
Time : 2 hrs. 30 mins. F. M. 40
SECTION ''B''
[6Q , 4: 24 marks]
Attempt ANY SIX questions.

I. Explain basic tbatures and characteristics of data communication and networking. [+3.|

2 What is IP addressing? Why and How is subnet addressing pertbrmed? [ +31

J Discuss data rate limit theorem in digital transmission. What is the theoretical highest bit
rate of a regular telephone line having a bandwidth of 3000 Hz (300 Hz to 3300 Hz). The
signal-to-noise ratio is usually 35 dB (3162) on up-link channel. [2+2]

4. Explain in detail about CSMA/CD Protocol. How does it detect the collisions? 141

5. Describe in brief about CDMA Media Access control. t4l

6. What advantages does fiber optics have over other media? Explain in brief about working
mechanism of fiber optics. [l+3]
7 Explain in brief about the working procedure of error correction techniques in checksum
procedure. L4l

SECTI oN "c"
[2Q, 8: l6 marks]

Attempt ANY TWO questions.

8 Explain the traffic shaping techniques performed by network layer in data


communication. t8l

9 Define briefly about operation of sliding window protocol. What are the advantages of
selective repeat ARQ over other ARQ? Discuss the working mechanism of Selective
Repeat ARQ. [2+2+4)

l0 Briefly describe about the factors that deflne quality of service of Data Communication
and Networking. Discuss three fundamental aspects of security in data communication
and networking. [2+6)

You might also like