0% found this document useful (0 votes)
194 views11 pages

MCS-218 Ignouassignmentguru - Com519

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
194 views11 pages

MCS-218 Ignouassignmentguru - Com519

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

24._Dec_2021 MCS-218.

pdf
25._June_2022 MCS-218.pdf
26._Dec_2022 MCS-218.pdf
[2] MCS-218

(c) Write the characteristics of transmission


No. of Printed Pages : 4 MCS-218
and propagation delays. 4

(d) Differentiate between congestion control


MASTER OF COMPUTER
and flow control. 4
APPLICATIONS (MCA) (NEW)
(e) Compare layer 2 and layer 3 switches. 5
Term-End Examination (f) Explain key generation algorithm for RSA.

December, 2021 Explain its process with an example. 6

(g) Discuss the QAM (Quadrature Amplitude


MCS-218 : DATA COMMUNICATION AND
Modulation) technique. Draw 8-QAM
COMPUTER NETWORKS
constellation diagram. 7
Time : 3 Hours Maximum Marks : 100 (h) Draw IPv4 header structure and explain

Note : (i) Question No. 1 is compulsory and carries the significance of flags. 6

40 marks. 2. (a) Which frequency bands are used for AM,


FM and Radar bands ? Write the
(ii) Attempt any three questions from the
relationship between tower height and
rest.
distance between repeaters. 5
1. (a) Find the CRC for the data polynomial (b) Explain why PAM is a necessary pre-
x  x  x  x 1,
9 7 5 2
with the generator
requisite to PCM ? What would be the
polynomial x  x 1 .
3
3
minimum sampling interval needed for
(b) What is a Local Area Network (LAN) ?
reconstructing a signal with highest
What are the typical characteristics of a
LAN ? 5 frequency of 1 kHz ? 5

P. T. O.
[3] MCS-218 [4] MCS-218

(c) Explain the concept of circuit and packet (b) What is Dijkstra’s algorithm for shortest
switching, with a suitable example. 5 path ? Find the best route between points

‘A’ and ‘E’ using Dijkstra’s algorithm. 10


(d) Compare star and tree topology in detail

with a suitable diagram. 5

3. (a) What is a Hamming Code ? How many

redundant bits are required to identify

errors in a character of 7 bits. Also


(c) What are the classes in IP addressing ?
mention the specified positions for
Explain the rules to determine the address
inserting these redundant bits. 5
class. 5
(b) What is meant by pure ALOHA ?
5. (a) What is Multiplexing ? Show the upward
Calculate the throughput of slotted
multiplexing with the help of a diagram. 5
ALOHA protocol. 5
(b) Discuss the contents of a digital certificate.
(c) Discuss IEEE 802.11 protocol in detail Explain the importance of digital

with a suitable diagram. 10 certificate. 5

(c) Explain the concept of RPC in detail. Draw


4. (a) With reference to connection oriented a diagram to explain RPC. 10
services, what are the steps in connection

establishment and termination ? 5


MCS–218

P. T. O.
No. of Printed Pages : 3 MCS-218

MASTER OF COMPUTER APPLICATIONS


(MCA-NEW)
Term-End Examination
June, 2022

MCS-218 : DATA COMMUNICATION AND


COMPUTER NETWORKS
Time : 3 hours Maximum Marks : 100
Note : Question no. 1 is compulsory and carries 40 marks.
Attempt any three questions from the rest.

1. (a) What is meant by CRC ? Write the following


bitstring in polynomial representation : 4
"1100010"

(b) What are Wireless LANs ? Discuss the


disadvantages of using radio transmitters. 5

(c) What is Transmission Media ? Compare


optical fiber with copper wire. 5

(d) What is meant by burst error ? How can


burst errors be corrected ? 5

(e) Explain the three types of internetwork


addresses with a suitable example for each. 5
MCS-218 1 P.T.O.
(f) Explain the concept of Diffie-Hellman key
generation. Generate public and private
key pairs using RSA algorithm using 7 and
11 as two prime numbers. 6
(g) Differentiate between PSK and FSK
modulation techniques. Explain the term
‘‘Quantization’’. 5
(h) Draw IPv4 header structure and explain
the significance of Fragment offset. 5

2. (a) What is encoding ? Explain digital-to-digital


encoding with an example. 5
(b) Explain the characteristics of Wide Area
Network (WAN). Differentiate between
client-server and peer-to-peer architecture. 10
(c) Discuss the importance of multiplexing.
List the basic multiplexing techniques. 5

3. (a) What is checksum ? Explain the features of


sliding window protocol. 5
(b) What is pipelining ? Explain stop and wait
ARQ when ‘ACK’ is lost, with the help of a
diagram. 5
(c) Briefly discuss the terms CSMA and
CSMA/CD. Explain Ethernet frame format
IEEE 802.3. 5
(d) Explain the utility of Spanning Tree and
Source Routing Bridges in computer
networks.

5
MCS-218 2
4. (a) What is a MAC address ? Compare virtual
circuit and datagram subnets.

5
(b) Find the shortest route between points ‘A’
and ‘E’ in the graph given below : 7

(c) Explain Token Bucket Traffic Shaper with


a suitable diagram. 3
(d) What is meant by fragmentation ? Compare
Interior and Exterior gateway routing
protocols.
5

5. (a) Define handshaking protocol. What are the


types of services provided by the transport
layer ?

5
(b) What is Nagle’s Algorithm ? Explain TCP
connection establishment in normal
operation.
5
(c) What is a Feistel network ? Write short
notes on Modes of Operation (CBC and
OFB).
5
(d) What is a Virtual Private Network (VPN) ?
Write the salient features of X.509
certificates.
5

MCS-218 3 P.T.O.
No. of Printed Pages : 4 MCS-218

MASTER OF COMPUTER
APPLICATIONS (MCA) (NEW)

Term-End Examination
December, 2022
MCS-218 : DATA COMMUNICATION AND
COMPUTER NETWORKS

Time : 3 Hours Maximum Marks : 100

Note : (i) Question No. 1 is compulsory and carries

40 marks.

(ii) Attempt any three questions from the

rest.

1. (a) Why bit stuffing is advantageous over


character stuffing ? Write the bit sequence
after bit stuffing for the data stream
“110001111111100001111100”. 2+3

P. T. O.
[2] MCS-218

(b) Differentiate between simplex, half duplex


and full duplex modes of data
transmission. 5

(c) What is data encoding ? Explain three


different ways in which encoding of analog
signal with analog information is
performed. 2+3

(d) What is Pipelining ? Explain selective


repeat ARQ. 2+3

(e) Write short notes on hidden station and


exposed station problem. 5

(f) Explain shortest path routing algorithm


with a suitable example. 5

(g) What is remote procedure call ? Mention


some important features of UDP. 2+3

(h) Define a cyber threat. List some common


threats in a user’s system. 2+3

2. (a) What are synchronous, asynchronous and


isochronous communication techniques ? 5
[3] MCS-218

(b) What is Phase Modulation ? Why is


Amplitude Modulation (AM) the most
susceptible to noise ? 2+3

(c) Define multiplexing and switching. What


are the differences between ADSL and
cable ? 3+2

(d) What is Internetworking ? Differentiate


between star and ring topologies of
networking. 2+3

3. (a) Find the CRC for the data polynomial

x4  x2  x  1, where generator

polynomial is x3  1. 5

(b) Explain stop and wait ARQ in normal


operation and when frame is lost. 5

(c) What is slotted ALOHA protocol ? Explain


its throughput calculation. 5

(d) Explain 802.11 protocol stack. What are


source routing bridges ? 3+2

4. (a) Compute the end to end delay for circuit


switching for a network having 5 hops to
switch a message of 1200 bits. Here all the

P. T. O.
[4] MCS-218

links have a data rate of 4800 bps. Size of


packet is 1024 bits with a header of 32 bits.
Assume 0.5 sec as a call setup time and
hop delay as 0.2 sec and there is no
processing delay. 8

(b) What is distance vector routing ? Explain


the count to infinity problem. 3+3

(c) Differentiate between congestion control


and flow control. Explain congestion
control in packet switched networks. 3+3

5. (a) Explain the connectionless and connection


oriented services provided by the transport
layer. 5

(b) What are important features of UDP ? Why


is it not considered as a reliable service ? 5

(c) What is a digital signature algorithm ?


Explain the basis of ElGaml public key
cryptosystem. 5

(d) What is a Firewall ? Explain the working


of intrusion detection system. 5

MCS–218

You might also like