0% found this document useful (0 votes)
17 views3 pages

Scsa1502-May23 QP

Uploaded by

G.Akshaya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views3 pages

Scsa1502-May23 QP

Uploaded by

G.Akshaya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Register Number

SATHYABAMA
INSTITUTE OF SCIENCE AND TECHNOLOGY
(Deemed to be University U/S 3 of UGC Act,1956)

Programme & Specialisation: B.E. - CSE


Title of the Paper : Computer Networks and Design Max. Marks: 100
Course Code : SCSA1502 (2019/2020) Time : 3 Hours
Date : 25-04-2023 Session : AN
________________________________________________________
(NOTE: Assume relevant data, if found missing)

PART - A (10 × 2 = 20)


Answer ALL the Questions

1. Examine various fundamental design goals in the network. (CO1)

2. List the Network design task and explain briefly. (CO1)

3. Justify the answer why ring ad bus topology is implemented


rather than other in LAN. (CO2)

4. Compare and contrast the various types of Etherne. (CO2)

5. VPN uses a public network to transmit private datagrams.


Illustrate how Data Confidentiality is maintained in VPN. (CO3)

6. Today’s business scenario is multi-polarised. Justify how VPN


helps in reducing the investment cost and increases the data
throughput efficiency with suitable explanations. (CO3)

7. Categorize the different tools used in designing the network.


(CO4)
8. Justify how the multimedia networks are simulated efficiently
with steps. (CO4)

9. Categorize the different process involved in establishing voice


and video on the LAN. (CO5)

10. Recommend a suitable procedure for establishing video


conferencing over IP networks. (CO5)

PART - B (5 × 16 = 80)
Answer ALL the Questions

11. Discuss the preparing for final design document, Monitoring,


Designing and Maintaining Design Documentation. (CO1)
(or)
12. Explain Modular Network Design with examples and also write
the benefits of modular network design. (CO1)

13. Discuss in details about the transfer of information by token


concept in token ring with necessary diagram and also explain its
framing of packet details. Also justify how the token ring
overcomes the token bus concept. (CO2)
(or)
14. Compare the details of different Ethernet with different parameter
like bandwidth, distance, meter duplex and cable types with their
applications. (CO2)

15. As a computer network expert your tasked with the identification


of a suitable procedure to protect your data over the Internet.
Suggest a suitable IP security and firewall mechanism which can
be implemented on the virtual network, your planned to create for
the company. (CO3)
(or)
16. Data Integrity and User Authentication is a major bottle neck in
Virtual Private networks (VPN). As a Network design expert
suggest how the above said security issues are addressed in a
VPN with necessary explanations and diagrams. (CO3)

17. Appraise on how the remote bridge is used for exchanging the
information from source to destination with necessary examples
and diagrams. (CO4)
(or)
18. Without training, the computer Networks cannot converge. As a
network engineer expert explain the different procedures used for
designing a network. (CO4)

19. Evolution of trends in communication enhanced the quality of


living among human timely interaction. Do you agree with the
above statement? Justify your answer. (CO5)
(or)
20. A telecom engineer is supposed to build up an IP PBX telephony
network. Identify the challenges for him to build up such a
network. (CO5)

You might also like