0% found this document useful (0 votes)
26 views6 pages

ACN Question Paper

Uploaded by

Kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views6 pages

ACN Question Paper

Uploaded by

Kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

r- - - --

Reg No.: >N Ul 2..1.tvl CA~ L°1s20MCA10407~:_ _


~__,____-~ L__l __rs ~ t-/../
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
Second Semester MCA (Two Years) Degree Supplementary Examination January 2024

~
I
I

I
,I
Course Code: 20M~Al04
Course Name: ADVANCED COMPUTER NETWORKS
Max. Marks: 60 Duration: 3 Hours
PAR1::A
Answer all questions, each carries3 marks. Marks

Distinguish between interface, protocol and layer in network software. (3)


How token bucket algorithm performs congestion control? (3)
What are port numbers, give its importance in computer communication? (3)
Explain flow control and error control in TCP. (3)
Write short note on RIP. (3)
Compare classful and classless addressing, giving examples for both. (3)
,,\
I
i:;- .. ... i i,;"
_._,At,t ~ C... l .1-.L
th,, dutie" of, data link Lay"'-r
· , _..,.. • •~ ~ ., ._,.._ _ _. ... •
..S..

,. (3)
__
1 l
"-
I .~ I
Compare any to random access 1p.r~tO,Pf.:'. ,S.' I
(3)
~ j ( 1

I
Explain Bluetootb architecture. I (3)
I I

Whatit afaewall?Explain. (3)


P.ARTB
Answer'any one question from each module. Each question carries 6 marks.
Module I
11 / What are the 'five layers in the Internet protocol stack? What are the principal (6)
J responsibilities of each of these layers?
OR
12 Describe the name-address resolution techniques used in DNS. (6)
Module II
13 Explain-.stop--and--wait and Go back--N protocol in.detail. (6)

,. / OR
~ Explain connection establishment and connection termination in TCP (6)
, Module Ill
Describe the format of 1Pv4 datagram with the help of a diagram, highlighting
\\ the.significance of each field.
OR
(6)

\ Page 1 of 2

\
-

0520MCA104072101

(6)
16 Explain how exterior routing is done using BGP.
Module IV
V1~ / l

What are the different-error detection techniques used•at the data link layer? (6)

J
, ,1-
OR
What is multiple access problem? Explain the CSMAICD method of medium (6)

access in Ethernet LANs.

:I Module V
Describe the format of IEEE 802.11.How does Multiple Access with Collision
Avoidance solve the hidden node proble1n in Wireless LANs?
OR
(6)

(6)
20 Write short note on
a. Troubleshooting in networks (3 marks )
b. SNMP (3 marks )

****

• I

\
Reg No.:
------ Name: CLo'm
APJ ABDUL KALiW~1Yf.efficA L UNI~ITY
Second Semester MCA (2 Year) Degree Regular and Supplementary Examination June 2023

Course Code: 20MCA104


Course Name: ADVANCED C~MPUTER NETWORKS
Max. Marks: 60 Duration: 3 Hours
PARTA
Marks
Answer all questions, earl: r.n1'1'ies3 marks.
1 /Explain protocol layering and its advantages. (3)
2 ./'Describe the working of file transfer protocol' with suitable figures. (3)
.

3 v-Compare TCP and UDP at the transport lay~r (3)


4 / Explain multiplexing and de-multiplexing with diagrams. (3)
5/ Draw the format of the IPv6 packet header, highlighting the significance of each (3)
. field. .
- '
(3)
Differentiate between routing and formarding.· ·
' ' . .. ,,,

7 / Explain token passing and polling-base:d mu~tiple access protocol with examples (3)
8/ What is the use of the checksum method? A sender has two data items to send: 1 (3)
. - - -,-•--.:...
··---·-·- _.L..L}_l..9..9..-1. l _~_o_~ .1. ~ o 1 11. 0..aµdl J.fo.h o. lo_1, 0 ,1 0 -1 o 1 0-1.. '1
·· · · · Compute checksum for the data. · .. ·
9/ Explain the piconet and scatternet architact_ure of Bluetooth. (3)
·- .. i. ' • - ••

·1g; What is the use of VPN are the techniques to guarantee privacy for organizations (3)
j
using yPN?
. I. '.,

PARTB
Answer a~y one question from each module. Eacll question carries 6 marks.
· ' · •, Module I · ·· .
11 /Explain the techniques and mechanisms that guarantee the._ quality of service of (6)
the network to deliver predictable service to an application program.
· ·. ' OR .
12 F.~vlaifl tho layered architecture of the :f~RJIB Fe:f:aFeace model. · (6)
I\, Mo«:lulell ·
13J. ' How the flow and error control servica is provided ~y the transport layer using (6)
G~-Back-N and Selective-Repeat prot~ols. Depict the working using timing
diagrams.
. .
14 ExgJain TCP segment structure with th frame format. (6)

,
Page 1 of :r
0520MCA104052303

Module III
is performed in the internet neing inteFdemain routing protocol BGP (6)
15 Haw Feuting
«JR
g of link state routing. U!e Dijkstra's algorithm and show the (6)
16 Exrlain the workin
J for
tabular summary of the algorithm's computation to find the shortest path
node U in the above graph.

Modnl11 JV
of codeword (6)
17 ✓Explain CRC. Generate codeword at sender and perform checking
at receiver. Assuming no error for the dataword 1100 and divisor 1101 using
CRC.
VR
the techniques character-orientgci f+Rming and bit-oriented framing in (6)
18 El11~irlate
data link control (DLC) to organize the bits that are carried by the physical layer.
Module V
(6)
With neat diagram explain the architeclure of IEEE 802.11 Wireless LAN.
OR
(3)
20 a) Elaborate the working of traffic analysis tools.
k ()
b) Explain any 3 tools/ commands for troubleshooting used by networ 3
administrators.

Page 2 of !J
\ RegN o.:__ ____ Name:_ _ _ _ _ _ _ __
APJ ABDUL KAL iW~i rlHff icAL UNIVERSITY
Second Semester MCA (2 Year) Degree Examination June 2022

Course Code: 20MCA104

Course Name: ADVAN CED COMPUTER NETWORKS


Duration: 3 Hours
Max. Marks: 60
PART A


Marks
Answer all questions, each carries 3 marks.
(3)
1 What are the reasons for using layered protocol architecture?
(3)
2 Differentiate HTTP persistent and non-persistent communications.
(3)
3 Demonstrate how Stop-and-Wait protocol is used for reliable data transfer.
(3)
4 Discuss about three-way handshaking in TCP with suitable diagram .
What are Virtual Circuits? Compare with circuit switched and packet switched (3)
5
networks.
6 Explain the features of RIP. (3)

7 Draw and explain IEEE 802.3 Ethernet frame format. (3)

8 What is the difference between a Hub and a Switch? (3)

9 With a neat diagram explain the architecture ofBluetooth (3)

e, 10 What is VPN?
PARTB
(3)

Answer any one question from each module. Each question carries 6 marks.
Module I
What is the relevance of a network protocol architecture? With neat diagram, brief (6)
11
the responsibilities of network support layers in OSI Reference model?
OR
Discuss ~ith relevant example, the application layer protocol used to retrieve web (6)
.12
pages from the Web.

Page 1 of2
OSl0MCA104072103

13 Wh · Module II
at ts network congestion? Show how the t1
. . per ormance of network is affected
by congestion? Write about the mechanisms to all . t .
(6)
h evia e congestion after it
appens.

OR
14 Demonstrate the workin fG B k .
g o o- ac -N and Selective Repeat protocols with (6)
suitable diagrams.

Module III
15 Define routing? Explain the process of Link State Routing with OSPF protocol. (6)
OR
16 Write short notes on inter-domain routing protocol BGP. (6)
Module IV
17 Explain the random access protocol used for collision detection in Ethernet. (6)
OR
18 Generate codeword at sender and perform checking of codeword at receiver (6)
assuming no error for the dataword I 100 and divisor 1101 using CRC.
ModuJeV
19 With neat diagram explain the architecture oflEEE 802.11 Wireless LAN. (6)
OR
20 Explain SNMP framework for managing devices in the Internet. (6)
****

Page 2 of 2

You might also like