ACN Question Paper
ACN Question Paper
~
I
I
I
,I
Course Code: 20M~Al04
Course Name: ADVANCED COMPUTER NETWORKS
Max. Marks: 60 Duration: 3 Hours
PAR1::A
Answer all questions, each carries3 marks. Marks
I
Explain Bluetootb architecture. I (3)
I I
,. / OR
~ Explain connection establishment and connection termination in TCP (6)
, Module Ill
Describe the format of 1Pv4 datagram with the help of a diagram, highlighting
\\ the.significance of each field.
OR
(6)
\ Page 1 of 2
\
-
0520MCA104072101
(6)
16 Explain how exterior routing is done using BGP.
Module IV
V1~ / l
What are the different-error detection techniques used•at the data link layer? (6)
J
, ,1-
OR
What is multiple access problem? Explain the CSMAICD method of medium (6)
:I Module V
Describe the format of IEEE 802.11.How does Multiple Access with Collision
Avoidance solve the hidden node proble1n in Wireless LANs?
OR
(6)
(6)
20 Write short note on
a. Troubleshooting in networks (3 marks )
b. SNMP (3 marks )
****
• I
\
Reg No.:
------ Name: CLo'm
APJ ABDUL KALiW~1Yf.efficA L UNI~ITY
Second Semester MCA (2 Year) Degree Regular and Supplementary Examination June 2023
7 / Explain token passing and polling-base:d mu~tiple access protocol with examples (3)
8/ What is the use of the checksum method? A sender has two data items to send: 1 (3)
. - - -,-•--.:...
··---·-·- _.L..L}_l..9..9..-1. l _~_o_~ .1. ~ o 1 11. 0..aµdl J.fo.h o. lo_1, 0 ,1 0 -1 o 1 0-1.. '1
·· · · · Compute checksum for the data. · .. ·
9/ Explain the piconet and scatternet architact_ure of Bluetooth. (3)
·- .. i. ' • - ••
·1g; What is the use of VPN are the techniques to guarantee privacy for organizations (3)
j
using yPN?
. I. '.,
PARTB
Answer a~y one question from each module. Eacll question carries 6 marks.
· ' · •, Module I · ·· .
11 /Explain the techniques and mechanisms that guarantee the._ quality of service of (6)
the network to deliver predictable service to an application program.
· ·. ' OR .
12 F.~vlaifl tho layered architecture of the :f~RJIB Fe:f:aFeace model. · (6)
I\, Mo«:lulell ·
13J. ' How the flow and error control servica is provided ~y the transport layer using (6)
G~-Back-N and Selective-Repeat prot~ols. Depict the working using timing
diagrams.
. .
14 ExgJain TCP segment structure with th frame format. (6)
,
Page 1 of :r
0520MCA104052303
Module III
is performed in the internet neing inteFdemain routing protocol BGP (6)
15 Haw Feuting
«JR
g of link state routing. U!e Dijkstra's algorithm and show the (6)
16 Exrlain the workin
J for
tabular summary of the algorithm's computation to find the shortest path
node U in the above graph.
Modnl11 JV
of codeword (6)
17 ✓Explain CRC. Generate codeword at sender and perform checking
at receiver. Assuming no error for the dataword 1100 and divisor 1101 using
CRC.
VR
the techniques character-orientgci f+Rming and bit-oriented framing in (6)
18 El11~irlate
data link control (DLC) to organize the bits that are carried by the physical layer.
Module V
(6)
With neat diagram explain the architeclure of IEEE 802.11 Wireless LAN.
OR
(3)
20 a) Elaborate the working of traffic analysis tools.
k ()
b) Explain any 3 tools/ commands for troubleshooting used by networ 3
administrators.
Page 2 of !J
\ RegN o.:__ ____ Name:_ _ _ _ _ _ _ __
APJ ABDUL KAL iW~i rlHff icAL UNIVERSITY
Second Semester MCA (2 Year) Degree Examination June 2022
•
Marks
Answer all questions, each carries 3 marks.
(3)
1 What are the reasons for using layered protocol architecture?
(3)
2 Differentiate HTTP persistent and non-persistent communications.
(3)
3 Demonstrate how Stop-and-Wait protocol is used for reliable data transfer.
(3)
4 Discuss about three-way handshaking in TCP with suitable diagram .
What are Virtual Circuits? Compare with circuit switched and packet switched (3)
5
networks.
6 Explain the features of RIP. (3)
e, 10 What is VPN?
PARTB
(3)
Answer any one question from each module. Each question carries 6 marks.
Module I
What is the relevance of a network protocol architecture? With neat diagram, brief (6)
11
the responsibilities of network support layers in OSI Reference model?
OR
Discuss ~ith relevant example, the application layer protocol used to retrieve web (6)
.12
pages from the Web.
Page 1 of2
OSl0MCA104072103
13 Wh · Module II
at ts network congestion? Show how the t1
. . per ormance of network is affected
by congestion? Write about the mechanisms to all . t .
(6)
h evia e congestion after it
appens.
OR
14 Demonstrate the workin fG B k .
g o o- ac -N and Selective Repeat protocols with (6)
suitable diagrams.
Module III
15 Define routing? Explain the process of Link State Routing with OSPF protocol. (6)
OR
16 Write short notes on inter-domain routing protocol BGP. (6)
Module IV
17 Explain the random access protocol used for collision detection in Ethernet. (6)
OR
18 Generate codeword at sender and perform checking of codeword at receiver (6)
assuming no error for the dataword I 100 and divisor 1101 using CRC.
ModuJeV
19 With neat diagram explain the architecture oflEEE 802.11 Wireless LAN. (6)
OR
20 Explain SNMP framework for managing devices in the Internet. (6)
****
Page 2 of 2