You are on page 1of 2

KIET SCHOOL OF ENGINEERING & TECHNOLOGY, GHAZIABAD

Department of Computer Science & Engineering

CT-2 EXAMINATION, EVEN SEM 2015-2016

B.Tech (CSE) VI SEM


Computer Networks (NCS 601)
University Roll No
MM: 60

Time: 90 Minutes

Course Outcomes:CO-1: Define, use and implement Computer Networks and the basic components of a Network system
CO-2: Know and Apply pieces of hardware and software to make networks more efficient, faster, more secure, easier to
use, able to transmit several simultaneous messages, and able to interconnect with other networks.
CO-3: Differentiate the various types of network configurations and applying them to meet the changing and
challenging networking needs of organizations.
CO-4: Define and analyze the circuits available for voice and data networks, their transmission speeds (bandwidth), and how
they are packaged for commercial use.
CO-5: Define the different protocols, software, and network architectures.

Note: Attempt Questions from each section as per direction.

SECTION -A
Q.1. Attempt all parts. All parts carry equal marks. Write answers of each part in short.

(5x2=10)

A)
What is the efficieny of slotted aloha and pure aloha protocol.
CO-2
B)
A sender sends a series of packets to the same destination using a 5-bit sequence numbers.
If the sequence number starts with 0, what is the sequence number after sending 100 packets?
CO-5.
C)
Which of the following CRC generators guarantee the detection of a single bit error?
X4 + X2 , X3 + X +1, X2 + 1, 1.
CO-2
D) What is NAT. How can NAT help in address depletion?
CO-3
E)
A host is sending 100 datagrams to another host. If the identification number of the first
datagram is 1024, what is the identification number of the last(in IPv4)?
CO-5.

SECTION -B
Q.2. Attempt any TWO of the following.

(2x10=20)

A)
CO- 2
(a) Explain the binary exponential back off algorithm.
(b) Using 5-bit sequence numbers. What is the maximum size of the send and receive windows for
each of the following protocols?
Stop-and-Wait ARQ, Go-Back-N ARQ, Selective-Repeat ARQ
B) Compare IPv4 and IPv6 headers and also draw the block diagram of the both. CO-5
C) An organization is granted the block 130.56.0.0 /16. The administrator wants to create 1024
subnets.
CO-3
(a) Find the subnet mask.
(b) Find the number of address in each subnet.
(c) Find the first and last addresses in subnet 1.
(d) Find the first and last addresses in subnet 1024.

SECTION -C
Q.3. Attempt any TWO of the following.
A)
(a) Differentiate between 802.3, 802.4 and 802.5 IEEE standards.
(b) Explain with the help of neat diagram frame format of HDLC protocol.

(2x15=30)
CO-3

B)
CO-5
(a) In a CSMA/CD network with a data rate of 10 Mbps, the maximum distance between any
station pair is found to be 2500 m for the correct operation of the collision detection process. What
should be the maximum distance if we increase the data rate to 100 Mbps? To 1 Gbps? To 10
Gbps?
(b) Define controlled access and list three protocols in this category.
C)
CO-3
An ISP is granted a block of address stating with 150.80.0.0 /16. The ISP wants to distribute these
blocks to 2600 customers as follows:
(a) The first group has 200 medium-size businesses; each need 16 address.
(b) The second group has 400 small businesses; each needs 8 addresses
(c) The third group has 2000 households; each needs 4 addresses.
Design the sub blocks and give the slash notation for each subblock. Find out how many
addresses are still available after these allocations.

You might also like