CN Model PAPER 11
CN Model PAPER 11
SECTION-A
I. Answer any TEN of the following. Each question carries TWO marks. (10x2=20)
1. Mention the goals of computer networks.
2. What are the services provided by data link layer?
3. Define attention, distortion.
4. Abbreviate FTP and HTTP.
5. Define Internet.
6. Write a note on ALOHA protocol.
7. What are the types of HDLC frames?
8. What are the services provided by PPP.
9. What is random access protocol?
10. Distinguish between data and signals.
11. Explain switching.
12. Compare datagram and virtual circuit.
SECTION-B
II. Answer any FIVE of the following. Each question carries FOUR marks. (5x4=20)
13. Define network topology. Explain BUS and STAR topologies with its Merits and Demerits.
14. Explain the various transmission modes.
15. Derive Shannon channel capacity for noisy channel.
1
16. Explain different types multiple access protocol.
17. Define Error. With an example explain Checksum Technique.
18. Explain CRC method of error checking. Give an example.
19. Write short notes on the following:
(a) Congestion control. (b) Flow control.
SECTION-C
III. Answer any TWO of the following. Each question carries TEN marks. (2x10=20)
20. Explain the ISO-OSI model of computer network with a neat diagram.
21. Compare FDMA, TDMA and CDMA.
22. a) What is routing? Explain Link State Routing.
b) Differentiate between TCP and UDP.
23. a) Explain the working of Electronic mail. How SMTP used in Email applications.
b) Explain the importance of Quality of Service (QoS).
******
2
ANSWERS
1. Mention the goals of computer networks.
ANS: The goal of networking is to achieve security, scalability, reliability, good performance, and
sharing of resources.
5
Issue Virtual – Circuit Networks Datagram Networks
telephone calls.
SECTION-B
II. Answer any FIVE of the following. Each question carries FOUR marks. (5x4=20)
13. Define network topology. Explain BUS and STAR topologies with its Merits and Demerits.
Definition 1 mark, types each 1.5 mark.
Here are some merits and demerits of bus and star topologies:
Bus topology
Cost-effective and easy to implement, but has some limitations:
Single point of failure: If the cable fails, the entire network goes down.
Shared backbone: Less secure than other topologies.
Data collisions: As more nodes share the cable, the risk of data collisions increases.
Star topology
Easy to operate and add or remove nodes, but has some disadvantages:
Expensive: Uses a lot of cable and extra hardware like hubs or switches.
Hub or switch failure: If a hub or switch fails, all connected devices lose network connection.
6
Hence, the channel capacity is directly proportional to the power of the signal, as SNR = (Power of
signal) / (power of noise).
7
5. Repeat at the receiver: The receiver performs the same division operation on the received data.
6. Check the remainder: If the remainder is zero, the data is error-free. If the remainder is non-zero,
errors were detected.
SECTION-C
III. Answer any TWO of the following. Each question carries TEN marks. (2x10=20)
20. Explain the ISO-OSI model of computer network with a neat diagram.
Diagram -2 mark
Explanation of layers – 8 marks
21. Compare FDMA, TDMA and CDMA.
Each comparison 2 marks
22. a) What is routing? Explain Link State Routing.
Routing is the process of selecting a path for data packets to travel from one network device to
another. It's a vital part of network communication, ensuring that data reaches its destination efficiently
and accurately.
8
Link state routing is a dynamic routing algorithm that uses a network's topology to find the best paths
for data packets. It's one of the two main types of routing protocols used in computer networks, along
with distance-vector routing protocols.
The network map is used to calculate the shortest path from one node to another.
Link state routing protocols were developed to address the limitations of distance-vector protocols.
Some examples of link-state routing protocols include Open Shortest Path First (OSPF)
Here's how link state routing works:
Create a network map
Each router generates link-state information for the links it directly connects to and sends it to its
neighbors. This information is directional.
Build a routing table
Each router independently calculates the best path to every destination in the network. The collection
of best paths forms the router's routing table.
Find the shortest path
23. a) Explain the working of Electronic mail. How SMTP used in Email applications.
Working of Email:
1. When the sender sends the email using the mail program, then it gets redirected to the simple mail
transfer protocol which checks whether the receiver’s email address is of another domain name or
it belongs to the same domain name as that of the sender (Gmail, Outlook, etc.). Then the email
gets stored on the server for later purposes transfer using POP or IMAP protocols.
2. If the receiver has another domain name address then, the SMTP protocol communicates with the
DNS (domain name server ) of the other address that the receiver uses. Then the SMTP of the
sender communicates with the SMTP of the receiver which then carries out the communication
and the email gets delivered in this way to the SMTP of the receiver.
Simple Mail Transfer mechanism (SMTP) is a mechanism for exchanging email messages between
servers. It is an essential component of the email communication process and operates at the
application layer of the TCP/IP protocol stack. SMTP is a protocol for transmitting and receiving
email messages.
SMTP is an application layer protocol . The client who wants to send the mail opens a TCP connection
to the SMTP server and then sends the mail across the connection. The SMTP server is an always-on
9
listening mode. As soon as it listens for a TCP connection from any client, the SMTP process initiates
a connection through port 25. After successfully establishing a TCP connection the client process
sends the mail instantly.
The SMTP model is of two types:
End-to-End Method
Store-and-Forward Method
The end-to-end model is used to communicate between different organizations whereas the store and
forward method is used within an organization.
******
10