0% found this document useful (0 votes)
28 views2 pages

CT Paper

This document outlines the CT Examination for the Computer Networks course at KIET Group of Institutions for the 6th semester. It includes various sections with questions covering topics such as network topologies, OSI layers, error detection mechanisms, and data link protocols. The exam consists of multiple choice and descriptive questions aimed at assessing students' understanding of computer networking concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views2 pages

CT Paper

This document outlines the CT Examination for the Computer Networks course at KIET Group of Institutions for the 6th semester. It includes various sections with questions covering topics such as network topologies, OSI layers, error detection mechanisms, and data link protocols. The exam consists of multiple choice and descriptive questions aimed at assessing students' understanding of computer networking concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Roll No.

___________________
KIET Group of Institutions
CT Examination (2022-2023) EVEN Semester

Department: Information Technology Course: B. Tech


Year: 3rd Semester: 6th
Subject Name: Computer Networks Subject Code: KCS-603
Duration: 2 Hrs. Max. Marks: 60
Note: Attempt all the questions of each section.

Section-A (2X10=20)
Q. 1 Compet
BL/
itive CO
Exam KC*
a Determine the reason of twisting the wires in twisted pair cable? 1 3/C
b Calculate the number of cable links required for the 6 devices connected in mesh,
1 3/P
ring, bus and star topology?
c Which layer is used for Hop-to-Hop delivery and Source to Destination delivery.
1 1/C
Write the addressing mechanism used on these respective layers with their size length.
d Write the full form of following addresses?
1. DNS
2. ARP GAT
3. DHCP E 1 1/C
4. RARP 2016
Also answer that which protocol among given is NOT used to resolve one form of
address to another one?
e In the following pairs of OSI protocol layer/sub-layer and its functionality, the
INCORRECT pair is.
GAT
1. Network layer and Routing
E 1 2/C
2. Transport layer and End-to-end process communication 2014
3. Data Link Layer and Bit synchronization
4. Medium Access Control sub-layer and Channel sharing
f Differentiate between a bus backbone and a star backbone. 2 2/P
g In data communication, a network has 4 intermediate nodes and then how many times
2 3/P
physical layer is used? Discuss your answer with neat and clean diagram.
h A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If
the output bit-string after stuffing is 01111100101, then the input bit-string is.
1. 0111110100
2. 0111110101 2 2/P
3. 0111111101
4. 0111111111
Explain your answer.
i What is Framing? Whole message could be packed in one frame, which is not
2 2/C
normally done. Justify reason for your answer.
j What is the difference between the delivery of a frame in the data link layer and the
2 2/C
delivery of a packet in the network layer?
Section-B (5X4=20)
KIET has multiple departments located in different areas of a building. The IT
department needs to connect all the departments to the KIET's network. Which
Q. 2 1 4/C
network topology would be the most suitable for this scenario, and why?
OR
● CO -Course Outcome generally refer to traits, knowledge, skill set that a student attains after completing the course successfully.
● Bloom’s Level (BL) - Bloom’s taxonomy framework is planning and designing of assessment of student’s learning.
● *Knowledge Categories (KCs): F-Factual, C-Conceptual, P-Procedural, M-Metacognitive
● #Reference to Competitive Exams (GATE, GPAT, CAT, GRE, TOFEL, NET, etc. )
Roll No. ___________________
Suppose you are working as a network administrator for a large organization that has
multiple departments spread across several buildings. The company wants to connect
all the departments and buildings to its network infrastructure.
a) Which device(s) would you use to connect the computers within a single
department?
b) Which device(s) would you use to connect the departments within a building?
c) Which device(s) would you use to connect the buildings together?
d) Which device(s) would you use to connect the company's network to the
internet?
Explain the differences between among each of these devices and why you chose
them for each scenario.
Discuss and differentiate among LAN, WAN, Intranet, Extranet and VPN.
Q. 3 OR 1 2/C
Discuss the different types of guided transmission media.
Expolre the design issues of layers.
OR
Illustrate the importance of parity check mechanism?
Q. 4 Suppose the sender wants to send the word world. In ASCII the five characters are 2 3/C
coded as
1110111 1101111 1110010 1101100 1100100
Show the actual bits sent after using even parity mechanism.
Discuss the major duties of Data Link Layer.
OR
Q. 5 If the data link layer can detect errors, then why do we need another error checking 2 2/C
mechanism at the transport layer?

Section-C (10X2=20)
Illustrate the circuit, message and packet switching techniques and also outline their
advantages and disadvantages.
Q. 6 OR 1 4/C
Illustrate the OSI reference model and also outline the differences with TCP/IP
protocol suite.
The following character encoding is used in a data link protocol: A: 01000111; B:
11100011; FLAG: 01111110; ESC: 11100000. Show the bit sequence transmitted (in
binary) for the six-character frame: A ESC FLAG ESC B FLAG when each of the
following farming methods are used:
a. Starting and ending flag bytes, with byte stuffing
b. Starting and ending flag bytes, with bit stuffing
Q. 7 OR 2 3/P
The following character encoding is used in a data link protocol: A: 01000111; B:
11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted (in
binary) for the frame: FLAG A B ESC FLAG when each of the following farming
methods are used:
a. Character count.
b. Flag bytes with character stuffing.

● CO -Course Outcome generally refer to traits, knowledge, skill set that a student attains after completing the course successfully.
● Bloom’s Level (BL) - Bloom’s taxonomy framework is planning and designing of assessment of student’s learning.
● *Knowledge Categories (KCs): F-Factual, C-Conceptual, P-Procedural, M-Metacognitive
● #Reference to Competitive Exams (GATE, GPAT, CAT, GRE, TOFEL, NET, etc. )

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy