| END TERM EXAMINATION | |
| Third Semester[BCA] | December 2024 |
| Paper Code: BCA-201 | Subject : Computer Networks |
| Time:3 Hours | Maximum Marks:60 |
| Note: Attempt 5 questions in all including Q.No.1 which is compulsory. Select one question from each unit. | |
| Q1 Answers the following questions : (4*5=20) | |
| (a) Explain the concept of distributed processing. How does it enhance the performance of networks systems? | |
| (b) Define attenuation, distortion and noise in transmission. How do they affect signal quality? | |
| (c) Describe the significance of modulation in telecommunication. | |
| (d) Explain the mechanisms involved in flow control in data communication. | |
| (e) Describe the process of IPv4 subnetting and its importance in network configurations. | |
| UNIT I | |
| Q2. Explain the essential components of a data communication system and their roles in facilitating communication. Use diagrams where necessary. (10) | |
| or | |
| Q3. Explain the difference between guided and unguided transmission media. Discuss the factors affecting propagation speed and throughput in these media types. (10) | |
| UNIT II | |
| Q4. Discuss various error detection and correction methods employed in the data link layer. Compare their effectiveness and implementation complexities. (10) | |
| or | |
| Q5. Compare the OSI and TCP/IP models in terms of their layer structures and the protocols associated with each layer. (10) | |
| UNIT III | |
| Q6. a) Differentiate between WDM, TDM and FDM in multiplexing techniques. Provide real-world applications for each. (5) | |
| (b) Explain the principles of unicast routing protocols: RIP, OSPF and BGP. (5) | |
| or | |
| Q7. Discuss the differences between static and dynamic routing. Explain Distance Vector and Link State routing protocol. (10) | |
| UNIT-IV | |
| Q8. a) Compare IPv4 and IPv6 addressing schemes, highlighting their advantages and differences. (5) | |
| b) Define the role of the session layer, presentation layer and application layer in the OSI model. (5) | |
| or | |
| Q9. Discuss symmetric and asymmetric encryption techniques, highlighting their difference in terms of security, key distribution, and computational complexity. (10) | |