END TERM EXAMINATION | |
Third Semester[BCA] | December 2024 |
Paper Code: BCA-201 | Subject : Computer Networks |
Time:3 Hours | Maximum Marks:60 |
Note: Attempt 5 questions in all including Q.No.1 which is compulsory. Select one question from each unit. | |
Q1 Answers the following questions : (4*5=20) | |
(a) Explain the concept of distributed processing. How does it enhance the performance of networks systems? | |
(b) Define attenuation, distortion and noise in transmission. How do they affect signal quality? | |
(c) Describe the significance of modulation in telecommunication. | |
(d) Explain the mechanisms involved in flow control in data communication. | |
(e) Describe the process of IPv4 subnetting and its importance in network configurations. | |
UNIT I | |
Q2. Explain the essential components of a data communication system and their roles in facilitating communication. Use diagrams where necessary. (10) | |
or | |
Q3. Explain the difference between guided and unguided transmission media. Discuss the factors affecting propagation speed and throughput in these media types. (10) | |
UNIT II | |
Q4. Discuss various error detection and correction methods employed in the data link layer. Compare their effectiveness and implementation complexities. (10) | |
or | |
Q5. Compare the OSI and TCP/IP models in terms of their layer structures and the protocols associated with each layer. (10) | |
UNIT III | |
Q6. a) Differentiate between WDM, TDM and FDM in multiplexing techniques. Provide real-world applications for each. (5) | |
(b) Explain the principles of unicast routing protocols: RIP, OSPF and BGP. (5) | |
or | |
Q7. Discuss the differences between static and dynamic routing. Explain Distance Vector and Link State routing protocol. (10) | |
UNIT-IV | |
Q8. a) Compare IPv4 and IPv6 addressing schemes, highlighting their advantages and differences. (5) | |
b) Define the role of the session layer, presentation layer and application layer in the OSI model. (5) | |
or | |
Q9. Discuss symmetric and asymmetric encryption techniques, highlighting their difference in terms of security, key distribution, and computational complexity. (10) |