A9-R4: DATA COMMUNICATIONS AND NETWORK TECHNOLOGIES NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2.

PART ONE is to be answered in the OMR ANSWER SHEET only, supplied with the question paper, as per the instructions contained therein. PART ONE is NOT to be answered in the answer book.

3.

Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be supplied at the table when the answer sheet for PART ONE is returned. However, candidates, who complete PART ONE earlier than one hour, can collect the answer book for PART TWO immediately after handing over the answer sheet for PART ONE. TOTAL TIME: 3 HOURS TOTAL MARKS: 100 (PART ONE – 40; PART TWO – 60) PART ONE (Answer all the questions) 1.

Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)

1.1 A) B) C) C)

Performance of a network can be measured by considering ________. transit time response time both A) and B) none of the above

1.2 A) B) C) D)

The term ________ refers to the way in which a network is laid out physically. physical topology conceptual structure network design none of the above

1.3 A) B) C) D)

The main disadvantage of the ring topology of network is ________. unidirectional traffic dedicated point to point connections both A) and B) none of the above

1.4

Standards that are not approved by an organizing body, but have been adapted as standards through widespread use are known as ________. default de facto de jure none of the above

A) B) C) D) 1.5 A) B) C) D)

A ________ is a set of rules that govern data communication; however, data communication can be made without it. protocol standards packages none of the above

1.6 A) B) C) D)

Wireless LANs use ________. management frames control frames data frames all of the above

A9-R4

Page 1 of 4

July, 2013

1.7 A) B) C) D)

________ listens to a portion of a spectrum, amplifies the incoming signal, and then rebroadcasts it at different frequency. Transponder Repeater Gateway None of the above

1.8 A) B) C) D)

Membership of a virtual LAN is based on ________. port number topology used network size none of the above

1.9 A) B) C) D)

Which of the following networks requires that all channels in a message transmission path be of the same speed? packet-switched network circuit-switched network message-switched network None of the above

1.10 A) B) C) D)

The qualifier differential to PSK means that ________. it uses phase shifts of multiple of 900 it uses phase shift of 450 phase shift is with reference to the previous bit transmitted none of the above

2.

Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)

2.1

All the networks use distributed processing.

2.2

MAN is the best choice when customers need both – (i) high speed connectivity and (ii) coverage area is within a town.

2.3

Frequency and period of a digital signal are inverse of each other.

2.4

Line coding is a process that converts digital signal to digital data.

2.5

The network allocation vector is a timer used for error checking.

2.6

The basic unit of a Bluetooth network is called a piconet.

2.7

A unicast address defines a single computer.

2.8

IPv6 Header includes a checksum header.

2.9

Post office protocols while mailing via Internet are used for pulling mails from different servers.

2.10

A9-R4

Virtual private networks need not use real private WANs.

Page 2 of 4

July, 2013

3.

Match words and phrases in column X with the closest related meaning/ word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10) X

Y

3.1

ARPANET

A.

CSMA/CA

3.2

Cerf and Kahn

B.

Internet service provider

3.3

ISP

C.

Transport layer

3.4

Hop to hop delivery

D.

IP address

3.5

Process to process delivery

E.

Data link layer

3.6

Address uniquely

F.

One bit signaling element

3.7

Unguided media

G.

TCP

3.8

Avoids collision on wireless networks

H.

Advanced mobile phone system

3.9

Cellular telephony area

I.

wireless communication

3.10

NRZ-L and FSK

J.

Internet

K.

CSMA/CD

L.

Cryptography

M.

Secret key

4.

which

defines

a

host

Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Enter your choice in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10) A.

Secret

B.

Same

C.

Burst error

D.

10 Base 5

E.

White

F.

Guided media

G.

WAN

H.

CSMA

I.

Unguided media

J.

PPP – Point to Point Protocol Firewall

K.

Single path

L.

A semi column

M. 4.1

Twisted pair cable, co-axial cable and fiber optic cables are examples of ________.

4.2

________ means two or more bits in the data unit have changed from 0 to 1 or 1 to 0.

4.3

________ defines format of the frame to be exchanged between devices.

4.4

________ noise is not a natural noise.

4.5

To minimize the chance of collision of frames and hence to increase performance the ________ method is used.

4.6

A leased line in commonly used for ________ links.

4.7

The downlink and uplink channels of a satellite must not be ________.

4.8

________ is a component which blocks the network traffic based on set of rules for security.

4.9

________ is a thick Ethernet.

4.10

Symmetric key in cryptography is also known as ________ key.

A9-R4

Page 3 of 4

July, 2013

PART TWO (Attempt any FOUR questions) 5. a) b)

Explain in brief about different types of networks. Give brief history and structure of the Internet. (7+8)

6. a)

b) 7. a) b) 8. a) b)

9. a) b) c)

i)

If we need to download text documents at the rate of 100 pages per minute, what is the required bit rate of the channel? Assume that a page has an average of 24 lines with 80 characters in each line. ii) A signal travels through an amplifier and its power is increased to 10 times. That is p2= 10p1. Give the formula to calculate amplification (gain of power). Briefly describe OSI model with necessary diagram. (6+9) Which technique can be used to combine signals from different sources to fit into a larger bandwidth such as wireless applications? Discuss the techniques in very brief. What is slotted ALOHA? Explain frame collision in it by giving an example. (7+8) Write a short note on guided media that provide conduit (channel/path) from one device to another. Which is the most common protocol for point to point access? Which services it can provide? Explain. (7+8) Differentiate IPv4 and IPv6. Give two to three main points only. What is cryptography? What are the components involved in it? Explain in brief. Write a short note on firewalls. (3+4+8)

A9-R4

Page 4 of 4

July, 2013

NIELIT A9-R4 Data Communication & Network Technologies SP-3.pdf

2.10 Virtual private networks need not use real private WANs. Page 2 of 4 ... 3.8 Avoids collision on wireless networks H. Advanced mobile phone system.

34KB Sizes 1 Downloads 167 Views

Recommend Documents

DATA COMMUNICATION AND NETWORK I.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. DATA ...

Information Communication Technologies Applications.pdf ...
mT 'toil 01-4R I. 3TET4T. 1.2 3747- -*--draff .3. ... Page 3 of 4. Main menu. Displaying Information Communication Technologies Applications.pdf. Page 1 of 4.

NIELIT C11-R4 Wireless & Mobile Communication SP-3.pdf ...
Calculate the probability of no collision. (10+8). 3. a) How are collision avoided in IEEE 802.11 protocol? Explain the uses of various interframe. spaces in the above protocol. b) Wireless Local Loop (WLL) technology fast and inexpensive access to t

Security and Communication Network
Soft computing techniques, such as Fuzzy Logic, Neural Networks, Evolutionary. Computing, Rough Sets and other similar techniques, have been proved ...

NIELIT BE4.2-R4 Professional & Business Communication SP-5.pdf ...
b) You have been asked to appear for an interview for the post of a Project Manager in an I-T. company. What kind ... Leo Baekeland's genie. has been out of the ...

NIELIT BE4.2-R4 Professional & Business Communication SP-6.pdf ...
Having adopted parliamentary democracy as the. right approach ... From political democracy we advance ... What does 'friendliness' in the workplace mean?

NIELIT C11-R4 Wireless & Mobile Communication SP-4.pdf ...
Give Comparison of Direct Sequence vs. ... c) Symbian OS is used in Mobile phones as Operating System. What are the characteristics of. Symbian OS? (6+6+6).

Security and Communication Network
pattern detection, data segmentation, data mining, adaptive control, information assurance, etc. Recently, soft computing is widely used in information system for assurance. For example, neural networks are used for intrusion detection or prevention,

NIELIT BE5.3-R4 Network Management & Information Security SP-1 ...
NIELIT BE5.3-R4 Network Management & Information Security SP-1.pdf. NIELIT BE5.3-R4 Network Management & Information Security SP-1.pdf. Open. Extract.

pdf-1491\information-communication-technologies-concepts ...
... loading more pages. Retrying... pdf-1491\information-communication-technologies-conce ... ologies-tools-and-applications-by-craig-van-slyke.pdf.

NIELIT C11-R4 Wireless & Mobile Communication SP-5.pdf ...
7. a) Write any three differences between CDMA and GSM. b) Explain the pros and cons of circuit switched data services on cellular networks. c) Write any three ...

NIELIT C11-R4 Wireless & Mobile Communication SP-2.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.

Fiber Optic Communication Technologies: What's ... - IEEE Xplore
tional search to online interactive maps, social networks ... more and more popular, and rapidly growing. ... Most of these network demands, although invisi-.

Fiber Optic Communication Technologies - IEEE Xplore
the deployment of broadband access networks around the world. The proliferation of access bandwidths offered by technologies such as fiber to the home (FTTH) has led to the mushroom- ing of many new web applications, from tradi- tional search to onli

Understanding how Information and Communication Technologies ...
1 See http://www.apple.com/itunes ..... located “over there” in the computer science building. Personally, I do not think of ...... as real and virtual, but considered both interactions as part of their embodied real life and their real self. ...

Chandigarh - Nielit
Jan 20, 2018 - The candidate should affix his/her recent coloured passport size photograph on the. Application Form generated online with unique reference ...

in-NIELIT-Data-Entry-Operator-Accountant-Application-form.pdf ...
Retrying... in-NIELIT-Data-Entry-Operator-Accountant-Application-form.pdf. in-NIELIT-Data-Entry-Operator-Accountant-Application-form.pdf. Open. Extract.

Agilent Technologies Democratizes Data With ... Services
As more and more health-care equipment and services buyers turn to the web for information, Agilent wanted to meet their needs online. The Agilent analytics team knew that a big part of the company's digital transformation would be expanding its anal

big-data-cloud-technologies-brief.pdf
big-data-cloud-technologies-brief.pdf. big-data-cloud-technologies-brief.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying ...

Agilent Technologies Democratizes Data With ... Services
across the company to drive on-target digital customer engagement. Agilent wanted to ... campaign management tools. .... 2017 Google Inc. All rights reserved.

CCNA Data Center- Introducing Cisco Data Center Technologies ...
Retrying... CCNA Data Center- Introducing Cisco Data Center Technologies Study Guide- Exam 640-916.pdf. CCNA Data Center- Introducing Cisco Data Center ...