Download PTU (I.K. Gujral Punjab Technical University Jalandhar (IKGPTU) ) BE/BTech CSE/IT (Computer Science And Engineering/ Information Technology) 2020 March 5th Sem BTCS 501 Computer Networks Ii Previous Question Paper
Roll No. Total No. of Pages : 02
Total No. of Questions : 18
B.Tech.(CSE/IT) (2012 to 2017) (Sem.?5)
COMPUTER NETWORKS-II
Subject Code : BTCS-501
M.Code : 70534
Time : 3 Hrs. Max. Marks : 60
INSTRUCTION TO CANDIDATES :
1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks
each.
2. SECTION-B contains FIVE questions carrying FIVE marks each and students
has to attempt any FOUR questions.
3. SECTION-C contains THREE questions carrying TEN marks each and students
has to attempt any TWO questions.
SECTION-A
Write briefly :
1. Explain basic principles of network security.
2. What is MAC address?
3. What is use of classes in IPv4?
4. What is use of frequency modulation?
5. Explain port address.
6. What is frequency reuse?
7. Explain Local multipoint Distribution System.
8. What is PAN?
9. Explain payload.
10. What is system capacity?
FirstRanker.com - FirstRanker's Choice
1 | M-70534 (S2)-712
Roll No. Total No. of Pages : 02
Total No. of Questions : 18
B.Tech.(CSE/IT) (2012 to 2017) (Sem.?5)
COMPUTER NETWORKS-II
Subject Code : BTCS-501
M.Code : 70534
Time : 3 Hrs. Max. Marks : 60
INSTRUCTION TO CANDIDATES :
1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks
each.
2. SECTION-B contains FIVE questions carrying FIVE marks each and students
has to attempt any FOUR questions.
3. SECTION-C contains THREE questions carrying TEN marks each and students
has to attempt any TWO questions.
SECTION-A
Write briefly :
1. Explain basic principles of network security.
2. What is MAC address?
3. What is use of classes in IPv4?
4. What is use of frequency modulation?
5. Explain port address.
6. What is frequency reuse?
7. Explain Local multipoint Distribution System.
8. What is PAN?
9. Explain payload.
10. What is system capacity?
2 | M-70534 (S2)-712
SECTION-B
11. Differentiate between ?Authentication Header? and ?Encapsulation Security Payload?.
12. Differentiate between TDMA and CDMA.
13. Explain various channel assignment strategies.
14. What are the application areas of Adhoc networks?
15. Explain internet key exchange system.
SECTION-C
16. What are the different routing protocols used in Ad hoc networks?
17. Explain IKE encoding in detail.
18. Explain the working of wireless local loop.
NOTE : Disclosure of Identity by writing Mobile No. or Making of passing request on any
page of Answer Sheet will lead to UMC against the Student.
FirstRanker.com - FirstRanker's Choice
This post was last modified on 21 March 2020