FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA MCA 2018 July Reg-Supply 3rd Sem 9F00302 Computer Network Question Paper

Download JNTU Anantapur (JNTU Anantapur) Master of Computer Applications (MCA) 2018 June-July Regular Supply 3rd Sem 9F00302 Computer Network Previous Question Paper

This post was last modified on 28 July 2020

JNTUA MCA 3rd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)


FirstRanker.com
Firstranker's choice
FirstRanker.com

--- Content provided by​ FirstRanker.com ---

Code: 9F00301

MCA II Semester Supplementary Examinations May 2018

COMPUTER NETWORKS

(For 2011(LC), 2012, 2013, 2014, 2015 & 2016 admitted batches only)

Time: 3 hours Max. Marks: 60

--- Content provided by⁠ FirstRanker.com ---

Answer any FIVE questions

All questions carry equal marks

  1. a) Bring out a comparison between OSI and TCP/IP reference models.
    b) Explain briefly: (i) Twisted pair copper wire (ii) Coaxial cable (iii) Fiber optics.
  2. a) Explain with an example how error detection and correction is done in the data link layer.

    --- Content provided by FirstRanker.com ---

    b) With a neat diagram, explain the concept of sliding window protocol.
  3. a) Illustrate the assumptions made during dynamic channel allocation. Explain each one of them.
    b) Write a note on Persistent and Non persistent CSMA.
  4. a) For the network given in figure below, give the forwarding table for each node. The links are labeled with relative costs; Your tables should forward each packet via the lowest cost path to its destination using distance vector routing algorithm.
    b) Discuss the congestion prevention techniques as choke packets and load shedding.
  5. --- Content provided by‌ FirstRanker.com ---

  6. a) With a neat diagram, explain the concepts of tunneling a packet.
    b) Explain briefly the Internet Multicasting. Discuss the PIM (Protocol Independent Multicast) and its types.
  7. (a) Discuss two phase locking protocol and strict two-phase locking protocol.
    (b) Discuss about conflict serializability with an example.
  8. a) Using the RSA public key cryptosystem, If p = 11 and q = 13, find the value of e and d. Also perform the encryption for message M=>5 and find the Cipher text.

    --- Content provided by⁠ FirstRanker.com ---

    b) Encrypt the message “JawaharlalNehruTechnologicalUniversity ” using transposition technique with key “315246”
  9. a) What are Domain name systems? With a neat diagram explain Internet domain name space.
    b) List the importance of MIME protocol. Discuss the five message header of MIME.

FirstRanker.com


--- Content provided by⁠ FirstRanker.com ---


This download link is referred from the post: JNTUA MCA 3rd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)