Tuesday, December 14, 2010

Networking Technologies I 2001


Gujarat University

MCA Semester IV
Networking Technologies I

Date : 13 Feb, 2001                                                                                                                           Marks:50

Instructions:
1.      Make figures when ever necessary.
2.      Figures to the right indicate full marks.
3.      Symbols carry their usual meaning.

Section I


Q-1      Write short notes on any THREE of the following:                                                                           [9]

a)      Email
b)      QoS with reference to Transport Layer
c)      Three way Handshake
d)     Load shedding

Q-2      Explain OSI reference model in detail.                                                                                              [8]

OR

Q-2      Elaborate upon Congestion Control Algorithms.                                                                               [8]


Q-3 a) Explain Selective Repeat sliding Window Protocol.                                                                           [4]
       b) Differentiate between Connectionless and Connection Oriented Services.                                       [4]

Section II


Q-4      Attempt any THREE                                                                                                                          [9]
a)      Write a short note on Cellular Technology
b)      Compare Novell Netware against TCP/IP.
c)      Differentiate between CSMA and MACAW
d)     Differentiate between virtual and datagram circuits

Q-5      Discuss various Transmission Media used for Networking.                                                               [8]

OR

Q-5      Comment in IEEE 802.3 standard specify the following:                                                                 [8]
·         Cabling
·         Encoding8
·         Frame Format
·         Back off Algorithm

Q-6 a) Discuss how Internetworking and networking considerations differ from each other.                      [4]
       b) Explain Cryptography in detail.                                                                                                          [4]