Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

A) Prepare and Test straight-over and Cross-over UTP cable

1 B) Draw and describe RJ-45 Connector pin out diagram.


C) When to use straight-through cables? When to use Cross-over cables? Why?
A. Write and perform C program for LRC and VRC error detection each.
B. Differentiate between LRC and VRC
C. Suppose, following 32 bit data plus LRC that was received. Find out whether the data is corrupted in
2 between transmission.

A. Write down steps to Configure Wireless Access point Using wireless Router using IP address of Router..
3 B. Draw general architecture of Ad-hoc and infrastructure BSS
C. When a Mobile Station moves from BSS to another BSS, explain the process of Handshaking.

A. Connect at least three computers in peer-to-peer mode and Share a Printer in the Network and
access the shared printer from the all the nodes.
4 B. Draw star and Tree Topology structure
C. How firewall can be used to maintain security of resources that are shared in network?

A. Write steps to setup Static and dynamic IP address for a computer using DHCP
B. Draw and describe working of DHCP protocol
5 C. Subnet the Class C IP Address 205.11.2.0 so that you have 30 subnets. What is the subnet mask for
the maximum number of hosts?
A. Run and display output for following commands with proper syntax : Ping, ipconfig, tracert, Netstat,
ARP.
B. What does following commands do:
a. Ping -t 192.168.43.1
6 b. Ipconfig/release
c. Tracert -w 60
d. Netstat -s
e. Arp -a
C. Give the use and syntax of Hostname and Nslookup utility.
A. Write down brief information about Wireshark software. Write steps to Capture TCP, UDP, HTTP, FTP
packets.
7 B. Draw and describe packet switched network.
C. Explain what winPcap software does. Is it necessary to install for wireshark? Why?

A. Prepare and test rollover UTP cable and straight-through UTP cable.
B. Draw color coded sequences of rollover, crossover and straight through connections.
8 C. Calculate number of wires required for a mesh network of 9 nodes connected to a switch which acts
as root for binary tree topology of 3 layers.
A. Connect two computer in Local Area Network and assign the following static IP address, subnet
mask, and default gateway to one of the computer.
a. IP Address 192.168.31.202
b. Subnet mask 255.255.255.0
9 c. Default gateway 192.168.31.1
B. Draw and describe working of DNS protocol
C. Consider-We have a big single network having IP Address 200.1.2.0. We want to do subnetting and divide
this network into 4 subnets. What is address of each of these 4 subnets?

A. Write down brief information about Cisco packet tracer. How to examine the contents of the IP header to
see NAT protocol at work using it?

10 B. Draw and describe working of NAT protocol.


C. Run and display output for following commands with proper syntax : Ping, tracert, Nslookup,
pathping . What are each of these commands are used for?

A. Prepare and perform a C/C++ program for CRC error detection


B. Draw and describe CRC code generation.
11 C. A bit stream 10011101 is transmitted using the standard CRC method. The generator polynomial is
x3+1. What is the actual bit string transmitted?

A. Write in brief about Common Open Research Emulator (CORE) network simulator software. Explain
its use.
12 B. Differentiate between IPv4 and IPv6
C. Draw IPv6 packet format.

A. Write down steps to Connect at least 3 Bluetooth enabled devices to each other and share data
amongst them.
13 B. What is Bluetooth tethering? Share internet connection with another device using Bluetooth.
C. Draw and describe piconet and scatternet.

You might also like