MU Information Technology (Semester 5)
Convergence of Technologies & Networking in Communication
December 2011
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1(a) What are the difference between ASK, FSK, PSK digital modulation technology?
4 M
1(b) Why M-ary PSK schemes give a higher data rate? What are practical problems in increasing the phases beyond limit?
4 M
1(c ) Explain ISO-OSI layered architecture in brief
4 M
1(d) What is the difference between virtual circuit switching, circuit switching and packet switching?
4 M
1(e ) What is the importance of logical layers in Telecommunications Management networks (TMN)?
4 M

2(a) Explain differentially encoded phase shift keying (DEPSK) in detail.
10 M
2(b) What is meant by handoff? Explain how proper handoff takes place with some Handoff Algorithms.
10 M

3(a) Explain in detail block diagram of analogy and digital communication system.
10 M
3(b) What is basic difference between transparent bridging used in Multi-bridging in Ethernet LANs?
10 M

4(a) Explain Code Division Multiple Access Technique. How spreading and scrambling takes place also explain Direct Sequence Spread Spectrum?
10 M
4(b) Explain the merits and demerits of input buffering, output buffering and shared buffering.
10 M

5(a) Explain ISDN architecture and How call is established as well as released in ISDN? Also describe the protocol stack in ISDN.
10 M
5(b) What is difference between traffic shaping and traffic policing? How shaping can avoid policing? Explain with simple example?
10 M

6(a) What is need of network management? Differentiate between TMN functional architecture and TMN physical architecture.
10 M
6(b) Explain in detail digital signatures and certificates?
10 M

Write short notes on any four of the following:-
7(a) Kerberos
5 M
7(b) 3G UMTS Network
5 M
7(c ) Data multiplexing
5 M
7(d) Bluetooth technology
5 M
7(e ) Error Correction and Detection Methods at data link layer.
5 M
7(f) RSA Algorithm
5 M



More question papers from Convergence of Technologies & Networking in Communication
SPONSORED ADVERTISEMENTS