Please log in to continue.
Please log in to continue.
Please log in to continue.
GTU Electronics and Communication Engineering (Semester 8)
Data Communication And Networking
May 2016
Data Communication And Networking
May 2016
1 (a) (i)
Explain how TCP/IP and OSI Reference Model are different with each other.
4 M
1 (a) (ii)
Explain various network topologies with their advantages and disadvantages.
3 M
1 (b)
Imagine the length of a 10Base-5 cable is 2500 meters. If the speed of propagation in a thick co-axial cable is 60% of the speed of light, how long does it take for a bit to travel from the beginning to the end of the cable? Ignore any propagation delay in the equipment. (Speed of light = 3×108 meters/sec).
7 M
2 (a)
Give the Classification of network in detail according to the area covered. Also explain each classification of network in detail.
7 M
Solve any one question from Q2(b) & Q2(c)
2 (b) (i)
What does 'negotiation' mean when discussing networking protocols? Give an example.
3 M
2 (b) (ii)
Give the main difference between TCP and UDP.
4 M
2 (c)
Give comparison among circuit switching, packet switching and message switching.
7 M
Solve any two question from Q3(a), Q3(b) & Q3(c), Q3(d)
3 (a)
The following character encoding is used in data link protocol:
A:01000111; B:11100011; FLAG:01111110; ESC:11100000;
Show the it sequence transmitted ( in binary ) for four character frame : A B ESC FLAG when each of the following framing methods are used:
1. Flag bytes with byte stuffing.
2. Starting and ending flag bytes, with bit stuffing.
A:01000111; B:11100011; FLAG:01111110; ESC:11100000;
Show the it sequence transmitted ( in binary ) for four character frame : A B ESC FLAG when each of the following framing methods are used:
1. Flag bytes with byte stuffing.
2. Starting and ending flag bytes, with bit stuffing.
7 M
3 (b)
What is piggybacking? Explain its advantage using an example.
7 M
3 (c)
Explain sliding window protocol of size 1, with a 3- bit sequence at sender and receiver side.
7 M
3 (d)
What is the major difference between error detecting and error correcting codes? Show how Hamming code is used to correct burst errors.
7 M
Solve any two question from Q4(a), Q4(b) & Q4(c), Q4(d)
4 (a)
Explain the channel allocation problem and its solution in detail.
7 M
4 (b)
Write short note on Bluetooth.
7 M
4 (c)
Explain hidden station problem and exposed station problem in wireless LAN.
7 M
4 (d)
Write short note on Fast Ethernet.
7 M
Solve any two question from Q5(a), Q5(b) & Q5(c), Q5(d)
5 (a)
What is congestion? Write congestion prevention policies for network and transport layers.
7 M
5 (b)
Write techniques to achieve good QOS. Explain leaky bucket algorithm.
7 M
5 (c)
Write short note on DNS.
7 M
5 (d)
Discuss the social issues connected with network security.
7 M
More question papers from Data Communication And Networking
STUPIDSID