GTU Electronics and Communication Engineering (Semester 8)
Data Communication And Networking
May 2016
Data Communication And Networking
May 2016
1 (a) (i)
Explain how TCP/IP and OSI Reference Model are different with each other.
4 M
1 (a) (ii)
Explain various network topologies with their advantages and disadvantages.
3 M
1 (b)
Imagine the length of a 10Base-5 cable is 2500 meters. If the speed of propagation in a thick co-axial cable is 60% of the speed of light, how long does it take for a bit to travel from the beginning to the end of the cable? Ignore any propagation delay in the equipment. (Speed of light = 3×108 meters/sec).
7 M
2 (a)
Give the Classification of network in detail according to the area covered. Also explain each classification of network in detail.
7 M
Solve any one question from Q2(b) & Q2(c)
2 (b) (i)
What does 'negotiation' mean when discussing networking protocols? Give an example.
3 M
2 (b) (ii)
Give the main difference between TCP and UDP.
4 M
2 (c)
Give comparison among circuit switching, packet switching and message switching.
7 M
Solve any two question from Q3(a), Q3(b) & Q3(c), Q3(d)
3 (a)
The following character encoding is used in data link protocol:
A:01000111; B:11100011; FLAG:01111110; ESC:11100000;
Show the it sequence transmitted ( in binary ) for four character frame : A B ESC FLAG when each of the following framing methods are used:
1. Flag bytes with byte stuffing.
2. Starting and ending flag bytes, with bit stuffing.
A:01000111; B:11100011; FLAG:01111110; ESC:11100000;
Show the it sequence transmitted ( in binary ) for four character frame : A B ESC FLAG when each of the following framing methods are used:
1. Flag bytes with byte stuffing.
2. Starting and ending flag bytes, with bit stuffing.
7 M
3 (b)
What is piggybacking? Explain its advantage using an example.
7 M
3 (c)
Explain sliding window protocol of size 1, with a 3- bit sequence at sender and receiver side.
7 M
3 (d)
What is the major difference between error detecting and error correcting codes? Show how Hamming code is used to correct burst errors.
7 M
Solve any two question from Q4(a), Q4(b) & Q4(c), Q4(d)
4 (a)
Explain the channel allocation problem and its solution in detail.
7 M
4 (b)
Write short note on Bluetooth.
7 M
4 (c)
Explain hidden station problem and exposed station problem in wireless LAN.
7 M
4 (d)
Write short note on Fast Ethernet.
7 M
Solve any two question from Q5(a), Q5(b) & Q5(c), Q5(d)
5 (a)
What is congestion? Write congestion prevention policies for network and transport layers.
7 M
5 (b)
Write techniques to achieve good QOS. Explain leaky bucket algorithm.
7 M
5 (c)
Write short note on DNS.
7 M
5 (d)
Discuss the social issues connected with network security.
7 M
More question papers from Data Communication And Networking