0% found this document useful (0 votes)
101 views2 pages

15A04704 Data Communications & Networking

This document contains a supplementary exam for a Data Communications and Networking course. It includes two parts - Part A contains 10 short answer questions worth 2 marks each on topics like encoding techniques, channel capacity, framing, error correction, addressing, Bluetooth, and public/private keys. Part B contains 5 long answer questions worth 10 marks each across 5 units on transmission modes, OSI vs TCP/IP models, error detection, windowing protocols, Ethernet, congestion control, routing, IPv4 to IPv6 transition strategies, transport layer protocols, and cryptography. Students are required to answer all questions in the allotted 3 hours.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views2 pages

15A04704 Data Communications & Networking

This document contains a supplementary exam for a Data Communications and Networking course. It includes two parts - Part A contains 10 short answer questions worth 2 marks each on topics like encoding techniques, channel capacity, framing, error correction, addressing, Bluetooth, and public/private keys. Part B contains 5 long answer questions worth 10 marks each across 5 units on transmission modes, OSI vs TCP/IP models, error detection, windowing protocols, Ethernet, congestion control, routing, IPv4 to IPv6 transition strategies, transport layer protocols, and cryptography. Students are required to answer all questions in the allotted 3 hours.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Code: 15A04704 R15

B.Tech IV Year I Semester (R15) Supplementary Examinations October 2020


DATA COMMUNICATIONS & NETWORKING
(Electronics & Communication Engineering)
Time: 3 hours Max. Marks: 70
PART – A
(Compulsory Question)
*****
1 Answer the following: (10 X 02 = 20 Marks)
(a) Create a diagram of the NRZ, NRZI and Manchester encodings for the bit pattern 11010011.
(b) What is Shannon capacity for noisy channel?
(c) Define framing and the reason for its need
(d) Distinguish between forward error correction versus error correction by retransmission
(e) What is the difference between a unicast, multicast, and broadcast address?
(f) Compare a Piconet and a Scatternet.
(g) What is classless addressing?
(h) What are the responsibilities of network layer?
(i) What is the maximum and minimum size of the TCP header?
(j) How is a secret key different from public key?

PART – B
(Answer all five units, 5 X 10 = 50 Marks)
UNIT – I
2 (a) What are different types of transmission modes? Draw and describe process of data communication
in various modes.
(b) Explain the OSI model for networking in brief. How does it differ from TCP/IP model?
OR
3 (a) Explain TCP/IP protocol suite in detail.
(b) Write short notes on unguided media.
UNIT – II
4 (a) Briefly explain the cyclic redundancy check error detection scheme. Prove the validity of the
scheme.
(b) Explain Point to Point protocol in detail.
OR
5 (a) Explain in detail about Selective Repeat and Go back –N sliding window protocols.
(b) A block of 32 bits has to be transmitted. Discuss how the thirty two bit block is transmitted to the
receiver using Longitudinal Redundancy Check. Consider a 32 bit block of data 11100111 11011101
00111001 10101001 that has to be transmitted. If Longitudinal Redundancy Check is used what is
the transmitted bit stream? What kinds of errors can Vertical Redundancy check determine? What
kinds of errors it cannot determine.
Contd. in page 2

Page 1 of 2
Code: 15A04704 R15

UNIT – III
6 (a) Explain access method for Standard Ethernet. Give its MAC frame format and discuss each field.
(b) Explain pure-ALOHA and slotted- ALOHA systems. Give the expression for throughout for each,
clearly explaining the various terms.
OR
7 (a) Define controlled access and explain the three control access protocols.
(b) Give the architecture of IEEE 802.11 and explain its MAC layers.
UNIT – IV
8 (a) Explain Link state routing algorithm with an example and compare with distance vector routing
algorithm.
(b) List three transition strategies to move from IPv4 to IPv6. Explain the difference between tunneling
and dual stack strategies during the transition period. When is each strategy used?
OR
9 (a) What is Internetworking? Discuss about Tunneling and fragmentation concepts.
(b) What is congestion? Differentiate between closed loop and open loop congestion policies.
UNIT – V
10 (a) Give UDP Segment structure and explain function of each field. Explain how UDP works.
(b) Compare symmetric key and asymmetric key cryptography. Explain in details about RSA
crptosystem.
OR
11 (a) Explain connection establishment and connection release in transport layer.
(b) How are secret keys in symmetric-key cryptography and public keys in asymmetric-key
cryptography are distributed and maintained? Explain.

*****

Page 2 of 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy