15A04704 Data Communications & Networking
15A04704 Data Communications & Networking
PART – B
(Answer all five units, 5 X 10 = 50 Marks)
UNIT – I
2 (a) What are different types of transmission modes? Draw and describe process of data communication
in various modes.
(b) Explain the OSI model for networking in brief. How does it differ from TCP/IP model?
OR
3 (a) Explain TCP/IP protocol suite in detail.
(b) Write short notes on unguided media.
UNIT – II
4 (a) Briefly explain the cyclic redundancy check error detection scheme. Prove the validity of the
scheme.
(b) Explain Point to Point protocol in detail.
OR
5 (a) Explain in detail about Selective Repeat and Go back –N sliding window protocols.
(b) A block of 32 bits has to be transmitted. Discuss how the thirty two bit block is transmitted to the
receiver using Longitudinal Redundancy Check. Consider a 32 bit block of data 11100111 11011101
00111001 10101001 that has to be transmitted. If Longitudinal Redundancy Check is used what is
the transmitted bit stream? What kinds of errors can Vertical Redundancy check determine? What
kinds of errors it cannot determine.
Contd. in page 2
Page 1 of 2
Code: 15A04704 R15
UNIT – III
6 (a) Explain access method for Standard Ethernet. Give its MAC frame format and discuss each field.
(b) Explain pure-ALOHA and slotted- ALOHA systems. Give the expression for throughout for each,
clearly explaining the various terms.
OR
7 (a) Define controlled access and explain the three control access protocols.
(b) Give the architecture of IEEE 802.11 and explain its MAC layers.
UNIT – IV
8 (a) Explain Link state routing algorithm with an example and compare with distance vector routing
algorithm.
(b) List three transition strategies to move from IPv4 to IPv6. Explain the difference between tunneling
and dual stack strategies during the transition period. When is each strategy used?
OR
9 (a) What is Internetworking? Discuss about Tunneling and fragmentation concepts.
(b) What is congestion? Differentiate between closed loop and open loop congestion policies.
UNIT – V
10 (a) Give UDP Segment structure and explain function of each field. Explain how UDP works.
(b) Compare symmetric key and asymmetric key cryptography. Explain in details about RSA
crptosystem.
OR
11 (a) Explain connection establishment and connection release in transport layer.
(b) How are secret keys in symmetric-key cryptography and public keys in asymmetric-key
cryptography are distributed and maintained? Explain.
*****
Page 2 of 2