0% found this document useful (0 votes)
12 views22 pages

Digital Communication

The document outlines the examination structure for a B.Tech. degree in Electronics and Communication Engineering, focusing on Digital Communication. It includes multiple parts with questions on topics such as modulation techniques, synchronization, cryptography, and error performance. The exam consists of both short answer questions and detailed explanations, covering various units of the curriculum.

Uploaded by

anbarasi03012004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views22 pages

Digital Communication

The document outlines the examination structure for a B.Tech. degree in Electronics and Communication Engineering, focusing on Digital Communication. It includes multiple parts with questions on topics such as modulation techniques, synchronization, cryptography, and error performance. The exam consists of both short answer questions and detailed explanations, covering various units of the curriculum.

Uploaded by

anbarasi03012004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

5626173

B.Tech. DEGREE EXAMINATION, MAY 2018

Sixth Semester

Electronics and Communication Engineering

DIGITAL COMMUNICATION

(2009 2012 Batchesand 2013 - 14 Batches onwards)


Time: Three hours Maximum:75 marks

PART A(10 x 2= 20 marks)


Answer ALL questions.
Allquestions carry equal marks.
1. Give the waveform representation of POM
sequence 101110010110.

2. What is inter symbol interference?


3. Differentiate coherent and non coherent detection.
4. Write the expression for symbol error performance
for equally likely, coherently detected M-ary PSK
signaling.
5. What are the randomness properties that make a
eudorandom signal truly random?
6. What are Hybrid systems?
7. What are the steps involved in the synchronizing
process of a locally generated spreading with the
received spread spectrum signal?
8. Give the classification of tracking loops.
9. What are the major requirement of a Crypto
System?

10. What are the properties of cryptographic hash


function?

PART B(5 x 11= 55 marks)

Answer ALLquestions ONE from each unit.

11. (a) i) What is matched filter? Derive the


expression for the impulse response of
the filler. (7)
(ii) The term matched-filter is often used
synonymously with correlator, How is
that possible when their mathematical
operations are different? (4)

Or

(b) ) Most often, providing more Eb/No will


not mitigate the degradation due to
inter symbol interference (ISI). Explain
why this is the case. (5)

2 5626173
(1) Find the minimum required bandwidth
for the baseb and transmission of a four
level PAM pulse sequence having a
data rate of R = 2400 bits/s if the
system transfer characteristic consists
of a raised- cosine spectrum with 100%
excess bandwidth (r = 1). (6)
12. (a) Distinguish between coherent an non
coherent demodulations. List different
modulation schemes under the two headings.
(11)
Or
(b) In case of orthogonal signaling such as
MFSK, why does error-performance improve
with higher dimensional signaling? (11)

13. (a) With neat diagram, explain the DS SS in


detail. Derive the expressioni for processing
gain of the system. (11)

Or

(b) What are RAKE receivers? Explain the


construction and operation of this receiver
with necessary diagrams. (11)
14. (a) What are suppressed carrier loops? Analyze
their performance in detail. What is the
potential drawback of such loops? How is it
Over come? (11)

Or

3 5626173
(b) What are the advantages of open loop
transmitter synchronization? Explain the
procesS of open-loop transmitter
synchronization in detail. B.T
(11)

15. (a) What is stream encryption? How does it


work? What are the vulnerabilities involved?
Ele
Explain in detail. (11)

Or
(b) Consider the following for the RSA scheme. (2009
If the prime numbers are p= 7 and q = 11,
list five allowable values for the decryption Time: T
key, d.
If the prime numbers are p = 13, q = 31, and
decryption key is d= 37, find the encryption
key, e, and describe how you would use it to
encrypt the word "DIGITAL" (11)
1. G
Se

2 W

3. D

4 W
.
fo
Si

5. W
ps
4 5626173
5626173
B.Tech. DEGREE EXAMINATION, MAY 20
Sixth Semester

Electronies and Conmmunication Engineering


DIGITAL, COMMUNICATION
(AIl 3Regulations)
"Time :Three hours Maximum:75 marks
PART A -(10 x 2= 20 marks)
Answer ALL questions.
All questions carry equal marks
1. List the disadvantagesof PCM.
2. What is Eye pattern?
3. What is the significance of BER Vs. SNR plot in
digital modulation scheme?
4. What is meant by AWGN channel?
5. What is meant
r by a PN sequence? Why it is
called s0?

6. Calculate the processing gain of FHSS system if


the total hopping band width is 2 MHz and
instantaneous band with is 40 KHz.
loop
7. List two differences between open and closed
transmitter synchronisation.

important in CDMA
8. Why power control is very
systems?

9. What is meant by Ciphertext?

10. Compare encryption and decription.

PART B -(5 x ||= 55 marks)

Answer ALL questions, ONE from each


Unit.

Allquestions carry equal marks.


UNIT I

distortion
11. (a) Derive the Nyquist criterion for
less Baseb and Binary Transmission. (6)

(b) Explain the effects of Inter symbol


Interference. (5)

Or

from
12. (a) What is amatched filter? How it differs
optimal filter? (5)

(b) Derive the expression for impulse response


of the matched filter. (6)
2 5626173
UNIT II

13. (a) Explain the Generation and Coherent


demodulation of Binary ASK with block
Diagrams. (5)

(b) Derive the expression of BER for FSK. (6)


Or

14. (a) Explain the Generation and detection of


Binary PSK witha block diagram. (5)

(b) Briefly explain the principle of Differential


PSK with the help of diagram (both
modulation and demodulation). (6)

UNIT III

15. (a) Explain the working of Frequency hopped


spread Spectrum with the help of block
diagram. (6)

(b) Compare and contrast fast


frequency
hopping and slow frequency hopping. (5)
Or

16. (a) Explain the operation of the RAKE receiver


with a schematic diagram. (6)

(6) Explain the working of CDMA system with a


block diagram. (5)
3 5626173
UNIT IV

17. (a) Compare and contract a coherent and non


coherent systen. (5) B.

(b) Explain the importance of receiver

synchronization spread spectrum


system. (6)
Or

18. (a) Explain how the symbol and frame


synchronization is achieved. (6)

(b) Explain the mechanism of tracking and Time


acquisition in spread spectrum system with
the help of diagram. (5)
UNIT V
19. (a) Explain the key management in encrypted
security system with the merits. (5)
1
(b) Explain the unity principle of
Diffie-Hellman key exchange with the 2.
demerits. (6) 3.
Or

20. Explainthe following: 4.

(a) Public key encryption system. (5) 5.

(b) RSA algorithm. (6)


6.

4 5626173
5626173

B.Tech. DEGREE EXAMINATION, SEPTEMBER 09

Sixth Semester

Electronics and Communication Engineering


DIGITAL COMMUNICATION

(2013-14 Regulation)
Time: Three hours Maximum: 75 marks

PARTA (10 x 2 = 20marks)


Answer ALL questions.

All questions carry equal marks.


1. What are eye pattern? How is eye pattern obtained
on the CRO?

2. What is matched filter? List the applications of


matched filter.

3. What is the advantage of coherent PSK over


coherent ASK?

4. List out the difference between coherent and non


coherent detection.

5. What are RAKE Receivers?


6. What are Hvbrid systems?
synchronization?
7. What is Receiver
synchronization?
8. What do you mean by network
9. What is cryptography?
techniques.
10. List out the classic encryption
PARTB-(5 x 11 =55marks)
from each Unit.
Answer ALL the questions, ONE
All questions carry equal marks.
UNIT I
expressions and
11. Explain a DPCM system with the
block diagram.
Or

12. Discuss about

Multilevel base land transmission (5)


(a)
Correlation receiver. (6)
(b)
UNIT II

13. Briefly discuss about the principle of DQPSK


system.
Or

14. Briefly discuss about the Non-coherent detection of


PSK.

2 5626173
UNIT III

15. Discuss the Fréquency-Hop Spread Spectrum


technique in detail:
Or

16. Explain PN sequences and Direct sequence spread


spectrum.

UNIT IV

17. Explain Frame synchronization in detail.


Or

18. Explain tracking and acquisition in spread


spectrum system.

UNIT V

19. Explain Diffie-Hellman key exchange in detail.


Or

20. Explain the RSA algorithm.

3 5626173
5626173
B.Tech. DEGREE EXAMINATION,
SEPTEMBER 2021.

Sixth Semester

Electronics and Communication Engineering


DIGITAL COMMUNICATION
Time: Three hours Maximum: 75 marks
PART A-(10 x 2 = 20 marks)

Answer ALLquestions.
All questions carry equal marks.
1 What is the use of eye pattern and draw the eye
pattern for binary antipodal signaling?
2. Differentiate base band transmission from pass
band transmission.

3. List the tw types of error


ror performance
degradation.
4. Give the probability of error for PSK (coherent)
and orthogonal FSK (coherent) modulation.
5. Define spread spectrum.
6. A PN sequence is generated using a feedback shift
register of length m= 4. The chip rate is 10 chips
per second. Find the PN sequence length.

7. Draw the block diagram of three types of open loop


bit synchronizers.

8. What do you mean by network synchronization?

9. Give an example for plain text and cipher text.


communications?
10. Why do we use crypto systems in

PART B (5 x 11 = 55 marks)

Answer ALL questions.

ONE question from each unit.

UNIT I

likelihood receiver structure


11. Explain maximum
co-error function.
and also calculate the

Or

probability
Explain the matched
filter and error
12.
signaling in detail.
performance of binary
5626173
2
UNIT II

13. Explain in detail the digital band pass modulation


techniques in ASK, FSK and PSK.

Or

14. Explain in detail the coherent detection of PSK.

UNIT III

l5. Explain frequency hop spread spectrum in detail


and list the uses of spread spectrum with CDMA.

Or

16. Explain spread spectrum and direct sequence


spread coherent binary phase shift keying in
detail.

UNIT IV

17. Explain Frame Synchronization in detail.

Or

18. Explain tracking and acquisition in spread


spr
spectrum system.

3 5626173
UNIT V

19. Explain RSA algorithm in detail.


Or

20. Explain stream encryption and public key


encryption system.

Time

1.

3.

4.

5.

4 5626173
5626173

BTech. DEGREE EXAMINATION, JULY 2023.


Sixth Semester

Electronics and Communication Engineering


DIGITAL COMMUNICATION

(2013-2014 Regulation)
Time: Three hours Maximum: 75 marks

PART A -(10 x 2= 20 marks)


Answer ALLquestions.
1. How does Granular noise OCCur in Delta
Modulation?

2. Compare the DPCM with Delta Modulation.


3. Difference between coherent and non coherent
binary modulation scheme.
4. Write the relation between the signal frequencies
and bit rate in MSK.

5. How do youdefine the processing Gain?


6. Mention the advantages of spread spectrum
techniques.
*7. Why does need of tracking in spread spectrum
-
system?

8. Elaborate the concept of frame synchronization in


spread spectrum system.
9. List out the four principles of cyber security.
10. How does private key cryptography work?
PART B-(5 x 11= 55 marks)
Answer ALL questions.

UNIT I

11. Explain about the PCM transmitter and receiver


with neat diagram. (11)

Or

12. Discuss about the Adaptive Delta Modulation


technique with diagram. (11)
UNIT II

13. Explain about the QAM modulation and


demodulation with neat diagram. (11)
Or

14. Derive the error performance of Non = Coherent


PSK and FSK system. (11)

2 5626173
!
UNIT III

'15. Explain in detail about Direct Sequence Spread


Spectrum Techniques with necessary diagrams.
(11)
Or

16. Discuss in detail about the operation of RAKE


receiver with neat diagram. (11)
UNIT IV

17. Discuss about the Network synchronization and


frame synchronization. (11)
Or

18. Explain in detail the following :

(a) Closed loop transmitter synchronization (6)


(b) Tracking and acquisition in Spread Spectrum
(5)
UNIT V

19. Discuss in detail about the key Management


system with neat diagram. (11)
Or

20. Explain in detail about the RSA algorithm with


neat diagram. (11)

3 5626173
5626173

B.Tech. DEGREE EXAMINATION, MAY 2024

Sixth Semester

Electronics and Communicat:ion Engineering


DIGITAL COMMUNICATION

(2013- 2014 Regulations)


Time:Three hours Maximum:75 marks

PART A (10 x 2= 20 marks)


Answer ALL questions.
1. Recall the companding equation for 4 -law
compander.
2. Define Inter Symbol Interference and interpret it
with a diagram.
3. Comment on the relationship between bit-error
probability (P) versus E/NO.
4. Recall the merits of M-ary signaling.
5. State any four applications of the spread
spectrum.
6. How to prevent the jamming of the signal using
the spread spectrum?
7. Mention the three levels of synchronization
needed for a coherent bandpass signaling system.
8. Define symbol and frame synchronizatio
9. Use playfair cipher to encrypt the message, "The
key is hidden under the door pad" with the secret
key "Search".
10. Compare monoalphabetic cipher with a
polyalphabetic cipher.
PART B -(5 X 11 =55 marks)
Answer ALL the questions, ONE from each Unit.

UNIT I
11. (a) Derive an expression for the transfer function
of the matched filter. (6)
(b) Construct a DPCM system. Derive the
expression for slope overload noise of the
system. (5)
Or
12. Describe the delta modulation system in detail
with aneat block diagram. Also, illustrate two
forms of quantization error in delta modulation.
(11)
UNIT II
13. (a) Draw and explain the Quadrature Receive
structure for coherent QPSK. Derive signal
space signal constellation. (5)
(b) Derive an expression for the probability of
error for the QPSK modulation scheme.
Comment on the power spectrum of the QPSK
signal. (6)
Or

2 5626173
14. (a) Compare the performance of binary
modulation and M-ary schemes used in digital
et communication systems. (5)
(b) Analyzing the transmitter, receiver and signal
space diagram of Quadrature Amplitude
Modulation, Outline the power spectral
density and bandwidth of the QAM signal
with neat diagramns and mention its
advantages. (6)
UNIT III

15. Explain the operation of Direct Sequence Spread


Spectrum (DSSS) with neat sketches. (11)
Or

16. Discuss the performance of a RAKE receiver with


a neat diagram. (11)
UNIT IV

17. (a) How data aided synchronization achieved


through continuous phase modulation? (5)
(b) How can squaring loop be used as a carrier
synchronizer? Outline the problems 1n

implementing this method. (6)


Or
18. (a) Discuss tracking and acquisition in a spread
spectrum system. (6)
(b) Describe network synchronization. (5)
3 5626173
UNIT V

19. (a) User A and Buse the Diffie-Hellman Key


exchange technique with a common prime
number q = 11 and a primitive root a = 5.
Find the following : (7)
() IfUser A has a private key X, =2, what
is A's publickey Y,?
(ii) If User B has private key X =3, What
is B'spublic key YB?
(iüi) Shared secret key.
(b) Compare conventional encryption with public
key encryption. (4)

Or

20. (a) With a neat sketch, describe elliptic curve


cryptography with an example. (7)
(b) Encrypt the message P =(9, 8), choose the
random value k =3, and determine the cipher
text Cm. (4)

4 5626173

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy