ptupaper.com
Roll No……..
Total No. of Questions: 08
M. Tech.
(ECE) (Sem.-1st)
DATA
COMMUNICATION NETWORK
Subject
Code: EC-503
Paper
ID: [E0563]
Time: 3 Hrs. Max.
Marks: 100
Instruction to Candidates:
1. Attempt
any FIVE questions out of EIGHT questions.
2. Each question
carry TWENTY marks.
Q1.
(a) What
is Data Communication? What are the possible ways of Data transmission and
explain with examples? Draw a block diagram of Data Communication system and
explain its components.
(b) What
are the various characteristics that define the effectiveness of a data
communication system? Explain.
(10)
Q2.
(a) Differentiate
between Synchronous and Asynchronous data transmission with the help of
suitable examples.
(10)
(b) What
are the various strategies for dealing with the errors in a network? Explain
each with the help of suitable example.
(10)
Q3.
(a) The
following character encoding is used in a data link protocol:
A:01000111;
B:11100011; FLAG; 01111110; ESC: 11100000
Show the bit sequence transmitted (in binary)
for the four-character frame: A B ESC FLAG when each of the following framing
methods are used:
(i)
Character count
(ii)
Flag bytes with byte stuffing
(iii)
Starting and ending flag bytes, with bit
stuffing
(12)
(b) A
bit string, 0111101111101111110, needs to be transmitted at the data link
layer. What is the string actually
transmitted after bit stuffing?
(4)
(c) Data link protocols almost always put the CRC
in a trailer rather than in a header. Why?
(4)
Q4.
(a)What
do you mean by Multiplexing? What is its use? Explain the different types of
Multiplexing along with their advantages and disadvantages.
(10)
(b)
Differentiate between datagram and virtual circuit approaches for
packet-switching.
(10)
Q5.
(a) What are
the various types of LAN access control methodologies?
(12)
(b) With
the help of necessary flow chart explain the working of CSMA/CD.
(8)
Q6.
(a) Differentiate
between IPv4 and IPv6.
(10)
(b)
Compare and Contrast OSI and TCP/IP models.
(10)
Q7.
(a) What are
the differences between message confidentiality and message integrity? Can you
have one without the other? Justify your answer?
(5)
(b) What
is the difference between an active and a passive intruder?
(4)
(c) What
is the difference between a symmetric key system and a public key system?
(5)
(d) What
is a key distribution center? What is a certificate authority?
(3)
(e) What
is the main-in-the-middle attack? Can this attack occur when a symmetric keys
are used?
(3)
Q8.
(a) Which
file system is used in the following operating systems:
(i)
Windows NT.
(ii)
Linux
(iii)
Unix
(3)
(b) What
is the size of ATM cell? Explain in detail the ATM header for the user-subnet
interface and for the internal subnet.
(7)
(c) Some
organizations use firewalls to isolate groups of users internally. Give example
of ways that internal firewalls can improve network performance and example of
ways internal firewalls can degrade network performance.
(10)
0 comments:
Post a Comment
North India Campus