0% found this document useful (0 votes)
103 views3 pages

Nlrma Unlverslrv: Institute of Technologr

This document is an exam for a data communications and networks course. It contains 6 questions testing students' knowledge of topics like: 1) The differences between broadband and baseband signals, frequency hopping and direct sequence spread spectrum, and properties of multiplexing. 2) Concepts in reliable data transmission like selective repeat ARQ, CRC, error detection, and random access protocols. 3) Details of IPv4 and IPv6 addressing, fragmentation, and Ethernet frame formats. 4) Network routing algorithms like Dijkstra's and subnetting IP addresses. 5) Transport layer protocols like TCP and UDP, and connection establishment and release. 6) The roles of DNS, repeaters

Uploaded by

Kella
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views3 pages

Nlrma Unlverslrv: Institute of Technologr

This document is an exam for a data communications and networks course. It contains 6 questions testing students' knowledge of topics like: 1) The differences between broadband and baseband signals, frequency hopping and direct sequence spread spectrum, and properties of multiplexing. 2) Concepts in reliable data transmission like selective repeat ARQ, CRC, error detection, and random access protocols. 3) Details of IPv4 and IPv6 addressing, fragmentation, and Ethernet frame formats. 4) Network routing algorithms like Dijkstra's and subnetting IP addresses. 5) Transport layer protocols like TCP and UDP, and connection establishment and release. 6) The roles of DNS, repeaters

Uploaded by

Kella
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Nlrma unlverslrv

Institute of Technologr
Semester End Examination (IR/RPR),December 2017
B.Tech in Information Technology,SemesterV
IT5O1DATACOMMUNICATION NETWORKS

Roll/ Supervisor's initial


Exam No with date

Time: 3 Hours Max Marks: 100

Instructions:
i) Attempt all questions,
ii) Figures to the right indicate full marks.
iii) Draw neat sketches wherever necessary.
iv) Assurne suitable data.,vherever necessarl/ and specify them.

Q-1. Answer the following. [2O]


A Distinguish between broadband signal aid baseband signal. The signal to [06]
noise ratio (SNR) is often given in decibels. Assume that SNRaeis 36 and
bandwidth for noisy channel is 3 MHz then what will be the theoretical
channel capacity?
B Compare and contrast Frequency Hopping Spread Spectrum (FHSS) arld 106]
Direct Sequence Spread Spectrum (DSSS) techniques? Show how
Irequency selected using k bit patterns in Frequency Hopping Spread
Spectrum (FHSS).
C A multiplexer combines four 1O0-kbps channels using a time slot of 2 [04]
b i t s .S h o \ t h e o u t p u t \ i t h f o u r a r b i t r a D i n p u r s .
{i) What is the frame rate?
{ii} What is the frame duration?
(iii)What is the bit rate?
{iv)What is the bit duration?
D List out functionalities of physical layer. \Mhy it is required to eliminate [04]
DC component in transmission of signal in medium?
OR
D Discuss the multimode step index and multimode graded index concept [04]
in optical fiber with suitable diagram?

Q-2. Answer the following. [181


A In selective repeat ARQ why window size is seiected as half compared to lO8]
Go-back-N ARQ. Justify your answer. lf 'k'is maximum size of sender
window in Go-back-N ARQ then how many sequence bits will be used?
B A data stream X6+X5+X3+X2+1 is transmitted using standard CRC 106l
method. The generator pol)nomial is X3+X+1. Show actual bit stream
transmitted through unreliable channel. Suppose 4fr bit from right is
inverted in 'original data stream' during unreliable transmission then
show how error will be detected at receiver end.
PageI of3
Nctuorks
1T501DataCommunication
OR
of
B why random access prorocols are required? Show how efficiency [06]
sioited aloha is double than efficiency of pure aloha
by a [04]
C tn COltl,t protocol prove that a receivingstation can get the.data sent
by the
sfe"ific sender if it multiplies the entire data on thc channel
s^ender'schip code and then divides it by the number of stations' (Assume
suitable data if required )

Q-3. Answer the following. [181


A Dilferentiate between IPv4 and lPv6. In lPv4, if sender wants to send total [10]
data of 8OOOBytes including minimum header size over a network having
maximum transferable unit (MTU) of size 2000 bytes including minimum
header size then find out followings:
i. Number of fragments
ii. Show ldentification bits (lF), More Fragmentation bits(MF) and Do not
Fragment bits (DF) for each fragment using table
iii. Fragsrentationoffset ald ralge of each fragment
B Draw 802.3 MAC Ethernet frame format indicating size of each field Why [08]
only CSMA/CD protocol is preferred for LAN application or Ethernet?
Justify your answer.

Q-4. Answer the following. 1221


A Use Djkstra's algorithm to find shortest path to all nodes in the graph l08l
'A'in a figure given below ald also show the trace to
using source node as
'A'.
destination node 'C' from source node

B A company has one of the following address as 199.110.63.74/26. If [08]


company uses classless addressing and want to divide a1l addresses into
four departments then answer the followings:
(i) How many of IP addresses are possible for company?
{ii) Show the range of each sub-block when it divides into four
departments each of 64 hosts
(iii) IP Address of 4th host of 3rd department
(iv) IP Address of 7ft host of 2nddepartment
Draw IPv4 Protocol format indicating size of each filed. Why TTL and [06]
Header Checksum fields are used in IPv4 protocol?
Page2 of3
1T501DataComnwication Networks
OR
C A compary has one of Class C's IP address as 199 168 123 49 and uses 106]
255.2i5.255.224 as subnet mask including subnet 0 calculate the
lollowings:
(i) SubnetId's of 4tl subnetand6frsubnet
(ii) sth host ol 3'd subnet
iiii) Broadcasting addressesof Othsubnet and 7e subnet

Q-5. Answer the following. [14]


A Demonstrate three way handshaking protocol used for connection [08]
establishmenr and release
connection al transportlayer'
B Give three differences between Transmission Control Protocol (TCP) and [06]
User Datagram Protocol (UDP).Also demonstrate the concept of half close
in TCP only with diagrarn.

Q-6. Atrswer tbe followiag. [O8l


A Discuss the significanceof folloo'ingterrns useC in cosrpute. net\t'orks: [08]
(i) Domain Name System (DNSi
(ii) Repeater,Hub, Switch and Router

OR
A Identify the protocol used in Email application. ExempLify a-rchitecture of [08]
Email system with suitable diagram.

Page3 of3

You might also like