0% found this document useful (0 votes)
414 views3 pages

CS 302 Question Paper

This document contains a past exam paper for the sixth semester B.Tech CS/IT degree. The exam tests knowledge of data communication and networks. It is divided into three sections covering topics such as layered architectures, encoding techniques, protocols, routing, and security. Students must answer 5 questions total, with no more than two from each section. Questions involve tasks like explaining processes, performing calculations, discussing concepts, and justifying statements.

Uploaded by

Nandita Hans
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
414 views3 pages

CS 302 Question Paper

This document contains a past exam paper for the sixth semester B.Tech CS/IT degree. The exam tests knowledge of data communication and networks. It is divided into three sections covering topics such as layered architectures, encoding techniques, protocols, routing, and security. Students must answer 5 questions total, with no more than two from each section. Questions involve tasks like explaining processes, performing calculations, discussing concepts, and justifying statements.

Uploaded by

Nandita Hans
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

B.Tech. (VI Sem.

) CS 302

B.Tech. CS/IT (SIXTH SEMESTER) EXAMINATION, JUNE 2020


PAPER CS 302 Data Communication and Networks
Maximum Marks – 60
Attempt FIVE questions in all, selecting not more than TWO questions
from each section. All questions carry equal marks.

SECTION A
1. (a) Consider a scenario of “Online Educational Classes”. Explain the process of data
communication between sender and multiple receivers step by step using the concept of layered
architecture in detail. (8)

(b) A digitized TV picture is to be transmitted from a source that uses a resolution of 1020*2046
picture elements (pixels), where each pixel can take on one of 64 intensity values. Assume that
100 pictures are sent per second. Find the source rate R (bps) and pixels per second. (4)

2. (a) Given the bit pattern 11001100, encode this data using ASK, BFSK, and BPSK. Also
encode derived analog signal using AM, FM, and PM methods. (6)

(b) Explain the concept of groups in frequency division multiplexing. Suppose 3 users want to
transmit data of sizes 10 MB, 20 MB and 5 MB simultaneously with same data rate. Use
statistical and synchronous time division multiplexing methods to transfer data, and describe
which method gives better performance and why? (6)

3. (a) For the bit stream 111101101, describe and sketch the waveforms for each of the following
coding schemes: (6)
(i) NRZ-L (ii) NRZ-I (iii) Bipolar-AMI
(iv) Manchester (v) Differential Manchester (vi) HDB3

(b) Analog and digital data were communicated by wired medium previously but nowadays
communication is performed by wireless medium, still in some cases wired medium is better
than wireless medium. Justify the statement. (3)

(c) What is the channel capacity for a channel with a 2200 Hz bandwidth and a signal-to-noise
ratio of 6dB? (3)
SECTION B
4. (a) Discuss different addressing mechanisms and data formation on each layer of TCP/IP
protocol suite. What is the idea and benefit behind different addressing mechanism and data
formation methods on each layer? (4)

(b) Consider the message M = 1111001101. Calculate the cyclic redundancy check (CRC) for
this message using the divisor polynomial x5 + x4 + x2 + 1. Also calculate error code if the 6th
bit is flipped in received data. Note: consider most significante bit (MSB) as first bit. (4)

(c) Suppose a receiver receives a 7-bit Hamming codeword as 1011111. Assuming the even
parity, check whether the received codeword is correct or wrong? If wrong, locate the bit in
error. (4)

5. (a) Is it appropriate to use stop-and-wait flow control method in LAN? What about WAN? Give
proper justification of your answer. (3)

10
(b) A link has a transmission speed of 10 bits/sec. It uses data packets of size 2000 bytes each.
The efficiency of the stop-and-wait protocol in this setup is exactly 30%. Determine the value of
the one-way propagation delay in milliseconds. Asume that the acknowledgement has negligible
transmission delay, and its propagation delay is the same as the data propagation delay. Also
assume that the processing delays at nodes are negligible. (5)

(c) For window size = 3, if every 5th packet that is being transmitted is lost during transmission
and if we have to send 12 packets, then how many transmissions are required in Go-Back-N and
selective repeat protocols? (4)

6. (a) In CSMA/CD, what is the condition for collision detection in worst case? Let X and Y are
the only two stations in an Ethernet. Each of them has a queue of frames to send. Suppose, both
X and Y attempt to transmit a frame, collide, and X wins the first backoff race. At the end of
this successful transmission by X, both X and Y attempt to transmit and collide. What will be
the probability of X to win the second backoff race? (6)

(b) Use Dijkstra’s algorithm to find the shortest path tree and the forwarding table for node A in
the following figure: (6)
SECTION C
7. (a) Do routers have IP addresses? If so, how many? In the IPv4 addressing, how many networks
are allowed and how many hosts can be configured corresponding to each network under class
B addresses? Justify your answer. (6)
(b) A datagram of 4000 bytes (20 bytes of header and 3980 bytes IP payload) reached at a router
and must be forwarded to a link with Maximum Transfer Unit (MTU) of 600 bytes. How many
fragments will be generated and what will be the values of M flag bits, offset, and total length
field corresponding to each fragment? (6)
8. (a) Suppose Sheena, with a web-based e-mail account (such as Hotmail or Gmail), sends a
message to Reena, who accesses her mail from her mail server using POP3. Discuss how the
message gets from Sheena’s host to Reena’s host. Make sure to list all of the application-layer
protocols that are used to move the message between the two hosts. (6)
(b) An Internet Service Provider (ISP) has the CIDR-based IP addresses available with it:
216.233.155.0/20. The ISP wants to give half of this of addresses to Organization A, and a
quarter to Organization B, while retaining the remaining with itself. Find the valid allocation of
addresses to A and B? (6)
9. (a) In RSA, given p = 11, q = 13, and e = 11, find n, Φ(n), and d. Further, find the ciphertext
corresponding to plaintext 7 using RSA encryption algorithm. (6)
(b) Justify your answer in the following cases: (6)
i. HTTP, FTP, and SMTP provides connection-oriented communication rather than
connectionless.
ii. Suppose you want to do a transaction from a remote client to a server as fast as possible.
Would you use UDP or TCP?
iii. What information is used by a process running on one host to identify a process running
on another host?

You might also like