0% found this document useful (0 votes)
86 views2 pages

Nirma University: N'itn, I"if " (X,: If',n"

The document is a past exam paper for a data communications and networking course. It contains 6 questions assessing various topics: 1. Networking concepts like layers, protocols, and features. 2. Data link protocols like sliding window protocols. 3. Network types like computer vs distributed networks. 4. Network standards, frame structure, and communication parameters. 5. Network concepts like classification, cabling, and throughput. 6. Cryptography concepts like encryption, algorithms, and key establishment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views2 pages

Nirma University: N'itn, I"if " (X,: If',n"

The document is a past exam paper for a data communications and networking course. It contains 6 questions assessing various topics: 1. Networking concepts like layers, protocols, and features. 2. Data link protocols like sliding window protocols. 3. Network types like computer vs distributed networks. 4. Network standards, frame structure, and communication parameters. 5. Network concepts like classification, cabling, and throughput. 6. Cryptography concepts like encryption, algorithms, and key establishment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Nirma University

Institute of Technologr
Semester End Examination (IR), December _ 2OIg
B. Tech. in Electronics and communication Engineering, semester-vll
ECTO 1 Data Communication and Networking
Roll/Exam No. Supervisor's initial
with date:
Time: 3 Hours Max. Marks: 10O
Instructions: 1. Attempt all questions.
2. Figures to right indicate full marks.
3. Use section-wise separate answer book.
4. Draw neat sketches wherever necessary.
SECTION.I
Q- Ua) A group of students have created a network for their personal use. The network t 1OI
co3'BL3 n'itn;,i"if;"[x,:*if',n"
network can individuauy communicate to each
other and can also work in broadcast mode of communication.
The network supports reliable end to end data delivery with proper
sequencing, error and flow control.

: ;l".TIJ',#Tf;H:[l :",H: ;:,TJ.t* very we'l

o The network can't access the internet and does not support the
protocols for linding the Ip address using the MAC addrLss and
vice versa.
Security features in the network are missing
Investigate the features listed above and answer the following questions for the
said network.
1. What are the software layers the network is not equipped with? Support
your argument with proper reasoning.
2. What are the other features the network might not support?
(b) Prepare the flow chart for the Sliding Window Selective Repeat protocol for
CO1,BL3 Receiver. tOsI
OR
(b) Prepare the algorithm for the sliding window Go Back to N protocol for
CO1,BL3 Transmitter. [O5l
(c) The network in any organtzation is a computer network, while the famous
co2,BL2 search engine is a distributed network. Jusrify. tOSl
Q-2 Two devices want to communicate with each other using IEEE 8O2.1S.I t16l
CO4,BL4 standard. The data link layer of the network is modified and allowed only one
standard slot time for the communication to either a master or a slave. After
one time slot, the direction of communication reverses, means the transmitter
becomes receiver and vice versa. Each communicator used 50 frames of the
said size for completing the communication. Find out the followings for the
said network.
1. Amount of data transmitted in a singre direction.
2. Amount of time required to complete the errtire communication.
3. Size of sequence number field for frame numbering.
4. Number of slots require in a single frame if the frame size is not restricted
to single standard slot time.
Page I of2
EC7O1 Data Communication and Networking

Q-3(a) With an appropriate example, state the disadvantages of byte stuffing used at t06l
CO2,BL2 Data Link Layer.
(b)Discuss the factors those make the CSMA/CD unfit for the wireless IOSI
CO 1,8L2 communication. Suggest the effective medium access technique that solves the
problem associated with CSMA/CD when used in wireless communication.
OR
(b) Discuss the problems associated with the static channel allocation methods, IOSI
CO2,BL2 which make them unfit for use in computer networks.
SECTION - II
Q-4(a) Classify the computer networks for Shape, Size, Transmission Technologr, [06l
CO2,BL2 Transmission Medium, connection type and connection technolory
(bl Twisted pair cable is more preferred in Telephone Networks. Justify. to6l
CO2,BL2
(c) The concept of pipelining may be useful to increase the throughput of the to6l
co2,BL2 system. Justify
Q-s(a) Calculate the shortest path from A to D using Dijkstra's shortest path IOSI
CO4,BL3 algorithm for the network shown in Figure 1.

E8F
Figure 1.
(bt Token bucket algorithm helps in traffic shaping. Justify the statement. losI
CO4,BL2
OR
(b) An organization is granted the block 130.56.0. O I 16. The administrator wants [O8]
CO4,BL4 to create lO24 subnets.
i. Find the subnet mask.
ii. Find the number of addresses in each subnet.
iii. Find the first and last addresses in subnet 1.
iv. Find the first and last addresses in subnet IO24.
Q-6 {a) Decode the following message using transposition theorem, if the key is: tO8l
CO4,BL3 SIMPLE
Message : HTYTXL_FUAMTS_FE*LBORLS_ER_*AE_ONA
(b) Discuss the concept of symmetric key algorithms for cryptography. IoSl
CO4,BL2
OR
(bt In asymmetric key cryptography, how do you think two persons can establish tOSl
CO4,BL2 two pairs of keys between themselves?

Page 2 of2

You might also like