DATACOMMUNICATIONNETWORKS
DATACOMMUNICATIONNETWORKS
:
Name of the Candidate:
18EC510
B.E. DEGREE– NOVEMBER 2022 –EXAMINATIONS
BRANCH: ELECTRONICS AND COMMUNICATION ENGINEERING
DATA COMMUNICATION NETWORKS
Duration : 3Hours Maximum: 100 Marks
Answer All Questions
PART – A (10 x 3 =30) CO Marks
A1. List the layers of OSI Model CO1 (3)
A2. Compare Bluetooth and Zigbee with its specification CO1 (3)
A3. List the routing metrics used in router CO2 (3)
A4. List the range of different IP classes in Classfull addressing scheme CO2 (3)
A5. What are the components available in router? CO2 (3)
A6. What are the functions of ARP and RARP protocol? CO3 (3)
A7. Explain the concept of checksum with example CO3 (3)
A8. Explain the role of Delay Bandwidth product with example in Network Performance CO4 (3)
A9. Write the port number of SMTP,DNS and HTTP CO5 (3)
A10. Explain Active attacks and Passive attacks CO5 (3)
PART – B (4 x 10 =40) CO Marks
B1. Use CSMA/CA algorithm, explain how the collisions are avoided in wireless Local CO1 (10)
Area Network and draw its frame format.
(OR)
B2. Use CSMA/CD algorithm, explain how the collisions are detected and how it can be CO1 (10)
overcome in Ethernet network with its neat sketch
B3. Calculate the throughput for 2 MB of data to both 2 Gbps and 10 Mbps Bandwidth CO4 (10)
for 100ms cross country channel.
(OR)
B4. Draw the perceived latency versus round trip time for the bandwidth of 2 Mbps and CO4 (10)
12 Mbps with data size of 2 byte and 2 MB object.
B5. Use RIP, build initial, final routing table to each node for the network graph CO2 (10)
consisting of seven nodes (Assume cost to each link) and also build initial and final
Global view
(OR)
B6. Use OSPF, build Routing table for any two nodes for the network graph consist of CO2 (10)
five nodes (Assume cost to each link) along with Tentative list and Confirmed list
with comments.
B7. Consider that the S-DES encryption scheme takes an 8-bit block of plaintext 1111 CO6 (10)
1001 and key, K1 =1110 1001 and K2 =1010 0111. Find an 8-bit block of cipher
text using the following permutation tables and S-boxes:
CONTD.,
C3. Consider a corporate network with class B IP address 134.72.0.0. Create Twelve CO2 (15)
subnetworks with 1024 systems connected to each subnetwork. Assign
(i) Subnetwork address and subnet mask for each subnet.
(ii) IP address range for hosts in each subnet
(iii) Broadcast address for each subnetwork.
(OR)
C4. Consider the network topology consist of five networks, each consist of 385 CO2 (15)
host,62 host,19host, 21 host and 2host with the network address 174.99.0.0/21.
Assign IP address for all the subnetworks and the hosts using VLSM and specify
broadcast address also.
***************