Professional Documents
Culture Documents
Computer Communication & Networking (Ec602) : Group A
Computer Communication & Networking (Ec602) : Group A
(ECE)/SEM-6/EC-602
Group A
Answer any ten of the following questions: [10 1=10]
6. In an environment with many high voltage devices, the best transmission medium
would be-
a) Twisted pair cable
b) Co-axial cable
c) Optical fiber.
9. High level data link control (HDLC)is an actual protocol designed to support both
a)Half duplex and full duplex communication over point to point link.
b) Full duplex communication over point to point link.
c) None of the above.
10. For stop and wait ARQ , n data packets sent, ACK are needed
a) n
b) 2n
c) n-1
11. If an Ethernet destination address is 08-07-06-05-44-33 then this is a
a) Unicast address
b) Multicast address
c) Broadcast address
12. Blue tooth is a
a) IEEE 802.15 LAN standard
b) Mobile phone compatible device
c) Software
Group B
Answer any three of the following questions: [3 5=15]
1. What do you mean by the term redundancy? How CRC is generated from
sender side? How does a single bit error differs from a burst error .1+2+2=5
2. Why flow control is necessary in data communication? Why start bit and
stop bit are used in serial asynchronous communication? 3+2=5
3. What is the basic difference between bridge and Hub? Why hub is called
multi-port repeater 3+2=5
4. Given data unit is 1100111-1011001- 1100101-0101101, how 2 dimensional
parity is generated from the given data unit. Why data compression is required
when the real time data moves from one network to another network. 3+2=5
5. What is the difference between physical address and logical address? Explain
with example. 5
Group C
1. a) Write down the different multiple access method used in data communication.
b) What is CSMA/CD? Describe CSMA/CD with flow chart? Prove that
Vulnerable time for slotted aloha protocol is average frame transmission
time. 2+8+5=15
2. What are the major drawbacks of X.25 protocol? What are the advantages of
ATM based network. Describe IEEE 802.5 token ring Lan architecture. 3+4+8=15
3. Why window size is 2m-1 in case of sliding window protocol? Describe Stop and
wait ARQ lost frame operation. How piggy backing saves the bandwidth 5+6+4=15
4. What is MAC? Describe IEEE 802.3 MAC frame architecture. How does 100base
Tx differ from 100 base Fx Ethernet. 2+8+5=15
5. What are the major advantages of layering model? Describe TCP/IP model of
networking, give at least one example for each layer .
5+10=15
6. Write a short note (any three)
[3 5=15]
a) V.90 modem
b) GSM network
c) B-ISDN
d) Packet switching.
e) Transmission media.