Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

B.TECH.

(ECE)/SEM-6/EC-602

COMPUTER COMMUNICATION & NETWORKING(EC602)


Model paper
Year -2010
SEMESTER 6th

Time : 3 hours Full Marks: 70

The figures in the margin indicate full marks.


Candidates are required to give their answers in their own words as far as practicable.

Group A
Answer any ten of the following questions: [10 1=10]

1. Vulnerable time for pure aloha protocol is.


a) Twice of average frame transmission time
b) Twice of propagation time
c) Twice of back off time.

2. Advantage of layering includes


a)Multi vender integration
b)Data hiding and encapsulation.
c) Easy testing
d) All the above

3. Physical characteristics of medium is defined by the


a) Data link layer
b) Physical layer
c) Session layer

4. Switching in the network layer in the internet uses


a) Datagram approach to packet switching
b) Virtual circuit switching
c) Circuit switching

5. Cat 5 cable supports data rate up to


a) 20Mbps in digital and analog mode
b) 100Mbps in digital mode
c) 100 Mbps in digital and analog mode

6. In an environment with many high voltage devices, the best transmission medium
would be-
a) Twisted pair cable
b) Co-axial cable
c) Optical fiber.

7. In sonet Synchronous transport module (STM-1) raw data rate


a) 51.84 Mbps
b) 155.52Mbps
c) 49.536 Mbps

8. In CRC given polynomial is x7+ x5+ x2+x+1, the divisor is


a) 10100111
b) 01011000
c) 11100011

9. High level data link control (HDLC)is an actual protocol designed to support both
a)Half duplex and full duplex communication over point to point link.
b) Full duplex communication over point to point link.
c) None of the above.

10. For stop and wait ARQ , n data packets sent, ACK are needed
a) n
b) 2n
c) n-1
11. If an Ethernet destination address is 08-07-06-05-44-33 then this is a
a) Unicast address
b) Multicast address
c) Broadcast address
12. Blue tooth is a
a) IEEE 802.15 LAN standard
b) Mobile phone compatible device
c) Software

Group B
Answer any three of the following questions: [3 5=15]

1. What do you mean by the term redundancy? How CRC is generated from
sender side? How does a single bit error differs from a burst error .1+2+2=5

2. Why flow control is necessary in data communication? Why start bit and
stop bit are used in serial asynchronous communication? 3+2=5

3. What is the basic difference between bridge and Hub? Why hub is called
multi-port repeater 3+2=5
4. Given data unit is 1100111-1011001- 1100101-0101101, how 2 dimensional
parity is generated from the given data unit. Why data compression is required
when the real time data moves from one network to another network. 3+2=5

5. What is the difference between physical address and logical address? Explain
with example. 5

Group C

Answer any three of the following questions: [3 15=45]

1. a) Write down the different multiple access method used in data communication.
b) What is CSMA/CD? Describe CSMA/CD with flow chart? Prove that
Vulnerable time for slotted aloha protocol is average frame transmission
time. 2+8+5=15

2. What are the major drawbacks of X.25 protocol? What are the advantages of
ATM based network. Describe IEEE 802.5 token ring Lan architecture. 3+4+8=15

3. Why window size is 2m-1 in case of sliding window protocol? Describe Stop and
wait ARQ lost frame operation. How piggy backing saves the bandwidth 5+6+4=15

4. What is MAC? Describe IEEE 802.3 MAC frame architecture. How does 100base
Tx differ from 100 base Fx Ethernet. 2+8+5=15
5. What are the major advantages of layering model? Describe TCP/IP model of
networking, give at least one example for each layer .
5+10=15
6. Write a short note (any three)
[3 5=15]
a) V.90 modem
b) GSM network
c) B-ISDN
d) Packet switching.
e) Transmission media.

You might also like