GTU Electronics and Communication Engineering (Semester 8)
Data Communication And Networking
May 2016
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) (i) Explain how TCP/IP and OSI Reference Model are different with each other.
4 M
1 (a) (ii) Explain various network topologies with their advantages and disadvantages.
3 M
1 (b) Imagine the length of a 10Base-5 cable is 2500 meters. If the speed of propagation in a thick co-axial cable is 60% of the speed of light, how long does it take for a bit to travel from the beginning to the end of the cable? Ignore any propagation delay in the equipment. (Speed of light = 3×108 meters/sec).
7 M

2 (a) Give the Classification of network in detail according to the area covered. Also explain each classification of network in detail.
7 M
Solve any one question from Q2(b) & Q2(c)
2 (b) (i) What does 'negotiation' mean when discussing networking protocols? Give an example.
3 M
2 (b) (ii) Give the main difference between TCP and UDP.
4 M
2 (c) Give comparison among circuit switching, packet switching and message switching.
7 M

Solve any two question from Q3(a), Q3(b) & Q3(c), Q3(d)
3 (a) The following character encoding is used in data link protocol:
A:01000111; B:11100011; FLAG:01111110; ESC:11100000;
Show the it sequence transmitted ( in binary ) for four character frame : A B ESC FLAG when each of the following framing methods are used:
1. Flag bytes with byte stuffing.
2. Starting and ending flag bytes, with bit stuffing.
7 M
3 (b) What is piggybacking? Explain its advantage using an example.
7 M
3 (c) Explain sliding window protocol of size 1, with a 3- bit sequence at sender and receiver side.
7 M
3 (d) What is the major difference between error detecting and error correcting codes? Show how Hamming code is used to correct burst errors.
7 M

Solve any two question from Q4(a), Q4(b) & Q4(c), Q4(d)
4 (a) Explain the channel allocation problem and its solution in detail.
7 M
4 (b) Write short note on Bluetooth.
7 M
4 (c) Explain hidden station problem and exposed station problem in wireless LAN.
7 M
4 (d) Write short note on Fast Ethernet.
7 M

Solve any two question from Q5(a), Q5(b) & Q5(c), Q5(d)
5 (a) What is congestion? Write congestion prevention policies for network and transport layers.
7 M
5 (b) Write techniques to achieve good QOS. Explain leaky bucket algorithm.
7 M
5 (c) Write short note on DNS.
7 M
5 (d) Discuss the social issues connected with network security.
7 M



More question papers from Data Communication And Networking
SPONSORED ADVERTISEMENTS