How To Exam?

a knowledge trading engine...


Biju Patnaik University of Technology 2008-6th Sem B.Tech (B Tech),ester computer network . - Question Paper

Thursday, 23 May 2013 01:30Web


BPUT(B Tech),6th semester computer network ques. paper.


Sixth / Eighth Semester Examination - 2008 COMPUTER NETWORKS Full Marks-70

Time: 3 Hours

Answer Question No, 1 which is compulsory and any five from the rest

The figures in the right-hand margin indicate marks.

1. Answer the following questions : 2x10

fa) Suppose the size of an uncompressed text message is 1 megabytes. How long does it take lo cfbwnload the file over a 32 kilobits/sec modem ?

(b) What is the difference between simplex and half duplex transmission mode ?

RT.O.

(c)    Explain the difference between character stuffing and bi! stuffing,

(d)    State how connection less protocol differs from connection oriented protocol.

(e)    Explain the meaning of the term protocol converter.

(t) Why does IPv6 allow fragmentation at the source onty,

(g)    Perform bit stuffing for the following sequence : 1101 1111 1101 1111 10101

IWL


(h)    Explain the difference between connectionless unacknowledged service and connectionless acknowledged service,

(i)    Define Nyquist signaling rate.

(j) How many errors rn a message can be corrected using LRC ?

2. (a) What is the function of a null modem 7 Show the internal connections used within a null modem and explain the significance of each connection. 5

(b) Explain how dock synchronization can be achieved using :

{i} Bipolar encoding

(ii) Differential Manchester encoding.

5

3.    (a) With the heip of frame sequence diagram,

explain how the following frames are handled in a Go-Back-N ARQ protocol:

(t) A corrupted I-frame and

(ii) A corrupted ACK-frame.    5

(b) Explain the principle of operation of CSMACD MAC used in LAN. 5

4.    (a) Describe Ihe structure of IP datagram

and explain the function of each field in the context of the IP protocol.    5

(b) List the message types associated with the Internet control message protocol (ICMP) and explain the various functions associated with Ihe protocol.    5

5.    (a) Sketch the header of a TCP segmenl.

Explain the function oJ each field, 5 BCSE 3306    3    P.T.O,

(b) Use Dijkslra algorithm to find the set of shortest path from node 4 to other nodes.

5

6. (a) Computer the CRC-4 character for the following message using a "divisor'1 constant of 10011.    5

(b) The original three network types were iin/i LAN, MAN and WAN. Describe how they I MM L differs from olne another.    5

1, (a) What is the drawback of'PSK versus FSK modulation.    5

(b). How does frame relay differs from ATM.

5

8. Write short notes on any two :    5x2

(a)    Guided media

(b)    Bluetooth

(c)    Cryptography.

*







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Biju Patnaik University of Technology 2008-6th Sem B.Tech (B Tech),ester computer network . - Question Paper