Академический Документы
Профессиональный Документы
Культура Документы
1.a) Explain the terms traffic load and service grade generally used with respect to
telephone system.
b) What is a subscriber loop? What are the limitations of stronger switching system.
2.a) Explain briefly the five basic functions supported by email system
b) Explain briefly about simple mail transfer protocol.
3.a) Distinguish between JPEG and MPEG standards and explain how synchronism is
achieved between audio and video streams in MPEG1
b) Give a connection less datagram model of internet and briefly explain strategy
adopted.
6.a) It is clear that bit stuffing is needed for user data fields in LAPD frames, since we
wish to accommodate arbitrary user data. Is it needed for the other feildds?
Specify.
b) Explain how hamming code is used to correct burst errors.
7.a) What is a virtual circuit and datagram. Compare datagram and virtual circuits
subnets.
b) Explain briefly about the services provided to the transport layer.
^^^
Set No
Code No.: 421202
IV- B.Tech. II-Semester Examinations April 2003
TELEMATICS
2
(Computer Science and Information Technology)
3.a) Explain the importance of decibels? With a block diagram briefly explain about
the operation of JPEG in a lossy sequential mode.
b) What is tunneling technique? Explain briefly about Internetwork routing of five
networks connected by six multi protocol routers.
6.a) With a block diagram explain conceptually the working of integrated services
digital network (ISDN).
b) What is a frame? Explain in detail about the framming methods used in data link
layer.
7.a) On what basis you group the messages. Explain different applications where these
messages are employed.
b) With a block diagram explain the architecture and modelling of basic and
supplementary services.
2.a) What is the importance of email gateways? Explain the operation of PGP for
sending message of plain text.
b) Explain briefly about simple mail Transfer protocol.
4.a) What are the two common goals of ATM switches? Explain the queuing principle
of ATM switch.
b) Distinguish between virtual circuits and circuit switching.
6.a) Suggest improvements to the bit stuffing algorithm to overcome the problem of a
single bit error.
b) Explain briefly with example how CRC code is used for computing check sum.
7.a) Explain briefly the functions of Network layer for call control procedures.
b) What are the three major methods by which supplementary services may be
controlled in the network layer.
1. a) What is a switching matrix? How does the rectangular matrices used to provide
concentration and expansion.
b) Briefly explain the functioning of central exchange system.
2. a) What is the importance of email gateways. Explain how application layer is used
for transferring email messages.
b) Explain the operation of PGP for sending messages of plain text.
3. a) Briefly explain the multiplexing phenomina of MPEG-2 for audio and video
streams.
b) Explain the means of differences that make internet working more difficult.
5. a) With a block diagram explain the user network interface of Broad Band ISDN.
b) Explain the functions of control protocol and briefly indicate the Global view of
protocol Architecture.
7. a) How many types of terminals are supported by ISDN? What are they? Briefly
explain.
b) Explain the different message formats generally used in ISDN Network layer.
c) Briefly explain about Bearer capability information element parameter.
^^^