Вы находитесь на странице: 1из 4

Government Engineering College, Rajkot

Electronics & Communication Department


B. E. Semester –VII Data Communication & Networking 2171008
A S S I G N M E N T
Physical Layer
List out the Classification of networks in detail according to the area covered. Also explain
1
each type of network in detail.
2 Draw and Explain the OSI reference model. Also give its application and critiques.
What is mobile telephone system? Explain basic concept of the mobile telephone system.
3
Also explain basic structure of mobile telephone systems.
4 Draw and explain the TCP/IP model. Also explain the critiques of TCP/IP model
5 What is the Public Switched Telephone System? Also explain details of PSTN system.
What is network topology? Explain different network topologies with example and
6
compare them.
Which of the OSI layers handles each of the following :
- Determine which route through the subnet to use.
7 - Dividing the transmitted bit stream into frames.
- Encryption and compression of the information.
- Flow control between source and destination node.
8 Compare FDM, WDM and TDM.
9 Explain the guided transmission media in detail.
Imagine the length of a 10Base-5 cable is 2500 meters. If the speed of propagation in a
thick co-axial cable is 60% of the speed of light, how long does it take for a bit to travel
10
from the beginning to the end of the cable? Ignore any propagation delay in the
equipment. (Speed of light = 3 x 108 meters / sec)
Given the dataword 1010101010 and the divisor 10111,
11 1.Show the generation of codeword at the sender site (Using binary Division)
2.Show the generation of dataword at receiver site (assuming no errors)
12 Explain single bit error Detection and Correction algorithm with Example
What is the principal difference between connectionless communication and connection-
13
oriented communication?
What is ADSL Technology? Why it is necessary to use ADSL technology to provide high
14
speed data access over conventional telephone lines?
15 Explain the four levels of addresses in TCP/IP protocols.
Describe the performance measurement terms for the overall measurement of the
16
network performance.
17 Explain in detail the DSL technology.
18 Write a short note on Fast Ethernet in detail.
19 What is the difference between a subnet and WAN? Explain WAN.
20 What is virtual LAN? Explain Virtual LAN configuration and its advantages.
Define Hamming distance. State the properties for error-detecting and error-correcting
21
codes depending on its Hamming distance.
22 Given the data word “101001111” and the divisor “10111”, show the generation of cyclic
redundancy check (CRC) codeword at the sender site.
Data Link Layer (LLC)
List the Data Link Layer design issues. What is framing? List all methods used for framing
23
and explain any two methods used for framing in detail.
List the elementary Data Link Protocol used in network. And explain any two of them in
24
details.
25 Explain ATM Reference Model in detail.
26 Compare X.25 and Frame Relay.
27 Explain cyclic redundancy check in detail.
28 Explain Sliding window protocol using GO back to N.
Explain the Go-Back-N and selective repeat protocols in brief. Comment on the effects of
29
errors caused in communication due to different window sizes.
The following character encoding is used in data link protocol:
A : 01000111 ; B : 11100011 ; FLAG : 01111110 ; ESC : 11100000
Show the it sequence transmitted ( in binary ) for four character frame : A B ESC FLAG
30
when each of the following framing methods are used :
1. Flag bytes with byte stuffing.
2. Starting and ending flag bytes, with bit stuffing.
31 What is piggybacking? Explain its advantages using an example.
Explain sliding window protocol of size 1, with a 3- bit sequence at sender and receiver
32
side.
What is the major difference between error detecting and error correcting codes? Show
33
how Hamming code is used to correct burst errors.
34 Explain hidden station problem and exposed station problem in wireless LAN.

35 Explain traditional Ethernet (IEEE 802.3) frame format. Also define minimum and maximum
length frame format for it.
Draw the sender and receiver windows for system using Go-Back-N ARQ given the
following:
36
1. Frame 0 and 1 sent and acknowledged
2.Frame 2, 3, 4 and 5 sent, but Frame 4 lost during the transmission
37 Explain Selective Repeat ARQ? Justify your answer with example for m=4.
What is the significance of Switching in Communications? Compare and Contrast Circuit
38 Switching, Message Switching and Packet Switching giving example of usage of each
switching technique.
Explain in Detail with diagram, Why it is required to define the Maximum and Minimum
39
Frame size of Ethernet? What is Binary Exponential Back off and why it is used in Ethernet?
40 Explain HLDC Protocol with modes of operation, Frame structure and Frame types.
Bit-stuff the following frame payload:
41 “00011111110011111010000111111111111111100”. And discuss limitations of bit
stuffing.
Data Link Layer (MAC)
What is channel allocation issue? Also explain the static and dynamic channel allocation
42
scheme.
List the Multiple access protocols used for the wireless network and explain any two of
43
them in detail.
Write the functions of Media Access Control sub layer. And Compare pure ALOHA and
44
slotted ALOHA.
45 Why CSMA/CA is used for wireless network? Explain it.
What are the multiple access protocols used for the wireless network and Explain in
46
detail any two of them.

A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200-kbps
47 bandwidth. Find the throughput if the system (all stations together) produces 1) 1000
frames per second, 2) 500 frames per second, 3) 250 frames per second.

Network Layer
What is congestion control? Why it is required? List all policies used for the congestion
48
control. Explain any two policies used for the congestion control in detail.
What is Quality of Service? What is its significance? List the techniques available to
49
improve Quality of Service and explain any two of them in detail.
50 Compare Packet Switching and Circuit Switching.
Differentiate between the following:
51
(I) Active hub, Passive hub and Repeater. (II) Router and Gateways.
52 Explain and compare distance vector routing and link state routing algorithm.
Draw IPV4 header format and explain the each field of the header. Also explain the
53
concept of fragmentation in detail.
54 Explain Hierarchical Routing with example.
55 Explain the Bluetooth architecture and Bluetooth frame structure in brief.
56 Discuss Classless Inter Domain Routing in detail.
57 Discuss Classful network Addressing scheme.
What is congestion? Write congestion prevention policies for network and transport
58
layers.
59 Write techniques to achieve good QOS. Explain leaky bucket algorithm.
60 Explain NAT with necessary diagrams.
61 Explain the Node instability concept.
62 How leaky bucket algorithm and Token bucket algorithm works?
Differentiate Static and Dynamic Routing with examples. Explain Link State Routing
63
Algorithm in detail with required diagrams.
What is ARP and explain its functioning Network Layer? What is RARP and why it is used at
64
Network Layer? Give answers to both the questions with proper explanation and figures.
Illustrate the techniques in short which are used for achieving Good Quality of Service at
65
Network Layer.
66 Differentiate the IPv4 and IPv6 in detail
Explain addressing at network layer. How different classes are defined for addressing at
67
network layer? What do mean by subnetting and supernetting?
What do you mean by shortest path in computer networking? Explain distance vector
68
routing algorithm.
69 What is difference between congestion control and flow control?
70 Explain the Internet Control Message Protocol (ICMP)
Transport Layer
71 What are the issues available in transport layer list them all and explain each issue in short.
72 What are the elements of transport protocol? Explain them all in short.
List the various duties of the transport layer and explain each in brief. Compare UDP and
73
TCP
Explain the Transport Service Primitives. Explain using diagram, connection
74
establishment and release using these primitives.
Application Layer
What is Domain Name System? Explain Recourse records and Name server for the Domain
75
Name System
What is World Wide Web? Draw and Explain architectural overview of the World Wide
76
Web.
77 What is cryptography? Explain Symmetric Key Algorithms in detail.
What is Digital Signature? List the methods used for Digital Signature and explain them in
78
detail.
79 Answer the following questions. (I) RSA algorithm. (II) Transposition cipher.
80 Answer the following questions. (I) FTP (II) HTTP
81 Explain the e-mail architecture and services. Write short note on POP3 and SMTP.
82 Explain RSVP—The Resource reservation Protocol.
83 Explain Remote Procedure Call technique in detail.
84 Explain Substitution cipher in detail. Explain why is easy to break using proper example.
85 Discuss various social issues related to security over Internet.
86 What is Cryptography? List various Ciphers and Explain any two in Detail.
87 What is VoIP? Compare and Contrast H.323 and SIP for Voice over IP Applications.
88 Explain Wireless Security used in wireless communication protocols.
89 Discuss Public Key Management in context of Network Security
90 Write a short note on HTTP.
91 Explain the DES and Triple DES algorithms.
92 Describe the working of VPN.
93 Write a short note on IPSec.
94 Briefly explain the working of PGP.
95 Write a short note on SSL.
Explain basic model of file transfer protocol. Also explain how communication takes
96
place in FTP and transmission mode of FTP.
97 Enlist the standards of Video Compression and explain any one of them.
98 Write short note on DHCP.

Вам также может понравиться