15A04704 Data Communications & Networking

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Code: 15A04704 R15

B.Tech IV Year I Semester (R15) Regular & Supplementary Examinations November/December 2019
DATA COMMUNICATIONS & NETWORKING
(Electronics & Communication Engineering)
Time: 3 hours Max. Marks: 70
PART – A
(Compulsory Question)
*****
1 Answer the following: (10 X 02 = 20 Marks)
(a) What is the difference between a port address, a logical address and a physical address?
(b) Consider a noiseless channel with a bandwidth of 3000 Hz transmitting a signal with two signal
levels. What is maximum bit rate?
(c) What is meant by bit stuffing?
(d) What are the various functions performed by data link layer?
(e) What is the difference between a BSS and an ESS?
(f) Compare the data rates for standard Ethernet, fast Ethernet and gigabit Ethernet.
(g) What are the advantages of IPv6 over IPv4?
(h) Define fragmentation and explain why the IPv4 and IPv6 protocols need to fragment some packets.
(i) What are the responsibilities of transport layer?
(j) Name four factors needed for a secure network.

PART – B
(Answer all five units, 5 X 10 = 50 Marks)
UNIT – I
2 (a) Give the significance of layered architecture. List all layers of OSI model & describe its functions.
(b) What is network topology? Explain the different network topologies. State its advantages and
disadvantages.
OR
3 (a) Discuss guided media used in data communication.
(b) What are the different types of networks? Explain in detail.
UNIT – II
4 (a) Compare and contrast on circuit switching, packet switching and message switching.
(b) For a 12 bit data string of 101100010010, determine the number of Hamming bits required;
arbitrarily place the Hamming bits into the data string. Also determine the logic condition of each
Hamming bit. Assume an arbitrary single bit transmission error, and prove that the Hamming code
will successfully detect the error.
OR
5 (a) What is HDLC? Give the frame format and explain procedure for data transfer with an example.
(b) Explain the working of 3 bit sliding window protocol with suitable example.
UNIT – III
6 (a) Define random access and explain CSMA & CSMA/CD protocol in detail.
(b) Describe Bluetooth architecture technologies.
OR
7 (a) Define channelization and explain FDMA, TDMA & CDMA techniques in detail.
(b) Explain hidden node and exposed node problem in IEEE 802.11 and its prevention.

Contd. in page 2

Page 1 of 2
Code: 15A04704 R15
UNIT – IV
8 (a) Explain distance vector routing with an example. What is count to Infinity problem?
(b) What is a mask & default mask in IPv4 addressing? Briefly define subnetting and supernetting. How
do the subnet mask and supemet mask differ from a default mask in classful addressing?
OR
9 (a) Compare and contrast the fields in the main & extension headers of IPv4 and IPv6. Make a table
that shows the presence or absence of each field.
(b) Explain the working of leaky bucket and token bucket algorithms for traffic shaping.
UNIT – V
10 (a) Compare the TCP header and the UDP header. List the fields in the TCP header that are missing
from UDP header. Give the reason for their absence.
(b) Compare public key & secret key encryption process. State its advantages & disadvantages.
OR
11 (a) Explain flow and error control mechanism in TCP?
(b) What is Digital Signature? Explain the process.

*****

Page 2 of 2

You might also like