Você está na página 1de 4

MCS-042@

MCA (Revised)
Term-End Examination
Juo, 2OO7
MC$-042@ : DATA COMMUNIGATION
AND COMPUTERNETWORKS
Time : 3 hours
Nofe r

l.

(a)

Maximum Marks : 100

Qu estion number 1 is com pulsory. Attempt any


three quesfionsfrom the rest.
Draw

the

pulse

101011 1001011,
techniques:
(i}

NRZ-L

(ii)

Manchester

diagram for bit stream


for the following encoding

(iii) DifferentialManchester
(b)

Explainthe differencesbetweenCircuit switchingand


Packet switching. How is virtual circuit approach
different from datagramapproach?

(c)

"slotted ALOHA achieves double efficiency than


pure ALOHA. " Justifythe statement.

MCS-042
@

P T.O.

(d)

(e)

What is the mechanismof :


(i)

Stop and Wait

(ii)

ContinuousARQ

Consider the following network with the indicated


link cost. Use Dijkstra's shortest path algorithm to
compute the shortest path from A to all other
network nodes. Show the complete calculation

C
:
1

\E

(f)

2.

TJ

Find the CRC for a 10 bit sequence1010011110


and a divisorof 1011. Also, checkyour answer.

(g)

Compare flow control and congestioncontrol.

(a)

What is MAN ? How does it differ from LANs and


WANs in terms of size, transmissionmedia and
reliability?

(b)

Explain the mechanismof light propagation in Fiber


optics. Also, describe the methods of connecting
fibers in a network.

Mcs-042
@

(c)

What is Hamming Distance ? Find minimum


hammingdistancebetweenthe code words 000111,
1 1 1000 and 1 1 1 1 1 1. Can it be used as single-bit
error correctingcode ?

3.

4.

(d)

What is piggybacking?

(a)

How is QAM different from PSK ? For a required


number of signallevels,which one will provide better
key ? Justify your answer.

(b)

What is the needof CSMA in data communication?


Explain the working o{ diff erentCSMA protocols.

(c)

How is Block-Cipherdifferent from Stream-Cipher?


Write all the steps of DES algorithm having 64-bit
block size and 56-bit key. Also, draw suitable
diagramto show all the stepsin the algorithm.

(a)

In distancevector routing, how does each router get


its initial knowledgeabout the network and how does
it use sharedinformation to update that knowledge?
Give suitableexampleto explain your answer.

(b)

Explain the working of token bucket traffic shaper.


How is it different from leaky bucket traffic shaper ?
Give at least four differences.

(c)

What are the considerationsin choosing the length


of the time-slice for TDM ? What are the
inefficiencesinherentin SynchronousTDM and how
does StatisticalTDM seek to reducethenr ?

MCS-042
0

P.T.O.

5.

Answer the following questions:


(i)

Comp are the sliding window protocol in datalink


layer with that in the transportlayer.

(ii)

What are the data packetsat each TCPnP protocol


suite layer ?

(iii) Differentiatebetweena physicaladdressand a logical


address.

(iv) Change77 to its one's complementform.

(v)

What is the major disadvantage of public key


encryption ? Also, give the major disadvantageof
secretkey encryption.

(vi) Explain the componentsof X'509 certificate.

MCS-042
@

3
5

2,000

Você também pode gostar