You are on page 1of 1

DATA COMMUNICATION AND COMPUTER NETWORKING

MCA2
1) What is the need of modulation? What are the different conversion techniques to analog signal to
digital data?
2) What is the difference between a port address, logical address and a physical address?
3) Apply CRC algorithm, determine the checksum and the transmitted frame for the bit stream
1101011011 and for the generator polynomial X3 + X2 + 1.
4) a) What is switching? Compare the different types of switching technique. b) What is the
difference between IPV4 and IPV6? c) What is the difference between TCP and UDP?
5) a) What do you understand by data security? Explain the various aspects of security with the help
of public and private key.
6) Explain baseband transmission and broadband transmission.
7) Explain DQDB in detail.
8) Television channels are 8 MHz wide. How many bits/sec can be sent if eight-level digital signals
are used ? Assume signal-to-noise ratio channel as 30 dB. Explain the Frame format of 802.5
LAN.
9) Write short notes on a) Flooding b) PCM c) X.21 d) UDP e) Frame relay f) Safe IP g) Public key
and Private key h) Circuit switched and packet switched networks i) X.25 j) 802.3 LAN.
10) a) What do you mean by congestion control? Explain the concept of token bucket in controlling
congestion. b) Using Manchester and differential Manchester line encoding techniques encode the
following binary strings : i) 11010100010 ii) 01011011011
11) Differentiate between Circuit Switching and Packet switching.
12) What is HDLC ? Explain NRM and ABM.
13) What are classfull and classless addressing? What is subnet musk ? Show each of default subnet
mask of classfull addressing.
14) What is SNR ? How can you identify the noiseful and noiseless channels using SNR ? What is
Nyquist Bit rate of noiseless channel ?
15) Compare and contrast link-state and distance vector routing.
16) What procedure is used to prevent a stream of binary data being misinterpreted as an HDLC flag ?
Explain the operation of this procedure.
17) What is subnet musk? Show each of default subnet mask of classfull addressing.Compare the
devices repeater, router, bridge and gateway.
18) Explain Leaky Bucket Algorithm.
19) How can you compare Pure ALOHA with Slotted ALOHA.
20) Explain RSA and BSC.
21) Compare TCP/IP and ISOOSI.
22) Explain the function of a token ring ? Explain how a receiver acknowledged a frame in token ring?
23) What are bit rate and baud rate ? Establish the relationship between these two. Describe
transmission modes.

You might also like