You are on page 1of 1

DATA COMMUNICATION & COMPUTER NETWORK

MCA2
1) What is the need of modulation? What are the different conversion techniques to
analog signal to digital data?
2) What is SNR? How can you identify the noiseful and noiseless channels using
SNR ? What is Nyquist Bit rate of noiseless channel?
3) Apply CRC algorithm, determine the checksum and the transmitted frame for the bit
stream 1101011011 and for the generator polynomial X 3 + X 2 + 1.
4) What is switching? Compare the different types of switching technique.
5) Explain baseband transmission and broadband transmission.
6) Define Multiplexing. Explain Time-Division Multiplexing with proper diagram.
7) Explain DQDB in detail.
8) Write short notes on a) Flooding b) PCM c) X.21 d) UDP e) Frame relay f) Safe IP
g) Public key and Private key h) Circuit switched and packet switched networks i)
802.3 LAN j) X.25 protocol. k) DQDB l) Piggybacking m) GEO satellite n) Domain
Name System.
9) a) Write the priority scheme of Token Bus LAN. b) Write the differences between
Token Bus and Token Ring Network. c) Explain how Token Ring works.
10)
a) What are bit rate and baud rate? Establish the relationship between these
two. b) Describe transmission modes.
11) Explain digital signature for authentication with diagram. Differentiate between
connection oriented and connectionless services implemented by the network layer.
12)
What are classfull and classless addressing ? What is subnet musk ? Show
each of default subnet mask of classfull addressing.Compare the devices repeater,
router, bridge and gateway.
13)
What is the difference between TCP and UDP ?
14)
Write the differences between a) TDM and FDM b) MAC-Addressing and
IP-Addressing.
15)
Differentiate between Circuit Switching and Packet Switching.
16)
a) How CSMA provides a clear improvement over ALOHA ? b) How CSMA
indicates further improvement by implementing CSMA/CD ? c) Explain the
function of a token ring ? d) Explain how a receiver acknowledged a frame in token
ring ?
17)
a) What do you understand by the term 'Data Security' ? b) Explain the
various aspects of security with the help of private and public keys. c) Explain RSA
method with an example.
18)
What procedure is used to prevent a stream of binary data being
misinterpreted as an HDLC flag ? Explain the operation of this procedure.
19)
Compare AM, FM and PM with example.
20)
What do you mean by congestion control ? Explain the concept of token
bucket in controlling congestion.

You might also like