All posts from

MECCE104 Communication Networks M.Tech Model Question Paper : mgu.ac.in

Name of the College : Mahatma Gandhi University
Department : Communication Engineering
Subject Code/Name : MECCE 104/Communication Networks
Sem : I
Website : mgu.ac.in
Document Type : Model Question Paper

Download Model/Sample Question Paper : https://www.pdfquestion.in/uploads/mgu.ac.in/5059-MECCE%20104%20Communication%20Networks.doc

Communication Networks Model Question Paper

M.TECH Degree Examination :
Model Question Paper
Specialization: Communication Engineering

Related : MGU MECAE102 Analog Integrated Circuit Design M.Tech Model Question Paper : www.pdfquestion.in/5058.html

First Semester
MECCE 104 : Communication Networks
(Regular-2013 Admissions)
Time: Three Hours
Maximum: 100 marks
Each question carries 25 marks. :
1. a) Discuss the limitations of stop and wait protocol (5)
b) What is a MAC address? Explain the MAC addressing scheme used in 802.11 (8)

c) A bit stream 10011101 is transmitted using the standard CRC method. The generator polynomial is x3 +1. Show the actual bit string transmitted. Suppose the third bit from the left is inverted during transmission. Show that this error is detected at the receiver’s end. (12)
OR

2. a) Discuss the important features of CSMA/CD. (5)
b) Design a reliable, pipelined, data transfer protocol that uses only negative acknowledgements. How quickly will your protocol respond to lost packets when the arrival rate of data to the sender is low? When it is high? (8)

c) Mention the design principles that were applied in arriving the seven- layer model of the ISO/OSI reference model. (12)

3. a) Differentiate between Link State and Distance Vector routing algorithms (5)
b) Explain the segment formats for TCP and UDP (8)

c) Suppose data grams are limited to 1500 bytes including header between source host A and destination host B. Assuming a 20 byte IP header how many data- grams would be required to send an MP3 of 4 million bytes? (12)
OR

4. a) What are the disadvantages of Bellman Ford Algorithm (5)
b) Discuss the various congestion control techniques used in transport layer (8)

c) Consider the three node topology shown below. The link costs are c(x,y)=5, c(y,z)=6,c(z,x)=2.Compute the distance tables after initialization step and after each iteration of a synchronous version of the distance vector algorithm (12)

5. a) What is meant by end-to-end delay and packet jitter? What are the causes of packet jitter (5)
b) Discuss how scheduling and policing schemes affects the QoS of a wireless network . Give an example for scheduling discipline that is not work conserving. (8)

c) What is meant by interactivity for streaming audio/video? Are the TCP receive buffer and the media player’s client buffer the same thing? If not, how do they interact? (12)
OR

6. a) Briefly explain Mobile IP (5)
b) What is hidden terminal problem? Explain how IEEE 802.11 deals with hidden terminals (8)

c) How is RTSP different from HTTP? “Can HTTP be used to request a stream”? Justify your answer. Does RTSP maintain state information about the client? (12) (consider the pause/resume function).

7. a) Explain how RSA works (5)
b) What is cryptography? Describe symmetric key and public key algorithms in detail (8)

c) What does it mean for a signed document to be verifiable, nonforgetable and nonrepudiable? Can message confidentiality exist without message integrity? Justify your answer. (12)
OR

8. a) What is a key distribution center? What is a certificate authority? (5)
b) What is the man-in-the-middle attack? Can this attack occur when symmetric keys are used (8)

c) Using RSA, choose p=3 and q=11, and encode the word “hello”. Apply the decryption algorithm to the encrypted version to recover the original plain-text message. (12)

Syllabus :
Module 1 :
Introduction to network architecture; Layering and protocols, OSI/Internet architecture, Performance parameters, Data link layer – Error detection and correction, multiple access protocols, Link layer addressing, Ethernet, CSMA/CD, Reliable Transmission-ARQ schemes and analysis.

Module 2 :
Internet Architecture: Layering in the Internet, Applications layer – HTTP, SMTP, Telnet, FTP; TCP/IP protocol stack.

Transport layer -TCP and UDP- Congestion control and avoidance, Fairness; Network layer – IPV4 and IPV6, Routing algorithms-Link state, Distance vector, Hierarchical; Routing in the Internet.

Module 3 :
Wireless links and Network characteristics, IEEE 802.11 wireless LANs-architecture, protocol, framing- Mobility management principles- Mobile IP;

Multimedia networking- streaming stored audio and video, protocols for real time interactive applications, Scheduling and policing; QOS- Integrated and Differentiated services.

Leave a Reply

How to add comment : 1) Type your comment below. 2) Type your name. 3) Post comment.

www.pdfquestion.in © 2021

Contact Us   Privacy Policy   SiteMap