A9-r3

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View A9-r3 as PDF for free.

More details

  • Words: 5,763
  • Pages: 27
A9-R3: DATA COMMUNICATION & COMPUTER NETWORKS

January 2006 TOTAL TIME: 3 HOURS

TOTAL MARKS: 100 (PART ONE-40; PART TWO – 60) PART ONE (Answer all the questions)

1.

Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10)

1.1 A) B) C) D)

Which of the following are the smallest and largest possible values of an IP octet? 0 and 512 255 and 512 0 and 256 0 and 255

1.2

The parameter Bit Error Rate (BER) plays more important role as compared to delay while transmitting. Data Audio Video Compressed Video

A) B) C) D) 1.3 A) B) C) D) 1.4

Seamless networking refers to A complete end-to-end digital network. Use of a single platform for end-to-end communication where geographical distance between communicating entities is hidden to the end user. Use of a single platform for end-to-end communication where geographical distance between communication entities is visible to the end user. Use of a single platform to transmit data, audio and video.

A) B) C) D)

In which of the following shape light pulses should be transmitted in order to cancel out nearly all the dispersion effects. Cosine Triangular Hyperbolic Cosine Reciprocal of Hyperbolic Cosine

1.5 A) B) C) D)

ARP is used to find IP address MAC address Subnet address Host address

1.6 A)

Throughput of simple ALHOHA is 18%

B) C) D)

18.8% 36% 36.8%

1.7 A) B) C) D)

If satellite is in geosynchronous orbit, it completes one orbit in One day (24 hours) One hour One month One year

1.8 A) B) C) D)

Baud is Number of bits per second Number of signal changes per second Number of bytes per second Number of characters per second

1.9 A) B) C) D)

Router operates in Data Link Layer Network Layer Transport Layer All of the above

1.10

In which ARQ, when a NAK is received, all frames sent since the last frame acknowledge are retransmitted Stop-and-Wait Go back n Selective Reject Both A and B

A) B) C) D)

2.

Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “tear-off” sheet attached to the question paper, following instructions therein. (1 x 10)

2.1 2.2 2.3 2.4

All WANs are necessarily packet switched networks. Frame relay uses large variable sized packets in contrast to ATM. ASK is a technique to convert digital data to an analog signal. Executable files can be transmitted using SMTP.

2.5 2.6 2.7 2.8 2.9 2.10 3.

Today’s Cellular networks employ all three multiple access schemes namely FDMA, TDMA and CDMA. TCP uses a credit-based flow and error control technique that is somewhat different from the sliding-window flow control found in X.25 and HDLC. Two computers cannot be connected via USB cable. A bridged network allows communication between two computers on one segment to occur simultaneously as communication between two computers on another segment. ADSL provides a lower bit rate downstream than upstream. HTTP use port 80. Match words and phrases in column X with the closest related meaning/ word(s)/phrases in column Y. Enter your selection in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10)

3.1

X Connection Oriented WAN Technology

Y A.

Telnet

3.2

Circuit Switched B Channels and Packet Switched D Channel

B.

HDLC

3.3

RF based physical layer

C.

CBR

3.4

Remote Login Protocol

D.

HTTP

3.5

Connectionless protocol

E.

Frame Relay

3.6

World Wide Web

F.

TCP

3.7

Real Time Service

G.

ISDN

3.8

Optical Transmission Systems

H.

UDP

I.

8

J.

ATM

K.

ABR

L.

FHSS

M.

12

N.

WDM

3.9

Number of hexadecimal digits in Ethernet address 3.10 Data Link layer

4.

Each statement below has blank space to fit one of the word(s) or phrases in the list below. Enter your choice in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10) A.

CSMS/CD

D. QAM G. ATM J. Encryption

B. X.25

C. Distance vector

E. Congestion control H. 48 Bytes K. CSMA/CA

F. I. L.

Token bus PSK Masquerade

M. Routing P. 64 Bytes

N. Ethernet Q. Starting Delimiter

O. Line-state R. SONET

4.1

IEEE 802.3 is popularly known as _________.

4.2

_________ is the network technology that can be used in both LAN and WAN.

4.3

The main characteristics of _________ are link-by-link flow control, sequence numbering and error checking.

4.4

In order to ensure that collisions can be detected by all nodes on the Ethernet network, the lower bound on Ethernet packet length is _________.

4.5

In order to share the transmission media wireless LANs use the _________ scheme.

4.6

_________ is the analog signaling technique used in ADSL and is a combination of amplitude and phase modulation.

4.7

Optimality principle is used in _________.

4.8

A(n) _________ takes place when one entity pretends to be different entity.

4.9

The first field in a Token Ring frame is called _________.

4.10

Routing protocols based on _________ does not exchange their routing tables periodically.

PART TWO (Answer any FOUR questions) 5. a) b) c)

Write in brief the features of the following transmission media: i) Coaxial Cable ii) Fiber Optic Cable Find out the capacity of a telephone line that transmits frequencies from 300 Hz and 3400 Hz with a signal to noise ratio of 35dB. What is pulse code modulation? What is the equivalent bit rate of a PCM channel having bandwidth of 4 KHz?

(8+3+4) 6. a) b) c) 7. a)

b) c) 8. a) b) c) 9. a) b) c) d)

What is the difference between: i) datagram subnet and virtual-circuit subnet. ii) circuit switching and packet switching. What advantages does TCP have over UDP? What are the features, which make TCP a reliable protocol? Explain the function of: Repeater, Bridge and Gateways. (8+[2+2]+3) Explain the operation of CRC error detection method. By means of an example show how: i) The error detection bits are generated ii) The received frame is checked for transmission errors Use the generator polynomial x5 + x4 + x2 + x + 1 What is static routing? How does it differ from dynamic routing? Discuss the problem of count to infinity associated with distance vector routing technique. (8+4+3) What are the reasons for congestion in a network? Describe any one method for congestion control. Could HDLC be used as a data link protocol for a LAN? Explain your answer. Describe the advantages of a small cell size in ATM. (7+4+4) Write short notes on any three: SNMP VPN Firewall GSM

July 2003 TOTAL TIME: 3 HOURS

TOTAL MARKS: 100 (PART ONE-40; PART TWO – 60) PART ONE (Answer all the questions)

1.

Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10)

1.1

Learning about the neighbours through special HELLO packets is the first step in A) distance vector routing B) local area routing C) link state routing D) none of the above

1.2

Sliding windows is a technique for

1.3

1.4

1.5

A) line discipline B) error control C) flow control D) session management In TCP, the path A) upto destination is allocated before the transmission of message begins B) upto next intermediate node is allocated before the transmission of message begins C) to be followed depends on the length of message D) none of the above A bridge recognizes addresses of A) layer 1 B) layer 2 C) layer 3 D) all of the above Mapping from MAC address to IP address is done by A) SNMP B) ARP C) RARP D) SMTP

1.6

To interconnect two homogeneous WANs, we need a A) bridge B) router C) repeater D) none of the above

1.7

To employ multi-access in GSM, users are given different A) time slots B) bandpass filters C) handsets D) none of the above

1.8

Base Station and MSC are related to A) cellular radio B) ISO-OSI model C) ARPANET structure D) none of the above

1.9

DNS name space in the Internet is A) flat and centralized B) hierarchical and centralized C) flat and distributed D) hierarchical and distributed

1.10

Usually security in a network is achieved by A) layering B) grade of service C) addressing D) cryptography

2.

Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “tear-off” sheet attached to the question paper, following instructions therein. (1 x 10)

2.1 2.2

Dial-up is always better than leased line. Synchronous data link control (SDLC) protocol has more control overhead than asynchronous data link control (ADCL) protocol. In IEEE 802.11b LAN, wireless technology is used. DPSK with four phases will enable the bit rate to be tripled over the corresponding two phase modulation. In VLANs, the bust can be used as a common broadcast medium. MIB is used in SMTP. IP is a best-effort connectionless protocol. Medium access protocols are associated with layer 2. Switching HUBs are less efficient than simple HUBs. CRC is also used in TCP.

2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 3.

3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8

Match words and phrases in column X with the closest related meaning/ word(s)/phrases in column Y. Enter your selection in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10) X Cell switching Coaxial cable Secure wireless multiplexing 128 bit address space Converting plain text to cipher text and vice versa 900/1800 MHz Downloading files LAN architecture from IBM

A. B. C. D. E. F. G. H.

Y IPv6 UDP FTP Cryptography GSM Cable TV 10 Hz Star topology

3.9 2B+D 3.10 Transport layer of INTERNET

4.

A. D. G. J. M. P.

I. J. K. L. M. N. O.

ISDN Token Ring FDM CDMA CODEC MODEM ATM

Each statement below has blank space to fit one of the word(s) or phrases in the list below. Enter your choice in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10) TFTP Telnet Fast LAN Character stuffing Bit stuffing Resistance

B. E. H. K. N. Q.

Message BSC Packet IP address MAC address Three

C. F. I. L. O. R.

VPN PPP HTTP Two Quantization Sampling

4.1

To implement a _____ over the INTERNET, tunneling is used.

4.2

_____ is the most common protocol used over dial-up lines to access the INTERNET.

4.3

The protocol used to transfer HTML pages is called _____.

4.4

In remote login, _____ is used to access distant servers.

4.5

The INTERNET is a _____ switched network.

4.6

In the INTERNET, _____ is used to forward data packets in intermediate routers.

4.7

The bottom _____ layers to TCP/IP suite are non-standard.

4.8

_____ is the first step in digitizing an analog signal.

4.9

The main advantage of PCM system is its _____ to system noise, offered by digital signals.

4.10

In Bisync protocol, _____ is used to avoid improper termination of frames.

PART - TWO (Answer ANY FOUR questions) 5. a) b) c) d) 6. a) b) c)

7. a) b) c) d) 8. a) b) c)

What is the difference between flow control and congestion control? What is reflection? What happens to a beam of light as it travels to a less sense medium? What happens if it travels to a denser medium? How does ionospheric propagation work? Which types of users normally use this type of propagation? What is the difference between network layer delivery and transport layer delivery? (2+[1+1+2]+4+5) Compare virtual circuit with datagram subnet? How is one TDM signal separated into its original components? Consider both implementations of TDM? What procedure is used to prevent a stream of binary data from being misinterpreted as an HDLC flag? Explain ht operation of this procedure? (5+7+3) Compare fibre optic cable with UTP cable when used as transmission media in LANs. Why is IP not exactly suitable for real time services? Compare and contrast CSMA/CD and token-passing access methods. What is a subnet mask and why is it necessary? (3+3+4+[2+3]) What are the different classes of addresses used in Ipv4? List their ranges in dotted decimal notation. What are the roles of repeaters, bridges, routers and gateways in achieving internetworking? Identify the layers in which they operate. Computing the checksum for the following data frame, find the complete transmitted frame bit pattern: data, D = 11001011011 generator polynomial, G(x) = x4 + x + 1

d) ([2+4]+[4+2+3) 9.

Write short notes on any three: i) VSAT ii) QPSK iii) SONET iv) Spread Spectrum (3x5)

A9-R3: DATA COMMUNICATION & COMPUTER NETWORKS NOTE: 1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions and PART TWO contains FOUR questions. 2.

PART ONE is to be answered in the TEAR-OFFANSWER SHEET only, attached to the question paper, as per the instructions contained therein. PART ONE is NOT to be answered in the answer book.

3.

Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be supplied at the table when the answer sheet for PART ONE is returned. However, candidates who complete PART ONE earlier than one hour, can collect the answer book for PART TWO immediately after handing over the answer sheet for PART ONE. TOTAL TIME: 3 HOURS TOTAL MARKS: 100 (PART ONE-40; PART TWO – 60) PART ONE (Answer all the questions) 1.

Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10)

1.1 A) B) C) D)

One factor in the accuracy of a reconstructed PCM signal is the Signal bandwidth Carrier frequency Number of bits used for quantization. Baud rate

1.2 A) B) C) D)

Category 1 UTP cable is most often used in Fast Ethernet Networks Traditional Ethernet Networks Infrared Networks Telephone Networks

1.3 A) B) C) D)

In 16-QAM, there are 16 Combinations of phase and amplitude Amplitudes Phases bps

1.4 A) B) C) D)

Guard bands increase the bandwidth for FDM TDM CDM None of the above

1.5 A) B) C) D)

The physical connection between an end point and a switch or between two switches is Transmission path Virtual path Virtual circuit None of the above

1.6 A) B) C) D)

Which of the following is an application layer service? Remote log-in File transfer and access Mail service All of the above

1.7 A) B) C) D)

The main function of transport layer is Node-to-node delivery Process-to-process delivery Synchronization Updating and maintenance of routing tables

1.8 A) B) C) D)

In which type of switching do all the packets of a message follow the same channels of a path? Data gram packet switching Virtual switching packet switching Message switching None of the above

1.9 A) B) C) D)

The shortest frame in HDLC protocol is usually the Information frame Supervisory frame Management frame None of the above

1.10 A) B) C) D)

The device operating at Data link layer is Bridge Router Repeater None of the above

2.

Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “tear-off” sheet attached to the question paper, following instructions therein. (1 x 10)

2.1

In FDM the users take turns in a round robin, each one periodically getting the entire bandwidth for a little burst of time. The minimum bandwidth required for QAM transmission is the same as that required for ASK and PSK transmission. Fiber-optic cable is used in backbone networks, cable TV networks and fast Ethernet networks. A multipoint connection provides a dedicated link between two devices. Routing is a function of data link layer. Flow control is needed to prevent collision between sender and receiver. HDLC is an actual protocol designed to support both half-duplex and full duplex communication over point-to-point and multipoint links. UDP and TCP are both network layer protocols. An ARP request is broadcast to all devices on the network. Routing and switching in frame relay are performed by the data link layer.

2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 3.

3.1 3.2 3.3 3.4 3.5

Match words and phrases in column X with the closest related meaning/ word(s)/phrases in column Y. Enter your selection in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10) X It is the function of network layer. It is the connectionless protocol in Transport layer.

Y A. B.

It is the internetworking protocol suite. C. This sublayer is responsible for the operation of the D. CSMS/CD access method. The protocol maps an IP address to a MAC address. E.

MAC ARP DNS Bridge Frame Relay

3.6

It is a client-server application that identifies each host on the Internet with a unique user-friendly name.

F.

Congestion control

3.7

It connects two LAN segments at Data Link layer.

G.

TDM

3.8

It is a virtual circuit WAN that was designed to respond to allow bursty data and a frame size of 9000 bytes.

H.

TCP

3.9 It is a second-generation cellular phone system. I. 3.10 It is known as simultaneous transmission of multiple J. signals across a single data link. K. L. M. N. O.

MODEM UDP Satellite TCP/IP Gateway GSM RARP

4.

A. D. G. J. M. P.

Each statement below has blank space to fit one of the word(s) or phrases in the list below. Enter your choice in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10) Network Circuit TCP Remains the same Data Link Token Bus

B. E. H. K. N. Q.

Increases Presentation ICMP TDM Physical CSMA/CD

C. F. I. L. O. R.

WDM Packet CRC UDP Decreases SNMP

4.1

The _________ layer changes bits into electromagnetic signals.

4.2

As the bit rate of an FSK signal increases, the bandwidth __________.

4.3

__________ is similar in concept to FDM. The signals being multiplexed, however, are light waves.

4.4

__________ is a powerful redundancy checking technique, which appends a sequence of redundant bits derived from binary division to the data unit.

4.5

In __________ protocol, a station must listen to a medium prior to sending data onto the line.

4.6

__________ layer provides services to transport layer.

4.7

The main Internet transport protocol is __________.

4.8

__________ switching statically reserves the required bandwidth in advance.

4.9

__________ LAN supports priorities and can be configured to provide a guaranteed fraction of the bandwidth to high-priority traffic.

4.10

The operation of the Internet is monitored closely by the routers. When something unexpected occurs, the event is reported by the __________.

PART TWO (Answer Any Four questions) 5. a) b) c)

6. a) b) c) 7. a) b) c)

8. a) b) c) 9.

What is the transmission rate on Ethernet LANs? For a given transmission rate, can each user on the LAN continuously transmit at the rate? What are some of the physical media that Ethernet can run over? What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in a circuit-switched network? (5+5+5) List two ways in which the OSI reference model and the TCP/IP reference model are the same. Now, list the two ways in which they differ. What is the principle difference between connectionless communication and connectionoriented communication? Why would the token-ring protocol be inefficient if the LAN has a very large perimeter? (6+6+3) What is the main difference between TCP and UDP? Give an advantage and disadvantage of frame relay over a leased telephone line. What are the two main functions of a datagram based network layer? What additional functions does a VC-based network layer have? (3+6+6) Compare and contrast link-state and distance-vector routing algorithms. Each Internet host will have at least one local name serve and one authoritative name server. What role does each of these servers have in DNS? What is an important difference between a Symmetric key system and a Public key system? (5+5+5) Write short notes on any three of the following: i) X.25 ii) HDLC iii) DNS iv) SNMP (3x5)

A9-R3: DATA COMMUNICATION & COMPUTER NETWORKS NOTE: 1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions and PART TWO contains FOUR questions. 2.

PART ONE is to be answered in the TEAR-OFFANSWER SHEET only, attached to the question paper, as per the instructions contained therein. PART ONE is NOT to be answered in the answer book.

3.

Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be supplied at the table when the answer sheet for PART ONE is returned. However, candidates who complete PART ONE earlier than one hour, can collect the answer book for PART TWO immediately after handing over the answer sheet for PART ONE. TOTAL TIME: 3 HOURS TOTAL MARKS: 100 (PART ONE-40; PART TWO – 60) PART ONE (Answer all the questions) 1.

Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10)

1.1

Learning about the neighbours through special HELLO packets is the first step in A) distance vector routing B) local area routing C) link state routing D) none of the above

1.2

Sliding windows is a technique for A) line discipline B) error control C) flow control D) session management In TCP, the path A) upto destination is allocated before the transmission of message begins B) upto next intermediate node is allocated before the transmission of message begins C) to be followed depends on the length of message D) none of the above

1.3

1.4

1.5

A bridge recognizes addresses of A) layer 1 B) layer 2 C) layer 3 D) all of the above Mapping from MAC address to IP address is done by A) SNMP B) ARP C) RARP D) SMTP

1.6

To interconnect two homogeneous WANs, we need a A) bridge B) router C) repeater D) none of the above

1.7

To employ multi-access in GSM, users are given different A) time slots B) bandpass filters C) handsets D) none of the above

1.8

Base Station and MSC are related to A) cellular radio B) ISO-OSI model C) ARPANET structure D) none of the above

1.9

DNS name space in the Internet is A) flat and centralized B) hierarchical and centralized C) flat and distributed D) hierarchical and distributed

1.10

Usually security in a network is achieved by A) layering B) grade of service C) addressing D) cryptography

2.

Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “tear-off” sheet attached to the question paper, following instructions therein. (1 x 10)

2.1 2.2

Dial-up is always better than leased line. Synchronous data link control (SDLC) protocol has more control overhead than asynchronous data link control (ADCL) protocol. In IEEE 802.11b LAN, wireless technology is used. DPSK with four phases will enable the bit rate to be tripled over the corresponding two phase modulation. In VLANs, the bust can be used as a common broadcast medium. MIB is used in SMTP. IP is a best-effort connectionless protocol. Medium access protocols are associated with layer 2. Switching HUBs are less efficient than simple HUBs. CRC is also used in TCP.

2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 3.

Match words and phrases in column X with the closest related meaning/ word(s)/phrases in column Y. Enter your selection in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10) X

3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10

Cell switching Coaxial cable Secure wireless multiplexing 128 bit address space Converting plain text to cipher text and vice versa 900/1800 MHz Downloading files LAN architecture from IBM 2B+D Transport layer of INTERNET

Y A. B. C. D. E. F. G. H. I. J. K. L. M. N. O.

IPv6 UDP FTP Cryptography GSM Cable TV 10 Hz Star topology ISDN Token Ring FDM CDMA CODEC MODEM ATM

4.

A. D. G. J. M. P.

Each statement below has blank space to fit one of the word(s) or phrases in the list below. Enter your choice in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10) TFTP Telnet Fast LAN Character stuffing Bit stuffing Resistance

B. E. H. K. N. Q.

Message BSC Packet IP address MAC address Three

C. F. I. L. O. R.

VPN PPP HTTP Two Quantization Sampling

4.1

To implement a _____ over the INTERNET, tunneling is used.

4.2

_____ is the most common protocol used over dial-up lines to access the INTERNET.

4.3

The protocol used to transfer HTML pages is called _____.

4.4

In remote login, _____ is used to access distant servers.

4.5

The INTERNET is a _____ switched network.

4.6

In the INTERNET, _____ is used to forward data packets in intermediate routers.

4.7

The bottom _____ layers to TCP/IP suite are non-standard.

4.8

_____ is the first step in digitizing an analog signal.

4.9

The main advantage of PCM system is its _____ to system noise, offered by digital signals.

4.10

In Bisync protocol, _____ is used to avoid improper termination of frames.

PART - TWO (Answer ANY FOUR questions) 5. a) b) c) d) 6. a) b) c)

7. a) b) c) d) 8. a) b) c)

What is the difference between flow control and congestion control? What is reflection? What happens to a beam of light as it travels to a less sense medium? What happens if it travels to a denser medium? How does ionospheric propagation work? Which types of users normally use this type of propagation? What is the difference between network layer delivery and transport layer delivery? (2+[1+1+2]+4+5) Compare virtual circuit with datagram subnet? How is one TDM signal separated into its original components? Consider both implementations of TDM? What procedure is used to prevent a stream of binary data from being misinterpreted as an HDLC flag? Explain ht operation of this procedure? (5+7+3) Compare fibre optic cable with UTP cable when used as transmission media in LANs. Why is IP not exactly suitable for real time services? Compare and contrast CSMA/CD and token-passing access methods. What is a subnet mask and why is it necessary? (3+3+4+[2+3]) What are the different classes of addresses used in Ipv4? List their ranges in dotted decimal notation. What are the roles of repeaters, bridges, routers and gateways in achieving internetworking? Identify the layers in which they operate. Computing the checksum for the following data frame, find the complete transmitted frame bit pattern: data, D = 11001011011 generator polynomial, G(x) = x4 + x + 1

d) ([2+4]+[4+2+3) 9.

Write short notes on any three: i) VSAT ii) QPSK iii) SONET iv) Spread Spectrum (3x5)

A9-R3: DATA COMMUNICATION & COMPUTER NETWORKS NOTE: 1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions and PART TWO contains FOUR questions. 2.

PART ONE is to be answered in the TEAR-OFFANSWER SHEET only, attached to the question paper, as per the instructions contained therein. PART ONE is NOT to be answered in the answer book.

3.

Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be supplied at the table when the answer sheet for PART ONE is returned. However, candidates who complete PART ONE earlier than one hour, can collect the answer book for PART TWO immediately after handing over the answer sheet for PART ONE. TOTAL TIME: 3 HOURS TOTAL MARKS: 100 (PART ONE-40; PART TWO – 60) PART ONE (Answer all the questions) 1.

Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10)

1.1 A) B) C) D)

One factor in the accuracy of a reconstructed PCM signal is the Signal bandwidth Carrier frequency Number of bits used for quantization. Baud rate

1.2 A) B) C) D)

Category 1 UTP cable is most often used in Fast Ethernet Networks Traditional Ethernet Networks Infrared Networks Telephone Networks

1.3 A) B) C) D)

In 16-QAM, there are 16 Combinations of phase and amplitude Amplitudes Phases bps

1.4 A) B) C) D)

Guard bands increase the bandwidth for FDM TDM CDM None of the above

1.5 A) B) C) D)

The physical connection between an end point and a switch or between two switches is Transmission path Virtual path Virtual circuit None of the above

1.6 A) B) C) D)

Which of the following is an application layer service? Remote log-in File transfer and access Mail service All of the above

1.7 A) B) C) D)

The main function of transport layer is Node-to-node delivery Process-to-process delivery Synchronization Updating and maintenance of routing tables

1.8 A) B) C) D)

In which type of switching do all the packets of a message follow the same channels of a path? Data gram packet switching Virtual switching packet switching Message switching None of the above

1.9 A) B) C) D)

The shortest frame in HDLC protocol is usually the Information frame Supervisory frame Management frame None of the above

1.10 A) B) C) D)

The device operating at Data link layer is Bridge Router Repeater None of the above

2.

Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “tear-off” sheet attached to the question paper, following instructions therein. (1 x 10)

2.1

In FDM the users take turns in a round robin, each one periodically getting the entire bandwidth for a little burst of time. The minimum bandwidth required for QAM transmission is the same as that required for ASK and PSK transmission. Fiber-optic cable is used in backbone networks, cable TV networks and fast Ethernet networks. A multipoint connection provides a dedicated link between two devices. Routing is a function of data link layer. Flow control is needed to prevent collision between sender and receiver. HDLC is an actual protocol designed to support both half-duplex and full duplex communication over point-to-point and multipoint links. UDP and TCP are both network layer protocols. An ARP request is broadcast to all devices on the network. Routing and switching in frame relay are performed by the data link layer.

2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 3.

3.1 3.2 3.3 3.4 3.5

Match words and phrases in column X with the closest related meaning/ word(s)/phrases in column Y. Enter your selection in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10) X It is the function of network layer. It is the connectionless protocol in Transport layer.

Y A. B.

It is the internetworking protocol suite. C. This sublayer is responsible for the operation of the D. CSMS/CD access method. The protocol maps an IP address to a MAC address. E.

MAC ARP DNS Bridge Frame Relay

3.6

It is a client-server application that identifies each host on the Internet with a unique user-friendly name.

F.

Congestion control

3.7

It connects two LAN segments at Data Link layer.

G.

TDM

3.8

It is a virtual circuit WAN that was designed to respond to allow bursty data and a frame size of 9000 bytes.

H.

TCP

3.9 It is a second-generation cellular phone system. I. 3.10 It is known as simultaneous transmission of multiple J. signals across a single data link. K. L.

MODEM UDP

M. N. O.

Gateway GSM RARP

4.

A. D. G. J. M. P.

Satellite TCP/IP

Each statement below has blank space to fit one of the word(s) or phrases in the list below. Enter your choice in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1 x 10) Network Circuit TCP Remains the same Data Link Token Bus

B. E. H. K. N. Q.

Increases Presentation ICMP TDM Physical CSMA/CD

C. F. I. L. O. R.

WDM Packet CRC UDP Decreases SNMP

4.1

The _________ layer changes bits into electromagnetic signals.

4.2

As the bit rate of an FSK signal increases, the bandwidth __________.

4.3

__________ is similar in concept to FDM. The signals being multiplexed, however, are light waves.

4.4

__________ is a powerful redundancy checking technique, which appends a sequence of redundant bits derived from binary division to the data unit.

4.5

In __________ protocol, a station must listen to a medium prior to sending data onto the line.

4.6

__________ layer provides services to transport layer.

4.7

The main Internet transport protocol is __________.

4.8

__________ switching statically reserves the required bandwidth in advance.

4.9

__________ LAN supports priorities and can be configured to provide a guaranteed fraction of the bandwidth to high-priority traffic.

4.10

The operation of the Internet is monitored closely by the routers. When something unexpected occurs, the event is reported by the __________.

PART TWO (Answer Any Four questions) 5. a) b) c)

6. a) b) c)

7. a) b) c)

What is the transmission rate on Ethernet LANs? For a given transmission rate, can each user on the LAN continuously transmit at the rate? What are some of the physical media that Ethernet can run over? What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in a circuit-switched network? (5+5+5) List two ways in which the OSI reference model and the TCP/IP reference model are the same. Now, list the two ways in which they differ. What is the principle difference between connectionless communication and connection-oriented communication? Why would the token-ring protocol be inefficient if the LAN has a very large perimeter? (6+6+3) What is the main difference between TCP and UDP? Give an advantage and disadvantage of frame relay over a leased telephone line. What are the two main functions of a datagram based network layer? What additional functions does a VC-based network layer have?

(3+6+6) 8. a) b) c)

9.

Compare and contrast link-state and distance-vector routing algorithms. Each Internet host will have at least one local name serve and one authoritative name server. What role does each of these servers have in DNS? What is an important difference between a Symmetric key system and a Public key system? (5+5+5) Write short notes on any three of the following: i) X.25 ii) HDLC iv) DNS iv) SNMP (3x5)