ALCCS
FEBRUARY 2009
NOTE:
· Question 1 is compulsory and
carries 28 marks. Answer any FOUR questions from the rest. Marks are indicated against each question.
· Parts of a question should be
answered at the same place.
Q.1 (7
x 4)
a. What is the principal
difference between synchronous and asynchronous communication?
b. Differentiate between RZ and Biphase
encoding schemes.
c. Why should CSMA based protocol have minimum
frame size? Give at least two reasons.
d. Why should maximum windows size be or less rather than in
sliding-window protocol, where m is
number of bits representing sequence no.? Explain.
e. Write four advantages of hierarchical routing.
f. Suppose an old SYN segment from station A
arrives at station B, requesting for TCP connection. Explain how the three-way
handshake procedure ensures that the connection is rejected.
g.
How does symmetric key cryptography differ from asymmetric key cryptography?
Also write advantages of former over the latter.
Q.2 a. A
radio system uses 9600 bps channel and 120 bit long frames. Compute maximum
throughput of ALOHA protocol using this system if ALOHA gives an efficiency of
18%. (6)
b. Derive the maximum throughput for mutitoken, single token and single frame operation
n Token passing rings. (6)
c. CRC
is constructed to generate a 4-bit FCS for an 11-bit message. The generator
polynomial is . Encode the data bit 00111011001 and give the
codeword. Show that the error is detected assuming that bit 7 in the codeword
from LSB is an error. (6)
Q.3 a. The session layer is not present in TCP/IP
protocol suite as compared to OSI model.
Explain how the session layer requirements are then taken care of in
TCP/IP? (6)
b. Consider building a CSMA/CD network running at
1 Gbps over a 1-km cable with no repeaters. The signal speed in the cable is
200,000 km/sec. What is the minimum frame size? (6)
c. Prove that utilization of a server in M/M/1
queue is ρ (6)
Q.4 a. Give the format of Ethernet frame and explain the meaning of each
field in the frame. (6)
b. Why keying is required in data communication
over networks? Using appropriate
diagrams compare the various features of Frequency Shift Keying (FSK) with
Phase Shift Keying (PSK). (6)
c. What is the use of AC, FC, and FS in token ring
protocol (IEEE 802.5). (6)
Q.5 a. Describe link state routing algorithm.
Illustrate the working using a suitable example. (6)
b. A gateway of infinite buffer capacity receives
packets at a mean rate of 125 packets per second and takes 2 milliseconds to
forward the packets. Compute the number of jobs in the system and number of
jobs waiting in the queue for the gateway. (6)
c. Explain the various classes of IP addresses
and also discuss advantages of dividing IP addresses into classes. (6)
Q.6 a. Explain
the following terms in the context of transport layer
(i) Forbidden region (ii) Three-way handshake (6)
b. What is the purpose of following fields in TCP
segment header?
(i)
Urgent pointer (ii) six 1-bit
flags (iii) window size (6)
c. Describe RSA algorithm used for encryption. (6)
Q.7 a. For RSA algorithm p = 7 and q= 11, find the
possible values of d. Also find value
of e for two possible values of d. (6)
b. Using Huffman coding generate codes for the
following symbols given with their frequency of occurrence (Show the Huffman
tree).
A
(50%) C(30%) G (15%)
T(5%) (6)
c. Write a short note on one of the following
(i)
Poisson Process (ii) File transfer
Protocol (iii) Electronic mail (6)