0% found this document useful (0 votes)
22 views

PE–3 Communication Networks ET

Uploaded by

Pranshu Bhusari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

PE–3 Communication Networks ET

Uploaded by

Pranshu Bhusari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

2KTT/ARDR/ET – 12906/12986

B. E. Seventh Semester (Electronics and Telecommunication


Engineering)/BEET_14-15_Rev_SOE_ET-101 Examination

Course Code : ET 1409/ET 409 Course Name : PE–3: Communication


Networks

Time : 2 Hours ] [ Max. Marks : 40


Instructions to Candidates :—
(1) Attempt any Four questions out of Six.
(2) All questions carry Ten marks.
(3) Assume suitable data wherever necessary.
(4) If question number written on answer book is incorrect, it will get zero marks.
(5) Due credit will be given to neatness and adequate dimensions.
(6) Illustrate your answers wherever necessary with the help of neat sketches.
(7) Use of Logarithmic tables, non – programmable calculator, is permitted.
1. Solve any One :––
(A1) What are the responsibilities of Data Link Layer ? 4(CO1)
(A2) Explain in brief four physical topologies of a network. 3(CO1)
(A3) Explain the difference between Connection-oriented and connection-less Services.
3(CO1)
OR

(B1) What are the responsibilities of Transport Layer ? 4(CO1)


(B2) Explain the approach to design network. 3(CO1)
(B3) Contrast and compare LAN, MAN and WAN with the help of suitable
example. 3(CO1)

2. Solve any One :––


(A1) Consider a system with stations following any random access method to
access the medium. As each station has equal right to access the medium
without being controlled by other station. How congestion, in general can
be avoided ? 4(CO3)
2KTT/ARDR/ET – 12906/12986 Contd.
(A2) How a newly installed bridge learns itself to establish a communication between
the LANs ? 3(CO3)
(A3) How the medium access with collision avoidance (MACA) protocol works
in LAN ? 3(CO3)
OR

(B1) Explain the following connecting devices :


(i) Hub
(ii) Link layer switch
(iii) Router 4(CO3)

(B2) Demonstrate Go-Back-n protocol with a forward channel is reliable but in


the reverse channel, if an acknowledge is delayed or lost. 3(CO3)
(B3) With a neat diagram explain Ethernet frame format. 3(CO3)

3. Solve any One :––


(A1) Enlist various switching techniques in PSTN. 4(CO3)
(A2) Enlist and address the data link layer design issues. 3(CO3)
(A3) Explain in details what are the error detection and correction methods.
3(CO2)
OR

(B1) What is the most common data link layer protocol for wired connections?
4(CO2)
(B2) Explain multi-node, the point-to-point protocol and dual-node protocol.
3(CO2)
(B3) What is sliding window protocol ? Explain it with example. 3(CO2)

4. Solve any One :––


(A1) The following is a dump of a TCP header in hexadecimal format : 05320017
00000001 00000000 500207FF 00000000 :
(i) What is the source port number ?

2KTT/ARDR/ET – 12906/12986 2 Contd.


(ii) What is the destination port number ?
(iii) What is the length of the header ?
(iv) What is the type of segment ? 6(CO3)

(A2) An organization is granted a block of addresses with the beginning address


14.24.74.0/24. The organization needs to have 3 sub blocks of addresses,to
use in its three subnets : one sub block of 10 addresses, one sub block
of 60 addresses, and one sub block of 120 addresses. Design the sub
blocks. 4(CO3)
OR

(B1) What are the characteristics of network layer ? 6(CO3)


(B2) Match the following for one or more layers of the TCPIP protocol suite:
(i) Route determination
(ii) Connection to transmission media
(iii) Providing services to the end user. 4(CO3)

5. Solve any One :––


(A1) How DNS server resolve the web address ? 5(CO4)
(A2) Discuss HTTP protocol. 5(CO4)
OR

(B1) Explain Digital signature. 5(CO4)


(B2) Write a short note on electronic mail. 5(CO4)

6. Solve any One :––


(A1) Discuss how a secret keys in symmetric cryptography and public keys in
asymmetric key cryptography are distributed and maintained. 5(CO4)

2KTT/ARDR/ET – 12906/12986 3 Contd.


(A2) Encrypt the massage ''this is an exercise'' using additive cipher with key
= 20. Ignore the space between words.
Decrypt the massage to get the original plaintext. 5(CO4)
OR

(B1) Alice uses the same key when she encrypts a message to be sent to
Bob and when she decrypts a message received from Bob. Is this as
example of symmetric key or asymmetric key cryptography ? Justify.
5(CO4)
(B2) Use additive cipher with key = 15 to encrypt the message ''Hola''.
5(CO4)

2KTT/ARDR/ET – 12906/12986 4

You might also like