Professional Documents
Culture Documents
Fifth Semester
(Regulations 2008/2010)
(Also common to.PTCS 2302 ~- Computer Networks for B.E. (Part-Time) Fourth
Semester - CSE - Regulations 2009)
11. (a) (i) Explain NRZ, NRZI and Manchester encoding schemes with
examples. (8)
(ii) Describe how bit stuffing works in HDLC protocol. (8)
Or
(b) (i) Discuss the issues in the data link layer. (4)
(ii) Suppose we want to transmit the message 11001001 and protect it
from errors using the CRC polynomial x3 + 1. Use polynomial long
division to determine the message that should be transmitted. (12)
12. (a) (i) An IEEE 802:5 token ring has 5 stations and a total wire length of
230 m. How many bits of delay must the monitor insert info the
ring? Calculate this for both 4 Mbps and 16 Mbps rings. The
propagation speed may be assumed to be 2.3 x 108 m Is. (6)
(ii) Discuss the problems encountered in applying CSMAlCD algorithm
to wireless LAN. How does 802.11 specification solve these
problems. (10)
Or
(b) (i) Discuss the limitations of bridges. (6)
(ii) Determine the maximum distance between any pair of stations in a
CSMAlCD network with a data rate of 10 Mbps, for the correct
operation of collision detection process, assuming the minimum
frame size to be 512 bits. What should be the maximum distance if
the data rate is increased to 1 Gbps? 2 stations A and B, connected
to the opposite ends of a 10-Mbps CSMAlCD network, start
transmission of long frames at times tl = 0 and t2 = 3 J.LS
respectively. Determine the instants when A hears the collision and
B hears the collision. 'Signal. propagation speed may be assumed as.
2 x 108ml s. (10)
13. (a) (i) Explain in detail about Address Resolution Protocol. (10)
(ii) What is subnetting? Explain. (6)
Or
(b) Explain the following:
(i): Error reporting (ICMP). (8)
(ii) Inter Domain Routing. (8)
14, (a) Describe the adaptive transmission mechanism and how it has evolved
time as the Internet community has gained more experience using TCP.
(16)
Or
(b) Explain the various congestion avoidance techniques in TCP. (16)
15. (a) Explain the structure of Data encryption standard. List various security
services.
Or
(b) . Explain about RSA algorithm with illustration.
2 73383