January, 2016
A9-R4: DATA COMMUNICATIONS & NETWORK TECHNOLOGIES
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 Which is not a component of data communication?A) Message
B) Sender
C) Receiver
D) None of the above
1.2 Which is a connectionless internet transport protocol?
A) IMAP
B) IP
C) UDP
D) TCP
1.3 In which routing method do all the routers have a common database?
A) Distance vector
B) Link state
C) Dijkstra method
D) None of the above
1.4 To connect a device like TV set with a co-axial cable, ________ connector is used.
A) RS 45 connector
B) BNC connector
C) RJ 11 connector
D) None of the above
1.5 If data frames arrive at the receiver site faster than they can be processed by the receiver, then
it is needed to tell the receiver to be slow down. The protocol used in this situation is:
A) Wait and watch
B) Suspend
C) Stop and wait
D) None of the above
1.6 Which of the following is a valid IPv4 address?
A) 111.56.45.78
B) 221.34.7.8.20
C) 75.45.301.14
D) None of the above
1.7 Which of the networks allows different speed links?
A) Message-switched networks
B) Packet-switched networks
C) Circuit-switched networks
D) None of the above
1.8 FDDI (Fiber Distributed Data Interface) is an example of which topology?
A) Bus Topology
B) Ring Topology
C) Star Topology
D) None of the above
1.9 Frame relay technique uses ________.
A) Circuit switching
B) Message switching
C) Connection Oriented Packet switching
D) Hybrid switching
1.10 Decryption and encryption of data are the responsibility of which of the following layer?
A) Physical layer
B) Data Link layer
C) Presentation layer
D) None of the above
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
2.2 The term burst error means that 2 or more bits in the data unit have changed from 1 to 0 or from
0 to 1.
2.3 CSMA/CA is an access method in which collision is added in a queue of detected collisions.
2.4 Unguided media transport electromagnetic waves without using a physical conductor and also
referred as wireless communication.
2.5 Repeater is a data link layer device.
2.6 The use of subnet ensures division of large network into several smaller networks.
2.7 Each IP packet must contain a source and destination address.
2.8 The Hamming distance between 001111 and 010011 is 4.
2.9 Star topology does not allow direct traffic between devices.
2.10 The TCP/IP reference model has 8 layers.
3. Match words and phrases in column X with the closest related meaning/ word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
X
|
Y
|
||
3.1
|
A network
topology
|
A.
|
Simplex transmission
|
3.2
|
Kind
of transmission used for short distance communication (such as used in remote
control)
|
B.
|
Ring
|
3.3
|
Transfer
of data with start - stop bits and a variable time interval between data
units
|
C.
|
Parity bit
|
3.4
|
Transmission in
both directions at the same time
|
D.
|
IPv6
|
3.5
|
Number of signal
changes per second
|
E.
|
Infrared
transmission
|
3.6
|
Minimum header
size of an IP packet
|
F.
|
Fully Qualified
Domain Name (FQDN)
|
3.7
|
It uniquely
identifies a host within a DNS hierarchy
|
G.
|
Full duplex transmission
|
3.8
|
Adding
one extra 0 whenever five consecutive 1s follow a 0
|
H.
|
16 bytes
|
3.9
|
No
need to have an account or password to use this special FTP
|
I.
|
Baud rate
|
3.10
|
Next Generation
Internet Protocol
|
J.
|
Asynchronous
transmission
|
K.
|
Anonymous FTP
|
||
L.
|
20 bytes
|
||
M.
|
Bit stuffing
|
4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Enter your choice in the “OMR” answer sheet supplied with the question paper,following instructions therein. (1x10)
A.
|
PGP
|
B.
|
Test
|
C.
|
STAR
|
D.
|
Bus
|
E.
|
TDMA (TDD-TDMA)
|
F.
|
Symmetric-Key
Cryptography
|
G.
|
X.25
|
H.
|
Mobile adhoc
network (MANET)
|
I.
|
Ping
|
J.
|
Jitter
|
K.
|
OSPF (Open Shortest Path First)
|
L.
|
Ring
|
M.
|
Telnet
|
4.1 ________ refers to the variation in the packet arrival time.
4.2 ________ is used diagnostically to ensure that a host computer the user is trying to reach is
actually operating.
4.3 ________ is a kind of half-duplex communication, where the slave and receiver send and
receive data, but not at the same time, in a Bluetooth network.
4.4 A virtual-circuit switching network called ________ is used in absence of frame relay.
4.5 ________ topology is used in Ethernet.
4.6 ________ protocol is used to provide security to Emails.
4.7 ________ is a client/server application that allows a user to log on to a remote machine, giving
the user access to the remote system.
4.8 In ________, the sender and receiver of a message share a single, common key that is used to
encrypt and decrypt the message.
4.9 ________ protocol is a popular example of a link state routing protocol.
4.10 ________ is a continuously self-configuring, infrastructure-less network of mobile devices
connected without wires.
PART TWO
(Attempt any FOUR questions)
5.
a) What is protocol? Write a brief note on UDP.
b) What is multiplexing? Distinguish between FDM and TDM.
c) Assume there are five channels, each with a 100-kHz bandwidth. These channels are to be
multiplexed together. What is the minimum bandwidth of the link if there is a need for a guard
band of 10kHz between the channels to prevent interference?
(6+6+3)
6.
a) Describe in brief the structure of OSI reference model of network and explain the basic functions
supported by any two layers of your choice.
b) Change the following IPv4 addresses from dotted-decimal notation to binary notation.
i) 111.56.45.78
ii) 221.34.7.82
(11+4)
7.
a) Describe the structure of a twisted-pair cable and explain its properties. Also distinguish an
unshielded twisted-pair (UTP) and shielded twisted-pair (STP).
b) Describe: (i) Fixed size framing and (ii) Variable size framing.
(10+5)
8.
a) Differentiate static routing and dynamic routing. Also describe any dynamic routing algorithm.
b) What is the main objective of cellular telephony? Write a brief note on typical cellular telephony
system.
(10+5)
9.
a) Describe in brief IPSecurity (IPSec). Also explain the transport mode and tunnel mode in one
line each.
b) Define cryptography. Explain the process of cryptography by discussing major components of
cryptography such as plain text, cipher text, cipher, and key.
c) Distinguish HTTP and Secure HTTP.
(5+5+5)
No comments:
Post a Comment