Electronics and Communication Engineering: Question Paper Code: X10366
Electronics and Communication Engineering: Question Paper Code: X10366
Fifth Semester
(Regulations 2017)
11. a) (i) For the following parameters find theoretical capacity of the channel: (6)
I. Bandwidth: 10 KHz and SNRdB =20
II. Bandwidth: 150KHz and SNRdB=8
III. Bandwidth: 2 MHz and SNRdB =10
(ii) What is Scrambling and why it is used? (4)
(iii) Is the size of the ARP packet fixed? Explain. (3)
(OR)
12. a) (i) Compare the medium of a wired LAN with that of a wireless LAN in
today’s communication environment. Explain why the MAC protocol is
more important in wireless LANs than in wired LANs? (7)
(ii) Explain briefly why collision is an issue in random access protocols but
not in controlled access protocols or channelization protocols. (6)
(OR)
(OR)
b) (i) Explain the steps used By DVMRP router to create a source-based tree.
(7)
(ii) Differentiate between compatible and mapped addresses. Briefly discuss
their applications. (6)
14. a) (i) Explain the services offered by TCP to process at the application layer.
(6)
(ii) Describe the token bucket mechanism for congestion control. With which
other technique is token bucket usually combined to achieve complete flow
control? What problems in the simpler approach are addressed by using a
token bucket mechanism? (7)
(OR)
b) (i) Sketch the TCP segment format and discuss it in detail. (6)
(ii) I. Consider a reliable data transfer protocol that uses only negative
acknowledgements. Suppose the sender sends data only infrequently. Would
a NAK- only protocol be preferable to a protocol that uses ACKs? Why? (4)
II. Now suppose the sender has a lot of data to send and the end-to-end
connection experiences few losses. In this second case, would a NAK-only
protocol be preferable to a protocol that uses ACKs? Why? (3)
15. a) (i) FTP uses the services of TCP for exchanging control information and data
transfer. Could FTP have used the services of UDP for either of these two
connections? Explain. (4)
(ii) Differentiate between a substitution cipher and a transposition cipher. (4)
(iii) What are the advantages and disadvantages of a decentralized P2P
network? (5)
(OR)
b) (i) What do you think would happen if the control connection were served
before the end of an FTP session? Would it affect the data connection? (4)
(ii) Differentiate between message authentication and entity authentication.
(4)
(iii) Differentiate between centralized and decentralized P2P networks. (5)
PART- C (1 x 15 = 15 Marks)
16. a) Suppose 6 host machines and 1 router are connected by a company network
consisting of 3 subnets. The configuration is given in the following table:
b) Consider two hosts, A and B, connected by single link of rate R bps. Suppose
that the two hosts are separated by m meters, and suppose the propagation
speed along the link is s meters/sec Host A is to send a packet of size L bits
to Host B.
(i) Express the propagation delay, dprop, in terms of m and s.
(ii) Determine the transmission time of the packet, dtrans, in terms of L
and R.
(iii) Ignoring processing and queueing delays, obtain an expression for
the end-to-end-delay.
(iv) Suppose Host A begins to transmit the packet at time t = 0. At
time t = dtrans, where is the last bit of the packet?
(v) Suppose dprop is greater than dtrans. At time t = dtrans, where is the
first bit of the packet?
(vi) Suppose dprop is less than dtrans. At time t = dtrans, where is the first
bit of the packet?
(vii) Suppose s = 2.5x108, L = 100 bits, and R=28 kbps. Find distance
m so that dprop equals dtrans.