You are on page 1of 3
ihttps://sww.aleubihar.com ihttps://sww.aleubihar.com (2) Code : 051802 (1 Which one of the following uses UDP a B.Tech 8th Semester Exam., 2020 the transport protocol? (atte FUNDAMENTALS OF DATA a COMMUNICATION (i) Telnet _— i) DNS Time < 3 hours Full Marks iu) SMTP Instructions (a) Bit stusting refers to i) The marks are indicated in the righthand margin. (i) There are NINE questions in this paper. (i) -Anempt FIVE questions in all. {iv} Question No, 1 i compulsory 1, Choose the correct answer (any seven) () inserting a ‘0 in user data stream + to difierentiate it with a Nag (i inserting a 0" avoid ambiguity (ii) appending a nibble to the fag in flag stream to ‘aera1s (a) Which one of the following is not a anquenee client-server application? (i) appending a nibble to the user (y internet chat data stream Wed browsing (fe) Match the following (i) mit P. SMTP 1. Application layer fy Ping 2. BoP 2. Transport layer fo) im the slow start phase of TCP R TeP 3: Data link-tayer congestion control algorthm, the size of 8. PPP 4. Network layer the congestion window 5. Physical layer (9) doce not increase Pars (i increases linearly 21358 quadratically i423 (iy inereanes exponensly ty 42s 20AK/915 (Tum over } wasn . 20aK/918 (Continued ) huepssiwww.akubihar.com huepssiwww.akubihar.com ihttps://sww.aleubihar.com (3) (Check sum is used for @ error correction (i) error detection fii) Both (@ and 6) {iv} Kone of the above (g) ISDN stands for fi) Integrated Service Digital Network {i Interaction System Digital Network (ii) Inexpensive System Digital Network (iu) None of the above (ry X25. defines the protocols from @ layer 2 to layer 3 (i) ayer 1 10 layer 2 (ii) layer 1 to layer 3 (iv) layer 3 to layer 2 (Protocols in which the sender waits for 2 positive acknowledgement before advancing to the next data item are often called AV ARQ (i) PPR ay) as, tu) PRE 20AK/918 ‘hueps:iwww.akubihar.com (Tum Over ) 20aK/918 Ihttps://svww.akubihar.com (4) G) The commonly used protocol for webpage transfer is HTM fy HTP + iy eee iw) WoT 2. Why are switches generally preferred to bridges for the emallest networks? Explain the difference between 2 switch and a bridge. hps:/ww-akubibar com 16 3. A global organisation has offices located in different countries around the world and wishes to connect these together with a network that can transfer data and telephone calls between each office. Explain hhow the Internet could be used to provide this network. 14 4. There are three approaches gathering and using routing information—fa) distance: vector routing, (2) link-state routing and (@ path-vector routing. Briefly compare the three approaches by describing the routing information uyed and the way the routing Algorithm. works. 14 (Continued ) huepss/Avww.akubihar.com ihttps://sww.aleubihar.com (5s) S. Given the frame (message). generator ‘and remainder shown below, calculate the ansmitted frame Bame T7001 LTS 1900001110 ¢Quovent thrown away) 4 4119 00 06 Frame wah four zeros ‘appended 6. Define ATM and explain the transmission fof ATM celis. What ate the advantages of ‘ATM Network? 4 7. Consider a token bucket rate controller used to control a reserved rate flow. Assume that the token bucket has a capacity of 10 tokens and a token fil rate of 100 tokens. per second, and that every packet consumes 20AK/938 (Turn Over ) huepssiwww.akubihar.com aavyscay 3 ihttps://sww.aleubihar.com (6) fone token. If no token is available for an arriving packet, it is marked for possible discarding, ‘Suppose that at time , the token bucket is empty and the next taken ‘arrives’ at time 10ms. If packets arrive at times 11, 13, 17, 19, 23 and 29, which packets (if any) are marked? 4 8. The figure below shows part of a network in which two personal computers A and B, are ‘each connected to a switch (LAN switch 1 land 2} which are themselves interconnected by a router. Consider the transmission of data from personal computer A to B and produce a protocol layer diagram that clearly shows how data passes through all of the layers of the ISO reference model that are used within the PCs, switches and router: 14 Rowter [Breit] weet ooeS ec [Fecal i 3 9. Write short notes on the flowing: 3Yie4-14 fa) X25 (e) NIC (©) Maliplexing (a) Modems 20nK 420/918 code : 051802 ‘huepssiwww.akubihar.com

You might also like