Describe Physical addresses, logical addresses and port addresses.
[3 marks]Differentiate circuit switched and packet switched network.
[4 marks]Write a note on OSI model and explain working of all layers.
[7 marks]An analog signal has a bit rate of 8000 bps and a baud rate of 2000 baud. How many data elements are carried by each signal element? How many signal elements do we need?
[3 marks]Define following terms: Attenuation, Distortion, Noise, Propagation delay
[4 marks]Enlist three digital to analog conversation methods. Write a note on any one of them.
[7 marks]Sender wants to send 0101100100 to the receiver. Draw the signal if the sender used following encoding techniques: NRZ-L NRZ-I Manchester Differential Manchester
[7 marks]Enlist ICMP error reporting messages and explain any one of them.
[3 marks]Count to Infinity problem exist in which routing protocol? Provide possible solutions to this problem.
[4 marks]Draw header structure of IPv4 and explain all the fields in detail.
[7 marks]Differentiate connection oriented and connection less services.
[3 marks]Discuss classful addressing scheme with its limitations.
[4 marks]Explain link state routing in detail.
[7 marks]Find out network address and broadcast address of the IP address 200.200.200.200 if the classful IP addressing scheme is used.
[3 marks]Sender wants to send 10011010 to the receiver. However, 10111101 has been received. Show how the receiver will detect the error using CRC scheme if the generator used is x3+x2+1.
[4 marks]Explain Go Back Nprotocol in detail.
[7 marks]Explain any one controlled access protocol.
[3 marks]State whether the below statement is TRUE/FALSE? Justify your answer with proper explanation. Slotted aloha is better than pure aloha.
[4 marks]Write a note on High Level Data Link Control (HDLC).1
[7 marks]Define following terms: Message Confidentiality Message Integrity Message No-repudiation
[3 marks]Explain how FTP works.
[4 marks]Describe functions and working of HTTP protocol in detail.
[7 marks]Describe working of simple network management protocol.
[3 marks]Draw the flowchart of CSMA/CD algorithm.
[4 marks]How confidentiality can be achieved with symmetric key encryption and asymmetric key encryption. Explain in detail. Also discuss advantages and limitations of both encryption techniques.2
[7 marks]