(SEM VI) THEORY EXAMINATION 2021-22 DATA COMMUNICATION NETWORKS
DATA COMMUNICATION NETWORKS (KEC063)
B.Tech Semester VI – Theory Examination (2021–22)
Data Communication Networks is a fundamental subject in Electronics and Communication Engineering that deals with the transfer of data between devices through transmission media using well-defined rules and protocols. The objective of data communication is to ensure accurate, reliable, and efficient exchange of information between sender and receiver. With the rapid growth of the Internet, mobile communication, cloud computing, and multimedia services, data communication networks form the backbone of modern digital infrastructure.
The uploaded question paper clearly shows that the examination emphasizes basic components of data communication, protocols, transmission media, optical fiber, framing, multiple access, Ethernet technologies, IP addressing, IPv4 to IPv6 transition, transport and application layer protocols, encoding techniques, cryptography, congestion control, Ethernet operation, TCP/UDP comparison, and HTTP concepts. To score well, answers must be written in clear, connected paragraphs, explaining concepts with proper reasoning and technical accuracy rather than listing short points.
SECTION A – BASIC CONCEPTS OF DATA COMMUNICATION
(Based on Section-A, Page-1 of the paper)
A data communication system consists of five essential components: the sender, receiver, message, transmission medium, and protocol. These components work together to ensure that data is transmitted correctly from source to destination.
Protocols are required in data communication because they define the rules for communication, including syntax, semantics, and timing. Without protocols, devices would be unable to interpret data correctly, leading to communication failure.
The purpose of cladding in optical fiber is to keep the light confined within the core by total internal reflection. Cladding has a lower refractive index than the core, preventing signal loss and improving transmission efficiency.
Framing is the process of dividing a continuous stream of bits into manageable units called frames. It is required so that the receiver can correctly identify the beginning and end of each message.
A multiple access protocol is necessary when multiple users share a common communication channel, such as when accessing the Internet through a telephone company’s local loop. It prevents collisions and ensures fair usage of the shared medium.
The data rates of Ethernet technologies increase progressively from Standard Ethernet to Fast Ethernet, Gigabit Ethernet, and Ten-Gigabit Ethernet, reflecting advancements in network speed and capacity.
Conversion of IPv4 addresses from dotted decimal to binary representation is required for internal processing by networking devices, as computers operate on binary data.
IPv4 to IPv6 transition strategies include dual stack implementation, tunneling, and header translation, which allow gradual migration without disrupting existing networks.
The maximum size of process data in a UDP datagram is limited by the size of the UDP packet minus header overhead, ensuring lightweight and fast communication.
HTTP is related to the World Wide Web because it defines how web browsers and servers communicate to request and deliver web pages and resources.
SECTION B – TRANSMISSION, MEDIA, ADDRESSING & SECURITY
(Based on Section-B, Page-1)
In the Internet model, information is passed from one layer to the next by encapsulation. Each layer adds its own header before passing data downward, while the receiver removes headers during decapsulation.
When NRZ-I encoding is used to transfer 10 Mbps data, the average signal rate depends on the bit pattern, and minimum bandwidth is calculated based on signal transitions.
Transmission media lies at the physical layer of the OSI model and is responsible for carrying raw bits over a communication channel.
Piggybacking is a technique in which acknowledgment information is included with outgoing data frames, reducing overhead and improving channel efficiency.
The Bluetooth 802.11 architecture describes short-range wireless communication using radio waves, supporting device discovery, pairing, and data exchange.
Classful and classless addressing in IPv4 explain how IP addresses are allocated. Classful addressing wastes address space, while classless addressing (CIDR) improves efficiency. Address depletion arises due to limited IPv4 address space.
Asymmetric and symmetric key cryptography differ in key usage. Symmetric cryptography uses a single shared key, while asymmetric cryptography uses public and private keys, enhancing security for data transmission.
SECTION C – NETWORK TOPOLOGIES AND PROTOCOLS
(Based on Section-C, Page-1)
The fundamental characteristics of a data communication system include delivery, accuracy, timeliness, and jitter. These characteristics ensure reliable and efficient communication.
Internet standards mature through stages such as proposed standard, draft standard, and Internet standard, ensuring interoperability and reliability.
Network topologies such as bus, star, ring, and mesh are categorized based on line configuration. Each topology has its own advantages and limitations in terms of cost, reliability, and scalability.
POINT-TO-POINT PROTOCOL AND BIT STUFFING
(Based on Section-C, Q4 on Page-1)
The Point-to-Point Protocol (PPP) is used to establish direct communication between two nodes. It provides framing, authentication, and error detection. The PPP frame format includes fields such as flag, address, control, protocol, payload, and frame check sequence.
Bit stuffing is used to prevent accidental occurrence of flag patterns within data. At the sender, extra bits are inserted after specific patterns, and at the receiver, these extra bits are removed to recover original data.
ETHERNET, MULTIPLE ACCESS & CONGESTION CONTROL
(Based on Page-2 of the paper)
Ethernet is a widely used LAN technology that follows CSMA/CD for medium access. The binary exponential back-off algorithm controls retransmission timing after collisions.
Collision detection is considered an analog process because it relies on voltage variation on the transmission medium. CSMA is preferred over ALOHA because it senses the channel before transmission, reducing collisions. The maximum efficiency of ALOHA is mathematically proven to be 1/e.
Congestion occurs when network resources are insufficient to handle traffic load. The token bucket algorithm controls congestion by regulating data transmission rate.
TRANSPORT & APPLICATION LAYER CONCEPTS
Fragmentation is required when packets exceed maximum transmission unit size. IPv4 allows routers to fragment packets, while IPv6 shifts fragmentation responsibility to the sender.
The TCP header contains several fields missing in UDP, such as sequence number, acknowledgment number, and window size, because UDP is connectionless and does not provide reliability.
MIME allows transmission of non-text data over email, while an HTTP transaction consists of request and response messages exchanged between client and server.
HOW TO WRITE DATA COMMUNICATION NETWORK ANSWERS IN THE EXAM
In Data Communication Networks, never write answers in short bullet points. Always begin with a definition, followed by explanation of working principles, protocol behavior, and relevance. Use correct networking terminology such as framing, multiplexing, encoding, congestion, addressing, and protocols. Examiners give maximum importance to conceptual clarity, logical explanation, and correct interpretation of networking mechanisms.
Related Notes
BASIC ELECTRICAL ENGINEERING
ENGINEERING PHYSICS THEORY EXAMINATION 2024-25
(SEM I) ENGINEERING CHEMISTRY THEORY EXAMINATION...
THEORY EXAMINATION 2024-25 ENGINEERING MATHEMATICS...
(SEM I) THEORY EXAMINATION 2024-25 ENGINEERING CHE...
(SEM I) THEORY EXAMINATION 2024-25 ENVIRONMENT AND...
Need more notes?
Return to the notes store to keep exploring curated study material.
Back to Notes StoreLatest Blog Posts
Best Home Tutors for Class 12 Science in Dwarka, Delhi
Top Universities in Chennai for Postgraduate Courses with Complete Guide
Best Home Tuition for Competitive Exams in Dwarka, Delhi
Best Online Tutors for Maths in Noida 2026
Best Coaching Centers for UPSC in Rajender Place, Delhi 2026
How to Apply for NEET in Gurugram, Haryana for 2026
Admission Process for BTech at NIT Warangal 2026
Best Home Tutors for JEE in Maharashtra 2026
Meet Our Exceptional Teachers
Discover passionate educators who inspire, motivate, and transform learning experiences with their expertise and dedication
Explore Tutors In Your Location
Discover expert tutors in popular areas across India
Discover Elite Educational Institutes
Connect with top-tier educational institutions offering world-class learning experiences, expert faculty, and innovative teaching methodologies