Q. No Answer Marks Marks: While Using RSA Algorithm, If P 3, Q 11, e 7 What Is The Public Key ?

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, PILANI, Hyderabad Campus

Second Semester 2010-2011


Course Title : Modern Communication Technologies: Course Number: ECE C392
Test
: QUIZ : Time
: 8.00 8.50 AM
Date: 16/04/11
Day: Saturday
Max Marks : 30
Note: Attempt all questions
ID NO:

Name:

Q. No
Question
1
Multiple access scheme for WLAN is A) CSMA
B) CSMA-CD
C)CSMA-CA
D) 1-Persistant CSMA
2
The number of ATM cells required to transfer 64kbps voice is .
3
802.3 standard is for defining . Protocol in IEEE 802 LAN standard
4
The CRC used in ATM for header error control can detect .. errors
5
Hidden Node problem is solved in WLAN by using techniques
6
Longest allowable information field size in 802.3 is . Bytes
While using RSA algorithm, if p = 3, q = 11, e = 7, what is the public key ?
7
8
In a CDMA receiver, if the received signal is [ -1 1 -3 -1] and the code sequence is [ -1
1 -1 1], the correlator + integrator output is .
9
In a slotted Aloha system with normalized load of 0.5, the normalized throughput is
10
11
12
13
14

Under a light load, . LAN has a smaller delay :


A ) Token Ring
B) Ethernet
C) FDDI
D) WLAN
The address class of the IP addresses: 200.58.20.165 is. 1) B
2) C
3) E
4) A
The average packet delay in using TDMA is than using FDMA
In UDP, Pseudo header is need for
A small organization has a Class C address for seven networks each with 24 hosts.
What is an appropriate subnet mask?

Answer

Marks
1
1
1
1
1
1
1
1
1
1
1
1
1
2

Marks

Sl.
No
15
16
17
18
19
20
21
22
23
24
25
26

Question

Answer

Marks

When the PSH Bit in TCP is set, TCP module at Rx is expected to


The Cell size in ATM protocol is .. bytes
FCS used in 802.3 is
If ALOHA protocol is used to share a 56 kbps satellite channel with a frame length of
1000 bits, the maximum throughput is . frames/second
If 2 stations are at a distance of 2500 mts, the efficiency of a typical MAC protocol to
transfer a 1000 bits packet at 10Mbps is .. (propagation speed is 250 mts / s)
The back off algorithm used in 802.3 is A)Random back off B) Truncated Binary
Random back Off C) Truncated Random back off D) iterative Random back off
For IP address 150.32.64.34 and a subnet mask 255.255.240.0, the subnet address is
If RSA algorithm is used with a public key of {e, n} = {17, 77}, what is the cypher text C,
for a plain text P = 25
The header Error control in ATM is computed at A) Only source B) Only destination C)
Both at destination & Source D) Source , Destination & at every switch in the path
In ATM, the time taken to fill the pay load with 32kbps real time voice ?
As per 802.11 standard, A) DCF & PCF are mandatory B) DCF is optional & PCF is
mandatory C) DCF & PCF are optional D) DCF is mandatory & PCF is optional.
In a cryptographic system the message is 2000 bits long and the hash is 64 bits long.
How many years does it take for an intruder to match one of the hashes, if each trial
takes 1 nano second ?

1
1
1
1

Total Marks

30

2
1
1
2
1
1
1
2

Scored
Marks

You might also like