Thursday, July 31, 2014

DATA COMPRESSION AND ENCRYPTION (DCE) MAY 2010 [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7

DATA COMPRESSION AND ENCRYPTION (DCE) MAY 2010  [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7

Con.3452-10.                                                                                                     AN-2875.

                                                                    (4 Hours)                          [Total Marks:-100]

N.B. (1) Question No.1 is compulsory.
        (2) Attempt any four questions out of remaining six questions.

1. (a) Compare lossy and lossless compression techniques with suitable examples. [5 Marks]
    (b) What are uniquely decodable codes? What are the tests performed to determine
          them. [5 Marks]
    (c) Compare the Arithmetic and Huffman coding. [5 Marks]
    (d) What are the main features of digital signature? [5 Marks]

2. Consider a discrete memoryless source with probability {0.35, 0.25, 0.20, 0.15, 0.05}
     Determine :- [20 Marks]
       (i) Huffman code for this source.
      (ii) Huffman code by minimum variance method.
     (iii) Determine average length, entrophy and efficiency.
      (iv) Draw binary root tree for both the codes.

3. (a) With S = {m, n, o, p} and p= {0.4, 0.3, 0.1, 0.2} encode message m n o p using
          arithmetic code. Generate tag for encoding and also decipher the tag to decode the sequence
          back. [10 Marks]  
     (b) Why is DCT more popular for image compression? Discuss its usage in JPEG. [10 Marks]

4. (a) Describe various standards of MPEG audio and video compressions. [10 Marks]
    (b) Explain the role played by KDC in symmetric encryption. [10 Marks]

5. (a) Explain the working of DES with block diagram. [10 Marks]
    (b) Explain Hash and MAC codes used for authentication. [10 Marks]

6. (a) Explain RSA algorithm with appropriate example. [10 Marks]
    (b) Explain various key management techniques. [10 Marks]

7. Write short notes on any two:- [20 Marks]
     (a) Chinese remainder theorem
     (b) Run Length Coding.
     (c) A law and  law of companding.
     (d) Text compression using PPM method.

DISCRETE TIME SIGNAL PROCESSING (DTSP) Semester 7 (3 Hours) May 2009

DISCRETE TIME SIGNAL PROCESSING
DISCRETE TIME SIGNAL PROCESSING (DTSP)
Semester 7
(3 Hours) May 2009
    VR-4797 
   [Total Marks : 100]
       
N.B. : (1) Question No. 1 is compulsory.  
  (2) Solve any four questions out of remaining six questions.  
  (3) Assume suitable data if required.  
  (4) Illustrate answers with sketches wherever required.  
       
1. Attempt any four :- 20
  (a) Impulse response of the highpass filter is obtained from the impulse response of the low pass filter by changing the signs of the odd numbered samples in impulse response of low pass filter. Justify.  
  (b) Explain the relationship between DFT and DCT.  
  (c) A two pole low pass filter has the system function H(z) = b0 / (1-pz-1)2
Determine the values of  b0 and p such that the frequency response H(w)
satisfies the conditions H(0) = 1 and | H(Π/4) |2 = 1/2
 
  (d) Compare IIR and FIR filters.  
  (e) Give any three advantages and disadvantages of digital filter.  
       
2. (a) Sample the given continuous time signal Xin(t) = sin[2Π1000t] + 0.5 sin [2Π2000t], at 8000 samples/s and find out eight point DFT using DIT  FFT algorithm. 10
  (b) For given sequence x(n) = {2, 0, 01}, perform following operations --
 
(i) Find out 4 pint DFT of X(n)
(ii) Plot x(n), its periodic extension Xp(n) and Xp(n-3)
(iii) Find out 4 point DFT of Xp(n-3)
(iv) Add phase angle in (i) with factor - [2Πrk/n] where N=4, r=3, k=0,1,2,3
(v) Comment on result you had in point (i) and (ii).
10
       
3. (a) The unit sample response of a system is h(n) = {3, 2, 1}. use the overlop save method to determine its output sequence in response to the repeating input sequence
x(n) = {2,0-2,0,2,1,0,-2,-1,0}.
10
  (b) What is DCT? Explain how DCT is classified in four types as DCT-I, DCT-II, DCT-III and DCT-IV. Which type is mostly used and why? 10
       
4. (a) The transfer function of discrete time casual system is given below
 
H(z) =          1 - Z-1

------------------------------------
1 - 0.2z-1 - 0.15Z-2
(i) Find the difference equation
(ii) Draw cascade and parallel realization
(iii) Show pole and zero diagram and then find magnitude at ω = 0 and ω= Π
(iv) Calculate the impulse response of the system.
10
  (b) Obtain the lattice realization for the system -
 
H(z) = 1+3z-1 + 3z-2 + z-3
_________________________

1+3/4z-1 + 1/2z-2 + 1/4z-3
10
     
5. (a) Consider the following specifications for a low pass filter
 
0.99 < | H (ejw) | < 1.01 0 < | ω | < 0.3 Π and
| H(ejw) | < 0.01 0.35 Π <  | ω | <   Π

Design a linear phase FIR filter to meet these specifications using the window design method.

10
  (b) Explain the pole zero locations for Type I, Type II, Type III and Type IV linear phase FIR filters. 10
       
6. (a) Use the bilinear transformation to design a discrete - time Chebychev high-pass filter an equiripple passband with
 
0 < | H (ejw) | < 01 0 < | ω | < 0.1 Π and
| 0.9 H(ejw) | < 1.0 0.3 Π <  | ω | <   Π
10
  (b) Write the help of block diagram, explain TMS 32 C 5 X series of processors. 10
       
7. Write short note on the following :- 20
  (a) Frequency sampling realization of FIR filters  
  (b) Finite Word Length in digital filters  
  (c) Digital Resonator  

DATA COMPRESSION AND ENCRYPTION (DCE) MAY 2012 [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7

DATA COMPRESSION AND ENCRYPTION (DCE) MAY 2012  [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7

Con. 4636.12.                         (REVISED COURSE)                                               GN-8942
                                                     (3 Hours)                                                 [Total Marks : 100]

N. B. : (1) Question No. 1 is Compulsory.
           (2) Attempt any four questions out of remaining six questions.

1. (a)What are the various models used for data compression?5
    (b)Compare between A-Law and u-Law compression ?5
    (c)What are active and passive attacts ?5
    (d)What are is Biometric Authentication ? Explain with examples.5

2. (a)

A source A= {a,b,c,d) has probabilities {0.7,0.15,0.1,0.05} respectively.

10
Generate a tag for the sequence { a b c d a } using arithmetic code.
    (b)Explain working of DES.10
3. (a)Take an example and show the difference in the encoding procedures of LZ7810
and LZW.
    (b)Explain RSA algorithm with an example.10

4. (a)

Discuss the various lossless techniques for image compression.

10
    (b)How are the keys distributed in conventional encryption systems ?10

5. (a)

How is motion compensation used in video compression ?

10
    (b)What are digital signatures and how are they implemented ?10

6. (a)

Why are Transforms used in compression ? How is JPEG different from

10
JPEG2000 ?
    (b)What are the various aspects of a firewall design ?10

7.

Write notes on (any two) :-

20
      (a) Chinese Remainder Theorom
      (b) Elliptic curve cryptography
      (c) MPEG audio standard
      (d) Steganography.

COMPUTER COMMUNICATION NETWORKS (CCN), B.E. Electronics & Telecommunication, Semester 7, May 2013.

COMPUTER COMMUNICATION NETWORKS (CCN),

B.E. Electronics & Telecommunication,

Semester 7, May 2013.
Con. 9370-13.
GS- 5788
(REVISED COURSE)

(3 Hours)
[Total Mark: 100]
N.B. (1) Question No 1 is compulsory.

(2) Attempt any four questions out of remaining six questions.

(3) Illustrate answers with sketches wherever required.

(4) Figures to the right indicate marks.

1. (a) Explain the difference between a connection oriented and connection less service. --- (5 Marks)

(b) What is data transparency? Explain bit stuffing and destuffing. ---- (5 Marks)

(c) What is collision and broadcast domain? How can they be reduced ? ---- (5 Marks)

(d) Explain ALOHA and Slotted ALOHA. ---- (5 Marks)

2. (a) What does the term error control mean in data link layer? Explain Go back N and selective repeat ARQ protocols. ---- (10 Marks)

(b) Explain count to infinity problem with an example and a method to avoid this Problem. ---- (10 Marks)

3. (a) Compare circuit switching, packet switching and message switching in detail. ---- (10 Marks)

(b) Explain TCP header in detail. ---- (10 Marks)

4. (a) Explain in detail repeaters, hub, bridges, routers, gateway and switches. ----(10 Marks)

(b) What is exterior and interior routing? Explain in brief distance vector routing and Link state routing. ---- (10 Marks)

5. (a) Explain HDLC frame formate. Describe configuration and response modes supported by HDLC protocol. ----- (10 Marks)

(b) Explain looping problem in bridge LAN with appropriate example. How to solve it. ---- (10 Marks)

6. (a) Write a note on IEEE 802.3 standard in detail. ----- (10 Marks)

(b) Find the shortest path between the source nodes 1 to all other nodes for the network given below using Dijkstra’s algorithm. Also draw the shortest path tree from node 1 to all other nodes. ---- (10 Marks)
7. Write short notes on any two: ---- (20 Marks)

(i) M/M/I model

(ii) ARP and RARP

(iii) ICMP

COMPUTER COMMUNICATION NETWORKS (CCN), B.E. Electronics & Telecommunication, Semester 7, December 2012.

COMPUTER COMMUNICATION NETWORKS (CCN),

B.E. Electronics & Telecommunication,

Semester 7, December 2012.
Con. 8440-12
KR- 1530
(REVISED COURSE)

(3 Hours)
[Total Mark: 100]
N.B. (1) Question No 1 is compulsory.

(2) Attempt any four questions out of remaining six questions.

(3) Assume suitable data wherever necessary.

1. (a) What is IP address, physical address, port number and socket address of a device. ---- (5 Marks)

(b) What is piggybacking? How is its use significant? ----- (5 Marks)

(c) Where is the MAC sub layer placed in the OSI model? What does it deal with and what services does it provide. ---- (5 Marks)

(d) Explain the role of internet layer and Network Interface Layer. ---- (5 Marks)

2. (a) What is flow control? Explain stop and wait ARQ with its state diagram. ---- (10 Marks)

(b) Compare packet switching, circuit switching and cell switching techniques with the help of timing diagram. ---- (10 Marks)

3. (a) Describe station types, configuration and communication (response) modes supported by HDLC protocol. ----- (10 Marks)

(b) Explain Repeater, Bridges, Routers and Switches. ---- (10 Marks)

4. (a) Explain how fragmentation and reassembly helps IP to work on a variety of physical networks. ------ (10 Marks)

(b) Differentiate between TCP and UDP. ---- (10 Marks)

5. (a) Explain the following medium sharing techniques: ----- (10 Marks)

(i) Reservation

(ii) Polling

(iii) Token passing.

(b) Explain Transparent bridges. Also show how bridge learning takes place with appropriate example. ----- (10 Marks)

6. (a) Discuss Queuing System classification. Explain M/M/I queuing system. ---- (10 Marks)

(b) For the graph shown in the figure show the successive iterations of the Dijkstr’s method of Shortest Path Algorithm. Take node 1 as the root node. ----- (10 Marks)
7. Write short notes on any two: ---- (20 Marks)

(a) Mobile IP

(b) DHCP

(c) OSPF

DATA COMPRESSION AND ENCRYPTION (DCE) DECEMBER 2009 [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7

DATA COMPRESSION AND ENCRYPTION (DCE) DECEMBER 2009 [ELECTIVE]  ELECTRONICS AND TELECOMMUNICATION SEMESTER 7

Con.5900-09.                                                                                         SP-6632

                                                      (3 Hours)                               [Total Marks:-100]

N.B:- (1) Question No.1 is compulsory.
          (2) Attempt any four questions out of remaining six questions.

1. (a) Compare lossy and lossless compression. [5 Marks]
    (b) Explain relative encoding for Fax and Telemetry. [5 Marks]
    (c) Compare conventional and public key encryption. [5 Marks]
    (d) Explain JPEG compression method for Image Compression. [5 Marks]

2. (a) What is data compression? Explain parameters to measure the performance of data
          compression techniques. [10 Marks]
    (b) Encode the following input stream using with and without move to front coding and compare
          the average code word length for both coding methods. Assume alphabets
          A=(a, b, c, d, m, n, o, p). Input stream 'C' = "abcddcbamnopponm". [10 Marks]

3. (a) Explain the Kraft Macmillan Inequality Criterion for variable size codes. Explain Ternary
         and Canonical Huffman codes. [10 Marks]
     (b) What is idea behind context based PPM algorithm? State the principle and how it can
           achieve saving in terms of rates. Explain PPM method for text compression. [10 Marks]

4. (a) Explain the concepts of static and dynamic dictionary. Show the encoding with example
         using LZ 77. [10 Marks]
    (b) A source and its letters form an alphabet  A=with probabilities
         P = {0.15, 0.06, 0.24, 0.05, 0.5} respectively. Calculate:- [10 Marks]
            (i) Standard Huffman code.
           (ii) Minimum Variance Huffman code.
          (iii) Variance in both codes and compare them.
          (iv) Average length and Redundancy of both the codes.
          (v) Draw the binary code tree for both the codes and also prove that they are prefix codes.

5. (a) Explain various approaches for compassing images of various types. [10 Marks]
    (b) Describe the features of video compression as compared to image compression. Explain
          the MPEG industry standard for video compression. [10 Marks]  

6. (a) Explain hybrid speech coders. In speech coding how the quality of speech can be improved
         by using CELP and other sinusoidal coders over LPC. [10 Marks] 
    (b) Explain how key management and distribution is a problem and how it is solved. Explain the
          various key management techniques. [10 Marks]

7. Write short notes on the following (any two):- [20 Marks]
     (a) RSA algorithm
     (b) HMAC design objectives and structures
     (c) Data Encryption Standard Algorithms.

DISCRETE TIME SIGNAL PROCESSING (DTSP) Semester 7 (3 Hours) December 2008

DISCRETE TIME SIGNAL PROCESSING
DISCRETE TIME SIGNAL PROCESSING (DTSP)
Semester 7
(3 Hours) December 2008
    RC-7319 
   [Total Marks : 100]
       
N.B. : (1) Question No. 1 is compulsory.  
  (2) Solve any four questions out of remaining six questions.  
  (3) Assume suitable data if required.  
       
1. (a) A digital sequence x(n) is to be transmitted across a linear time-invariant band limited channel as illustrated in figure


The transmitter is a D/C converter, and the receiver simply samples the received
waveform ya (t).
                y(n) =  ya (nTs)
Assume that the channel may be modeled as an ideal low-pass filter with a cutoff frequency of 4 KHz :-
 
Ga (JΩ) = { 1    | Ω| < 2Π (4000)
0    | Ω| < 2Π (4000)

Assuming an ideal C/D and D/C , and perfect synchronization between the transmitter and receiver, What values of sampling period, Ts will guarantee that y(n) = x(n).

20
  (b) We can create a comb filter by taking an FIR filter and replacing z by z, where L is a positive integer. Justify  
  (c) Explain how to determine IDFT using FFT algorithm.  
  (d) Compare impulse invariant and Bilinear transformation.  
       
2. (a) Find a difference equation to implement a filter tat has a unit sample response
             h (n) = (1/4)n cos (nΠ/3) u (n).
08
  (b) Design a digital resonator with a peak gain of unity at 50 Hz and 3 dB bandwidth of 6 Hz assuming a sampling frequency of 300Hz. 06
  (c) Realize a digital sinusoidal generator with the help of block diagram. 06
       
3. (a) A signal x(t) that is bandlimited to 10KHz is sampled with a sampling frequency of 20 KHz. The DFT of N = 1000 samples of x(n) is then computed.
     (i) To what analog frequency does the index k = 150 correspond?
     (ii) What is the spacing between the spectral samples?
10
  (b) The linear phase constraint on FIR filters places constraints on the unit sample response and the location of the zeros of the system function. In the table below, indicate with a check which filter types could successfully be used to approximate the given filter type. Justify your answers.
 
  Type I Type II Type III Type IV
Low-pass filter        
High-pass filter        
Bandpass filter        
Bandstop filter        
Differentiator        
10
       
4. (a) What is DCT? Explain how DCT is classified in four types as DCT-I, DCT-II, DCT-III and DCT-IV. Which type is mostly used and why? 10
  (b) Design a digital Chebyschev filter to satisfy the constraints.
 
0.707 <  | H (e) | < 1, 0 < ω < 0.2 Π
| H (e) | < 0.1, 0.5 < ω < Π

Use bilinear transformation and assuming T = 1 sec.

10
     
5. (a)      (i) x(n) = { 1 + 5j, 2 + 6j, 3 + 7j, 4 + 8j }. Find DFT X(k), using DIF FFT.
     (ii) Using results obtained in (i) and not otherwise find the DFT of the following sequences :-
               X1(n) = { 1, 2, 3, 4}, X1(n) = { 5, 6, 7, 8 }.
08
  (b) The direct form-II realization of IIR filter is shown in figure.
(i) Obtain transfer function H(z).
(ii) Obtain difference equation.
(iii) Realize the filter using cascade from with first order sections.
(iv) Realize the filter using parallel from with first order sections.
(v) Find impulse response of the filter.
(vi) Draw pole zero diagram.
(vii) Comment on stability of filter.
12
       
6. (a) Design FIR filter satisfy following specifications :-
 
  Passband edge frequency 1.5 KHz
  Transition width 0.5 KHz
  Stopband attenuation 750 dB
  Sampling frequency 8 KHz
Use hamming window function.
08
  (b) With the help help of block diagram, explain TMS 32 C 5X series of processors. 10
       
7. Write short note on the following :- 20
  (a) Filtering of long data sequences  
  (b) Finite word length effects in digital filters  
  (c) Geortzel's Algorithm  
  (d) Compare the DSP processors and general purpose processors.  

DATA COMPRESSION AND ENCRYPTION (DCE) May 2013 [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7

DATA COMPRESSION AND ENCRYPTION (DCE) DECEMBER 2013 [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7

Con. 9865-13.                                                                                                   GS-6238
                                                   (3 Hours)                                                  [Total Marks : 100]

  
N.B. : (1) Question No. 1 is Compulsory.
          (2) Attempt any four questions out of remaining six questions.
          (3) Assume suitable data wherever required.
          (4) Figures to be right indicates full marks.
          (5) Answers to the question should be grouped and written together.

1. (a)What are the different measures of performance of data compression techniques ?5
    (b)Discuss the applicaltion of JPEG 2000.5
    (c)Compare public and private key crypto-system.5
    (d)What is secure electronic payment system ?5

2. (a)

A source and its letter form an alphabet A = {a, b, c, d, e} with probabilities

10
P = {0.15, 0.05, 0.25, 0.35, 0.2} respectively. Calculate :-
      (i) Standard Huffman code
     (ii) Minimum variance Huffman code
     (iii) Average length and redundancy of both codes
     (iv) Draw the binary code tree for both the codes.
    (b)Explain the working of DES with block diagram.10

3. (a)

What are dictionary based compression schemes? Explain LZ77 with suitable examples.

10
    (b)What are various aspects of conventional encryption ? Discuss the types of attacks.10

4. (a)

How are differential encoding schemes used in audio compression ?

10
    (b)Explain Chinese remainder theorem with an example.10

5. (a)

Describe various approaches for Image Compression and discuss one of them in

10
detail.
    (b)Explain Hash and MAC algorithm used for authenication.10

6. (a)

Describe the features of Video Compression as compared to Image Compression.

10
Explain MPEG industry standard for video compression.
    (b)Explain Digital Immune System.10

7.

Write short notes on any two :-

20
       (a) Firewall design
       (b) Elliptic curve cryptography
       (c) MPEG audio standard
       (d) Two dimensional image transform.

DATA COMPRESSION AND ENCRYPTION (DCE) MAY 2009 [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7

DATA COMPRESSION AND ENCRYPTION (DCE) MAY 2009 [ELECTIVE]  ELECTRONICS AND TELECOMMUNICATION SEMESTER 7
                                                      
                                                                      (3 Hours)                            [Total Marks:-100]

N.B:- (1) Question No.1 is compulsory.
          (2) Attempt any four out of remaining six questions.

1. (a) Distinguish between Scalar and Vector quantization. [5 Marks]
    (2) What is 'motion compensation' in video compression? [5 Marks]
    (3) Compare symmetric and public key cryptography. [5 Marks]
    (4) Classify security attacks and discuss them. [5 Marks]

2. (a) Draw the Adaptive Huffman tree for the string 'xyxwz'... Give the encoding and decoding
         process for the same. [10 Marks] 
    (b) Explain the working of DES. [10 Marks]

3. (a) Encode the string 'mnop mnop ponm' using LZ78. What are the limitations of this method?
         How does LZW overcome this limitations? [10 Marks]
    (b) What is the significance of prime numbers in cryptography? Explain RSA algorithm with a
          suitable example. [10 Marks]

4. (a) Describe various approaches for image compression and discuss one of them in
         detail. [10 Marks]
   (b) Explain the Diffie-hellman key exchange process. [10 Marks]

5. (a) Explain significance of modelling and coding with respect to data compression. Discuss the
         various popular models used. [10 Marks]
    (b) Discuss security of HASH and MAC functions. [10 marks]

6. (a) What are the various applications for the Run Length Encoding(RLE) compression
          scheme? [10 Marks]
    (b) What are the main features of Digital Signature? Discuss one if its algorithm. [10 Marks]

7. Write notes on any two:- [20 Marks]
     (a) MPEG Audio
     (b) Discrete Logarithm
     (c) Stream Ciphers
     (d) Arithmetic Coding 

Wednesday, July 30, 2014

COMPUTER COMMUNICATION NETWORKS (CCN), B.E. Electronics & Telecommunication, Semester 7, May 2008.

COMPUTER COMMUNICATION NETWORKS (CCN),

B.E. Electronics & Telecommunication,

Semester 7, May 2008.
Con. 2976-08
CO- 4225
(REVISED COURSE)
(3 Hours)
[Total Mark: 100]
N.B. (1) Question No 1 is compulsory.

(2) Attempt any four questions out of remaining six questions.

1. (a) Compare OSI model and TCP/IP model. ----- (5 Marks)

(b) Explain HDLC data link control. ----- (5 Marks)

(c) What is the difference between Network layer delivery and transport layer delivery? ---- (5 Marks)

(d) Explain packet switching in brief. ---- (5 Marks)

2. (a) Explain performance issues in ARQ.--- (10 Marks)

(b) Draw the layered OSI Network architecture. Explain the functions of each layer and show the path of actual and vertual communication between the layers. ---- (10 Marks)

3. (a) Explain the SONET multiplexing and SONET frame structure. ---- (10 Marks)

(b) What is the mechanism of sliding window flow control? ----- (10 Marks)

4. (a) Differentiate UDP and TCP. ---- (10 Marks)

(b) Show that the maximum through put of pure ALOHA is 1/2e. ---- (10 Marks)

5. (a) Explain the various transmission media in detail. ---- (10 Marks)

(b) Explain the spanning tree algorithm with reference to frame forwarding, address learning and loop resolution. ---- (10 Marks)

6. (a) Explain Dijkstra's shortest path algorithm using graph. --- (10 Marks)

(b) With the help of block diagram explain ATM protocol architecture. ----- (10 Marks)

7. Write short notes on:- ----- (20 Marks)

(a) IPv4 and IPv6

(b) Hubs, Bridges and Switches

(c) FDDI

(d) ATM traffic management.

DISCRETE TIME SIGNAL PROCESSING (DTSP) Semester 7 (3 Hours) May 2008

Microprocessors and Microcontoll
DISCRETE TIME SIGNAL PROCESSING (DTSP)
Semester 7
(3 Hours) May 2008

 
CO-3484
[Total Marks : 100]
       
N.B. : (1) Question No. 1 is compulsory.  
  (2) Solve any four questions out of remaining six questions.  
  (3) Assume suitable data if required.  
       
1. (a) The analog signal x(t) is given below :
  x(t) = 2 cos 2000 ∏t + 3 sin 6000 ∏t + 8 cos 12000 ∏t
Calculate
     (i) Nyquist sampling rate.
     (ii) If the given x(t) is sampled at the rate Fs = 5000 Hz. What is the discrete
          time signal obtained after sampling ?
     (iii) What is the analog signal y(t) we can reconstruct from the samples if ideal
             interpolation is used?
20
  (b) Determine the casual and stable inverse of the system with impulse response
         h(n) = δ(n)-1/2 δ(n-1).
 
  (c) Suppose that H(z) and G(z) are rational and have minimum phase. Which of the following filters have minimum phase?
     (i) H(z) G(z)
     (ii) H(z) + G(z).
 
       
2. (a) Consider the digital filter shown in Figure :-


(i) Determine the input-output relation and the impulse response h(n)
(ii) Determine and sketch the magnitude | H (ω) | and the phase response ∠H(ω) of
      the filter and find which frequencies are completely blocked by the filter.
(iii) When ω0 = η/2, determine the output y(n) to the input
     x(n) = 3 cos (η/3 n + 30o ) -∞< n <∞.
10
  (b) For a continues time signal with equation, x(t) =sin [ 2 η 1000 t ] + 0.5 sin [ 2 η 2000 t ] sample the given signal at 8000 samples/esc find out 8 point DFT. Plot magnitude and phase response. 10
       
3. (a) Given x(n) = { 1, 2, 2, 1 }. Find corresponding DFT X(k) using DIT FFT. 10
  (b) Explain Energy compaction capability of DCT. 10
       
4. (a) What is the linear phase filter? What conditions are to be satisfied by the impulse response of an FIR system in order to have a linear phase? Plot and justify compulsory zero locations for symmetric even antisymmetric even and antisymmetric odd FIR filters. 10
  (b) Design the second order low pass digital Butterworth filter whose cut off frequency is 1 KHz at sampling frequency 104 samples per socond. (Use BLT method.) 10
     
5. (a) Design an FIR low pass digital filter with specifications --
    

Hd (e) = {

e-j3ω  - 3Π/4 < ω < 3Π/4
0        3Π/4 < | ω | < Π
 
10
  (b) A linear sfift-invariant system has a unit sample response given by
            h(n) = { -0.01, 0.02, -0.10, 0.40, -0.10, 1.02, -0.01}
     (i) Draw a signal flow graph for this system that requires the minimum number of
         multiplications.
     (ii) If the input to this system is bounded with I x(n) | < 1 for all n, what is the
           maximum value that the output y(n) can attain?
08
  (c) Define phase delay and group delay 02
       
6. (a) Implement the all pass filter using a lattice filter structure
 
H(z) = -0.512 + 0.64 z-1 -0.8z-2 + z-3
----------------------------------------------------
1-0.8z-1 + 0.64 z-2 - 0.512 z-3
08
  (b) With the help of block diagram, explain architecture of TMS 32 C 5X series of processors. 08
  (c) Compare impulse invariant and Bilinear transformation. 04
       
7. Write short note on the following :- 20
  (a) Filtering of long data dequences  
  (b) Goertzel Algorithm  
  (c) Frequency domain characteristics of the different types of window functions  
  (d) Coefficient quantization in IIR filters.  

DATA COMPRESSION AND ENCRYPTION (DCE) DECEMBER 2013 [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7

DATA COMPRESSION AND ENCRYPTION (DCE) [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7

Con. 8446-13.                                                                                                     LJ-14002
                                                        (3 Hours)                                            [Total Marks : 100]


N. B. : (1) Question No. 1 is Compulsory.
           (2) Attempt any four questions out of remaining six questions.

1. (a)How are DPCM and ADPCM used for audio compression?5
    (b)What is the difference between Shannon Fano coding and Huffman coding? 5
    (c)Discuss the major steps in S-box design.5
    (d)What are digital signatures and how are they used?5

2. (a)

A source A= {w,x,y,z) has probabilities {0.15,0.1,0.7,0.05} respectively. Generate

10
and decipher the tag for the sequence [x,y,z,w,z] using arithmetic code.
    (b)Explain how triples DES works with two and three keys.10

3. (a)

Take an alphabet string and code it using LZ78. what are the limitations and how can

10
they be overcome with LZW?
    (b)Classify the different types of attacks and explain them with examples.10

4. (a)

How is the frequency domain coding useful in audio compression?

10
    (b)Discuss the various principle involved in private and public key cryptography.10

5. (a)

Explain one lossless technique of image compression.

10
    (b)What are message authentication and Hash function and how are they used?10

6. (a)

What are the various steps involved in video compression?

10
    (b)Explain the various certificate based on Biometric authentication methods.10

7.

Write short notes on (any two) :-

20
      (a) JPEG 2000.
      (b) Chinese Remainder Theorom.
      (c) Digital Immune Systems.
      (d) Success Electronic Payment Systems.

MICROPROCESSORS AND MICROCONTROLLERS - 2 (MPMC) MAY 2010 [EXTC] ELECTRONICS AND TELECOMMUNICATION SEMESTER 6

MICROPROCESSORS AND MICROCONTROLLERS - 2 (MPMC) MAY 2010  [EXTC] ELECTRONICS AND TELECOMMUNICATION SEMESTER 6

Con.3514-10.                                        (REVISED COURSE)               AN-4528

                                                                   (3 Hours)                    [Total Marks:-100]

N.B: (1) Question No.1 is compulsory.
        (2) Attempt any four questions out of remaining six questions.
        (3) Assume suitable data, wherever required with justification.
        (4) Figures to the right indicate full marks.

1. (a) Draw the internal states of program memory, data register and flags of RIC18 microcontroller
         after executing the following set of instructions. In the interrupt vector table at address
         000000H a jump instruction is stored and the main program begins at location 000020H.
         Assume that the program execution starts when the microcontroller is power on
         reset. [10 Marks]
         MOVLW      0x89
         ADDLW       0x77
    (b) Explain the pipeline fetch and execution process with respect to the above
          program. [5 Marks]
    (c) Design an 8-bit serial input/output port interfaced at 0x08000 address in minimum mode
         of 8086 microprocessor. Show interface diagram and absolute memory map. [5 Marks]

2. (a) With neat diagram compare and explain different synchronizing methods for data transfer
          between 8086 microprocessor, and I/O devices. Clearly indicate the handshake
          signals. [10 Marks]
    (b) Explain the interrupt structure of 8086 microprocessor with respect to 8259 Programmable
         interrupt controller. [10 Marks]

3. (a) Draw the interface diagram of 8086 microprocessor and 8087 NDP, also explain various
         interface signals and co-processor working with host processor. [10 Marks]
    (b) Convert the decimal number - 187.625 into short real, long real and temporary real data
          types of 8087 NDP. [10 Marks]

4. (a) With neat diagram explain the different instruction formats of PIC18 controller. Also give
          the comparison of bit size of opcode for different instructions. [10 Marks]
    (b) Explain the working of following instruction of PIC18.
          (i) BTFSC F,b,a   (ii) BTG F,b,a   (iii) RRNCF F,d,a   (iv) IORWF F,d,a
              Specify the significance of each field in every instruction. [10 Marks]

5. (a) Write an assembly language program for an interface shown in Figure-1. Read an 8-bit data
         through DIP switch connected on PORTB and output the data to bit-0 of PORTC where an
         LED is connected. The clock frequency of the controller is 40 MHz and the data transfer rate
         at PORTC is 100 milliseconds. [10 Marks]
 
    (b) Draw the flow chart and write the an assembly language program for PIC18 controller to
         read and write five bytes from program memory to data memory. Assume the starting address
         of the program, data memory. [10 Marks]

6. (a) Write an assembly language program for an interface shown in figure-2. the interface is to
          implement a 3x3 bit calculator. The calculator has a two bit command interpreter as given in
          Table-1 to select different arithmetic operations. Display the result on LEDs connected on
          PORTC. [15 Marks]


    (b) Explain in brief various addressing modes of PIC 18 controller. [5 Marks]

7. Write a short notes on four of the following: [20 Marks]
     (a) Various assembly language directives and Macro functions.
     (b) String instructions of 8086.
     (c) Harvard architecture.
     (d) Dual functionality of parallel ports of PIC 18.
     (e) Stack related instructions of PIC 18.
     (f) What do you mean by object code compatibility in processor? How it is achieved in x86
          processor.


Tuesday, July 29, 2014

MICROPROCESSORS AND MICROCONTROLLERS - 2 (MPMC) MAY 2013 [EXTC] ELECTRONICS AND TELECOMMUNICATION SEMESTER 6

MICROPROCESSORS AND MICROCONTROLLERS - 2 (MPMC) MAY 2013  [EXTC] ELECTRONICS AND TELECOMMUNICATION SEMESTER 6

Con. 7241-13.                                                                                            GS-9789
                                                  (3 Hours)                                         [Total Marks : 100]

N. B. : (1) Question No. 1 is Compulsory.
           (2) Solve any four questions from the remaining six questions.
           (3) Figures to the right indicate full marks.
           (4) Assume suitable wherever necessary.

1. (a)Design 8086 microprocessor based system using mininimum mode following10
specifications :-
     (i) 8086 microprocessor working at 8 MHz
     (ii) 32 KB EPROM using 16 K X 8 devices
     (iii) 32 KB SRAM using 16 K X 8 devices.
Clearly show memory map address ranges. Draw a neat schematic.
    (b)What is segmented memory and what are its advantages ? Explain logical and physical.5
address in 8086.
    (c)Explain features of PIC 18F microcontroller.5

2. (a)

Draw and explain interfacing of 8086 with 8255.

10
    (b)Explain data and program memory organization of PIC 18F microprocontroller.10

3. (a)

Give flowchart and assembly language program for 8086 to substract two 4 digit

10
BCD numbers.
    (b)Explain the following instructions of PIC 18F microcontroller :-10
       (i) DAW
      (ii) MOVLB 0 X 06
     (iii) TBLRD*+
     (iv) SLEEP

4. (a)

Explain interrupt structure of 8086.

10
    (b)Explain addressing modes of PIC 18F microcontroller.10

5. (a)

Interface 8259A to 8086 and write initialization instructions for 8259A to meet

10
the following specifications :-
       (i) Edge triggered, single
      (ii) Mask interrupts IR1 and IR4
      (iii) Interrupt vector type for IRO is 60H.
    (b)List and explain stack related and processor control instructions of 8086.10

6. (a)

Explain 8086 maximum mode of operation in detail.

10
    (b)Write assembly language program for PIC 18F microcontroller to evaluate the10
following expression.
Y = P X Q + R X S
where p, Q, R and S are 8 bit numbers, which are located at memory locations
0 X 20 to 0 X 23. Store the result Y in memory locations 0 X 24 to 0 X 26.

7.

Write short notes on any four of the following:-

20
       (a) PIC 18F pipelining
       (b) PIC 18F STATUS register
       (c) Memory banking in 8086
       (d) PIC 18F microcontroller REST.
       (e) Advantages of memory segmentation.

MICROPROCESSORS AND MICROCONTROLLERS - 2 (MPMC) DECEMBER 2012 [EXTC] ELECTRONICS AND TELECOMMUNICATION SEMESTER 6

MICROPROCESSORS AND MICROCONTROLLERS - 2 (MPMC) DECEMBER 2012 [EXTC] ELECTRONICS AND TELECOMMUNICATION SEMESTER 6

Con.8257-12                                                                                                  KR-8720

                                        (3 Hours)                                                      [Total Marks:-100]

N.B: (1) Questions No.1 is compulsory.
        (2) Attempt any four questions from remaining six questions.

Q.1 (a) Compare 8086 and 8088 microprocessor. [4 Marks]
       (b) Write function for following pin for 8086 microprocessor. [6 Marks]
               (i) 
              (ii) 
             (iii) 
       
       (c) Explain status register of PIC 18. [5 Marks]
       (d) Write a program for PIC 18 to configure PORT B as output send 55 and AA atternately
             to PORT B. [5 Marks] 

Q.2 (a) Explain interrupt structure of 8086 microprocessor. [10 Marks]
       (b) Explain difference between 8086, 80186, 80286,80386 and 80486 microprocessor.
             [10 Marks]

Q.3 (a) Explain addressing modes of 8086 microprocessor. [10 Marks]
       (b) Explain following instruction of PIC-18 [10 Marks]
             (i) BTFSS F,b, A
            (ii) XORWF F,d,a
           (iii) ADDLW 0 x 25
           (iv) MOVFF
           (v) NEGF f,a.

Q.4 (a) Explain instruction formate used in PIC-18. [10 Marks]
       (b) Explain maximum mode of 8086 microprocessor. [10 Marks]

Q.5 (a) Draw and explain interfacing of 8086-8295 PIC. [10 Marks]
       (b) Explain features of coprocessor 8087. Explain interfacing with 8086 microprocessor.
             [10 Marks]

Q.6 (a) Explain I/O port structure of PIC-18. [10 Marks]
       (b) A Bank of 8 push buttons keys are connected to PORT B of PIC-18. Write a program to
            recognize key pressed, debounce key and identify location in the key bank with numbers
            from 0 to 7. [10 Marks]   

Q.7 (a) Explain assembler directives used in 8086 microprocessor. [10 Marks]
       (b) Explain pipeline concept used in PIC-18. [10 Marks]

Microprocessors and Microcontollers - 1 (MPMC) Semester 5 (3 Hours) December 2013

Microprocessors and Microcontoll
Microprocessors and Microcontollers - 1 (MPMC)
Semester 5
(3 Hours) December 2013

 
LJ-11312
[Total Marks : 100]
       
N.B. : (1) Question No. 1 is compulsory.  
  (2) Solve any four questions out of remaining six questions.  
       
1. (a) Explain T states, Machine cycles and instruction cycles and instruction cycles. 05
  (b) Why address and data bus are multiplexed? Explain how they demultiplexed in 8085. 05
  (c) Differentiate SJMP, AJMP, and LJMP instructions of 8051. 05
  (d) Write assembly language program for 8051 to read the data from port lines P1.0 to P1.3 and P2.0 to P2.3, if data are equal then send FFH to PORT 3 else OOH. 05
       
2. (a) Explain interrupt structure of 8085. 10
  (b) Explain internal memory organization of 8051 microcontroller. 10
       
3. (a) Draw and explain timing diagram for instruction INR M. 10
  (b) Draw and explain the architecture of ARM processor. 10
       
4. (a) Explain the control word register format of 8253. Write assembly language program for 8085 to generate a square wave of frequency 2 KHz using 8253. Assume 8253 clock frequency is 1 MHz. 10
  (b) Explain addressing modes of ARM processor. 10
     
5. (a) Interface 8255 to 8085 using I/O mapped I/O technique. Write assembly language program to initialize 8255 as PORT A- input port, PORT B - output port in mode 1 10
  (b) Calculate the time delay produced by the following subroutine. Assume crystal frequency of 8085 as 6 MHz.
 
  PUSH PSW
  PUSH B
  LXI B, FFFDH
UP: DCX B
  MOVA,C
  ORAB
  JNZ UP
  POP B
  POP PSW
  RET
10
       
6. (a) Write assembly language program to generate a rectangular waveform of frequency 1 KHz and 70% duty cycle at pin P1.1 using 8051. Assume 8051 microcontroller is operating at frequency 12 MHz. 10
  (b) Explain serial communication in 8085 system. 10
       
7. Write short note on :- 20
  (a) Salient features of 89C51, 89C52, 89C2051 and 89C2052.  
  (b) ADC 0808 interfacing with 8051 microcontroller.  
  (c) PORT 1 internal structure of 8051  
  (d) Memory Access instructions of ARM processor.  

Monday, July 28, 2014

MICROPROCESSORS AND MICROCONTROLLERS - 2 (MPMC) DECEMBER 2013 [EXTC] ELECTRONICS AND TELECOMMUNICATION SEMESTER 6

MICROPROCESSORS AND MICROCONTROLLERS - 2 (MPMC) DECEMBER 2013 [EXTC] ELECTRONICS AND TELECOMMUNICATION SEMESTER 6

Con. 7339-13.                                                                                                   LJ - 11488
                                                           (3 Hours)                                        [Total Marks : 100]

N. B. : (1) Question No. 1 is Compulsory.
           (2) Solve any four questions from remaining questions.

1. (a)Design memory system for 8086 microprocessor with following specifications :-12
   (i) 8086 microprocessor working in mininimum mode at 10MHz frequency.
  (ii) 32 KB EPROM using 8 KB Chips
  (iii) 16 KB SRAM using 4 KB Chips.
Explain the design and show memory address map.
    (b)Draw and explain typical I/O port pin structure of PIC 18.4
    (c)Describe Mode Set Register of DMA controller 8257.4

2. (a)

Explain control word and status word of 8087 NDP.

10
    (b)Describe addressing modes of PIC 18.10

3. (a)

Interface Seven segment dispaly with PIC 18 and explain its working.

8
    (b)Draw and explain timing diagrams for read operation in minimum and maximum12
mode of 8086 microprocessor.

4. (a)

Explain memory organisation of PIC 18.

10
    (b)With neat diagram explain interfacing of DMA controller 8257 wiith 808610
microprocessor in minimum mode.

5. (a)

Write an assembly language program for 8086 microprocessor to check whether.

10
a string of 10 characters represents Palindrome.
    (b)Interface 8087 NDP with 8086 microprocessor and expalin their interaction.10

6. (a)

Which are the different methods of program looping?Explain each method in short.

10
    (b)Describe how interface chip and I/O Devices are synchronised. Explain it using10
pulse mode.

7.

Write notes on (any four):-

20
      (a) Status register of PIC 18
      (b) Control flags of 8086
      (c) Assembler directives
      (d) Programming model of 8086
      (e) Advantages of memory segmentation.