0% found this document useful (0 votes)
35 views

Topic Wise Questions Multimedia Communication (CSE4295)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

Topic Wise Questions Multimedia Communication (CSE4295)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

CSE 4295: Multimedia Communication

Topic Wise Semester Final Questions


Semesters: Sp21, Fall20, Sp20, Fall19, Fall18
Prepared by Md. Faisal Khan, EEE 37th Batch

Probable Question Pattern


Same as last semester two semesters (Sp21 & Fall20). Descriptive questions in Part A. Mathematical problems in Part B.

Packet Switching
Fall20 (2a)
Discuss about the delays in packet switched network. Explain the impact of packet size on the transmission delay in
packet switching networks. Also explain the effect of introducing more router/switching exchange between the end nodes.

Fall19 (2b)
Discuss connectionless and connection-oriented services in packet switched networks.

Fall18 (1 a & b)

Fall18 CCI (a & b)


TCP/IP

1. Spring21 (1b)

2. Fall20 (1a)
(a) Compare between OSI and TCP/IP protocol models. Briefly discuss about major tasks of the Link layer and the
Transport layer of TCP/IP model along with example of two protocols used in each layer.

3. Spring20 (1a)
a) Discuss about the layers responsible for flow control and error handling TCP/IP protocol stack.
4. Fall18 3(a)

5. Fall18 CCI (4b)


MP3, MPEG 1, MPEG 2, MPEG 4, H.26x

1. Spring21 (2a)

2. Fall20 (1b)
(b) With the help of illustrative block diagram, explain the MPEG I video encoding process. Indicate properly the lossy
steps during the encoding process. Also find and show the block/group of blocks used to exploit the temporal and spatial
redundancy in video sequence.

3. Fall20 (3c)
Give an overview of various MPEG standards. Also give a simplified overview of the components of the MPEG-4
standards.
4. Spring20 (2b)
With necessary block diagram of an MP3 encoder, clarify the improvements introduced in MP3.

5. Spring20 (3b)
Discuss the working principle of the H.26x video coding standard with detailed diagrams.

6. Fall18 (5a)

7. Fall18 (6b)

8. Fall18 CCI (5b)


JPEG Compression

1. Spring21 (2b)

2. Spring20 (2a)
Clarify the statement that the JPEG compression is a lossy compression technique with a proper description of the lossy
stages of JPEG compression technique.

3. Fall18 (6a)

4. Fall18 CCI (5a)

Chroma Sub Sampling

1. Spring21 (3a)

2. Spring20 (4a)
Illustrate the concept of chroma sub-sampling with suitable example. Also clarify the following chroma sub-sampling
standard i. 4:2:2 ii. 4:2:0

3. Fall18 (5b)
MP4 Encoder/Decoder

1. Spring21(3b)

DES & AES Method

1. Spring21(4a)

2.Fall19 (3a)
Discuss the DES and the AES encryption methods

3. Fall18 (7a)

4. Fall18 CCI (7b)


Digital Signature & Message Digest

1. Spring21(4b)

2. Spring20 (3a)
Discuss about the concept of message digest? How it can be used for authentication. Explain why it is more secure against
public key only attack.

3. Fall19 (4b)
Demonstrate how a receiver can identify whether an unauthorized third party has forged the original message if the sender
uses a digital signature.

4. Fall18 CCI (7a)

5. Fall19 (5b)
Demonstrate how digital signature and message digest together can be used to secure the authenticity of the original
message.

6. Fall18 (8a)

7. Fall18 CCI (8a)


UTF-8***

1. Spring21 (5)
2. Fall20 (4)

3. Spring20 (1b)
Illustrate different formats of the UTF-8 text encoding technique with suitable examples.
4. Spring20 (4)
Huffman Code***

1. Spring21 (6)

2. Fall20 (5)
Choose the better encoding method between the Huffman code and any other Prefix code for the following sentence.
see, I see bees, bees see me.
State the justification of your answer. Ignore the spaces and punctuation symbols in the sentence. Consider only the
letters.

3. Spring20 (8)
Choose the better encoding method between the Huffman code and any other Prefix code for the following sentence.
some men interpret nine memos
State the justification of your answer.

4. Fall19 (4a)
Choose the better encoding between the Huffman code and Prefix code for the following sentence, with proper reason.
somemeninterpretninememos

5. Fall18 CCI (4a)


Hamming Code

Fall19 (Part B Q1)


Apply encoding to all the three least significant digits of your roll number as a single message using a suitable Hamming
code. Before applying the Hamming code, convert each digit of the message into an equivalent 4 bit BCD value so that
you will get a 12- bit long binary sequence as a message. Assume, the LSB of the encoded bitstream is in error. Show in
detail, how the receiver will be able to detect that error.

Fall18 (2 a & b)

Fall18 CCI (3a)


LZW Method***
1. Spring21 (7)

2. Fall20 (6)
Employ the LZW method for compressing as well as decompressing the following sentence.
some men interpret nine memos
Ignore the spaces and punctuation symbols in the sentence. Consider only the letters.

3. Fall19 (Part B Q2)


Employ LZW compression on your roll number. For doing that, write down your 9-digit roll number three times without
any other characters, such as ‘dot’ or ‘space’ etc. Thus you will get a 27-digit long message. Now compress this message
using LZW method. Assume that the basic dictionaries in the transmitter and receiver have only 128 entries (from 0 to
127). Therefore the next entry in the dictionary must be started from index number 128. After proper compression, show
the complete decompression procedure at the receiving side. Illustrate the memory requirements after employing the LZW
method.

4. Fall18 (4)
Cyclic Redundancy***

1. Spring21 (8)

2. Spring20 (7)
Apply the Cyclic Redundancy Check on a 16-bit data stream to demonstrate how the receiver will detect the error that
occurred in any bit in the data stream. Assume the generator polynomial is (x4+x3+1) and the binary value of the 16-bit
data stream is the BCD equivalent of the 4 least significant digits of your roll number.

3. Fall19 (5)
Apply the Cyclic Redundancy Check on a 16-bit data stream to demonstrate how the receiver will detect the error that
occurred in any bit in the data stream. Assume the generator polynomial is x4+x2+1 and the binary value of the 16-bit data
stream is 1100100110010011.

4. Fall18 (3a)
Mixed
Spring21 (1a)

Fall20 (3a)
Give a comprehensive overview on the Teleconferencing technology.

Spring20(4b)
Give a comprehensive technical overview of the Internet telephony

Fall20 (3b)
Explain the Advanced Encryption System with the help of block diagram.

Fall18 CCI (6b)

Fall19 (1b)
Explain the different types of delays in communication networks with the help of an illustration.

Fall20 (2b)
Explain and illustrate the man-in-the-middle attack in the authentication phase of a communication session. Also explain
how we can combat this type of security threats

Fall18 (7a)

Fall18 CCI (6a)

Fall19 (2a)
How the complexity grows with the increase of node number in point-to-point connection? Explain with the help of
illustration.

Fall18 CCI(1b)
Fall19 (3b)
Explain the concept of layer models for transferring data via a protocol stack.

Fall18 (8a)

Fall18 CCI(1a)

Fall18 CCI (8b)

You might also like