Topic Wise Questions Multimedia Communication (CSE4295)
Topic Wise Questions Multimedia Communication (CSE4295)
Packet Switching
Fall20 (2a)
Discuss about the delays in packet switched network. Explain the impact of packet size on the transmission delay in
packet switching networks. Also explain the effect of introducing more router/switching exchange between the end nodes.
Fall19 (2b)
Discuss connectionless and connection-oriented services in packet switched networks.
Fall18 (1 a & b)
1. Spring21 (1b)
2. Fall20 (1a)
(a) Compare between OSI and TCP/IP protocol models. Briefly discuss about major tasks of the Link layer and the
Transport layer of TCP/IP model along with example of two protocols used in each layer.
3. Spring20 (1a)
a) Discuss about the layers responsible for flow control and error handling TCP/IP protocol stack.
4. Fall18 3(a)
1. Spring21 (2a)
2. Fall20 (1b)
(b) With the help of illustrative block diagram, explain the MPEG I video encoding process. Indicate properly the lossy
steps during the encoding process. Also find and show the block/group of blocks used to exploit the temporal and spatial
redundancy in video sequence.
3. Fall20 (3c)
Give an overview of various MPEG standards. Also give a simplified overview of the components of the MPEG-4
standards.
4. Spring20 (2b)
With necessary block diagram of an MP3 encoder, clarify the improvements introduced in MP3.
5. Spring20 (3b)
Discuss the working principle of the H.26x video coding standard with detailed diagrams.
6. Fall18 (5a)
7. Fall18 (6b)
1. Spring21 (2b)
2. Spring20 (2a)
Clarify the statement that the JPEG compression is a lossy compression technique with a proper description of the lossy
stages of JPEG compression technique.
3. Fall18 (6a)
1. Spring21 (3a)
2. Spring20 (4a)
Illustrate the concept of chroma sub-sampling with suitable example. Also clarify the following chroma sub-sampling
standard i. 4:2:2 ii. 4:2:0
3. Fall18 (5b)
MP4 Encoder/Decoder
1. Spring21(3b)
1. Spring21(4a)
2.Fall19 (3a)
Discuss the DES and the AES encryption methods
3. Fall18 (7a)
1. Spring21(4b)
2. Spring20 (3a)
Discuss about the concept of message digest? How it can be used for authentication. Explain why it is more secure against
public key only attack.
3. Fall19 (4b)
Demonstrate how a receiver can identify whether an unauthorized third party has forged the original message if the sender
uses a digital signature.
5. Fall19 (5b)
Demonstrate how digital signature and message digest together can be used to secure the authenticity of the original
message.
6. Fall18 (8a)
1. Spring21 (5)
2. Fall20 (4)
3. Spring20 (1b)
Illustrate different formats of the UTF-8 text encoding technique with suitable examples.
4. Spring20 (4)
Huffman Code***
1. Spring21 (6)
2. Fall20 (5)
Choose the better encoding method between the Huffman code and any other Prefix code for the following sentence.
see, I see bees, bees see me.
State the justification of your answer. Ignore the spaces and punctuation symbols in the sentence. Consider only the
letters.
3. Spring20 (8)
Choose the better encoding method between the Huffman code and any other Prefix code for the following sentence.
some men interpret nine memos
State the justification of your answer.
4. Fall19 (4a)
Choose the better encoding between the Huffman code and Prefix code for the following sentence, with proper reason.
somemeninterpretninememos
Fall18 (2 a & b)
2. Fall20 (6)
Employ the LZW method for compressing as well as decompressing the following sentence.
some men interpret nine memos
Ignore the spaces and punctuation symbols in the sentence. Consider only the letters.
4. Fall18 (4)
Cyclic Redundancy***
1. Spring21 (8)
2. Spring20 (7)
Apply the Cyclic Redundancy Check on a 16-bit data stream to demonstrate how the receiver will detect the error that
occurred in any bit in the data stream. Assume the generator polynomial is (x4+x3+1) and the binary value of the 16-bit
data stream is the BCD equivalent of the 4 least significant digits of your roll number.
3. Fall19 (5)
Apply the Cyclic Redundancy Check on a 16-bit data stream to demonstrate how the receiver will detect the error that
occurred in any bit in the data stream. Assume the generator polynomial is x4+x2+1 and the binary value of the 16-bit data
stream is 1100100110010011.
4. Fall18 (3a)
Mixed
Spring21 (1a)
Fall20 (3a)
Give a comprehensive overview on the Teleconferencing technology.
Spring20(4b)
Give a comprehensive technical overview of the Internet telephony
Fall20 (3b)
Explain the Advanced Encryption System with the help of block diagram.
Fall19 (1b)
Explain the different types of delays in communication networks with the help of an illustration.
Fall20 (2b)
Explain and illustrate the man-in-the-middle attack in the authentication phase of a communication session. Also explain
how we can combat this type of security threats
Fall18 (7a)
Fall19 (2a)
How the complexity grows with the increase of node number in point-to-point connection? Explain with the help of
illustration.
Fall18 CCI(1b)
Fall19 (3b)
Explain the concept of layer models for transferring data via a protocol stack.
Fall18 (8a)
Fall18 CCI(1a)