You are on page 1of 6

www.andhracolleges.

com The Complete Information About Colleges in Andhra Pradesh

Code No: RR320503 Set No. 1


III B.Tech II Semester Regular Examinations, Apr/May 2006
COMPUTER NETWORKS
( Common to Computer Science & Engineering, Information Technology,
Electronics & Control Engineering, Computer Science & Systems
Engineering and Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions

www.andhracolleges.com
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) List two advantages and two disadvantages of having international standards
for network, Protocols?
(b) Write short notes on interfaces and services of ISO layers. [8+8]

2. (a) Mentioning the advantages and disadvantages, explain sliding window protocol
using Go back n and using selective repeat.
(b) Draw, and explain about HDLC protocol. [8+8]

3. (a) A 4-Mbps token ring has a token-holding timer value of 10m sec. What is the
longest frame that can be sent on this ring?
(b) In a token ring the sender removes the frame. What modifications to the
system would be needed to have the receiver remove the frame instead, and
what would the consequences be? [8+8]

4. (a) For hierarchical routing with 4800 routers, what region and cluster sizes should
be chosen to minimize the size of the routing table for a three-layer hierarchy?

www.andhracolleges.com
(b) A computer on a 6-Mbps network is regulated by a token bucket. The token
bucket is filled at a rate of 1Mbps. It is initially filled to capacity with 8
megabits. How long can the computer transmit at the full 6 Mbps?
(c) An ATM network uses a token bucket scheme for traffic shaping. A new token
is put into the bucket every 5 µsec. What is the maximum sustainable net
data rate (i.e., excluding header bits)? [4+6+6]

5. (a) Briefly discuss about Transport Layer quality of service parameters.


(b) Briefly explain the concept of Addressing in TL. [8+8]

6. (a) Briefly discuss about Internet work Routing.


(b) Briefly discuss about connection less Internetworking. [8+8]

7. (a) What is Nagle’s algorithm? Explain the problem of silly window syndrome:
suggest a solution to this problem.
(b) Draw and explain the AAL1 cell format, headers and trailers. [8+8]

8. (a) What is the difference between message confidentiality and message integrity?
Can you have one without the other? Justify your answer.
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
USA-UK-Australia-Germany-France-NewZealand Universities List
1 of 2
www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information
www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR320503 Set No. 1


(b) What is an important difference between a symmetric key system and a public
key system?
(c) What is the man-in-the-middle attack? Can this attack occur when symmetric
keys are used? With an example, Justify your Answer. [6+4+6]

⋆⋆⋆⋆⋆

www.andhracolleges.com

www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR320503 Set No. 2


III B.Tech II Semester Regular Examinations, Apr/May 2006
COMPUTER NETWORKS
( Common to Computer Science & Engineering, Information Technology,
Electronics & Control Engineering, Computer Science & Systems
Engineering and Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions

www.andhracolleges.com
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) Write any four reasons for using layered protocols.


(b) List two ways in which the OSI reference model and the TCP/IP reference
model are the same and list in which they differ.
(c) Which is the principle difference between CO communication and CL commu-
nication. [6+4+6]

2. Explain in detail about elementary DLL protocols. [16]

3. (a) Explain the operation of source Routing Bridges.


(b) Compare and contrast Transparent and Source routing bridges. [8+8]

4. (a) Explain about, Routing for Mobile Hosts.


(b) What is Broadcasting? With an example, explain about Reverse path for-
warding. [8+8]

5. (a) Briefly discuss about Transport Layer quality of service parameters.

www.andhracolleges.com
(b) Datagram fragmentation and reassembly are handled by IP and are invisible
to TCP. Does this mean that TCP does not have to worry about data arriving
in the wrong order? [8+8]

6. (a) Briefly discuss about Concatenated Virtual Circuits.


(b) Briefly discuss about connection less Internetworking. [8+8]

7. (a) Draw and explain the structure of the ATM Adaptation layer.
(b) Draw and explain the AAL1 cell format, headers and trailers. [8+8]

8. (a) Is the message associated with a message digest encrypted? Explain your
answer.
(b) What is a key distribution centre? What is a certificate authority?
(c) In what way does a public key encrypted message digest provide a “better”
digital signature than using public key encrypted message? [6+6+4]

⋆⋆⋆⋆⋆

Seminar Topics - Scholarships - Admission/Entrance Exam Notifications


1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR320503 Set No. 3


III B.Tech II Semester Regular Examinations, Apr/May 2006
COMPUTER NETWORKS
( Common to Computer Science & Engineering, Information Technology,
Electronics & Control Engineering, Computer Science & Systems
Engineering and Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions

www.andhracolleges.com
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) Draw and explain in detail about ISO-OSI reference model.


(b) What does “negotiation” means when discussing network protocols? Give an
example of it. [8+8]

2. (a) Imagine a sliding window protocol using so many bits for sequence numbers
that wrap around never occurs. What relations must hold among the four
window edges and the window size?
(b) PPP is based closely on HDLC, which uses bit stuffing to prevent accidental
flag bytes within the payload from causing confusion. Give at least one reason
why PPP uses character stuffing instead. [8+8]

3. (a) What is meant by contention systems.


(b) Explain CSMA/CD protocol.
(c) Explain any one Collision free protocol. [4+6+6]

4. (a) With an example, explain Hierarchical Routing Algorithm.

www.andhracolleges.com
(b) Explain about, Routing for Mobile Hosts. [8+8]

5. (a) Briefly explain the concepts of Flow Control and Buffering.


(b) Imagine that a two-way handshake rather than a three-way handshake were
used to set up connections. In other words, the third message was not required.
Are deadlocks now possible? Give an example or show that none exist. [8+8]

6. (a) What is tunneling? Can tunneling be used in datagram subnets? If so, how?
(b) Discuss the two styles of internetworking. [8+8]

7. (a) Can AAL 1 handle messages shorter than 40 bytes using the scheme with the
Pointer field? Explain your answer.
(b) AAL 3/4 allows multiple sessions to be multiplexed onto a single virtual circuit.
Give an example of a situation in which that has no value. Assume that one
virtual circuit has sufficient bandwidth to carry all the traffic.
(c) What is the payload size of the maximum length message that fits in a sinlge
AAL 3/4 cell? [6+6+4]

8. (a) Explain the built-in HTTP request methods.


Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR320503 Set No. 3


(b) How do you make an image clickble in HTML? Give an example. [8+8]

⋆⋆⋆⋆⋆

www.andhracolleges.com

www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR320503 Set No. 4


III B.Tech II Semester Regular Examinations, Apr/May 2006
COMPUTER NETWORKS
( Common to Computer Science & Engineering, Information Technology,
Electronics & Control Engineering, Computer Science & Systems
Engineering and Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions

www.andhracolleges.com
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) Write any four reasons for using layered protocols.


(b) List two ways in which the OSI reference model and the TCP/IP reference
model are the same and list in which they differ.
(c) Which is the principle difference between CO communication and CL commu-
nication. [6+4+6]
2. (a) Given 1101011011 data frame and generator polynomial G(x) = x4 + x + 1,
derive the transmitted frame.
(b) What is pipelining? With an example, explain Go back-n sliding window
protocol. [8+8]
3. (a) What is time domain reflectometry? Write about 802.3 cabling.
(b) Draw and Explain 802.3 frame format. [8+8]
4. (a) Briefly discuss about congestion control in VC subnets.
(b) Write short notes on:

www.andhracolleges.com
i. Choke packet
ii. Load shedding
iii. Jitter control. [8+8]
5. (a) Briefly explain the concepts of Flow Control and Buffering.
(b) Explain in detail Four protocol scenarios for releasing a connection. [8+8]
6. (a) Briefly discuss ICMP.
(b) With an example, explain Address resolution protocol. [8+8]
7. (a) Give the format of UDP segment and TCP segment? Explain when UDP is
preferred to TCP?
(b) Briefly discuss about TCP timer management. [8+8]
8. (a) What is the role of SMI in network management?
(b) What is a key distribution centre? What is a certificate authority?
(c) In what way does a public key encrypted message digest provide a “better”
digital signature than using public key encrypted message? [5+6+5]

⋆⋆⋆⋆⋆
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information

You might also like