Anda di halaman 1dari 4

Code: 9A05506

1
(Common to IT and CSE)

B.Tech III Year I Semester (R09) Regular & Supplementary Examinations December/January 2013/14 COMPUTER NETWORKS Time: 3 hours Answer any FIVE questions All questions carry equal marks ***** 1 (a) (b) 2 (a) (b) 3 (a) (b) (c) 4 (a) (b) Explain the characteristics of WAN. Why a WAN is required and what objectives are achieved by having a WAN? Write short notes on interfaces and services of ISO layers. What is slip? What are the advantages and disadvantages of it? With an example, explain the importance of sequence numbers for the acknowledgements. Write short notes on the following: Binary encoding. Manchester encoding. Differential Manchester encoding. Consider an organization which has several branches in different cities of India. How hierarchical routing can be used for routing in such an organization? Explain how complexity of network layer and transport layer varies with type of service provided. Discuss in detail about the encoding of the IP address. Explain in detail about the various fields that are present in IPv4 header. Draw and explain the header format for a user datagram protocol. Discuss in detail about the real time transport protocol. What is a CDN? Explain the steps in looking up a URL when a CDN is used. Draw and explain the architecture of WAP. What are drawbacks of the DES algorithm? Explain the triple DES with an example. Max Marks: 70

5 (a) (b) 6 (a) (b) 7 (a) (b) 8 (a) (b)

*****

Code: 9A05506

2
(Common to IT and CSE)

B.Tech III Year I Semester (R09) Regular & Supplementary Examinations December/January 2013/14 COMPUTER NETWORKS Time: 3 hours Answer any FIVE questions All questions carry equal marks ***** 1 (a) (b) (c) 2 (a) (b) 3 (a) (b) Briefly explain the following: Twisted-pair cable. Coaxial cable. Fiber optic cable. Briefly explain about the data link layer design issues. If the bit string 0111101111101111110 is bit stuffed what is the output of the string. What is the primary difference between a token bus and token ring? A large population of ALOHA uses manages to generate fifty requests/sec, including both originals and retransmissions. Time is slotted in the units of 40 msec. (i) What is the chance of success on the first attempt? (ii) What is the probability of exactly k collisions and then a success? (iii) What is the expected number of transmission attempts needed? Discuss the flooding and selective flooding algorithms. Define congestion. Briefly explain different congestion prevention policies. What is fragmentation? Why is it important in internet working? Explain transport fragmentation in detail. What are the various services provided by the transport layer? Explain them in detail. Distinguish between NSAP, TSAP and transport connection. Explain the server side role in world wide web. Write short notes on hyper text markup language. Discuss in detail about the public key signatures. Explain with a suitable example, the generation of digital signatures by using the message digests. Max Marks: 70

4 (a) (b) 5

6 (a) (b) 7 (a) (b) 8 (a) (b)

*****

Code: 9A05506

3
(Common to IT and CSE)

B.Tech III Year I Semester (R09) Regular & Supplementary Examinations December/January 2013/14 COMPUTER NETWORKS Time: 3 hours Answer any FIVE questions All questions carry equal marks ***** 1 (a) (b) 2 (a) (b) Name the five basic network topologies and explain each one. Briefly explain how data transmission is done by using coaxial cable. What is flow control? Is it essential at the data link layer? Mention few techniques for the same. Explain how bandwidth wastage is reduced in the case of sliding window protocol with selective repeat. Briefly explain how the data link layer switching is done. With a neat sketch explain the operation of simple two port bridge. Explain selective flooding and discuss some of its practical usages. What is congestion? Why congestion control mechanisms differ for virtual circuit subnets and datagram subnets? Explain the role of NAT in the IP addressing. Describe in detail about the internet control message protocol. Suppose that the clock driven scheme for generating initial sequence numbers is used with a 15-bit wide clock counter. The clock ticks once every 100 msc, and the maximum packet lifetime is 60 sec. How often need resynchronization take place? In the work case? When the data consumes 240 sequence numbers/min? Write the performance enhancements to the World Wide Web. Discuss in detail about the message headers present in HTTP protocol. Discuss with an example, the conversion of plain text to cipher text by using the following: Counter mode. RSA. Triple DES. Max Marks: 70

3 (a) (b) 4 (a) (b)

5 (a) (b) 6

(a) (b) 7 (a) (b) 8 (a) (b) (c)

*****

Code: 9A05506

4
(Common to IT and CSE)

B.Tech III Year I Semester (R09) Regular & Supplementary Examinations December/January 2013/14 COMPUTER NETWORKS Time: 3 hours Answer any FIVE questions All questions carry equal marks ***** 1 (a) (b) 2 (a) (b) (c) 3 Write short notes on: (i) ARPANET. (ii) Internet. Distinguish between crossbar and space division switches. Write short notes on: Error correction codes. Error detection codes. Explain a simple stop-and-wait protocol. A seven floor office building has 15 adjacent offices per floor. Each office contains a wall socket for a terminal in the front wall, so the sockets from a rectangular grid in the vertical plane, with a separation of 4 m between sockets, both horizontally and vertically. Assuming that it is feasible to run a straight cable between any pair of sockets, horizontally, vertically or diagonally, how many meters of cable are needed to connect all sockets using: (i) A star configuration with a single router in middle. (ii) An 802.3 LAN. (iii)A ring network (without a wire center). Explain the concept of virtual circuit and datagram. Design algorithm using disjkstras algorithm to list all nodes on the cheapest path to a given destination. Write short notes on the following: Classless inter domain routing in internet. Address resolution protocol. Would it be possible to place the RTP code in the operating system kernel, along with the UDP code? Explain your answer. Explain the real-time transport protocol header format with a neat sketch. List and explain the components present in the user agent. Explain the RFC 822 formats with suitable example. List the disadvantages of cipher feedback mode. How they can be overcome by using the stream cipher? Explain the technique used in the symmetric key algorithms for conversion of plain text to cipher text. Max Marks: 70

4 (a) (b)

5 (a) (b) 6 (a) (b) 7 (a) (b) 8 (a) (b)

*****

Anda mungkin juga menyukai