Vous êtes sur la page 1sur 4

Code No:R7320503 1

III B.Tech.II Semester(R07) Regular Examinations, May 2010


COMPUTER NETWORKS
(Common to Computer Science & Engineering, Information Technology, Computer Science
& Systems Engineering, Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE questions
All questions carry equal marks
?????

1. (a) Explain in detail ISO-OSI reference model.


(b) Write short notes on interface, service and protocol.

2. (a) Explain the various types of wireless transmissions.


(b) What are the advantages and disadvantages of optical fiber as a transmission medium?

o m
3. (a) Given 1101011011 data frame and generator polynomial G(x)=x4 + x + 1, derive the
transmitted frame.
(b) In detail explain about internet.
. c
ld
4. (a) Briefly explain the key assumptions in dynamic channel allocation in LANS and MANS.

r
w o
(b) What is Ethernet? What are the most commonly used Ethernet cabling types?

5. (a) Briefly explain the distance vector routing algorithm with an example.

tu
(b) What is multicost? Explain multicost routing algorithm.

j. n
6. (a) What is choke packet? How does the choke packet helps in congestion control?
(b) Discuss how routing and switching is done in ATM networks.

w w
7. (a) Briefly discuss about transport layer quality of service parameters.
(b) Draw the structure of ATM AAI and explain.

w
8. (a) What is DNS? Explain the working of DNS.
(b) Classify security problems and explain each of them.

?????
Code No:R7320503 2
III B.Tech.II Semester(R07) Regular Examinations, May 2010
COMPUTER NETWORKS
(Common to Computer Science & Engineering, Information Technology, Computer Science
& Systems Engineering, Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE questions
All questions carry equal marks
?????

1. (a) Discuss TCP/IP network model in detail.


(b) A system has an N-layer protocol hierarchy. Application generates message of length M-
bytes. At each of layer, an H-byte header is added what fraction of the network bandwidth
is filled with the header?

2. (a) Explain in detail about crossbar switches?


(b) Explain the working of an ATM switch with the help of a diagram.
o m
.
3. (a) What is SLIP? What are the advantages and disadvantages of it?
c
r ld
(b) What is the remainder obtained by dividing x7 + x5 + 1 by generator x3 + 1?

4. (a) Discuss in detail the working of a token ring protocol with a neat sketch.

o
(b) Compare and contrast transparent and source routing bridges.

w
tu
5. (a) Distinguish between data gram and virtual circuit subnets.
(b) Explain the design issues of Network layer.

j. n
6. (a) What is internetworking? What are the different devices used to interconnect dissimilar
networks at different layer levels?

w w
(b) Briefly explain about the leaky bucket algorithm.

7. (a) Explain TCP segment header with a neat sketch.

w
(b) Imagine that a two-way handshake rather than a three-way handshake were used to set-up
connections. In other words, the third message was not required. Are the deadlocks now
possible? Give an example (or) show that none exist.

8. (a) What is SNMP? Briefly discuss its message types.


(b) Briefly explain a key distribution centre and a certificate authority.

?????
Code No:R7320503 3
III B.Tech.II Semester(R07) Regular Examinations, May 2010
COMPUTER NETWORKS
(Common to Computer Science & Engineering, Information Technology, Computer Science
& Systems Engineering, Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE questions
All questions carry equal marks
?????

1. (a) What is the principal difference between connectionless communication and connection.
oriented communication?
(b) Describe ISO-OSI model with a neat sketch.

2. (a) Discuss about the ISON architecture in detail.


(b) What are the reasons for choosing cell switching in ATM?

o m
3. (a) Draw and explain HDLC frame format.
(b) Discuss the design issues of data link layer.
. c
ld
4. (a) What are carrier sense protocols? Discuss about persistent and non persistent CSMA?

r
w o
(b) Compare and contrast static and dynamic channel allocation methods.

5. Define adaptive and non-adaptive routing. Explain any two non-adaptive routing algorithms.

j. n tu
6. (a) What is Tunneling? How it helps in connecting two different networks?
(b) What is congestion? Discuss different congestion control algorithms.

7. (a) Draw and explain in detail the TCP Header.

w w
(b) Why abrupt connection release result in data loss?

8. (a) What is cryptoanalysis?

w
(b) Briefly discuss about substitution ciphers, transposition ciphers and one time pads.

?????
Code No:R7320503 4
III B.Tech.II Semester(R07) Regular Examinations, May 2010
COMPUTER NETWORKS
(Common to Computer Science & Engineering, Information Technology, Computer Science
& Systems Engineering, Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE questions
All questions carry equal marks
?????

1. (a) Explain about Novell Networks and the ARPANET.


(b) Write any four reasons for usage of layered protocols.

2. (a) Explain broadband ISDN layers.


(b) Distinguish between circuit switching and pocket switching.

o m
3. (a) Explain one-bit sliding window protocol. Give the advantages and disadvantages of one
-hit sliding window protocol.
(b) Give the algorithm for CRC method of error checking.
. c
ld
4. (a) Explain the role of Discovery frames in source routing bridges in detail.

r
w
5. (a) Explain link state routing with an example. o
(b) Explain in detail the operation of slotted ALOHA.

tu
(b) Discuss the different algorithms for broadcast routing and compare them.

j. n
6. (a) What is fragmentation? Why is it important in internetworking? Explain transparent
fragmentation.
(b) Draw the ATM cell format. Explain how fields in cell format are used.

w w
7. (a) Give the format of TCP and UDP segment. Explain in when UDP is preferred to TCP.
(b) Why does the maximum packet lifetime T, have to be large enough to ensure that not

w
only the packet, but also its acknowledgments have vanished? Explain.

8. (a) What is multimedia? What are the problems with audio and video transfer over computer
networks?
(b) What is public key cryptography? What are the necessary conditions for public key
cryptography?

?????

Vous aimerez peut-être aussi