Académique Documents
Professionnel Documents
Culture Documents
o m
3. (a) Given 1101011011 data frame and generator polynomial G(x)=x4 + x + 1, derive the
transmitted frame.
(b) In detail explain about internet.
. c
ld
4. (a) Briefly explain the key assumptions in dynamic channel allocation in LANS and MANS.
r
w o
(b) What is Ethernet? What are the most commonly used Ethernet cabling types?
5. (a) Briefly explain the distance vector routing algorithm with an example.
tu
(b) What is multicost? Explain multicost routing algorithm.
j. n
6. (a) What is choke packet? How does the choke packet helps in congestion control?
(b) Discuss how routing and switching is done in ATM networks.
w w
7. (a) Briefly discuss about transport layer quality of service parameters.
(b) Draw the structure of ATM AAI and explain.
w
8. (a) What is DNS? Explain the working of DNS.
(b) Classify security problems and explain each of them.
?????
Code No:R7320503 2
III B.Tech.II Semester(R07) Regular Examinations, May 2010
COMPUTER NETWORKS
(Common to Computer Science & Engineering, Information Technology, Computer Science
& Systems Engineering, Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE questions
All questions carry equal marks
?????
4. (a) Discuss in detail the working of a token ring protocol with a neat sketch.
o
(b) Compare and contrast transparent and source routing bridges.
w
tu
5. (a) Distinguish between data gram and virtual circuit subnets.
(b) Explain the design issues of Network layer.
j. n
6. (a) What is internetworking? What are the different devices used to interconnect dissimilar
networks at different layer levels?
w w
(b) Briefly explain about the leaky bucket algorithm.
w
(b) Imagine that a two-way handshake rather than a three-way handshake were used to set-up
connections. In other words, the third message was not required. Are the deadlocks now
possible? Give an example (or) show that none exist.
?????
Code No:R7320503 3
III B.Tech.II Semester(R07) Regular Examinations, May 2010
COMPUTER NETWORKS
(Common to Computer Science & Engineering, Information Technology, Computer Science
& Systems Engineering, Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE questions
All questions carry equal marks
?????
1. (a) What is the principal difference between connectionless communication and connection.
oriented communication?
(b) Describe ISO-OSI model with a neat sketch.
o m
3. (a) Draw and explain HDLC frame format.
(b) Discuss the design issues of data link layer.
. c
ld
4. (a) What are carrier sense protocols? Discuss about persistent and non persistent CSMA?
r
w o
(b) Compare and contrast static and dynamic channel allocation methods.
5. Define adaptive and non-adaptive routing. Explain any two non-adaptive routing algorithms.
j. n tu
6. (a) What is Tunneling? How it helps in connecting two different networks?
(b) What is congestion? Discuss different congestion control algorithms.
w w
(b) Why abrupt connection release result in data loss?
w
(b) Briefly discuss about substitution ciphers, transposition ciphers and one time pads.
?????
Code No:R7320503 4
III B.Tech.II Semester(R07) Regular Examinations, May 2010
COMPUTER NETWORKS
(Common to Computer Science & Engineering, Information Technology, Computer Science
& Systems Engineering, Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE questions
All questions carry equal marks
?????
o m
3. (a) Explain one-bit sliding window protocol. Give the advantages and disadvantages of one
-hit sliding window protocol.
(b) Give the algorithm for CRC method of error checking.
. c
ld
4. (a) Explain the role of Discovery frames in source routing bridges in detail.
r
w
5. (a) Explain link state routing with an example. o
(b) Explain in detail the operation of slotted ALOHA.
tu
(b) Discuss the different algorithms for broadcast routing and compare them.
j. n
6. (a) What is fragmentation? Why is it important in internetworking? Explain transparent
fragmentation.
(b) Draw the ATM cell format. Explain how fields in cell format are used.
w w
7. (a) Give the format of TCP and UDP segment. Explain in when UDP is preferred to TCP.
(b) Why does the maximum packet lifetime T, have to be large enough to ensure that not
w
only the packet, but also its acknowledgments have vanished? Explain.
8. (a) What is multimedia? What are the problems with audio and video transfer over computer
networks?
(b) What is public key cryptography? What are the necessary conditions for public key
cryptography?
?????