Sunteți pe pagina 1din 4

Code No: R5310505 1

III B.Tech I Semester(R05) Supplementary Examinations, May 2009


COMPUTER NETWORKS
(Common to Computer Science & Engineering and Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. (a) What are the distinct characteristics of local area networks, explain briefly? Why is a
LAN required and what objectives are achieved by having a LAN
(b) A group of 2n − 1 routers are interconnected in a centralized binary tree, with a router
at each tree node. Router i communicate with router j by sending a message to the root
of the tree. The root then sends the message back down to j. Derive an approximate
expression for the mean number of hops per message for large n, assuming that all router
pairs are equally likely. [8+8]

2. (a) Discuss in detail about Time division switches?


(b) With a neat diagram explain ISDN system with a PBX for use in large businesses? [8+8]

3. (a) In HDLC format how the variable address part is recognized by the nodes? What is bit
stuffing?
(b) Under what circumstances a node can send a frame with RNR status?
(c) If the bit string 0111101111101111110 is bit stuffed, what is the output string?
[8+4+4]

4. (a) Discuss about MAC addresses?


(b) Explain about a bit-map collision free protocol? [8+8]

5. Define Adaptive and Non-Adaptive routing. Classify the routing algorithms in to adaptive and
non adaptive type with suitable justifications. [16]

6. (a) What is inter-networking? Why it is required?


(b) What are the different devices that can be used for inter networking? Explain.
[8+8]

7. (a) Explain the protocol scenarios for establishing a connection using three way handshake.
(b) Why abrupt connection release results in data loss? [12+4]

8. (a) When external viewers are needed? How does a browser know which one to use?
(b) What is the difference in transferring compressed and uncompressed video?
[6+10]

?????
Code No: R5310505 2
III B.Tech I Semester(R05) Supplementary Examinations, May 2009
COMPUTER NETWORKS
(Common to Computer Science & Engineering and Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. (a) Differentiate between the following:


i. Connection less and Connection oriented services
ii. Point-to-Point Vs Broadcast type of networks
(b) What is the difference between a confirmed service and an unconfirmed service? For each
of the following, tell whether it might be a confirmed service, an unconfirmed service, both
or neither
i. Connection establishment
ii. Data transmission
iii. Connection release. [8+8]
2. (a) Television channels are 6MHz wide. How many bits/sec can be sent if four level digital
signals are used? Assume a noiseless channel
(b) How does a virtual circuit differ from a physical circuit? What advantages would a virtual
circuit provide? [8+8]
3. (a) Discuss the error control technique which is commonly used in data network. What value
of N is used in go-back-N ARQ technique used in ARPANET and why?
(b) Imagine that you are writing the data link software for a line used to send data to you,
but not from you. The other end uses HDLC, with a 3-bit sequence number and a window
size of seven frames. You would like to buffer as many out of sequence frames as possible
to enhance efficiency, but you are not allowed to modify the software on the sending side.
Is it possible to have a receiver window greater than one, and still guarantee that the
protocol will never fail? If so, what is the largest window that can be safely used? [8+8]
4. (a) Mention different IEEE 802 standards. Why is it expected that these standards should
be followed by all concerned universally?
(b) Explain how remote bridges can be used to interconnect distant LANS? [8+8]
5. What are the services provided by Network layer to Transport layer. Explain. [16]
6. Explain in detail
(a) OSPF and
(b) BGP. [8+8]
7. (a) Explain the protocol scenarios for establishing a connection using three way handshake.
(b) Why abrupt connection release results in data loss? [12+4]
8. (a) What is public key cryptography? What are the necessary conditions for public key
cryptography?
(b) Explain RSA algorithm with example? [8+8]

?????
Code No: R5310505 3
III B.Tech I Semester(R05) Supplementary Examinations, May 2009
COMPUTER NETWORKS
(Common to Computer Science & Engineering and Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. (a) Compare point -to-point channels with broadcast channels along with suitable examples?
(b) A collection of five routers is to be collected in a point-to-point subnet. Between each
pair of routers, the designers may put a high speed line, a medium-speed line, a low-speed
line, or no line. If it takes 100ms of computer time to generate and inspect each topology,
how long will it take to inspect all of them to find the one that best matches the expected
load? [8+8]

2. (a) What are the reasons for choosing cell switching in ATM?
(b) Discuss about the ISDN architecture in detail? [6+10]

3. (a) Explain one -bit sliding window protocol. Give the advantages and disadvantages of one-
bit sliding window protocol?
(b) Discuss the services provided by the data link layer to the network layer?
[8+8]

4. (a) Discuss about MAC addresses?


(b) Explain about a bit-map collision free protocol? [8+8]

5. How buffering at receiver can help in solving out of order delivery of packets. What are the
limitations of it. What are the applications for which this strategy is suitable and why. What
are the applications for which this strategy is not suitable and why. Explain. [16]

6. (a) What are ATM Service categories? Explain.


(b) What is Quality of Service? How ATM supports Quality of Service? [8+8]

7. (a) Explain the protocol scenarios for establishing a connection using three way handshake.
(b) Why abrupt connection release results in data loss? [12+4]

8. (a) What are the advantages of using e-mail gateways?


(b) How SMTP protocol works? [8+8]

?????
Code No: R5310505 4
III B.Tech I Semester(R05) Supplementary Examinations, May 2009
COMPUTER NETWORKS
(Common to Computer Science & Engineering and Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. (a) Define the following terms:


i. Computer Network
ii. Peer process
iii. Protocol
iv. Interface.
(b) Discuss various network applications and goals in detail. [8+8]
2. (a) What are the problems with message switching? How packet switching over comes it?
(b) Give a brief note on cross bar switches? [8+8]
3. (a) Discuss about character stuffing and bit stuffing framing techniques with examples? Men-
tion their advantages and disadvantages?
(b) Discuss about the simple protocol for a noisy channel? [8+8]
4. (a) What is the prime difference between a token bus and a token ring?
(b) A large population of ALOHA users manages to generate 50 requests/sec, including both
originals and retransmissions. Time is slotted in the units of 40 msec.
i. What is the chance of success on the first attempt?
ii. What is the probability of exactly k collisions and then a success?
iii. What is the expected number of transmission attempts needed? [4+12]
5. (a) Consider an organization which has several branches in different cities of India. How
hierarchical routing can be used for routing in such an organization.
(b) Explain how complexity of network layer and transport layer varies with type of service
provided. [10+6]
6. (a) When RARP is required. Explain how it works. What is the limitation of RARP? How
BOOTP provides solution for it?
(b) What is the difference between classful addressing and classless addressing? How classless
addressing results in decrease in the table size?
(c) Give an argument why the leaky bucket algorithm should allow just one packet per tick,
independent of how large the packet is. [6+5+5]
7. (a) Network layer can provide both connection oriented service and connection less service.
Similar is the case with Transport layer, then why two different layers are required.
(b) What are the Transport layers Quality of Service parameters? [8+8]
8. (a) How POP works? What are the advantages of IMAP over POP?
(b) What is the role played by message transfer agent? Explain. [6+10]

?????

S-ar putea să vă placă și