Sie sind auf Seite 1von 4

Code: 9A05506

III B. Tech II Semester (R09) Regular & Supplementary Examinations, April/May 2013 COMPUTER NETWORKS (Common to CSS & ECC) Time: 3 hours Max. Marks: 70 Answer any FIVE questions All questions carry equal marks ***** 1 (a) Explain the characteristics of WAN. Why a WAN is required and what objectives are achieved by having a WAN? (b) Write short notes on interfaces and services of ISO layers. (a) What is SLIP? What are the advantages and disadvantages of it? (b) With an example, explain the importance of sequence numbers for the acknowledgements. (a) Briefly explain how the data link layer switching is done. (b) With a neat sketch explain the operation of simple two port bridge. What is optimality principle? With an example explain distance vector routing algorithm. (a) Give brief description about the different types of networks. (b) Write short notes on internetworking devices. (a) Would it be possible to place the RTP code in the operating system kernel, along with the UDP code? Explain your answer. (b) Explain the real-time transport protocol header format with a neat sketch. (a) Explain in detail about the hyper text transfer protocol. (b) Explain how the dynamic web page generated from the client side. (a) Explain one time pads with a suitable example. (b) Discuss about the redundancy and freshness.

4 5

*****

Code: 9A05506

III B. Tech II Semester (R09) Regular & Supplementary Examinations, April/May 2013 COMPUTER NETWORKS (Common to CSS & ECC) Time: 3 hours Max. Marks: 70 Answer any FIVE questions All questions carry equal marks ***** 1 Briefly explain the following: (a) Twisted-pair cable. (b) Coaxial Cable. (c) Fiber optic cable. (a) Give the detailed description of PPP frame format. (b) Explain the following terms of the data link layer. (i) Framing (ii) Error control (iii) Flow control (a) Explain how static channel allocation is done in LANs and MANs. (b) Write brief note on differential Manchester encoding. (a) With an example explain multicast routing algorithm. (b) Explain about count-to-infinity problem. What is horizon hack? (a) Discuss some of the ways in which the networks differ. (b) How is internetworking can be done? Explain in detail. (a) What is the total size of the minimum TCP MTU, including TCP and IP overhead but not including data link layer overhead? (b) Why does UDP exist? Would it not have been enough to just let user processes send raw IP packets? (a) What is a CDN? Explain the steps in looking up a URL when a CDN is used. (b) Draw and explain the architecture of WAP. (a) With a neat sketch, explain the process of converting the plain text to cipher text by using the cipher block chaining. (b) Explain how to encrypt and decrypt the message by using the stream cipher.

*****

Code: 9A05506

III B. Tech II Semester (R09) Regular & Supplementary Examinations, April/May 2013 COMPUTER NETWORKS (Common to CSS & ECC) Time: 3 hours Max. Marks: 70 Answer any FIVE questions All questions carry equal marks ***** 1 (a) With a neat diagram, explain the functionality of layers, protocols and interfaces. (b) What is the difference between connection-oriented and connection-less switching? (a) Discuss the functions of data link layer in brief. (b) What is pipelining? Discuss the two approaches dealing with errors in the presence of pipelining. (a) Write a brief note on ALOHA protocol. (b) Discuss about Manchester encoding with example. (a) Explain distance vector routing algorithm with example. (b) Compare adaptive and non-adaptive routing algorithms. (a) Give the structure of concatenated virtual circuits for internetworking. (b) Discuss in detail about the internetwork routing. (a) Give brief description about the timer management in TCP. (b) What do you mean by indirect TCP? Discuss it in detail. (a) Write the performance enhancements to the world wide web. (b) Discuss in detail about the message headers present in HTTP protocol. (a) Discuss the encryption and decryption process of the message by using the cipher feedback mode method. (b) Explain the substitution cipher mechanism of converting the plain text to cipher text. *****

Code: 9A05506

III B. Tech II Semester (R09) Regular & Supplementary Examinations, April/May 2013 COMPUTER NETWORKS (Common to CSS & ECC) Time: 3 hours Max. Marks: 70 Answer any FIVE questions All questions carry equal marks ***** 1 (a) Differentiate between the following: (i) Connectionless and connection oriented services. (ii) Point-to-point (vs.) Broadcast type of networks. (b) Give brief notes on crossbar switches. 2 (a) Give the services provided by the data link layer to the network layer. (b) Give the algorithm for the CRC method of error checking. (a) What is pure ALOHA and slotted ALOHA? Mention the advantages of slotted ALOHA. (b) Discuss about MAC addresses. Explain different congestion control techniques in network layer. (a) What is connectionless internetworking? Explain it in detail. (b) Explain the internetworking using the concatenated virtual circuits. (a) Draw and explain the position of RTP in the protocol stack. (b) Give brief description about the UDP protocol. (a) Explain the server side role in world wide web. (b) Write short notes on hyper text markup language. (a) Describe in detail about the conversion of plain text to cipher text by using the counter mode technique. (b) Write short notes on electronic code book mode.

4 5

*****

Das könnte Ihnen auch gefallen