Beruflich Dokumente
Kultur Dokumente
1
IV B.Tech II Semester Supplimentary Examinations, May 2008
INTERNET TECHNOLOGIES
(Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
⋆⋆⋆⋆⋆
1 of 1
Code No: RR421202 Set No. 2
IV B.Tech II Semester Supplimentary Examinations, May 2008
INTERNET TECHNOLOGIES
(Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
⋆⋆⋆⋆⋆
1 of 1
Code No: RR421202 Set No. 3
IV B.Tech II Semester Supplimentary Examinations, May 2008
INTERNET TECHNOLOGIES
(Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
1. (a) List the major disadvantages with the layered approach to protocols.
(b) Using the layer models describe the ordering and delivery of a Pizza, indicating
the interactions at each level as shown in figure 1b. [10+6]
Figure 1b
2. (a) What are the different AAL protocols & services.
(b) List all 16 possible values of the GFC field and the interpretation of each value.
[8+8]
4. (a) In a credit flow control scheme such as TCP’s, what provision can be made
for credit allocations that are lost or misordered in transit?
(b) In a partial packet discard ( PPD) scheme, the final cell in the datagram is
not dropped. Why? [8+8]
8. Discuss about:
1 of 2
Code No: RR421202 Set No. 3
(c) RSA algorithm. [6+5+5]
⋆⋆⋆⋆⋆
2 of 2
Code No: RR421202 Set No. 4
IV B.Tech II Semester Supplimentary Examinations, May 2008
INTERNET TECHNOLOGIES
(Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
1. (a) List the major disadvantages with the layered approach to protocols.
(b) Using the layer models describe the ordering and delivery of a Pizza, indicating
the interactions at each level as shown in figure 1b. [10+6]
Figure 1b
2. (a) Compare the individual fields of the IPv4 header with the IPv6 header.
(b) An IP datagramis to be fragmented, Which options in the option field need to
be copied in to the header of each fragment and which need only be retained
in the first fragment? Justify. [8+8]
3. (a) What is the need for flow control and error control.
(b) Discuss the various flow and error control techniques of DLL. [8+8]
4. Discuss the performance issues of TCP over ATM. [16]
5. (a) What is the spanning tree and give Breadth first search for a spanning tree.
(b) How shortest path can be determined by using dijkstra’s algorithm. [8+8]
6. Discuss in detail IPv6. [16]
7. Give a brief description
(a) DS configuration and operation
(b) Assured forwarding PHB
(c) DS Code point. [6+5+5]
8. Discuss about:
(a) Public Key encryption
(b) Digital signature
(c) RSA algorithm. [6+5+5]
⋆⋆⋆⋆⋆
1 of 1