Sie sind auf Seite 1von 5

Code No: RR421202 Set No.

1
IV B.Tech II Semester Supplimentary Examinations, May 2008
INTERNET TECHNOLOGIES
(Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) Discuss the design issues of TCP/IP networks.


(b) Give any two applications of TCP/IP. [8+8]
2. Define the following parameters for a switching networks:
N - number of hops between two given end systems
L - message Length B - data rate on all links in bits per sec.
P - fixed packet size H - overhead bits per packet
S - set up time D - propogation delay per hop
(a) What value of P, as a function of N,L and H results in minimum end to end
delay on a datagram network? Assume that L is much larger than P and D is
zero
(b) What is the significance of Type of Service field in IPv4 protocol. [8+8]
3. Discuss the following
(a) Fast Ethernet
(b) Fibre Channel
(c) Wireless LAN. [6+5+5]
4. (a) How guaranteed frame rate is managed in ATM.
(b) Discuss the different ABR parameters used in capacity allocation. [8+8]
5. (a) Give the OSPF packet format with discussion
(b) What are the RIP limitations
(c) What is adptive routing. [6+5+5]
6. Discuss in detail IPv6. [16]
7. Give a brief description
(a) DS configuration and operation
(b) Assured forwarding PHB
(c) DS Code point. [6+5+5]
8. What is simple network management protocol? Discuss. [16]

⋆⋆⋆⋆⋆

1 of 1
Code No: RR421202 Set No. 2
IV B.Tech II Semester Supplimentary Examinations, May 2008
INTERNET TECHNOLOGIES
(Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. Write a short notes on:


(a) Internet Protocol
(b) Udp. [8+8]
2. (a) Consider a packet switching network of N nodes connected by Star, Loop and
Fully connected.Give the average number of hops between stations for each
case.
(b) Discuss
i. X.25
ii. Frame relay architecture. [6+10]
3. (a) Write a short notes on Ethernet networks
(b) Discuss in detail 10 Gbps ethernet. [8+8]
4. (a) In a credit flow control scheme such as TCP’s, what provision can be made
for credit allocations that are lost or misordered in transit?
(b) In a partial packet discard ( PPD) scheme, the final cell in the datagram is
not dropped. Why? [8+8]
5. (a) Give the OSPF packet format with discussion
(b) What are the RIP limitations
(c) What is adptive routing. [6+5+5]
6. (a) What are the design requirements for IP based internets?
(b) Discuss the ISA approach for the QoS support over IP based Internets? [8+8]
7. (a) Give the comparison between elastic and inelastic traffic
(b) What is the purpose of DS code point
(c) Give a brief description of PHB. [6+5+5]
8. Discuss about:
(a) Public Key encryption
(b) Digital signature
(c) RSA algorithm. [6+5+5]

⋆⋆⋆⋆⋆

1 of 1
Code No: RR421202 Set No. 3
IV B.Tech II Semester Supplimentary Examinations, May 2008
INTERNET TECHNOLOGIES
(Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) List the major disadvantages with the layered approach to protocols.
(b) Using the layer models describe the ordering and delivery of a Pizza, indicating
the interactions at each level as shown in figure 1b. [10+6]

Figure 1b
2. (a) What are the different AAL protocols & services.
(b) List all 16 possible values of the GFC field and the interpretation of each value.
[8+8]

3. (a) Write a short notes on Ethernet networks


(b) Discuss in detail 10 Gbps ethernet. [8+8]

4. (a) In a credit flow control scheme such as TCP’s, what provision can be made
for credit allocations that are lost or misordered in transit?
(b) In a partial packet discard ( PPD) scheme, the final cell in the datagram is
not dropped. Why? [8+8]

5. Discuss the various shortest path algorithms. [16]

6. (a) Elaborate the two design characteristics of RSVP?


(b) What is RTP control Protocol (PTCP)? Describe the four functions. [8+8]
performed by RTCP?

7. (a) List the design goals of RSVP.


(b) Explain label stacking.
(c) What is the purpose of RTP. [6+5+5]

8. Discuss about:

(a) Public Key encryption


(b) Digital signature

1 of 2
Code No: RR421202 Set No. 3
(c) RSA algorithm. [6+5+5]

⋆⋆⋆⋆⋆

2 of 2
Code No: RR421202 Set No. 4
IV B.Tech II Semester Supplimentary Examinations, May 2008
INTERNET TECHNOLOGIES
(Information Technology)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) List the major disadvantages with the layered approach to protocols.
(b) Using the layer models describe the ordering and delivery of a Pizza, indicating
the interactions at each level as shown in figure 1b. [10+6]

Figure 1b
2. (a) Compare the individual fields of the IPv4 header with the IPv6 header.
(b) An IP datagramis to be fragmented, Which options in the option field need to
be copied in to the header of each fragment and which need only be retained
in the first fragment? Justify. [8+8]
3. (a) What is the need for flow control and error control.
(b) Discuss the various flow and error control techniques of DLL. [8+8]
4. Discuss the performance issues of TCP over ATM. [16]
5. (a) What is the spanning tree and give Breadth first search for a spanning tree.
(b) How shortest path can be determined by using dijkstra’s algorithm. [8+8]
6. Discuss in detail IPv6. [16]
7. Give a brief description
(a) DS configuration and operation
(b) Assured forwarding PHB
(c) DS Code point. [6+5+5]
8. Discuss about:
(a) Public Key encryption
(b) Digital signature
(c) RSA algorithm. [6+5+5]

⋆⋆⋆⋆⋆

1 of 1

Das könnte Ihnen auch gefallen