CN 3
CN 3
Set No. 1
III B.Tech II Semester Regular Examinations, April 2010 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology and Electronics & Computer Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks
1. (a) What is the relationship between telecommunications and data communications? Is one a subset of other? Give reasons for your answers? (b) What are the dierent goals and applications of networking? Give ve reasons of how networks are a part of our lives? [8+8] 2. (a) Television channels are 6MHz wide. How many bits/sec can be sent if four level digital signals are used? Assume a noiseless channel (b) How does a virtual circuit dier from a physical circuit? What advantages would a virtual circuit provide? [8+8] 3. (a) Discuss the error control technique which is commonly used in data network. What value of N is used in go-back-N ARQ technique used in ARPANET and why? (b) Imagine that you are writing the data link software for a line used to send data to you, but not from you. The other end uses HDLC, with a 3-bit sequence number and a window size of seven frames. You would like to buer as many out of sequence frames as possible to enhance eciency, but you are not allowed to modify the software on the sending side. Is it possible to have a receiver window greater than one, and still guarantee that the protocol will never fail? If so, what is the largest window that can be safely used? [8+8] 4. (a) Discuss about fast Ethernet cabling? (b) Explain various token bus control frames? [8+8]
5. What is non- adaptive routing. Explain any two non- adaptive routing algorithms. [16] 6. (a) What is the signicance of home agent and Foreign agent in routing for mobile hosts? (b) Why tunneling is used for routing in mobile hosts? [10+6]
7. (a) Compare a conventional TDM leased line with an ATM PVC from the users point of view and from the network operators point of view. Which feature of PVC makes it attractive from both points of view. (b) Explain how ATM xed size cells makes cell switching quicker. (c) What are the applications which use constant bit rate and variable bit rate services of ATM? [5+5+6] 1 to of remove 2 Please purchase PDF Split-Merge on www.verypdf.com this watermark.
Set No. 1
[6+10]
8. (a) What are the elds in message header of email system? (b) What are SMTP types & subtypes? Explain them.
Set No. 2
III B.Tech II Semester Regular Examinations, April 2010 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology and Electronics & Computer Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks
1. (a) What are the distinct characteristics of local area networks, explain briey? Why is a LAN required and what objectives are achieved by having a LAN (b) A group of 2n 1 routers are interconnected in a centralized binary tree, with a router at each tree node. Router i communicate with router j by sending a message to the root of the tree. The root then sends the message back down to j . Derive an approximate expression for the mean number of hops per message for large n, assuming that all router pairs are equally likely. [8+8] 2. (a) Write a brief notes on: i. Radio transmission ii. Microwave transmission. (b) Discuss about Narrow band ISDN? 3. (a) Explain one -bit sliding window protocol. Give the advantages and disadvantages of one-bit sliding window protocol? (b) Discuss the services provided by the data link layer to the network layer? [8+8] 4. What is a token? Discuss the protocol of token ring LAN in general. Discuss with example how priority is implemented in a token ring LAN? [16] 5. Routing can be classied in to two types Source routing and hop-by-hop routing. In source routing, source determines the complete route, places the route in the packet header and intermediate routers just switch packets from one link to other link. In hop-by-hop routing each router maintains a routing table and when packet arrives on input link it places it on output link based on routing table. Compare the relative advantages & disadvantages of these two routing approaches. [16] 6. (a) What are ATM Service categories? Explain. (b) What is Quality of Service? How ATM supports Quality of Service? [8+8] [8+8]
7. (a) Network layer can provide both connection oriented service and connection less service. Similar is the case with Transport layer, then why two dierent layers are required. (b) What are the Transport layers Quality of Service parameters? [8+8]
Set No. 2
8. (a) When user clicks a hyperlink, what are the steps that occur between the users click and the page being displayed? (b) What is proxy server? How proxy server works? (c) Explain the http request methods? [5+6+5]
Set No. 3
III B.Tech II Semester Regular Examinations, April 2010 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology and Electronics & Computer Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks
1. Write short notes on the following: (a) Client server model (b) MAN (c) Interfaces and services. [4+6+6]
2. (a) Television channels are 6MHz wide. How many bits/sec can be sent if four level digital signals are used? Assume a noiseless channel (b) How does a virtual circuit dier from a physical circuit? What advantages would a virtual circuit provide? [8+8] 3. (a) What is ow control? Why is essential at the data link layer? Mention few techniques for the same? (b) Explain how the band width wastage is reduced in case of sliding window protocol with selective repeat? [8+8] 4. (a) Explain any two protocols that resolve the contention for the channel with out any collisions at all? (b) A very heavily loaded 1?km?long, 10-Mbps token ring has propagation speed of 200 m/sec. Fifty stations are uniformly spaced around the ring. Data frames are 256-bits, including 32 bits of overload. Acknowledgements are piggybacked onto the data frames and are included as spare bits within the data frames and are eectively free. The token is 8 bits. Is the eective data rate of this higher or lower than the eective data rate of a 10-Mbps CSMA/CD network? [8+8] 5. (a) Explain Dijkstras shortest path algorithm. (b) Consider graph given gure 5b. Compute the shortest path from A to D. [8+8]
Code No: V3224/R07 6. (a) Explain Load shedding for congestion control.
Set No. 3
(b) What is Jitter? Why it is important to control jitter for Audio and Video applications? How Jitter is controlled? [6+10] 7. (a) Explain the protocol scenarios for establishing a connection using three way handshake. (b) Why abrupt connection release results in data loss? 8. What is DNS? What is its use? How DNS works? [12+4] [16]
Set No. 4
III B.Tech II Semester Regular Examinations, April 2010 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology and Electronics & Computer Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks
1. (a) How does Internet diers from WAN? (b) Give an example where we require i. Simplex communication ii. Half duplex communication iii. Full duplex communication. (c) What are the two reasons for using layered protocols. [6+6+4]
2. (a) If a binary signal is sent over a 3KHz channel whose signal to noise ratio is 20dB. What is the maximum achievable data rate? (b) Which switching method allows real-time data transfer? Mention the advantages of packet switching? [8+8] 3. (a) Give the detailed description of PPP frame format? (b) Explain the following terms related to the data link layer i. Framing ii. Error control iii. Flow control.
[8+8]
4. (a) Discuss about the le key assumptions in case of dynamic channel allocation in LANs and WANs? (b) Discuss in detail the working of token bus? [8+8]
5. (a) Two approaches can be used for ordering of packets, buering all the packets at the receiver and then reordering them or receiver accepts only packets in order and sender retransmits packets if necessary. Compare these two approaches. (b) Consider an environment in which probability of errors is high. What should be packet size in such an environment, Large/ Small? Justify your selection. [10+6] 6. Explain in detail (a) OSPF and (b) BGP. [8+8]
7. (a) In TCP Why three?way handshake is required for connection establishment and release. 1 to of remove 2 Please purchase PDF Split-Merge on www.verypdf.com this watermark.
Set No. 4
(b) Why TCP is not suitable for request?reply type of transfers? (c) As application developer under what circumstances you use TCP and under what circumstances you use UDP? [6+5+5] 8. (a) Classify security problems and explain each of them. (b) What is the role played by dierent layers in providing security? [8+8]