Code No: RR Set No. 1

Similar documents
3. (a) Explain WDMA protocol. (b) Explain wireless LAN protocol. [8+8]

Code No: RR Set No. 1

3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge.

1. (a) With a neat diagram, explain the functionality of layers, protocols and interfaces.

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

Computer Networks. Andrew S. Tanenbaum

QUESTION BANK UNIT-I

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

QUESTION BANK EVEN SEMESTER

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

CS1302 / Computer Networks

PSD2A Computer Networks. Unit : I-V

Institute of Science and Technology 2067

Computer Networks (Unit wise Questions)

UNIT - IV Ques.4 Ques.5

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

7.1.1 Objective and Relevance Prerequisites. i. JNTU Suggested Books Experts Details Findings and Developments

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

SHIRDI SAI ENGINEERING COLLEGE

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

UNIVERSITY QUESTIONS

Computer network questions for final exam preparation 21/08/2017

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

KINGS COLLEGE OF ENGINEERING

Date: June 4 th a t 1 4:00 1 7:00

Chapter 5. The Network Layer

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A

Upper Layer Services. Berkeley Sockets Example of Socket Programming: Internet File Server

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao

Subject Name: Computer Network Subject Code:

===================================================================== Exercises =====================================================================

Chapter 6. The Transport Layer. The Transport Service. Services Provided to the Upper Layers. Transport Service Primitives (3) 10/7/2010

Jaringan Komputer. The Transport Layer

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.

BVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Chapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service

Chapter 5. The Network Layer

B. P. PODDAR INSTITUTE OF MANAGEMENT & TECHNOLOGY DEPT OF ELEDTRONICS & COMMUNICATION ENGINEERING ACADEMIC YEAR: ODD SEMESTER

Chapter 5. The Network Layer. CEN Chapter 5 1

Operating Systems CS 571

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

Raj Jain. The Ohio State University Columbus, OH

COMP 361 Computer Communications Networks. Fall Semester Final Examination: Solution key

UNIT I Review Computer Networks and the Internet

UNIT IV TRANSPORT LAYER

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

MARIA COLLEGE OF ENGINEERING AND TECHNOLOGY, ATTOOR

Question 7: What are Asynchronous links?

Lecture 20 Overview. Last Lecture. This Lecture. Next Lecture. Transport Control Protocol (1) Transport Control Protocol (2) Source: chapters 23, 24

Sub Code & Name : EC2352 COMPUTER NETWORKS Unit: I Branch: EC Semester :VI. Unit syllabus: PHYSICAL LAYER 9

University of Southern California EE450: Introduction to Computer Networks

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

ก ก Information Technology II

Digital Communication Networks

Chapter 5. The Network Layer FATİH ŞAHİN Network Layer Design Isues. Store-and-Forward Packet Switching

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Distributed Video Systems Chapter 4 Network Technologies

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Your favorite blog : (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

3201 Computer Networks (Final Exam) (Model Answer)

EEC-682/782 Computer Networks I

Data Networks. Lecture 1: Introduction. September 4, 2008

ET4254 Communications and Networking 1

Objectives. Chapter 10. Upon completion you will be able to:

Application Layer Network Layer

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Prof. G. Ram Reddy Centre for Distance Education Osmania University MCA II Year 2014 ASSIGNMENTS

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Chapter 6. The Network Layer

EEC-682/782 Computer Networks I

JAYARAM COLLEGE OF ENGINEERING AND TECHNOLOGY Pagalavadi, Tiruchirappalli (An approved by AICTE and Affiliated to Anna University)

Additional Material. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Information Network I/No.

Good Ideas So Far Computer Networking. Outline. Sequence Numbers (reminder) TCP flow control. Congestion sources and collapse

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

EEC-484/584 Computer Networks

FACULTY OF COMPUTING AND INFORMATICS

CS3600 SYSTEMS AND NETWORKS

EEC-484/584 Computer Networks

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C

Chapter 6. The Network Layer

Computer Networks (Introduction to TCP/IP Protocols)

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

Introduction to Networks and the Internet

CODE COURSE NAME DESCRIPTION SEM CS401 Communication Engineering & Coding Theory Knowledge of communication engineering & coding theory IV

EE-311 Data Communication & Networks

Transcription:

Code No: RR410402 Set No. 1 1. (a) Write any four reasons for using layered protocols. (b) List two ways in which the OSI reference model and the TCP/IP reference model are the same and list in which they differ. (c) Which is the principle difference between CO communication and CL communication. [6+4+6] 2. (a) Briefly, explain about the DLL design issues. (b) If the bit string 0111101111101111110 is bit stuffed. What is the output of the string? [8+8] 3. (a) Explain in detail the operation of slotted ALOHA. (b) Consider the delay of pure ALOHA versus slotted ALOHA at low load. Which one is less? Explain your answer. [8+8] 4. Explain congestion. How do we control the same? Which packets are used practically for this purpose? At what layer this is done? What is the difference between flow control and congestion control? [16] 5. (a) Imagine a generalized n-army problem, in which the agreement of any two of the armies is sufficient for victory. Does a protocol exist that allows blue to win? (b) Suppose that the clock-driven scheme for generating initial sequence numbers is used with a 15-bit wide clock counter. The clock ticks once every 100msec, and the maximum packet lifetime is 60sec. How often need resynchronization take place i. in the worst case? ii. when the data consumes 240 sequence numbers/min? (c) Why does the maximum packet lifetime, T, have to be large enough to ensure that not only the packet, but also its acknowledgements, have vanished? [6+6+4] 6. (a) Briefly discuss about Concatenated Virtual Circuits. (b) Briefly discuss about connection less Internetworking. [8+8] 1 of 2

Code No: RR410402 Set No. 1 7. (a) Give the format of UDP segment and TCP segment? Explain when UDP is preferred to TCP? (b) What are blocking calls, primitives and non-blocking primitives? [8+8] 8. (a) What is public key cryptography? With an example, Explain RSA Algorithm. (b) Explain Diffie-Hellman key exchange Authentication protocol. [8+8] 2 of 2

Code No: RR410402 Set No. 2 1. (a) Briefly explain about the TCP/IP reference model. (b) Compare and contrast OSI and TCP/IP models. [8+8] 2. Explain in detail about elementary DLL protocols. [16] 3. (a) Explain static channel allocation in LANs and MANs. (b) Explain five key Assumptions in Dynamic channel allocation in LANs and MANs. [8+8] 4. (a) For hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three-layer hierarchy? (b) Compute a multicast spanning tree for router C in the subnet below for a group with member at routers A, B, C, D, E, F, I, and K. Shown in figure 4b Figure 4b (c) Give an argument why the leaky bucket algorithm should allow just one packet per tick, independent of how large the packet is. [6+4+6] 5. (a) Define the following terms. i. Option Negotiation ii. Transport quality iii. Transport service user iv. Transport service provider (b) Explain in detail Four protocol scenarios for releasing a connection. [8+8] 6. (a) Briefly discuss ICMP. 1 of 2

Code No: RR410402 Set No. 2 (b) Discuss the two styles of internetworking. [8+8] 7. (a) To get around the problem of sequence numbers wrapping around while old packets still exist, one could use 64-bit sequence numbers. However, theoretically, an optical fiber can run at 75 Tbps. What maximum packet lifetime is required to make sure that future 75 Tbps networks do not have wraparound problems even with 64-bit sequence numbers? Assume that each byte has its own sequence number, as TCP does. (b) AAL 3/4 allows multiple sessions to be multiplexed onto a single virtual circuit. Give an example of a situation in which that has no value. Assume that one virtual circuit has sufficient bandwidth to carry all the traffic. (c) In a network that has a maximum TPDU size of 128 bytes, a maximum TPDU lifetime of 30 sec, and an 8-bit sequence number, what is the maximum data rate per connection? [6+6+4] 8. (a) Explain in detail methods of DES chaining. (b) Briefly discuss about IDEA. [8+8] 2 of 2

Code No: RR410402 Set No. 3 1. (a) Write any four reasons for using layered protocols. (b) List two ways in which the OSI reference model and the TCP/IP reference model are the same and list in which they differ. (c) Which is the principle difference between CO communication and CL communication. [6+4+6] 2. (a) What is the reminder obtained by dividing x 7 +x 5 +1 by the generator x 3 +1? (b) Frames of 1000 bits are sent over a 1-Mbps-satellite channel. Acknowledgements are always piggybacked onto data frames. The headers are very short. Three-bit sequence numbers are used. What is the maximum achievable channel utilization for i. Stop-and-wait ii. Go-back n. iii. Selective repeat. [8+8] 3. (a) What is meant by contention systems. (b) Explain CSMA/CD protocol. (c) Explain any one Collision free protocol. [4+6+6] 4. In the link state Routing Algorithm explain how to (a) Learn about neighbours (b) Measure the line cost. (c) Build Link state Packets (d) Distributing Link state packets, and (e) Compute the New routes. [16] 5. (a) Briefly explain the concepts of Flow Control and Buffering. (b) What is multiplexing? Briefly explain upward and downward multiplexing. [8+8] 6. (a) What is tunneling? Can tunneling be used in datagram subnets? If so, how? (b) With an example, explain Address resolution protocol. [8+8] 1 of 2

Code No: RR410402 Set No. 3 7. (a) Draw and explain the structure of the ATM Adaptation layer. (b) Briefly discuss about TCP timer management. [8+8] 8. (a) What is Cryptanalysis? Briefly discuss about substitution cipher, transposition ciphers and one-time pads. (b) Explain any one secrete key algorithm. [8+8] 2 of 2

Code No: RR410402 Set No. 4 1. (a) Write any four reasons for using layered protocols. (b) List two ways in which the OSI reference model and the TCP/IP reference model are the same and list in which they differ. (c) Which is the principle difference between CO communication and CL communication. [6+4+6] 2. (a) Mentioning the advantages and disadvantages, explain sliding window protocol using Go back n and using selective repeat. (b) Draw, and explain about HDLC protocol. [8+8] 3. (a) A 4-Mbps token ring has a token-holding timer value of 10m sec. What is the longest frame that can be sent on this ring? (b) In a token ring the sender removes the frame. What modifications to the system would be needed to have the receiver remove the frame instead, and what would the consequences be? [8+8] 4. (a) What are the problem which caused demise of distance vector routing? Explain the algorithm that replaced it? (b) With an example, explain Distance Vector Routing algorithm? [8+8] 5. (a) Explain Berkeley socket primitives for TCP. (b) Briefly explain the concept of Addressing in TL. [8+8] 6. (a) What is tunneling? Can tunneling be used in datagram subnets? If so, how? (b) What is three bears problem? Write short notes on CIDR. [8+8] 7. (a) Give the format of UDP segment and TCP segment? Explain when UDP is preferred to TCP? (b) Briefly discuss about TCP timer management. [8+8] 8. (a) What is MOSPF? Discuss briefly about Multicast Backbone. (b) What is ADSL? Draw, Explain the ADSL as the local distribution network. [8+8] 1 of 1