Cn

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Cn as PDF for free.

More details

  • Words: 1,095
  • Pages: 3
B.TECH. INFORMATION TECHNOLOGY IF352 – COMPUTER NETWORKS Time: 3 Hours Max. Marks: 100 Answer All Questions PART-A ( 10 x 2 = 20 Marks) 1. What are the uses of Computer network? 2. What is the Principal difference between connectionless and connection oriented communication? 3. What is the similarity and difference between congestion control and flow control? 4. Enumerate any four reasons for using layered protocols. 5. Give the applications of Frame relay Service. 6. What are the layers and protocols used in ATM? 7. What are the requirements to connect two different networks (Ethernet and Token ring) in the lower layers? 8. Briefly explain ALOHA and slotted ALOHA protocols. 9. Discuss the issues in transport layer. 10. Justify the need for encryption and decryption used in Data Communication PART-B (5 x 16 = 80 Marks) 11. Explain with a neat sketch, the functions of the protocols used in each layer of the OSI model and illustrate how communication is taking place between two end systems. 12.a)i) Discuss the various types of encoding and modulation techniques used in Data communication. ii) Explain two types of guided media and two types of unguided media transfer in networks. OR 12.b) Explain in detail, how communication is taking place starting from connection establishment, data transfer and connection termination in (j) Circuit switching and (ii) Packet switching. 13.a)i) Give the functions of Repeater, Switch and Hub. ii) Why do you need routing protocols? Explain the operation of any two routing algorithms. OR 13.b) Explain in detail, how sliding window protocol is used in HDCC for full duplex lines with window size 4.

14.a) Give the Frame Relay Protocol Architecture and explain the functions of each one. OR 14.b)i) Explain cell delineation state diagram during Transmission of ATM Cells. ii) Explain the requirements for ATM traffic and congestion control. 15.a)i) Define and explain the data link layer in IEEE 802 project. Why is this layer divided into sub layers? Describe the function of each sub layer. ii) Compare the Ethernet architecture with Token Ring. OR 15.b) Write short notes on: (i) FDDI (ii) E-Mail (iii) Wireless LAN (iv) ATM LAN

CS1302 – COMPUTER NETWORKS (Common to Information Technology and B.E., (part tine) R 2006 Fourth Semester) (Regulation 2004) Time: Three hours Maximum: 100 marks Answer ALL questions PART A –(10 ´ 2 = 20 marks) 1. State the major functions performed by the presentation layer of the ISO OSI model. 2. A sine wave has a frequency of 6 Hz. What is its period? 3. Briefly discuss stop – and – wait method of flow control. 4. List the two types of data frames in FDDL. 5. List the two forms in which virtual circuit packet switching is implemented. 6. Which class does the following IP address belong to? (a) 157.143.252.207 (b) 93.31.1.245 7. What is a datagram socket? 8. “TCP software is implemented as a Finite State Machine”. Discuss. 9. What is a Domain Name service? 10. State the application layer protocol in the TCP/IP protocol suite that provides access to a networked file server. PART B – (5 ´ 16 = 80 marks) 11. (a) (i) What is a Protocol? List the three key elements of a protocol. (4) (ii) With relevant examples differentiate between simplex, half duplex and full duplex communication. (4) (iii) A sine wave completes one cycle in 25us. What is its frequency? Express the frequency in kHz. (4) _ (iv) A digital signal has a bit interval of 40 microseconds. What is the bit rate? Express the bit rate in Kbps. (4) Or (b) (i) An analog signal carries four bits in each signal element. If 1000 signal elements are sent per second, find the baud rate and the bit rate. (4) (ii) Discuss the role played by repeaters in Terrestrial Microwave

communication? Is the distance between repeaters fixed? Discuss. (4) (iii) A network has n devices. Determine the number of cable link required for a mesh, ring, bus and star topology. (8) 12. (a) (i) A block of 32 bits has to be transmitted. Discuss how the thirty two bit block is transmitted to the receiver using Longitudinal Redundancy Check. (6) (ii) Consider a 32 bit block of data 11100111 11011101 00111001 10101001 that as to be transmitted. If Longitudinal Redundancy Check is used what is the transmitted bit stream? (4) (iii) In the Hamming code, for a data unit of m bits how you do compute the number of redundant bits ‘r’ needed? (3) (iv) What kinds of errors can Vertical Redundancy check determine? What kinds of errors it cannot determing? (3) (b) (i) List the three main functions performed by the data link layer of the ISO OSI model. (3) (ii) Explain the working of Carrier Sense Multiple Access protocol. (3) (iii) How does a Token Ring LAN operate? Discuss (6) (iv) List and briefly discuss the two different basic transmission technologies that can be used to set up wireless LAN’s. (4) 13. (a) (i) State which layers of the ISO OSI model does the following interconnecting devices operate. (4) 1. Repeaters 2. Bridges 3. Routers 4. gateways. (ii) State the major difference between Distances. Vector Routing and Link State Routing. Discuss how these routing techniques work. (12) Or (b) (i) What is sub netting? Discuss. Also state which classes of IP address can be sub netted. (5) (ii) What is subnet masking? Discuss. (iii) How can we prove that we have 2, 147, 48, 648 address in class A? (3) (iv) What is the sub network address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0? (5) 14. (a) (i) List and discuss the various primitives for a simple transport service. (6) (ii) “DNS can use the services of UDP or TCP using port 53”. Discuss when UDP is used and when TCP is used. (4) (iii) Highlight the features of UDP and briefly discuss the same. (6) Or (b) (i) Discuss connection establishment and connection release in TCP (6) (ii) Discuss how TCP provides reliability using error control. (6) (iii) Discuss the strategies TCP uses to avoid congestion. (4) 15. (a) (i) With a relevant example discuss how the domain space in divided. (6) (ii) Distinguish between a fully qualified domain name and a partially qualified domain name. Give relevant example (6) (iii) List the various risks faced by messages that are transmitted over the internet. (4) Or (b) (i) Discuss how simple Mail Transfer Protocol (SMTP) works? Can multimedia messages be transmitted using SMPT? Discuss. (10) (ii) Is Common Gateway Interface a language? Discuss. (6)

Related Documents

Cn
April 2020 30
Cn
November 2019 38
Cn
November 2019 51
Cn
November 2019 56
Cn
October 2019 50
Cn
November 2019 34