Você está na página 1de 18

Scribd Upload a Document

Search Documents

Explore

Documents

Books - Fiction Books - Non-fiction Health & Medicine Brochures/Catalogs Government Docs How-To Guides/Manuals Magazines/Newspapers Recipes/Menus School Work + all categories Featured Recent

People

Authors Students Researchers Publishers Government & Nonprofits Businesses Musicians Artists & Designers Teachers + all categories Most Followed Popular

Sudha Saravanan

Account
o o o o o o o o o o

Home My Documents My Collections My Shelf View Public Profile Messages Notifications Settings Help Log Out

/ 4

Download this Document for Free

Code No: R5310505

1
III B.Tech I Semester(R05) Supplementary Examinations, May 2009 COMPUTER NETWORKS (Common to Computer Science & Engineering and Information Technology) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks

1. (a) What are the distinct characteristics of local area networks, explain briey? Why is a LAN required and what objectives are achieved by having a LAN (b) A group of 2 1 routers are interconnected in a centralized binary tree, with a router
n

at each tree node. Routeri communicate with routerj by sending a message to the root of the tree. The root then sends the message back down toj. Derive an approximate expression for the mean number of hops per message for large n, assuming that all router pairs are equally likely. [8+8]

2. (a) Discuss in detail about Time division switches? (b) With a neat diagram explain ISDN system with a PBX for use in large businesses? [8+8] 3. (a) In HDLC format how the variable address part is recognized by the nodes? What is bit stung? (b) Under what circumstances a node can send a frame with RNR status? (c) If the bit string 0111101111101111110 is bit stued, what is the output string? [8+4+4] 4. (a) Discuss about MAC addresses? (b) Explain about a bit-map collision free protocol? [8+8] 5. Dene Adaptive and Non-Adaptive routing. Classify the routing algorithms in to adaptive and non adaptive type with suitable justications. [16] 6. (a) What is inter-networking? Why it is required? (b) What are the dierent devices that can be used for inter networking? Explain. [8+8] 7. (a) Explain the protocol scenarios for establishing a connection using three way handshake. (b) Why abrupt connection release results in data loss? [12+4] 8. (a) When external viewers are needed? How does a browser know which one to use? (b) What is the dierence in transferring compressed and uncompressed video? [6+10]

Code No: R5310505

2
III B.Tech I Semester(R05) Supplementary Examinations, May 2009 COMPUTER NETWORKS (Common to Computer Science & Engineering and Information Technology) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks

1. (a) Dierentiate between the following: i. Connection less and Connection oriented services ii. Point-to-Point Vs Broadcast type of networks (b) What is the dierence between a conrmed service and an unconrmed service? For each of the following, tell whether it might be a conrmed service, an unconrmed service, both or neither i. Connection establishment ii. Data transmission

iii. Connection release. [8+8] 2. (a) Television channels are 6MHz wide. How many bits/sec can be sent if four level digital signals are used? Assume a noiseless channel (b) How does a virtual circuit dier from a physical circuit? What advantages would a virtual circuit provide? [8+8] 3. (a) Discuss the error control technique which is commonly used in data network. What value of N is used in go-back-N ARQ technique used in ARPANET and why? (b) Imagine that you are writing the data link software for a line used to send data to you, but not from you. The other end uses HDLC, with a 3-bit sequence number and a window size of seven frames. You would like to buer as many out of sequence frames as possible to enhance eciency, but you are not allowed to modify the software on the sending side. Is it possible to have a receiver window greater than one, and still guarantee that the protocol will never fail? If so, what is the largest window that can be safely used? [8+8] 4. (a) Mention dierent IEEE 802 standards. Why is it expected that these standards should be followed by all concerned universally? (b) Explain how remote bridges can be used to interconnect distant LANS? [8+8] 5. What are the services provided by Network layer to Transport layer. Explain. [16] 6. Explain in detail (a) OSPF and (b) BGP. [8+8] 7. (a) Explain the protocol scenarios for establishing a connection using three way handshake. (b) Why abrupt connection release results in data loss? [12+4] 8. (a) What is public key cryptography? What are the necessary conditions for public key cryptography? (b) Explain RSA algorithm with example? [8+8]

Code No: R5310505

3
III B.Tech I Semester(R05) Supplementary Examinations, May 2009 COMPUTER NETWORKS (Common to Computer Science & Engineering and Information Technology) Time: 3 hours Max Marks: 80 Answer any FIVE Questions

All Questions carry equal marks


1. (a) Compare point -to-point channels with broadcast channels along with suitable examples? (b) A collection of ve routers is to be collected in a point-to-point subnet. Between each pair of routers, the designers may put a high speed line, a medium-speed line, a low-speed line, or no line. If it takes 100ms of computer time to generate and inspect each topology, how long will it take to inspect all of them to nd the one that best matches the expected load? [8+8] 2. (a) What are the reasons for choosing cell switching in ATM? (b) Discuss about the ISDN architecture in detail? [6+10] 3. (a) Explain one -bit sliding window protocol. Give the advantages and disadvantages of onebit sliding window protocol? (b) Discuss the services provided by the data link layer to the network layer? [8+8] 4. (a) Discuss about MAC addresses? (b) Explain about a bit-map collision free protocol? [8+8] 5. How buering at receiver can help in solving out of order delivery of packets. What are the limitations of it. What are the applications for which this strategy is suitable and why. What are the applications for which this strategy is not suitable and why. Explain. [16] 6. (a) What are ATM Service categories? Explain. (b) What is Quality of Service? How ATM supports Quality of Service? [8+8] 7. (a) Explain the protocol scenarios for establishing a connection using three way handshake. (b) Why abrupt connection release results in data loss? [12+4] 8. (a) What are the advantages of using e-mail gateways? (b) How SMTP protocol works? [8+8]

r5310505-computer networks
Download this Document for FreePrintMobileCollectionsReport Document This is a private document.

Info and Rating

siva_bharath@sanc...

Share & Embed

Related Documents
PreviousNext 1.

p.

p.

p.

2.

p.

p.

p.

3.

p.

p.

p.

4.

p.

p.

p.

5.

p.

p.

p.

6.

p.

p.

p.

7.

p.

p.

More from this user


PreviousNext 1.

4 p.

4 p.

4 p.

2.

4 p.

4 p.

4 p.

3.

1 p.

1 p.

4 p.

4.

2 p.

1 p.

1 p.

5.

2 p.

1 p.

4 p.

6.

1 p.

1 p.

1 p.

7.

1 p.

1 p.

2 p.

8.

1 p.

1 p.

1 p.

9.

2 p.

Add a Comment

Submit share: Characters: 400 Upload a Document

Search Documents

Follow Us! scribd.com/scribd twitter.com/scribd facebook.com/scribd About Press Blog Partners Scribd 101 Web Stuff Scribd Store Support FAQ Developers / API Jobs Terms Copyright Privacy

Copyright 2011 Scribd Inc. Language: English scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd.

pdf Title:

txt

Category:

Tags:

(separate with commas)

Description: Save

pdf

txt

Você também pode gostar