Tuesday, 27 August 2013

computer networks univquestionbank

B.E/B.Tech DEGREE EXAMINATION Apr/May2008
Fifth semester
Computer Science and Engineering

CS1302 -COMPUTER NETWORKS
(Regulation 2004)
Time: 3 hours                                                                                              Maximum marks: 100

Answer ALL questions
PART A (10 x 2 =20 marks)
1. Draw a hybrid topology with a star backbone and four ring networks?
2. What is the significance of twisting in twisted pair cable?
3. What is the main purpose of the second ring in the FDDI protocol?
4. Assume a Go-Back-N protocol is used with a window size of 4 and that the ACK for packet 2 gets lost. Show the events until packet 2 is acknowledged at the sender side.
5. Is 3.54.81.76 a class A, B, C or D IP address? What are the network ID and host ID in decimal notation? Assume that subnets are not used.
6. What are the two main reasons that hierarchical routing is employed in the Internet, rather than using a single link-state or distance vector protocol to route packet globally?
7. Suppose we are downloading a file over 1.5 Mbps link using a TCP connection under slow start with RTT of 100 milliseconds. What will be the window size when the link is fully utilized?
8. What field in the IP datagram header is used to avoid forwarding datagram’s endlessly through routing loops? How is the header used to accomplish that?
9. Distinguish between iterative and recursive DNS queries?
10. Compare the way SMTP and HTTP transmit the images. Which one do you think is more efficient? Why?
PART B (5 x 16 = 80)
11. (a) What is the difference between a protocol and a service interface? Explain your answer in terms of the ISO seven layer models. (16 marks)
(or)
11. (b) Explain how guided media differ from unguided media? Briefly explain any three methods used for data transmission using guided media and two methods used for data transmission using unguided media. (16 marks)
12. (a) Go-back-n and selective-reject are two basic approaches to deal with transmission errors.
 (i)  Compare the two approaches in terms of storage and bandwidth requirements. (8 marks)
(ii)  With the aid of a packet sequence (timing) diagram, show the operation of go-back-n when a data-packet/ACK-packet/NAK-packet is corrupted. (8 marks)
(or)
12.  (b)  Station A has two frames in a queue ready to send at the same time. On an 802.3 CSMA/CD network, is it guaranteed that Station B’s frame will be transmitted before the second frame of Station A is transmitted? Why? What is the answer for the same scenario on an 802.5 token ring network? Assume all frames have the same priority. (16 marks)
13. (a) 13. (a) Given the network topology below, use a link-state algorithm to compute the shortest path from A to all other nodes. Make sure to show the results of the computation at each step. (16 marks)
(or)
13. (b) (i)  How do subnetting and supernetting enhance scalability? What is the purpose of a subnet mask and a supernet (CIDR) mask? Is a subnet mask visible outside an IP network? Is a CIDR mask visible outside an IP network?
13. (b) (ii) What are the network number, subnet number, and host number for address 135.104.192.100, mask 255.255.128.0 ?
13. (b) (iii) How many addresses are spanned by the CIDR address 205.12.192.0/20, and what range do they span?
14. (a) Compare and contrast the two TCP/IP transport protocols: TCP and UDP, in terms of demultiplexing, reliability, and flow control. How does TCP identify a connection? Is the information needed for this identification readily available to the TCP software in the received TCP segment? Explain. With the help of a diagram, explain how a connection is established in TCP. (16 marks)
(or)
14. (b) How many RTTs does it take until the sender’s congestion window reaches 1Mbytes? Recall that the congestion window is initialized to the size of a single segment, and assume that the slow-start threshold is initialized to a value higher than the receiver’s advertised window. If the time to send the file is given by the number of required RTTs times the RTT value, what is the effective throughput for the transfer? What percentage of the link bandwidth is utilized? (16 marks)

15.  (a) You are going to use a terminal of the host xyz.cse.edu to write an email from your email account to my email account, with the content “I wanna pass!” Write down in sequence the commands in SMTP, along with any necessary argument, that you need to use to send this email. (16 marks)
(or)
(b) (b) Describe with an example how does a HTTP request retrieves the document usr/users/doc/doc 1. Use atleast two general headers, two request headers and one entity header. Show the response if the document has moved to usr/deads/doc 1 and if there is a syntax error in the request. (16 marks)
B.E/B.Tech DEGREE EXAMINATION Nov/Dec 2006
Fifth semester
Computer Science and Engineering

CS1302 -COMPUTER NETWORKS 
(Regulation 2004)
Time: 3 hours                                                                                              Maximum marks: 100

Answer ALL questions
PART A (10 x 2 =20 marks)
PART B (5 x 16 = 80)

B.E/B.Tech DEGREE EXAMINATION May/Jun 2007
Fifth semester
Computer Science and Engineering
CS1302 -COMPUTER NETWORKS 
(Regulation 2004)
Time: 3 hours                                                                                              Maximum marks: 100

Answer ALL questions
PART A (10 x 2 =20 marks)
PART B (5 x 16 = 80)

B.E/B.Tech DEGREE EXAMINATION Nov\Dec2007
Fifth Semester
Computer Science and Engineering

CS1302 – COMPUTER NETWORKS
(Regulation 2004)
Time: 3 hours                                                               Maximum marks: 100

Answer ALL questions
PART A (10 x 2 =20 marks)
PART B (5 x 16 = 80)
15. (a) Explain the followings related with FTP:
(ii) Commands  (8 marks) 
(or)
15. (b) Explain the followings related with HTTP:
  (i) Messages (8 marks) (ii) Headers (8 marks)




No comments:

Post a Comment