|
1. Draw a hybrid topology with a star backbone and four ring
networks?
2. What is the significance of twisting in twisted pair cable?
3. What is the main purpose of the second ring in the FDDI
protocol?
4. Assume a Go-Back-N protocol is used with a window size of 4
and that the ACK for packet 2 gets lost. Show the events until packet 2 is
acknowledged at the sender side.
5. Is 3.54.81.76 a class A, B, C or D IP address? What are the
network ID and host ID in decimal notation? Assume that subnets are not
used.
6. What are the two main reasons that hierarchical routing is
employed in the Internet, rather than using a single link-state or distance
vector protocol to route packet globally?
7. Suppose we are downloading a file over 1.5 Mbps link using a
TCP connection under slow start with RTT of 100 milliseconds. What will be
the window size when the link is fully utilized?
8. What field in the IP datagram header is used to avoid
forwarding datagram’s endlessly through routing loops? How is the header
used to accomplish that?
9. Distinguish between iterative and recursive DNS queries?
10. Compare the way SMTP and HTTP transmit the images. Which one
do you think is more efficient? Why?
PART B (5 x 16 = 80)
11. (a) What is the difference between a
protocol and a service interface? Explain your answer in terms of the ISO
seven layer models. (16 marks)
(or)
11. (b) Explain how guided media differ from unguided media?
Briefly explain any three methods used for data transmission using guided
media and two methods used for data transmission using unguided media. (16
marks)
12. (a) Go-back-n and selective-reject are two basic
approaches to deal with transmission errors.
(i) Compare the two approaches in terms of storage and
bandwidth requirements. (8 marks)
(ii) With the aid of a packet sequence (timing)
diagram, show the operation of go-back-n when a
data-packet/ACK-packet/NAK-packet is corrupted. (8 marks)
(or)
12. (b) Station A has two frames in a queue ready to send at
the same time. On an 802.3 CSMA/CD network, is it guaranteed that Station
B’s frame will be transmitted before the second frame of Station A is
transmitted? Why? What is the answer for the same scenario on an 802.5
token ring network? Assume all frames have the same priority. (16 marks)
13. (a) 13. (a) Given the network topology
below, use a link-state algorithm to compute the shortest path from A to
all other nodes. Make sure to show the results of the computation at each
step. (16 marks)
(or)
13. (b) (i) How do subnetting and supernetting enhance
scalability? What is the purpose of a subnet mask and a supernet (CIDR)
mask? Is a subnet mask visible outside an IP network? Is a CIDR mask
visible outside an IP network?
13. (b) (ii) What are the network number, subnet
number, and host number for address 135.104.192.100, mask 255.255.128.0 ?
13. (b) (iii) How many addresses are spanned by the
CIDR address 205.12.192.0/20, and what range do they span?
14. (a) Compare and contrast the two TCP/IP
transport protocols: TCP and UDP, in terms of demultiplexing, reliability,
and flow control. How does TCP identify a connection? Is the information
needed for this identification readily available to the TCP software in the
received TCP segment? Explain. With the help of a diagram, explain how a
connection is established in TCP. (16 marks)
(or)
14. (b) How many RTTs does it take until the sender’s congestion
window reaches 1Mbytes? Recall that the congestion window is initialized to
the size of a single segment, and assume that the slow-start threshold is
initialized to a value higher than the receiver’s advertised window. If the
time to send the file is given by the number of required RTTs times the RTT
value, what is the effective throughput for the transfer? What percentage
of the link bandwidth is utilized? (16 marks)
15. (a) You are going to use a terminal of the host xyz.cse.edu
to write an email from your email account to my email account, with the
content “I wanna pass!” Write down in sequence the commands in SMTP, along
with any necessary argument, that you need to use to send this email. (16
marks)
(or)
(b) (b) Describe with an example how does a HTTP request
retrieves the document usr/users/doc/doc 1. Use atleast two general
headers, two request headers and one entity header. Show the response if
the document has moved to usr/deads/doc 1 and if there is a syntax error in
the request. (16 marks)
|
B.E/B.Tech
DEGREE EXAMINATION Nov/Dec 2006
Fifth semester
Computer Science and Engineering
CS1302 -COMPUTER NETWORKS
(Regulation 2004)
Time: 3
hours
Maximum marks: 100
Answer ALL questions
PART A (10 x
2 =20 marks)
|
|
|
B.E/B.Tech DEGREE EXAMINATION May/Jun 2007
Fifth semester
Computer Science and Engineering
CS1302 -COMPUTER NETWORKS
(Regulation 2004)
Time: 3
hours
Maximum
marks: 100
Answer ALL questions
PART A (10 x 2 =20 marks)
|
PART B (5 x 16 = 80)
|
B.E/B.Tech
DEGREE EXAMINATION Nov\Dec2007
Fifth Semester
Computer Science and Engineering
CS1302 – COMPUTER NETWORKS
(Regulation 2004)
Time: 3
hours
Maximum marks: 100
Answer ALL questions
PART A (10
x 2 =20 marks)
|
PART B (5 x 16 = 80)
15. (a) Explain the
followings related with FTP:
|
|
|
|
|
|
No comments:
Post a Comment