NR-320502 Computer Networks
NR-320502 Computer Networks
NR-320502 Computer Networks
2.a) What are the different broadband ISDN protocols and explain.
b) What are the advantages of cell switching when compared with circuit
switching?
3.a) Explain the operation of simplex stop and wait protocol.
b) What is piggy backing? Explain the merits of piggy backing.
5.a) Explain hierarchical routing with an example and give its advantages.
b) A computer on a 6-Mbps network is regulated by a token bucket. The token
bucket is filled at a rate of 1-Mbps. It is initially filled to capacity with 8
Megabits. How long can the computer transmit at the full 6-Mbps?
6.a) Explain how connection setup and release is done in ATM networks.
b) Discuss the different types of gateways.
c) Differentiate between frame and packet.
8.a) The Diffe-Hellman key exchange is being used to establish a secret key between
Alice and Bob. Alice sends Bob (719,3,191). Bob responds with (543). Alice’s
secret number, x, is 16. what is the secret key?
b) Explain the Needham-Schroeder authentication and point out its problems and
explain how these problems are solved in Otway-Rees authentication protocol?
&&&
Code No: 320502 Set No.
2.a) Suppose transmission channels become virtually error free, is the data link
layer still needed? Justify your answer.
b) Explain how the notation of multiplexing can be applied at the data link layer.
4.a) Write the comparison of IEE 802.4 and IEE 802.5 Frame format.
b) Explain MAC sub layer functions.
5..a) Consider a network with 6 routers namely A, B, C, D, E and F . The details about
the direct links between the routers and the delay involved are as follows:
(A,B,4) , (B,C,2), (C,D,3) (A,E,5), (E,F,8), (F,D,7), (B,F,6), (C,E,1). Assume
distance vector routing is used, and the following vectors have just come into
router C: from B: (5,0,8,12,6,2); from D: (16,12,6,0,9,10); from E:(7,6,3,9,0,4).
The measured delays to B, D and E are 6,3 and 5 respectively. What is C’s new
routing table ? Give both the outgoing line to use and the expected delay.
b) Explain the ICMP protocol and its different messages.
7.a) Take into account a case where the effect of using slow start on a line with a
10-msec round trip time and with no congestion. The receive window is 24 KB
and the maximum segment size is 2 KB. How long does it take before the first full
window can be sent?
b) A TCP machine is sending windows of 65535 bytes over a 1-Gbps channel that
has a 10-msec one-way delay. What is the maximum throughput available? What
is the maximum data rate per connection?
8. Explain RSA public key algorithm. Taking a=1, b=2….z=26, encrypt “jntuhyd”
choosing prime numbers 5 and 11.
&&&
Code No: 320502 Set No.
4.a) Explain the difference between Source routing bridge and Transparent bridge.
b) Explain the operation of spanning tree bridges.
5.a) Discuss the drawbacks of flooding and distance vector routing algorithms.
b) Explain how to subnet a class B network and the use of subnet mask.
c) Convert the IP address whose hexadecimal representation is C22F1582 to dotted
decimal notation and explain.
6.a) Discuss some of the ways in which the networks differ? How is internet working
done?
b) Discuss about congestion control in ATM networks.
&&&
Code No: 320502 Set No.
III B.Tech. II-Semester Supplementary Examinations, November-2003
COMPUTER NETWORKS
4
(Common to Computer Science and Engineering, Computer Science and
Information Technology and Electronics and Computer Engineering)
Time: 3hours Max.Marks:80
Answer any FIVE questions
All questions carry equal marks
---
1.a) In the Client/Server model, what is the role of the client program? What is the role
of the server program?
b) How does information get passed from one OSI layer to the next?
c) List the layers of the OSI model? And what are the responsibilities of
presentation and session layers. Explain them.
2.a) What is the purpose of cladding in an optical fiber ? Discuss its density relative to
the core.
b) What are the disadvantages of optical fiber as a transmission medium?
c) Explain dual cable and single cable systems in broad band coaxial cable.
4.a) What are the advantages of token ring and token bus.
b) What is pipe lining in data link layer? Explain.
5.a) Briefly discuss the services provided by the network layer to the transport layer.
b) How many addresses are spanned by the CIDR address 205.12.192.0/20 and what
range do they span.
7.a) Consider an ATM device transmitting single-cell messages at 600 mbps. One cell
in 100 is totally corrupted due to random noise. How many undetected errors per
week can be expected with the 32-bit AAL 5 checksum?
b) A 128-byte request is sent by a client to a server located 100 km away over a
1-gigabit optical fibre. What is the efficiency of the line during the remote
procedure call?