(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
CS2363 - COMPUTER NETWORKS Model Question Paper
1. Reg.No.
ANNA UNIVERSITY SEMESTER EXAMINATION - MAY / JUNE 2014
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
MODEL QUESTION PAPER – 1
CS2363 - COMPUTER NETWORKS
Year/Semester & Branch: III year /VI Semester & B.E EEE
Faculty Name: T.Selvakumar Date:
Max. Marks: 100 Time: 3 hrs
PART-A Answer ALL Questions (10x2=20 Marks)
1. Show with an example how encoding can be done using NRZI technique?
2. Differentiate ARP and RARP.
3. Give the CIDR notation for Class A, B and C.
4. Draw IPv6 header format.
5. Give the operation in three way Handshaking with timeline diagram.
6. Draw the datagram format of TCP.
7. Define Kerberos authentication protocol & Give neat sketch.
8. How is a secret key different from public key?
9. Give the format of HTTP request message.
10. Define MIB & MIB groups.
PART-B Answer ALL Questions (5x16=80 Marks)
11. (a) Explain in detail about OSI reference model with neat sketches and its layer operations. (16)
OR
11. (b)
(i) Discuss in detail on cyclic redundancy check with suitable examples. (8)
(ii) What is the function of stop and wait flow control? (8)
12. (a) Illustrate with a neat sketch, the IPV 4 datagram format. Compare the fields in the main
headers of IPV 4 and IPV 6. (16)
OR
12. (b)
(i) Internet control message protocol. (12)
(ii) Find the class and CIDR notation of each address
(1) 11000001 10000011 00011011 11111111
(2) 14.23.120.8 (4)
13. (a) How the Queuing Disciplines algorithm are used to improve Quality of service? Explain
any four parameters. (16)
OR
13. (b) Discuss in detail the TCP segment and Discuss about connection management in TCP. (16)
14. (a) Briefly Explain Authentication Protocols and explain Public Key Authentication Protocols
and Diffie-Hellman Key Agreement. (16)
OR
14. (b)
(i) Describe how PGP can be used to provide security at the application layer? (8)
(ii) Explain the method of compressing the image by using JPEG. (8)
2. Reg.No.
15. (a) Explain the working of electronic mail. Describe how the SMTP is used in E-mail
applications. (16)
OR
15. (b)
(i) Briefly explain simple network management protocol (SNMP). (8)
(ii) Discuss the File Transfer Protocol (FTP) with suitable diagrams. (8)
*****
Prepared by Approved by
AP/CSE HOD/CSE