SlideShare a Scribd company logo
1 of 7
Download to read offline
www.studentyogi.com                                                                     www.studentyogi.com

         Code No: R05310504
                                                                                 Set No. 1
                 III B.Tech I Semester Regular Examinations, November 2007
                                       COMPUTER NETWORKS
                ( Common to Computer Science & Engineering and Information
                                                Technology)
         Time: 3 hours                                                                  Max Marks: 80
                                       Answer any FIVE Questions
                                    All Questions carry equal marks



           1. Write short notes on the following:

               (a) Client server mo del
               (b) MAN

               (c) Interfaces and services.                                                         [4+6+6]

           2. (a) Discuss in detail about space division switches?
               (b) With a neat diagram explain ISDN system for home use? [8+8]

           3. (a) Explain one -bit sliding window protocol. Give the advantages and disadvan-
                    tages of one-bit sliding window protocol?
               (b) Discuss the services provided by the data link layer to the network layer?
                                                                                                      [8+8]

           4. (a) What is the prime di erence between a token bus and a token ring?
               (b) A large population of ALOHA users manages to generate 50 requests/sec,
                    including both originals and retransmissions. Time is slotted in the units of
                    40 msec.
                      i. What is the chance of success on the rst attempt?
                     ii. What is the probability of exactly k collisions and then a success?
                    iii. What is the expected number of transmission attempts needed? [4+12]

           5. De ne route. Why routing algorithm is required. Routes can be predetermined
              and then use them when required (or) Routes can be determined when needed and
              use them immediately. First method is proactive and second metho d is reactive.
              Which one is preferred for wired networks? Justify your answer. [16]

           6. (a) How Tunneling helps in connecting two di erent networks?
               (b) How routing in inter-network is di erent from routing in subnet? [8+8]

           7. (a) What is the purpose of sequence numbers in TCP Segment?
               (b) Why padding is required for TCP Segment?
               (c) Write short notes on TCP timers.                                                 [4+4+8]

           8. (a) What is security? What is network security? What is information security?
www.studentyogi.com                                                       www.studentyogi.com

         Code No: R05310504
                                                                       Set No. 1
               (b) What are the Pros and Cons of providing security?
               (c) Who are the people who cause security problems?             [6+5+5]
www.studentyogi.com                                                                    www.studentyogi.com

         Code No: R05310504
                                                                               Set No. 2
                 III B.Tech I Semester Regular Examinations, November 2007
                                       COMPUTER NETWORKS
                ( Common to Computer Science & Engineering and Information
                                                Technology)
         Time: 3 hours                                                                 Max Marks: 80
                                       Answer any FIVE Questions
                                    All Questions carry equal marks



           1. (a) Give a detailed description of the Novell Netware reference model.
               (b) With suitable examples explain simplex, half-duplex & full-duplex communi-
                   cation.                                                                    [10+6]

           2. (a) Discuss in detail about asynchronous communication?
               (b) Discuss in detail about broad band ISDN?                                           [8+8]

           3. (a) Discuss the error control technique which is commonly used in data network.
                    What value of N is used in go-back-N ARQ technique used in ARPANET and
                    why?
               (b) Imagine that you are writing the data link software for a line used to send
                    data to you, but not from you. The other end uses HDLC, with a 3-bit
                    sequence number and a window size of seven frames. You would like to bu er
                    as many out of sequence frames as possible to enhance e ciency, but you are
                    not allowed to modify the software on the sending side. Is it possible to have
                    a receiver window greater than one, and still guarantee that the protocol will
                    never fail? If so, what is the largest window that can be safely used? [8+8]

           4. (a) Discuss about MAC addresses?
               (b) Explain about a bit-map collision free protocol?                                   [8+8]

           5. (a) What is Multicasting. How it is di erent from broadcasting. How do you
                   construct a multicast tree. Explain with an example.
               (b) What are the applications of multicasting.                                        [10+6]

           6. (a) How congestion is controlled in ATM?
               (b) Explain ATM LAN emulation.                                                         [8+8]

           7. (a) What are the applications which use connection oriented service and which
                   use connection less service? Explain?
               (b) What is the type of service that is required for uncompressed audio & video.
                   Explain?
               (c) What is the type of service that is required for compressed audio & Video?
                   Explain?                                                                       [6+5+5]
www.studentyogi.com                                                                    www.studentyogi.com

         Code No: R05310504
                                                                                Set No. 2
               (b) What is the role played by di erent layers in providing security? [8+8]
www.studentyogi.com                                                                   www.studentyogi.com

         Code No: R05310504
                                                                               Set No. 3
                 III B.Tech I Semester Regular Examinations, November 2007
                                       COMPUTER NETWORKS
                ( Common to Computer Science & Engineering and Information
                                                Technology)
         Time: 3 hours                                                                Max Marks: 80
                                       Answer any FIVE Questions
                                    All Questions carry equal marks


           1. (a) Compare point -to-point channels with broadcast channels along with suitable
                     examples?
                (b) A collection of ve routers is to be collected in a point-to-point subnet. Be-
                     tween each pair of routers, the designers may put a high speed line, a medium-
                     speed line, a low-speed line, or no line. If it takes 100ms of computer time
                     to generate and inspect each topology, how long will it take to inspect all of
                     them to nd the one that best matches the expected load? [8+8]

           2. (a) Compare the two methods of serial transmission. Discuss the advantages and
                    disadvantages of each?
               (b) With a neat diagram explain about Kno ckout switch? [8+8]
           3. (a) Discuss the error control technique which is commonly used in data network.
                    What value of N is used in go-back-N ARQ technique used in ARPANET and
                    why?
               (b) Imagine that you are writing the data link software for a line used to send
                    data to you, but not from you. The other end uses HDLC, with a 3-bit
                    sequence number and a window size of seven frames. You would like to bu er
                    as many out of sequence frames as possible to enhance e ciency, but you are
                    not allowed to modify the software on the sending side. Is it possible to have
                    a receiver window greater than one, and still guarantee that the protocol will
                    never fail? If so, what is the largest window that can be safely used? [8+8]

           4. What is a token? Discuss the protocol of token ring LAN in general. Discuss with
              example how priority is implemented in a token ring LAN?                                  [16]
           5. What is non- adaptive routing. Explain any two non- adaptive routing algorithms.
                                                                                                       [16]
           6. Explain Network layer in ATM.                                                             [16]
           7. (a) What are the similarities and di erences between Data Link layer and Trans-
                   port layer?
               (b) Explain addressing at Transport layer?                                             [6+10]
           8. What is Authentication? How it is di erent from Authorization? Explain in brief
              di erent Authentication protocols with their relative merits and demerits. [16]
www.studentyogi.com                                                                       www.studentyogi.com

         Code No: R05310504
                                                                                  Set No. 4
                 III B.Tech I Semester Regular Examinations, November 2007
                                       COMPUTER NETWORKS
                ( Common to Computer Science & Engineering and Information
                                                Technology)
         Time: 3 hours                                                                    Max Marks: 80
                                       Answer any FIVE Questions
                                    All Questions carry equal marks



           1. (a) Compare and contrast WAN and Internet
               (b) What are the various types of network topology? What are the implications
                   of having di erent topologies?                                                        [6+10]
           2. (a) Give a comparison of semiconductor diodes and LEDs as light sources?
               (b) Discuss about wireless communication in detail?                                       [6+10]

           3. (a) Discuss the error control technique which is commonly used in data network.
                    What value of N is used in go-back-N ARQ technique used in ARPANET and
                    why?
               (b) Imagine that you are writing the data link software for a line used to send
                    data to you, but not from you. The other end uses HDLC, with a 3-bit
                    sequence number and a window size of seven frames. You would like to bu er
                    as many out of sequence frames as possible to enhance e ciency, but you are
                    not allowed to modify the software on the sending side. Is it possible to have
                    a receiver window greater than one, and still guarantee that the protocol will
                    never fail? If so, what is the largest window that can be safely used? [8+8]

           4. (a) Discuss about the le key assumptions in case of dynamic channel allocation
                    in LANs and WANs?
               (b) Discuss in detail the working of token bus?                                            [8+8]

           5. How bu ering at receiver can help in solving out of order delivery of packets. What
              are the limitations of it. What are the applications for which this strategy is suitable
              and why. What are the applications for which this strategy is not suitable and why.
              Explain.                                                                                     [16]

           6. (a) What are the message types used by ICMP? Explain.
               (b) Explain the network protocols.
                      i. ARP
                     ii. RARP.                                                                           [6+10]

           7. (a) Explain the protocol scenarios for releasing a connection.
               (b) What is the relation between NSAP & TSAP?                                             [12+4]

           8. (a) What is security? What is network security? What is information security?
www.studentyogi.com                                                       www.studentyogi.com

         Code No: R05310504
                                                                       Set No. 4
               (b) What are the Pros and Cons of providing security?
               (c) Who are the people who cause security problems?             [6+5+5]

More Related Content

What's hot

computer science sample papers 3
computer science sample papers 3computer science sample papers 3
computer science sample papers 3Swarup Kumar Boro
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
第14回 配信講義 計算科学技術特論A(2021)
第14回 配信講義 計算科学技術特論A(2021)第14回 配信講義 計算科学技術特論A(2021)
第14回 配信講義 計算科学技術特論A(2021)RCCSRENKEI
 
Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform IJECEIAES
 
Bca(rev syll ii-sem) assignment for july 2012 and jan 2013 sessionn
Bca(rev syll ii-sem) assignment for july 2012 and jan 2013 sessionnBca(rev syll ii-sem) assignment for july 2012 and jan 2013 sessionn
Bca(rev syll ii-sem) assignment for july 2012 and jan 2013 sessionnShripad Tawade
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...Journal For Research
 
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...IRJET Journal
 
第15回 配信講義 計算科学技術特論A(2021)
第15回 配信講義 計算科学技術特論A(2021)第15回 配信講義 計算科学技術特論A(2021)
第15回 配信講義 計算科学技術特論A(2021)RCCSRENKEI
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
Alphabet Recognition System Based on Artifical Neural Network
Alphabet Recognition System Based on Artifical Neural NetworkAlphabet Recognition System Based on Artifical Neural Network
Alphabet Recognition System Based on Artifical Neural Networkijtsrd
 
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIESLOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIESaciijournal
 
The Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- ReduxThe Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- ReduxPierre Schaus
 

What's hot (12)

computer science sample papers 3
computer science sample papers 3computer science sample papers 3
computer science sample papers 3
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
第14回 配信講義 計算科学技術特論A(2021)
第14回 配信講義 計算科学技術特論A(2021)第14回 配信講義 計算科学技術特論A(2021)
第14回 配信講義 計算科学技術特論A(2021)
 
Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform
 
Bca(rev syll ii-sem) assignment for july 2012 and jan 2013 sessionn
Bca(rev syll ii-sem) assignment for july 2012 and jan 2013 sessionnBca(rev syll ii-sem) assignment for july 2012 and jan 2013 sessionn
Bca(rev syll ii-sem) assignment for july 2012 and jan 2013 sessionn
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
 
第15回 配信講義 計算科学技術特論A(2021)
第15回 配信講義 計算科学技術特論A(2021)第15回 配信講義 計算科学技術特論A(2021)
第15回 配信講義 計算科学技術特論A(2021)
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
Alphabet Recognition System Based on Artifical Neural Network
Alphabet Recognition System Based on Artifical Neural NetworkAlphabet Recognition System Based on Artifical Neural Network
Alphabet Recognition System Based on Artifical Neural Network
 
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIESLOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
LOCALIZATION OF OVERLAID TEXT BASED ON NOISE INCONSISTENCIES
 
The Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- ReduxThe Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- Redux
 

Similar to Computer Networks Jntu Model Paper{Www.Studentyogi.Com}

0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1guestac67362
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1guestd436758
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networksguestd436758
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networksguestac67362
 
Computer Programming Jntu Model Paper{Www.Studentyogi.Com}
Computer Programming Jntu Model Paper{Www.Studentyogi.Com}Computer Programming Jntu Model Paper{Www.Studentyogi.Com}
Computer Programming Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
C O M P U T E R P R O G R A M M I N G J N T U M O D E L P A P E R{Www
C O M P U T E R  P R O G R A M M I N G  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  P R O G R A M M I N G  J N T U  M O D E L  P A P E R{Www
C O M P U T E R P R O G R A M M I N G J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Decision Support Systems Jntu Model Paper{Www.Studentyogi.Com}
Decision Support Systems Jntu Model Paper{Www.Studentyogi.Com}Decision Support Systems Jntu Model Paper{Www.Studentyogi.Com}
Decision Support Systems Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
D E C I S I O N S U P P O R T S Y S T E M S J N T U M O D E L P A P E R{Www
D E C I S I O N  S U P P O R T  S Y S T E M S  J N T U  M O D E L  P A P E R{WwwD E C I S I O N  S U P P O R T  S Y S T E M S  J N T U  M O D E L  P A P E R{Www
D E C I S I O N S U P P O R T S Y S T E M S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Embedded Systems Jntu Model Paper{Www.Studentyogi.Com}
Embedded Systems Jntu Model Paper{Www.Studentyogi.Com}Embedded Systems Jntu Model Paper{Www.Studentyogi.Com}
Embedded Systems Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Advanced computer architecture
Advanced computer architectureAdvanced computer architecture
Advanced computer architecturevamsi krishna
 
05211201 A D V A N C E D D A T A S T R U C T U R E S A N D A L G O R I...
05211201  A D V A N C E D  D A T A  S T R U C T U R E S   A N D   A L G O R I...05211201  A D V A N C E D  D A T A  S T R U C T U R E S   A N D   A L G O R I...
05211201 A D V A N C E D D A T A S T R U C T U R E S A N D A L G O R I...guestd436758
 
05211201 Advanced Data Structures And Algorithms
05211201 Advanced Data Structures  And  Algorithms05211201 Advanced Data Structures  And  Algorithms
05211201 Advanced Data Structures And Algorithmsguestac67362
 
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Www
C O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{Www
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}Computer Organization Jntu Model Paper{Www.Studentyogi.Com}
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Connecting network
Connecting networkConnecting network
Connecting networkimacomobio
 

Similar to Computer Networks Jntu Model Paper{Www.Studentyogi.Com} (20)

0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Computer Programming Jntu Model Paper{Www.Studentyogi.Com}
Computer Programming Jntu Model Paper{Www.Studentyogi.Com}Computer Programming Jntu Model Paper{Www.Studentyogi.Com}
Computer Programming Jntu Model Paper{Www.Studentyogi.Com}
 
C O M P U T E R P R O G R A M M I N G J N T U M O D E L P A P E R{Www
C O M P U T E R  P R O G R A M M I N G  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  P R O G R A M M I N G  J N T U  M O D E L  P A P E R{Www
C O M P U T E R P R O G R A M M I N G J N T U M O D E L P A P E R{Www
 
Decision Support Systems Jntu Model Paper{Www.Studentyogi.Com}
Decision Support Systems Jntu Model Paper{Www.Studentyogi.Com}Decision Support Systems Jntu Model Paper{Www.Studentyogi.Com}
Decision Support Systems Jntu Model Paper{Www.Studentyogi.Com}
 
D E C I S I O N S U P P O R T S Y S T E M S J N T U M O D E L P A P E R{Www
D E C I S I O N  S U P P O R T  S Y S T E M S  J N T U  M O D E L  P A P E R{WwwD E C I S I O N  S U P P O R T  S Y S T E M S  J N T U  M O D E L  P A P E R{Www
D E C I S I O N S U P P O R T S Y S T E M S J N T U M O D E L P A P E R{Www
 
Embedded Systems Jntu Model Paper{Www.Studentyogi.Com}
Embedded Systems Jntu Model Paper{Www.Studentyogi.Com}Embedded Systems Jntu Model Paper{Www.Studentyogi.Com}
Embedded Systems Jntu Model Paper{Www.Studentyogi.Com}
 
Advanced computer architecture
Advanced computer architectureAdvanced computer architecture
Advanced computer architecture
 
Network programming
Network programmingNetwork programming
Network programming
 
05211201 A D V A N C E D D A T A S T R U C T U R E S A N D A L G O R I...
05211201  A D V A N C E D  D A T A  S T R U C T U R E S   A N D   A L G O R I...05211201  A D V A N C E D  D A T A  S T R U C T U R E S   A N D   A L G O R I...
05211201 A D V A N C E D D A T A S T R U C T U R E S A N D A L G O R I...
 
05211201 Advanced Data Structures And Algorithms
05211201 Advanced Data Structures  And  Algorithms05211201 Advanced Data Structures  And  Algorithms
05211201 Advanced Data Structures And Algorithms
 
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
 
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Www
C O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{Www
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Www
 
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}Computer Organization Jntu Model Paper{Www.Studentyogi.Com}
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}
 
Ads
AdsAds
Ads
 
Connecting network
Connecting networkConnecting network
Connecting network
 

More from guest3f9c6b

Mass Transfer Operations I Jntu Model Paper{Www.Studentyogi.Com}
Mass Transfer Operations I Jntu Model Paper{Www.Studentyogi.Com}Mass Transfer Operations I Jntu Model Paper{Www.Studentyogi.Com}
Mass Transfer Operations I Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Linear Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Linear Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Linear Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Linear Ic Applications Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
English Jntu Model Paper{Www.Studentyogi.Com}
English Jntu Model Paper{Www.Studentyogi.Com}English Jntu Model Paper{Www.Studentyogi.Com}
English Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Engineering Chemistry Jntu Model Paper{Www.Studentyogi.Com}
Engineering Chemistry Jntu Model Paper{Www.Studentyogi.Com}Engineering Chemistry Jntu Model Paper{Www.Studentyogi.Com}
Engineering Chemistry Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Engineering Chemistry 1 Jntu Model Paper{Www.Studentyogi.Com}
Engineering Chemistry 1 Jntu Model Paper{Www.Studentyogi.Com}Engineering Chemistry 1 Jntu Model Paper{Www.Studentyogi.Com}
Engineering Chemistry 1 Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Emwavesandtransmission Lines Jntu Model Paper{Www.Studentyogi.Com}
Emwavesandtransmission Lines Jntu Model Paper{Www.Studentyogi.Com}Emwavesandtransmission Lines Jntu Model Paper{Www.Studentyogi.Com}
Emwavesandtransmission Lines Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Electronic Devices And Circuits Jntu Model Paper{Www.Studentyogi.Com}
Electronic Devices And Circuits Jntu Model Paper{Www.Studentyogi.Com}Electronic Devices And Circuits Jntu Model Paper{Www.Studentyogi.Com}
Electronic Devices And Circuits Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Electromagneticwavesandtransmissionlines Jntu Model Paper{Www.Studentyogi.Com}
Electromagneticwavesandtransmissionlines Jntu Model Paper{Www.Studentyogi.Com}Electromagneticwavesandtransmissionlines Jntu Model Paper{Www.Studentyogi.Com}
Electromagneticwavesandtransmissionlines Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Electrical Technology Jntu Model Paper{Www.Studentyogi.Com}
Electrical Technology Jntu Model Paper{Www.Studentyogi.Com}Electrical Technology Jntu Model Paper{Www.Studentyogi.Com}
Electrical Technology Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Electrical Measurements Jntu Model Paper{Www.Studentyogi.Com}
Electrical Measurements Jntu Model Paper{Www.Studentyogi.Com}Electrical Measurements Jntu Model Paper{Www.Studentyogi.Com}
Electrical Measurements Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Electrical Machines Iii Jntu Model Paper{Www.Studentyogi.Com}
Electrical Machines Iii Jntu Model Paper{Www.Studentyogi.Com}Electrical Machines Iii Jntu Model Paper{Www.Studentyogi.Com}
Electrical Machines Iii Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Electrical Machines Ii Jntu Model Paper{Www.Studentyogi.Com}
Electrical Machines Ii Jntu Model Paper{Www.Studentyogi.Com}Electrical Machines Ii Jntu Model Paper{Www.Studentyogi.Com}
Electrical Machines Ii Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Electrical Circuits Analysis Jntu Model Paper{Www.Studentyogi.Com}
Electrical Circuits Analysis Jntu Model Paper{Www.Studentyogi.Com}Electrical Circuits Analysis Jntu Model Paper{Www.Studentyogi.Com}
Electrical Circuits Analysis Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Digital Control Systems Jntu Model Paper{Www.Studentyogi.Com}
Digital Control Systems Jntu Model Paper{Www.Studentyogi.Com}Digital Control Systems Jntu Model Paper{Www.Studentyogi.Com}
Digital Control Systems Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Designofmachinemembers I Jntu Model Paper{Www.Studentyogi.Com}
Designofmachinemembers I Jntu Model Paper{Www.Studentyogi.Com}Designofmachinemembers I Jntu Model Paper{Www.Studentyogi.Com}
Designofmachinemembers I Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Databasemanagementsystems Jntu Model Paper{Www.Studentyogi.Com}
Databasemanagementsystems Jntu Model Paper{Www.Studentyogi.Com}Databasemanagementsystems Jntu Model Paper{Www.Studentyogi.Com}
Databasemanagementsystems Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Control Systems Jntu Model Paper{Www.Studentyogi.Com}
Control Systems Jntu Model Paper{Www.Studentyogi.Com}Control Systems Jntu Model Paper{Www.Studentyogi.Com}
Control Systems Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Computer Graphics Jntu Model Paper{Www.Studentyogi.Com}
Computer Graphics Jntu Model Paper{Www.Studentyogi.Com}Computer Graphics Jntu Model Paper{Www.Studentyogi.Com}
Computer Graphics Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Computerapplicationinchemicalengineering Jntu Model Paper{Www.Studentyogi.Com}
Computerapplicationinchemicalengineering Jntu Model Paper{Www.Studentyogi.Com}Computerapplicationinchemicalengineering Jntu Model Paper{Www.Studentyogi.Com}
Computerapplicationinchemicalengineering Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 

More from guest3f9c6b (20)

Mass Transfer Operations I Jntu Model Paper{Www.Studentyogi.Com}
Mass Transfer Operations I Jntu Model Paper{Www.Studentyogi.Com}Mass Transfer Operations I Jntu Model Paper{Www.Studentyogi.Com}
Mass Transfer Operations I Jntu Model Paper{Www.Studentyogi.Com}
 
Linear Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Linear Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Linear Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Linear Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
 
English Jntu Model Paper{Www.Studentyogi.Com}
English Jntu Model Paper{Www.Studentyogi.Com}English Jntu Model Paper{Www.Studentyogi.Com}
English Jntu Model Paper{Www.Studentyogi.Com}
 
Engineering Chemistry Jntu Model Paper{Www.Studentyogi.Com}
Engineering Chemistry Jntu Model Paper{Www.Studentyogi.Com}Engineering Chemistry Jntu Model Paper{Www.Studentyogi.Com}
Engineering Chemistry Jntu Model Paper{Www.Studentyogi.Com}
 
Engineering Chemistry 1 Jntu Model Paper{Www.Studentyogi.Com}
Engineering Chemistry 1 Jntu Model Paper{Www.Studentyogi.Com}Engineering Chemistry 1 Jntu Model Paper{Www.Studentyogi.Com}
Engineering Chemistry 1 Jntu Model Paper{Www.Studentyogi.Com}
 
Emwavesandtransmission Lines Jntu Model Paper{Www.Studentyogi.Com}
Emwavesandtransmission Lines Jntu Model Paper{Www.Studentyogi.Com}Emwavesandtransmission Lines Jntu Model Paper{Www.Studentyogi.Com}
Emwavesandtransmission Lines Jntu Model Paper{Www.Studentyogi.Com}
 
Electronic Devices And Circuits Jntu Model Paper{Www.Studentyogi.Com}
Electronic Devices And Circuits Jntu Model Paper{Www.Studentyogi.Com}Electronic Devices And Circuits Jntu Model Paper{Www.Studentyogi.Com}
Electronic Devices And Circuits Jntu Model Paper{Www.Studentyogi.Com}
 
Electromagneticwavesandtransmissionlines Jntu Model Paper{Www.Studentyogi.Com}
Electromagneticwavesandtransmissionlines Jntu Model Paper{Www.Studentyogi.Com}Electromagneticwavesandtransmissionlines Jntu Model Paper{Www.Studentyogi.Com}
Electromagneticwavesandtransmissionlines Jntu Model Paper{Www.Studentyogi.Com}
 
Electrical Technology Jntu Model Paper{Www.Studentyogi.Com}
Electrical Technology Jntu Model Paper{Www.Studentyogi.Com}Electrical Technology Jntu Model Paper{Www.Studentyogi.Com}
Electrical Technology Jntu Model Paper{Www.Studentyogi.Com}
 
Electrical Measurements Jntu Model Paper{Www.Studentyogi.Com}
Electrical Measurements Jntu Model Paper{Www.Studentyogi.Com}Electrical Measurements Jntu Model Paper{Www.Studentyogi.Com}
Electrical Measurements Jntu Model Paper{Www.Studentyogi.Com}
 
Electrical Machines Iii Jntu Model Paper{Www.Studentyogi.Com}
Electrical Machines Iii Jntu Model Paper{Www.Studentyogi.Com}Electrical Machines Iii Jntu Model Paper{Www.Studentyogi.Com}
Electrical Machines Iii Jntu Model Paper{Www.Studentyogi.Com}
 
Electrical Machines Ii Jntu Model Paper{Www.Studentyogi.Com}
Electrical Machines Ii Jntu Model Paper{Www.Studentyogi.Com}Electrical Machines Ii Jntu Model Paper{Www.Studentyogi.Com}
Electrical Machines Ii Jntu Model Paper{Www.Studentyogi.Com}
 
Electrical Circuits Analysis Jntu Model Paper{Www.Studentyogi.Com}
Electrical Circuits Analysis Jntu Model Paper{Www.Studentyogi.Com}Electrical Circuits Analysis Jntu Model Paper{Www.Studentyogi.Com}
Electrical Circuits Analysis Jntu Model Paper{Www.Studentyogi.Com}
 
Digital Control Systems Jntu Model Paper{Www.Studentyogi.Com}
Digital Control Systems Jntu Model Paper{Www.Studentyogi.Com}Digital Control Systems Jntu Model Paper{Www.Studentyogi.Com}
Digital Control Systems Jntu Model Paper{Www.Studentyogi.Com}
 
Designofmachinemembers I Jntu Model Paper{Www.Studentyogi.Com}
Designofmachinemembers I Jntu Model Paper{Www.Studentyogi.Com}Designofmachinemembers I Jntu Model Paper{Www.Studentyogi.Com}
Designofmachinemembers I Jntu Model Paper{Www.Studentyogi.Com}
 
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
 
Databasemanagementsystems Jntu Model Paper{Www.Studentyogi.Com}
Databasemanagementsystems Jntu Model Paper{Www.Studentyogi.Com}Databasemanagementsystems Jntu Model Paper{Www.Studentyogi.Com}
Databasemanagementsystems Jntu Model Paper{Www.Studentyogi.Com}
 
Control Systems Jntu Model Paper{Www.Studentyogi.Com}
Control Systems Jntu Model Paper{Www.Studentyogi.Com}Control Systems Jntu Model Paper{Www.Studentyogi.Com}
Control Systems Jntu Model Paper{Www.Studentyogi.Com}
 
Computer Graphics Jntu Model Paper{Www.Studentyogi.Com}
Computer Graphics Jntu Model Paper{Www.Studentyogi.Com}Computer Graphics Jntu Model Paper{Www.Studentyogi.Com}
Computer Graphics Jntu Model Paper{Www.Studentyogi.Com}
 
Computerapplicationinchemicalengineering Jntu Model Paper{Www.Studentyogi.Com}
Computerapplicationinchemicalengineering Jntu Model Paper{Www.Studentyogi.Com}Computerapplicationinchemicalengineering Jntu Model Paper{Www.Studentyogi.Com}
Computerapplicationinchemicalengineering Jntu Model Paper{Www.Studentyogi.Com}
 

Computer Networks Jntu Model Paper{Www.Studentyogi.Com}

  • 1. www.studentyogi.com www.studentyogi.com Code No: R05310504 Set No. 1 III B.Tech I Semester Regular Examinations, November 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering and Information Technology) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. Write short notes on the following: (a) Client server mo del (b) MAN (c) Interfaces and services. [4+6+6] 2. (a) Discuss in detail about space division switches? (b) With a neat diagram explain ISDN system for home use? [8+8] 3. (a) Explain one -bit sliding window protocol. Give the advantages and disadvan- tages of one-bit sliding window protocol? (b) Discuss the services provided by the data link layer to the network layer? [8+8] 4. (a) What is the prime di erence between a token bus and a token ring? (b) A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in the units of 40 msec. i. What is the chance of success on the rst attempt? ii. What is the probability of exactly k collisions and then a success? iii. What is the expected number of transmission attempts needed? [4+12] 5. De ne route. Why routing algorithm is required. Routes can be predetermined and then use them when required (or) Routes can be determined when needed and use them immediately. First method is proactive and second metho d is reactive. Which one is preferred for wired networks? Justify your answer. [16] 6. (a) How Tunneling helps in connecting two di erent networks? (b) How routing in inter-network is di erent from routing in subnet? [8+8] 7. (a) What is the purpose of sequence numbers in TCP Segment? (b) Why padding is required for TCP Segment? (c) Write short notes on TCP timers. [4+4+8] 8. (a) What is security? What is network security? What is information security?
  • 2. www.studentyogi.com www.studentyogi.com Code No: R05310504 Set No. 1 (b) What are the Pros and Cons of providing security? (c) Who are the people who cause security problems? [6+5+5]
  • 3. www.studentyogi.com www.studentyogi.com Code No: R05310504 Set No. 2 III B.Tech I Semester Regular Examinations, November 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering and Information Technology) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. (a) Give a detailed description of the Novell Netware reference model. (b) With suitable examples explain simplex, half-duplex & full-duplex communi- cation. [10+6] 2. (a) Discuss in detail about asynchronous communication? (b) Discuss in detail about broad band ISDN? [8+8] 3. (a) Discuss the error control technique which is commonly used in data network. What value of N is used in go-back-N ARQ technique used in ARPANET and why? (b) Imagine that you are writing the data link software for a line used to send data to you, but not from you. The other end uses HDLC, with a 3-bit sequence number and a window size of seven frames. You would like to bu er as many out of sequence frames as possible to enhance e ciency, but you are not allowed to modify the software on the sending side. Is it possible to have a receiver window greater than one, and still guarantee that the protocol will never fail? If so, what is the largest window that can be safely used? [8+8] 4. (a) Discuss about MAC addresses? (b) Explain about a bit-map collision free protocol? [8+8] 5. (a) What is Multicasting. How it is di erent from broadcasting. How do you construct a multicast tree. Explain with an example. (b) What are the applications of multicasting. [10+6] 6. (a) How congestion is controlled in ATM? (b) Explain ATM LAN emulation. [8+8] 7. (a) What are the applications which use connection oriented service and which use connection less service? Explain? (b) What is the type of service that is required for uncompressed audio & video. Explain? (c) What is the type of service that is required for compressed audio & Video? Explain? [6+5+5]
  • 4. www.studentyogi.com www.studentyogi.com Code No: R05310504 Set No. 2 (b) What is the role played by di erent layers in providing security? [8+8]
  • 5. www.studentyogi.com www.studentyogi.com Code No: R05310504 Set No. 3 III B.Tech I Semester Regular Examinations, November 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering and Information Technology) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. (a) Compare point -to-point channels with broadcast channels along with suitable examples? (b) A collection of ve routers is to be collected in a point-to-point subnet. Be- tween each pair of routers, the designers may put a high speed line, a medium- speed line, a low-speed line, or no line. If it takes 100ms of computer time to generate and inspect each topology, how long will it take to inspect all of them to nd the one that best matches the expected load? [8+8] 2. (a) Compare the two methods of serial transmission. Discuss the advantages and disadvantages of each? (b) With a neat diagram explain about Kno ckout switch? [8+8] 3. (a) Discuss the error control technique which is commonly used in data network. What value of N is used in go-back-N ARQ technique used in ARPANET and why? (b) Imagine that you are writing the data link software for a line used to send data to you, but not from you. The other end uses HDLC, with a 3-bit sequence number and a window size of seven frames. You would like to bu er as many out of sequence frames as possible to enhance e ciency, but you are not allowed to modify the software on the sending side. Is it possible to have a receiver window greater than one, and still guarantee that the protocol will never fail? If so, what is the largest window that can be safely used? [8+8] 4. What is a token? Discuss the protocol of token ring LAN in general. Discuss with example how priority is implemented in a token ring LAN? [16] 5. What is non- adaptive routing. Explain any two non- adaptive routing algorithms. [16] 6. Explain Network layer in ATM. [16] 7. (a) What are the similarities and di erences between Data Link layer and Trans- port layer? (b) Explain addressing at Transport layer? [6+10] 8. What is Authentication? How it is di erent from Authorization? Explain in brief di erent Authentication protocols with their relative merits and demerits. [16]
  • 6. www.studentyogi.com www.studentyogi.com Code No: R05310504 Set No. 4 III B.Tech I Semester Regular Examinations, November 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering and Information Technology) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. (a) Compare and contrast WAN and Internet (b) What are the various types of network topology? What are the implications of having di erent topologies? [6+10] 2. (a) Give a comparison of semiconductor diodes and LEDs as light sources? (b) Discuss about wireless communication in detail? [6+10] 3. (a) Discuss the error control technique which is commonly used in data network. What value of N is used in go-back-N ARQ technique used in ARPANET and why? (b) Imagine that you are writing the data link software for a line used to send data to you, but not from you. The other end uses HDLC, with a 3-bit sequence number and a window size of seven frames. You would like to bu er as many out of sequence frames as possible to enhance e ciency, but you are not allowed to modify the software on the sending side. Is it possible to have a receiver window greater than one, and still guarantee that the protocol will never fail? If so, what is the largest window that can be safely used? [8+8] 4. (a) Discuss about the le key assumptions in case of dynamic channel allocation in LANs and WANs? (b) Discuss in detail the working of token bus? [8+8] 5. How bu ering at receiver can help in solving out of order delivery of packets. What are the limitations of it. What are the applications for which this strategy is suitable and why. What are the applications for which this strategy is not suitable and why. Explain. [16] 6. (a) What are the message types used by ICMP? Explain. (b) Explain the network protocols. i. ARP ii. RARP. [6+10] 7. (a) Explain the protocol scenarios for releasing a connection. (b) What is the relation between NSAP & TSAP? [12+4] 8. (a) What is security? What is network security? What is information security?
  • 7. www.studentyogi.com www.studentyogi.com Code No: R05310504 Set No. 4 (b) What are the Pros and Cons of providing security? (c) Who are the people who cause security problems? [6+5+5]