8th Semester Computer Science (2013-June) Question Papers

18,208 views

Published on

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
18,208
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
361
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

8th Semester Computer Science (2013-June) Question Papers

  1. 1. ( C i/ 1,USN Time: 3 hrs. Eighth Semester B.E. Degree Examination, June/July 2013 AD-HOG Networks O6CS/I5841 Max. Marks:100 (08 Marks) (08 Marks) (05 Marks) networks. (05 Marks) (10 Marks) (14 Marks) (14 Marks) E I =6-*t .=A Et4 9^ '=o 9'= o'" aE :9 A;: ()< -i ..i z E Note: Answer FIVE full questions, selecting atleast Tll/O questions from each part. PART_A I a. Give the classification ofdifferent wireless networks. (04 Marks) b. What are the major challenges a routing protocol faces in ad-hoc wireless networks? c. Explain the security threats that exist in wireless networks. 2 a. Mention any five design goals oia MAC protocol for ad-hoc nelr'rorks. b. With a neat diagram, explain hidden and exposed terminal problems in wireless c. Explain in detail. D - PRMA protocol. 3 a. Write a short note on : i) Distributed laxity based priority scheduling scheme ii) Directional busytone based MAC protocol. 4a. b. b. Give the brief explanation of working of a MAC protocol using directional antennas. (06 Marks) Explain any three design issues ofa routing protocol for ad - hoc networks. (06 Marks) With an example, discuss the working of D DSDV routing protocol ii) DSR routing protocol. 5a. b. C- PART - B What are the advantages and disadvantages ofCEDAR protocol? (03 Marks) Explain zone routing protocol. (07 Marks) Give brief explanation of power aware routing metrics of ad-hoc wireless networks. (10 Marks) 6 a. Explain any five major reasons for throughout degradation of TCP when used in ad-hoc wireless networks. (10 Marks) b. Discuss the operation of feedback based TCP, with a suitable example. (10 Marks) 7 a. Briefly explain the network security requirements for ad-hoc wireless networks. (04 Marks) b. Give the classification ofsecurity attacks on ad-hoc wireless networks. (06 Marks) c. List and give brief explanation of network layer attacks. (10 Marks) 8 a. Explain the design choice for providing QoS supporl for ad-hoc wireless networks. ,.ia{-t,''. .. (10 Marks) 6. Explain Ticket -Based QoS routing protocol. .). ,..'.- '" (10 Marks) 'i' ",,,t:t{,* :
  2. 2. USN 06cs81 Eighth Semester B.E. Degree Examination, June I July 2Ol3 Advanced Gomputer Architecture Time: 3 hrs. Max. Marks:100 Note: Answer any FIVE full questions, selecting atleast TWO question from each part. PART - A a. Defure Computer Architecture. Illustrate the seven dimensions of an ISA. b. Assume 4 disk subsystem with the following components and MTTF. i) 10 Disk, each rated at 1000000 hours MTTF ii) 1 SCSI controller 500,000 hours MTTF ii| 1 power supply 200,000 - hours MTTF i r) 1 Fan 200,000 - hours MTTF v) 1 SCSI cable 1,000,000 - hours MTTF. Using the simplifying assumptions that the iife times are exponentially distributed and that lailure are independent. Compute the MTTF olthe sl stem as a whole. (04 Marks) c. We will run two applieations on this dual Pentium but the resource requirements are not equal. The f-rst application needs 80% of the resources and the other only 20% of the resou.rces. i) Given that 40% of the first application is parallelizable, how much speed up would you achieve with that application if run in isolation? ii) Given that 99%o of the second application is parallelizable, how much speed up would this application observe ifrun in isolation? iii) Given that 40Yo of the first application is paralletizable, how much overall system speed up would you observe ilyou parallelized it? E q g .= cr E.J tt -a 5! AA 6d, 5.!l E> .i ...i z o E 2a. b. (08 Marks) much overall system (08 Marks) (10 Marks) (10 Marks) .4 c. a. b. With a neat diagram. explain the classic five stage pipeline fo1 RISC processor. Mention the techniques used to reduce branch costs. prediction used for same. Explain static and dynamic branch (08 Marks) dependencies. Explain (06 Marks) (06 Marks) (0E Mrrks) (04 Marks) b. Explain the basic schemes for enforcing Coherence in system. a. Briefly explain four basic Cache optimization methods. 1of2 iv) Given that 99% of the seiond application is parallelizable, how speedup would you get? What is pipelining? List pipeline hazards. Explain any one in detail. What is data dependencies? Mention the different types of data ame dependencies with example between two instructions. What is correlating predictors? Explain with examples. Explain the basic VLIW approach for exploiting ILP using multiple issues. Write a note on value prediction. c. Mention the key issues in implementing advanced speculation techniques. Explain. (08 Marks) PART - B a. Explain any two hardware primitives to implement synchronization, with example. (I0 Marks) a shared memory multiprocessor ( l0 Marks) ii -' (lo Marks) li'
  3. 3. 06cs81 b. Assume we have a computer where the Clocks Per Instruction (CPI) is 1.0. When all memory accesses hit in the Cache. The only data accesses are loads and stores and these @ )/n vp -J, /)L,r/ e t} 'ts,s* -..9n r.W*I.* .Nv ag- ..* Y fl aV rly xv {. -a' (,, {*} *cI. , '(l:" '"ar{-J ,, ./t,ry ( +S' 2 of2
  4. 4. USN 06CS/IS834 (06 Marks) (08 Marks) (06 Marks) (06 Marks) (04 Marks) (05 Marks) (05 Marks) (06 Marks) (10 Marks) (04 Marks) .(05 Mark) (06 Marks) (04 Marks) (05 Marks) (06 Marks) (08 Marks) (06 Marks) E g Yi '! a 66 CE --3 og oi -i ..i z E Eighth Semester B.E. Degree Examination, June / July 2013 Network Management Systems Time: 3 hrs. Max. Marks:100 Notez Answer ony FIVEfull questions, selecting atleast TlyO question from each part. PART-A 1 a. What are the goals of network management? Explain the functions of network management. (10 Marks) b. List the problems that are common in network management system. (04 Marks) c. With a neat diagram, explain network management Dumbbell Architecture. (06 Marks) Explain the salient features ofvarious network management standards. Explain the functional model of network management system. Explain various data types used in ASN - 1. a. Explain Two tier, Tluee tier and proxy server organization model of SNMP. (08 Marks) b. With a neat diagram, explain network management architecture of SNMP. (08 Marks) c. Write a note on history of SNMP management. (04 Marks) b. c. 4 a. Explain the structure of management inlormation in SNMP. b. Explain how basic encoding rule (BER) is used in SNMP. d. Explain the Get - Request operation tbr a system group. PART - B What is remote monitoring? Explain new data types defined in RMON 1 . Explain the common RMON1 and Ethernet groups. Describe RMON2 conformance group. 7 a. Brielly explain the dif'ferent broadband access technology. b. Explain the ADSL system reference model. c. What are the different parameters used in ADSL fault management? i d. Explain the elements of cable modem management MIBs. 8 a. Write a note on Fault management. b. Describe the various kinds ofclient / server authentication systems. c. With a neat diagram, explain policy - based management. c. What are the types of traps used in SNMP? Explain each with the structure of trap PDU. 5a. b. c. 6 a. What is the need for ATM LAN emulation? Explain the layered architecture of a LAN emulation. (08 Marks) b. With a neat diagram, explain the role of SNMP and ILMI in ATM management. (06 Marks) c. Describe ATM digital exchange interface management. (06 Marks)
  5. 5. USN ' Time: 3 hrs. 06IS81 Max. Marks:100 (08 Marks) (04 Marks) (08 Marks) (04 Marks) (08 Marks) (08 Marks) cause-effect (05 Marks) (05 Marks) (05 Marks) (05 Marks) (05 Marks) (05 Marks) (10 Marks) Eighth Semester B.E. Degree Examination, June/July 2013 Software Testing Note: Answer FIVE full questions, selecting ot least TWO questions from each part. a :v1 -^t x0r -a :q 6 .9. 4.9 oy (.) < o z a E 1a. b. c. PART_A Explain in detail the various measures ofsoftware quality attributes. With a suitable example, explain how will you specify program bahviour. Briefly explain the concepts oftest metrics. Explain the eoncepts ofdefect management. Explain in detail the several strategies for test generation. With a neat sketch,.explain the elements of model checking. W}at do you mean by definition - use pairs? Explain the concepts ofdata dependence graph with a suitable example. Briefly explain the concepts ofdata flow analysis. Define data flow testing criteria with respect to DU pa s. What are the diff'erences between test case and test case specifications? Define the term adequacy criteria with a suitable example Briefly explain the concepts ofscaffolding. Explain the concepts ofself-checks as oracles. Write short notes on the following concepts: Memory leaks System testing Acceptance testing Integration testing 3 a. Briefly explain the concepts of unidimensional versus multidimensional puf,itiorirfljo murr.g b. Name and explain the four steps which are helpful in creating the equivalence class. (06 Marks) c. With a neat sketch, explain in detail the steps involved in the generation of tests using the category-partition method. (08 Marks) a. Explain the procedures which.are used for the generation of tests using graphing. b. With a neat sketch, explain the notation used in cause-effect graphing. c. Briefly describe the lault model for predicate testing. d. Explain the usage olpredicate testing in practice. PAR'I'- B a. Explain the concepts of statement testing. b. Briefly explain the concepts ol branch testing. c. Explain in detail the concepts of path testing with a suitable example. 2a. b. c. 6a. b. c. d. la. b. c d. 8 (05 Marks) (05 Marks) (05 Marks) (05 Marks) (05 Marks) .(05 Marks) (05 Marks) (05 Marks) a. b. c. d. (20 Marks)

×