Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

8th Semester (June-2016) Computer Science and Information Science Engineering Question Papers

8th Semester (June-2016) Computer Science and Information Science Engineering Question Papers

  • Login to see the comments

  • Be the first to like this

8th Semester (June-2016) Computer Science and Information Science Engineering Question Papers

  1. 1. USN 10rs81 Max. Marks:'100 (05 Marks) (10 Marks) (04 Marks) (06 Marks) (10 Marks) (10 Marks) (20 Marks) Eighth Semester B.E. Degree Examination, June/July 2016 Software Architecture Note: Answer FIVE full questions, selecting at least TWO questions from each part d o o. d Eo 0) ! ox J- 6v oo ll .E . xbo Y() otidO ()= rE ()O do 00s(gcd -a)>r !d ,o 5r ?() oj 9E<o LO 5i 6.; > qi 5I)o c50 P.!.) :iD U: tr< J6i 6) o z l, o o Time: 3 hrs. 1a. b. 2a. b. c. 3a. b. c. With the help of neat block diagram of ABC (Architecture Business Cyclb), explain in detail the different activities which are involved in creating a software architecture.(l0 Marks) c. Why is software architecture important? (05 Marks) PART _ A Briefly explain software architecture with def,rnitions. What is modifiability? Explain general scenario for modifiability. Explain in brief the business qualities. Explain how faults are detected and prevented. Explain in brief about KWIC (Kepvord in Context) with shared data solution. (10 Marks) Enlist architectural styles and explain event-based, implicit invocation. (06 Marks) Explain the advantages and disadvantages of pipes andSlters in architectural style.(O4 Marks) 6 a. What arethe steps involved in implementing the microkernel system? b. Explaie.the dynamic scenarios of reflection with neat diagram. 7 , lV.rite notes on: ai"'' Design pattern b. Master-Slave pattem b. Whole-part pattern d. Proxy pattern e. Command processor 8 a. Explain the steps performed when designing an architecture using the ADD method. (10 Marks) b. Write short notes any two of following: i) Forming team structures ii) Documenting across views iii) Documenting interfaces. q*$* cs 4 a. What do you mean architectural pattern? How it is categorized? Explain the structure part of the solution for ISO layered architecture. (10 Marks) b. Explain the steps involved in the implementation of pipes and filters architecture. (10 Marks) PART - B 5 a. What do you mean by broker architecture? What are the steps involved in implementing distributed broker architecture pattern? (10 Marks) b. Write benefits of MVC. (05 Marks) c. What are the liabilities of PAC? (05 Marks) (10 Marks)
  2. 2. USN lrlcs/rs841 (06 Marks) (07 Marks) {S7 Marks) {03 S{arks} {09 Marksi {S8IV$arks} (07 Marksi (13 Marks) (10 lVfarks) (10 Marks) (05 Marks) (04 Mar[<s] (1tr Marksi a.- b. q; o a I !() () ! Eg 6lu 7v) -oo 11 coo .= c :o0Yo -O o(J -!6O rc! >e/6 6a -o o{: e- ii trEo"! 9E<o-q ti !o 6.v bo: troa.na c- ;'i E'YL U< ron Z d ! o o. Eighth Sexnester B.E. Degree Examination, June/July 2016 Ad-Hoc Networks Tirne: 3 hrs. Max. Marks: tr00 Note: Answer uny FIVE fwll qwestiolrs, selectircg atle{rs{ TWO qwestiafis fr$pn ee*c{o psrt" PAR.T * A Write any eight diff,erences between cellular networks and Ad-hoc 'wireless networks. Expiain the major issues to be considered in designing a MAC protocol for ad*hof-LT:iHl networks" {tS Marks) 2 a. Explain hidden and exposed termireal problems with a neat diagrarar. (05 Marks) b. Explain the packet exchange rnechanism in MACAW protocotr wittrl a neat diagrani. (86 Marks) c. Explain collision avoidance time allocation protocol frame format with a dia.gram. (09 Marks) 3 a. Explain MAC protocol using directional antennas. b. Explain interieaved carrier-sense rnultiple access protoeol in brief. c. Explain the operation of rnultichannel MAC protocol with a neat diagram" mechanisrn. b. Explain DSDV routing-protocol with an example. c. Explain AODV protocol. 4 a. Write the classification of routing protocol based on the routing information update 5a. b. 6a. b: la. b" 8a. b. P,&RT _ B Explain zone routing protocol. Explain Fishey state routing protocol with an example. Why does TCP not perform well in Ari-hoc wireless networks? Explain Ad-hoc TCP, with state diagram f,:r ATCP sender. Explain in brief various routing attacks. Briefly explain requirements f,or a secure routing protocol. Explain two major kinds cryptographic algorithms. Briefly explain the characteristics that affects QoS provisioning in Ad-hoc wireless networks. (07 Marks) Explain Location and delay predictions witli respect tc p,redictive location based QoS routing protocol. (x3 Marks) ****a?
  3. 3. USN b. 6a. b. lOCS/IS834 ci o o o () ox ':> dU Zr, coo .gN df, -o *, a. 39 o() -o>r/6 5r, ag o..f .()E toal; LO 6.:r coo (-) = tr>:iD UL !J< iN (.) z cd o O. Eighth Semester B.E" Degree Examination, Jume/Ju$ 2A16 Network Management Systems Time: 3 hrs. Max. Marks:-[00 Note: Answer FIVE.fall questiarus, selectircg at leest TWO qwestions.frow ewch part, a. Explain Data and Telecornrnurr.*,,ffir* with neat diagrarns. (x0 nrarks) b. Briefly explain Network Management functional groupings with neat diagrarns. (10 Marks) a. What are network management standards? Explain. (Sd Marks) b. Briefly explain models in OSI Network managernent architecture rnodel with a necessary diagram. (S8 Marks) c. Explain inforrnation model with a neat diagram. (06 Manks) a. Explain SNMP organization rnodel with neat diagrarn. (10 Marks) b. Explain the system overview of SNMP network management archifecture with neat diagrarn. (10 Marks) a. Explain the SNMP based ASN.1 data type structure with a rlecessary diagram" (10 Manks) b. Explain the encoding structure used in SNMPvl. (05 Ntarks) c. Explain the structure of Managed objects. (05 Marks) PAT{T _ B 5 a. What is Remote monitoring (RMON)? Explain the advantages of using R.emote rnonitoring with a necessary diagram. (10 Marks) Explain various groups and functions RMON 1 performs at the data link layer. (tr8 Marks) With a neat sketch explain : i) Layered architecture of {-A}d emula.tion across ATM ii) LAN emulation client connections across LUNI (10 Marks) Explain with neat sketches : i) ATIVT network reference model ii) M2 interface. (t(} Marks) Explain with neat sketches Broadband access technology and HFC Technology" (tro Marks) Explain the protocol trayer architecture in an F{FC system. i05 Marks) What are ADSL network management elernents? Discuss ADSL fault management. (05 Marks) What are event correlation techniques? List the approaches. Explain rule based reasoning with neat sketches. (1S lllanks) Explain ctrient/server Authentication system. (10 Marks) ta. b. c. 8a. b.
  4. 4. USN Time: 3 hrs. Note: Amswer FIVE fwll qaestions, seleating at least TWO qwestions fronn each part" a.Withaneatflowchart,explain,,,,ffiusimulaticrnstudy" b. Briefly expiain the advantages and disadvantages of simulation. ltcs82 Max. Marks:100 (I0 Marks) (tr0 Marks) (tr2 Marks) (08 Marks) (06 Marks) Eighth Semester B.E. Degree Examination, Jume/July 2016 System Modeling and Simulation b. 3d, b. af O o ! 6 6 o og 3e (!= ':> J2 7r) ico .= .r Cosf, -o 3* 6:Y o() oo( =,e5 >e -?o 6r= ia. 6, oj !)E 6c)i, aE !o ^^o =c0'-a :.'. I =oo- L,)< *an o '7 o, 2 a. A computer technical support center is staffed by twc people, Able and Baker, who take calls and try to answer questions and solve computer problems. The time between calls ranges from 1to 4 rninutes with the distribution as shown in Tabie 1.1. Able is rnore experienced and can provide service faster than Baker, vrhich means that, when both are idle, Able takes the cal1. The distribution of their service tirrres are shown in Table 1.2 and Table 1.3 respectively. Table 1. tr: Inter arrivalaDle l. t: lnter arrwa me A l ) dtstrtbutron IAT (mins) I 2 -) 4 Probability 0.2s 0.40 0.20 0.15 Table 1.2: Service time distribution of Able Service time (mins) 2 J 4 5 Frobability 0.30 0.28 0.25 0.i7 Table 1.3: Service tirne distribution of Baker Service time (rnins) a J 4 5 5 Probability 0.35 a.25 0.20 4.2 Randorn digits for inter-arrival tirnes are : 26,98, 90, 26, 42,74,80, 69,22,49,34, 45,24,34. Random digits fbr service tirne are :95,21,51,92,89, 38, 13, d1, SCI,49,39,53,88, 01, 81. Simulate this system for 10 customers, by finding i) Average waiting tirne for a customer ii) Average Inter Arrival tirne iii) Average service time of Able iv) Average service time of Baker v) Average waiting time of those who wait. prylain the various concepts used in discrete-event sirnulation with an example. Explain simulation in Java. A companlz used 6 trucks to haul lxanganese from Kolar to industry. There are two loaders, to load each truck. After loading, a truck flloves to the weighing scale to be weighed. The queue discipline is FIFO. When it is weighed, a truck travels to the industry and retums to the loader queue. The distribution of loading tirne, weighing tirne and travel time are as follows : Loading Tirne (mins) 10 5 5 10 15 10 i0 l5 Weiehine Time (mins) 8 t2 B t6 t2 o L) Travel Time (mins) 30 60 80 40 50 70 End of simulation is completion of four weighing from the scale. Calculate the total busy time of both loaders, scale, average loaderand scale utilization.,4ssume that fourtrucks are at the loaders and Two are at the scale, at time "0". The shopping of simulation is after 10 iterations'. (tr41V[arks) tr of2
  5. 5. 10cs82 What is Poisson process? With example explain the properties of Poisson process. (06 Marks)4a. b. c. 5a. b. 6a. b. 7a. 1^ U. c. c. Explain the characteristics of a queuing systern. Explain the various steady state parameters of M/G/1 Queue. Explain the replication rnethod for steady - state simulations. Differentiate between point estimation and interv'al estimation. BAro _-E Use linear congnrential method to generate a sequence of 5 random numbers, with given seed27, increment 43, and constant multiplier 17, modulus i00. (04 Marks) The sequence of random numbers A.54, A.13,0"98, 0.11 and 0.58 has been generated. Use K - S test with u : 0.05 to determine if the hypothesis that the numbers are uniformly distributed on the interval [0, 1] can be rejected. Take Du : 0.565. (08 Marks) Test whether the 2no ,9tn , i6tn ........ Nurnbers in the following sequence are auto correlated by taking cr : 0.05. Take Zon: i.96. 0.38, 0.48, 0.35, 0.01, 0.54,0.34,0.95, 0.06, 0.6i, 0.95, 0.49, 0.96, 0.14, 0.96, 0.99, 0.37, 0.49, 0.60, 0.04, 0.83, 0.42, A.83,0.37,0.21, 0.90, 0.99, 0.91, 0.79, CI.77, a.99,0.95, a.21, 0.4i, 0.81, 0.96, 0.3i, 0.09, a.06, a.23, a.71, 0.73, 0.47, 0.13, 0.55, 0.11, 0.75, A36, A.25, 4.23, 4.72,0.60, Ci.84, 0.70, 0.30, 0.26, 0.3 8, 0.05, 0. 19, A.73, A.44. (08 Marks) Explain acceptance - re"iection technique for Foissor: distribution. Generate 5 Poisson variates with mean cr : 0.25. R.andom numbers are: 0.073, 0.693,0.945,0.739,0.014, a342. Test whether tlie following data follows Poisson distribution using the chi-square test of goodness of fit. Srith mean cx, : 0.05. Take l],rr., = 1 i.l (10 Marks) Arrivals iperiod n I 2 1 J 4 5 6 7 8 I l0 il Frequencv T2 10 t9 t7 l0 8 7 5 5 J a J I (08 Marks) (06 Marks) (10 Marks) (05 Marks) Differentiatq between terrninating and steady state sirnulations by giving one example each. (05 Marks) a. Explain.components of verification and validation process. Explain with neat dragram, model buiiding, verification and validation process. (12 Marks) b. With neat diagrara, expiain the iterative process of calibrating a model. (08 Marks) **r** 2 of2

×