Answer ALL Questions
Answer ALL Questions
7. Give the format for UDP datagram and give the meaning for each field.
8. Define the terms (a) Jitter (b) Socket address.
9. What is MIME?
10. Give an account on Steganography.
PART B (5 x 16 = 80)
11. (a) (i) Explain Layers in OSI model. (8 mark)
11. (a) (ii) Explain the Star and Bus topologies of computer networks. (8 marks)
(or)
11. (b) (i) Explain about Coaxial cable and Fiber Optics media for communication. (8 marks)
11. (b) (ii) Explain about the transmission modes available for data flow. (4 marks)
11. (b) (iii) Explain the categories of networks. (4 marks)
12. (a) (i) Explain CRC error detection mechanism with an example. (8 marks)
12. (a) (ii) Explain HDLC in detail. (8 marks)
(or)
12.(b) (i) Explain the frame format of IEEE 802.3 and IEEE 802.5 in detail. (10 marks)
12. (b) (ii) What is CSMA/CD? Explain. (6 marks)
13. (a) (i) Explain about Special IP addresses in detail. (8 marks)
(a) (ii) A company is granted the site address 201.70.64.0. The company needs 6 subnets. Design the
subnets. (8 marks)
(or)
13. (b) (i) Explain Link state routing. (8 marks)
13. (b) (ii) Explain Routing table and Routing module. (8 marks)
14. (a) (i) Explain the Steps involved in computing Checksum for an UDP Datagram. (12 marks)
14. (a) (ii) Explain Four-way Handshaking method to terminate a connection in TCP? (4 marks)
(or)
14. (b) (i) Explain about TCP Congestion control technique in detail. (8 marks)
14. (b) (ii) What is Silly Window Syndrome? How do you avoid it? (8 marks)
15. (a) Explain the followings related with FTP:
(i) Connections and communications (8 marks)
(ii) Commands (8 marks)
(or)
15. (b) Explain the followings related with HTTP:
(i) Messages (8 marks) (ii) Headers (8 marks)
B.E/B.Tech DEGREE EXAMINATION May/Jun 2007
Fifth semester
Computer Science and Engineering
CS1302 -COMPUTER NETWORKS
(Regulation 2004)
Time: 3 hours Maximum marks: 100
PART B (5 x 16 = 80)
11.(a) (i) What is a Protocol? List the three key elements of a protocol.
(a) (ii) With relevant examples differentiate between simplex, half duplex and full duplex
communication.
(a) (iii) A Sine wave completes one cycle in 25 μs. What is its frequency? Express the frequency in
KHz.
(a) (iv) A digital signal has a bit interval of 40 μs. What is the bit rate? Express the bit rate in Kbps.
(or)
11.(b) (i) An analog signal carries four bits in each signal element. If 1000 signal elements are sent per
second, find the baud rate and the bit rate.
11. (b) (ii) Discuss the role played by repeaters in Terrestrial Microwave communication? Is the
distance between repeaters fixed? Discuss.
11. (b) (iii) A network has ‘n’ devices. Determine the number of cable links required for a mesh, ring,
bus and star topology.
12. (a) (i) A block of 32 bits has to be transmitted. Discuss how the thirty two bit block is transmitted
to the receiver using Longitudinal Redundancy Check.
12. (a) (ii) Consider a 32 bit block of data 11100111 11011101 00111001 10101001 that has to be
transmitted. If Longitudinal Redundancy Check is used what is the transmitted bit stream?
12. (a) (iii) In the Hamming code, for a data unit of m bits how do you compute the number of
redundant bits ‘r’ needed?
12. (a) (iv) What kinds of errors can Vertical Redundancy check determine? What kinds of errors it
cannot determine?
(or)
12. (b) (i) List the three main functions performed by the data link layer of the ISO OSI model.
12. (b) (ii) Explain the working of Carrier Sense Multiple Access protocol.
12. (b) (iii) How does a Token Ring LAN operate? Discuss.
12. (b) (iv) List and briefly discuss the two different basic transmission technologies that can be used to
set up wireless LAN’s.
13. (a) (i) State which layers of the ISO OSI model does the following interconnecting devices operate.
13. (a) (ii) State the major difference between Distance Vector Routing and Link State Routing.
Discuss how these routing techniques work.
(or)
13. (b) (i) What is subnetting? Discuss. Also state which classes of IP address can be subnetted.
13. (b) (ii) What is subnet masking? Discuss.
13. (b) (iii) How can we prove that we have 2, 147, 48, 648 address in class A?
13. (b) (iv) What is the subnetwork address if the destination address is 200.45.34.56 and the subnet
mask is 255.255.240.0?
14. (a) (i) List and discuss the various primitives for a simple transport service.
14. (a) (ii) “DNS can use the services of UDP or TCP using port 53”. Discuss when UDP is used and
when TCP is used.
14. (a) (iii) Highlight the features of UDP and briefly discuss the same.
(or)
14. (b) (i) Discuss connection establishment and connection release in TCP.
14. (b) (ii) Discuss how TCP provides reliability using error control.
14. (b) (iii) Discuss the strategies TCP uses to avoid congestion.
15. (a) (i) With a relevant example discuss how the domain space is divided.
15. (a) (ii) Distinguish between a fully qualified domain name and a partially qualified domain name.
Give relevant example.
(or)
15. (b) (i) Discuss how Simple Mail Transfer Protocol (SMTP) works? Can multimedia messages be
transmitted using SMTP? Discuss.
15. (b) (ii) Is Common Gateway Interface a language? Discuss.