You are on page 1of 2

R.M.D.

ENGINEERING COLLEGE
RSM NAGAR, KAVARAIPETTAI 601 206
Ist Semester M.E Computer Science and engineering
Second Internal Assessment OCTOBER 2014
Sub. Title : Design and management of networks

Date

: 19.11.14

Sub. Code : CP7101

Branch

: CSE

Time

Max. Marks

: 100

: 3 hours

Answer all questions


Part A (10 x 2 = 20)

1. What are the uses of peer to peer flow models?


2. Draw the example diagram for data source and sink?
3. Give any of the five flow characteristics defined for flow analysis
4. Give the process model for component architecture approach
5. List any three common approaches for identifying flows from application
perspective
6. Define. Sub-netting and Super netting
7. What is Reference Architecture?
8. Distinguish between Network Architecture and Network Design
9. Define. In-band and Out-band Management
10. Tabulate the Dependencies between Performance Mechanisms

Part B (5x16=80 marks)


11 a. Explain the Flow based Architectural Model with a neat sketch (16 marks)
(Or)
b. Explain the Addressing and Routing mechanism used in a network.

12 a) Discuss data sources and sinks in detail?

(16 marks)

(OR )
b) Which flow models apply to each set of flows described below?
a. Users on the Internet accessing the same Web server

(16 marks)

b. Forty workstations processing batch jobs overnight, managed by a central


mainframe
c. Email use across the Internet
d. A transaction-processing application, authorizing credit card transactions
between a companys retail stores and its headquarters
13 a)Develop a flow model for real-time/near-real-time flows. How would you
characterize the flows for this model? What are likely data sources and sinks? Apply your
model to a videoconferencing application

(16 marks)

(OR)
b) What are the differences between the LAN/MAN/WAN and Access/Distribution/
Core architectural models? Under what conditions might each be applied to a
network?

(16 marks)

14 a) What are the layers of network management? Give an example of management at


each layer (what is managed, how it is managed).

(16 marks)

(OR)
b) Explain the Security and Privacy architecture with neat sketches. (16 marks)
15 a) Explain in detail about flow specification algorithm

(16 marks)

(OR)
b) Explain various network topology design models with suitable examples (16 marks)

You might also like