You are on page 1of 2

www.Vidyarthiplus.

com

www.Vidyarthiplus.com Page 1

ANNA UNIVERSITY OF TECHNOLOGY, COIMBATORE
B.E / B.TECH DEGREE EXAMINATIONS : NOV/DEC 2011
REGULATIONS : 2008
FIFTH SEMESTER : ECE
080290032 COMPUTER NETWORKS
Time : 3 Hours Max.Marks : 100
PART A
(10 X 2 =20 MARKS)
ANSWER ALL QUESTIONS
1. what is the difference between a port address, a logical address and a physical address?
2. List the layers of the internet model.
3. What is the maximum & minimum size of UDP protocol?
4. Which fields if IPv4 Reader changes from router to router?
5. Compare persistence timer with keep alive timer.
6. Distinguish between Datagram subnet and Virtual Circuit subnet.
7. What is meant by Link Virtualization?
8. State the concept of Hamming Distance.
9. What are the fields available in PPP frame?
10. What is an Intrusion Detection system?

PART-B
(5 X 16 =80 MARKS)
ANSWER ALL QUESTIONS

11. (a) With neat sketch explain in detail about various protocol layers and their service
Models in networks.
(OR)
(b) (i) Distinguish between HTTP & FTP. (8)
(ii) Explain in detail how the performance of WWW can be enhanced. (8)


12. (a) (i) Explain in detail about the concept of multiplexing and demultiplexing . (8)
(ii) Describe in detail about the real time transport protocols with suitable
Diagram. (8)
(OR)

www.Vidyarthiplus.com

www.Vidyarthiplus.com Page 2

(b) (i) Explain the situation in which congestion can occur in a network. (8)
(ii) Discuss in detail about controlling the congestion in a network . (8)

13 (a) Explain about the shortest path routing algorithm in detail using suitable
examples .
(OR)
(b) Explain in detail about ht architecture of virtual circuit and datagram network
with their merits and demerits.

14. (a) Explain the architecture of IEEE 802.11 Wireless LAN with suitable diagram. Discuss
its concept of Addressing Mechanism.
(OR)
(b) Explain in detail about various error detection and correction techniques.

15. (a) (i) List out the securing mechanism for an E-mail. (6)
(ii) What is SSL? Briefly explain its architecture and its security
Parameters .
(10)
(OR)
(b) (i) Explain in detail how TCP connections can be secured? (8)
(ii) Write short notes on IDS . (4)
(iii) List out the various parameters in QoS. (4)

*****THE END*****

You might also like