You are on page 1of 11

1. (a) Discuss the classification of Networks according to their size?

(b) Discuss the various design issues related to the layers in ISO-OSI model? [10+6] 2. (a) Discuss circuit switching and packet switching methods. Also discuss their merits and demerits. (b) Differentiate between the following: i. bit rate and baud rate ii. single mode fiber and multi mode fiber. [12+4] 3. (a) Mention the different protocols used in data link layer. Explain the operation of HDLC protocol? (b) What is framing? Discuss various framing techniques? [8+8] 4. What is a token? Discuss the protocol of token ring LAN in general. Discuss with example how priority is implemented in a token ring LAN? [16] 5. (a) Explain Dijkstras shortest path algorithm. (b) Consider graph given figure 5b. Compute the shortest path from A to D. [8+8]

6. Explain routing for mobile hosts. [16] 7. (a) Suggest modifications to TCP to make it suitable for short data transfers. (b) UDP provides only connectionless service. For applications which use UDP how you provide reliability. [10+6] 8. DNS uses databases. Database can be centralized or distributed. What are the pros and cons of centralized and distributed data base approaches? What type of database DNS actually uses? [16]

1. (a) Compare and contrast OSI reference model and TCP/IP reference model. (b) With the help of appropriate examples explain various types of connection oriented and connection less services. [8+8] 2. (a) Explain about ISDN architecture? (b) Differentiate between optical fiber and coax? [10+6] 3. (a) Draw the phase diagram for bringing a line up and down using PPP? (b) Discuss about a simplex stop-and-wait protocol? What are its merits and demerits? [8+8] 4. (a) Discuss about fast Ethernet cabling? (b) Explain various token bus control frames? [8+8] 5. (a) How hierarchical routing reduces the size of routing table. (b) What is reverse path forwarding? How it helps in broadcasting. (c) What are the services provided by network layer to transport layer. [6+6+4] 6. (a) How leaky bucket algorithm helps in traffic shaping? (b) Explain the working of token bucket algorithm. [8+8] 7. (a) Explain the transport service primitives. (b) Imagine that a two-way handshake rather than a three-way handshake were used to set up connections. In other words, the third message was not required. Are deadlocks now possible? Give an example or show that none exit. [8+8] 8. (a) What is the functionality that is supported by any e mail system? (b) What is the difference in playing Audio and Video in streaming mode and download mode? [8+8] 1. (a) Make a technical comparison between OSI & TCP/IP reference model. (b) Novell Netware looks more like TCP/IP than like OSI. Justify. [8+8] 2. (a) Write a brief notes on: i. Radio transmission ii. Microwave transmission. [8+8] (b) Discuss about Narrow band ISDN?

3. (a) What is the checksummed frame transmitted if the message is 1101011011 & the generator polynomial is x 4 + x + 1 using CRC. (b) Give the detailed description of HDLC frame format? [8+8] 4. Write short notes on: (a) Ethernet (b) Wireless LAN (c) Source routing bridge (d) Remote bridges. [44=16] 5. Consider request- reply type of service. Client requests and Server replies. Assume large number of clients. In this context which one is preferred, Connection oriented service or Connection less service and why. Server can be state less of stateful server. Which one is preferred in the above context. Justify your selection. [16] 6. (a) Define congestion. What are the reasons for congestion? (b) How congestion control is different from flow control? [10+6] 7. (a) Explain the protocol scenarios for releasing a connection. (b) What is the relation between NSAP & TSAP? [12+4] 8. (a) Why DNS uses distributed data bases? (b) How do you make web pages dynamic? (c) What is the functionality that is supported by user agent? [5+6+5]

1. (a) Distinguish among LAN,MAN,WAN and Internet. (b) What are the two protocols that are defined at the transport layer of the TCP/IP reference model? Mention their applications? [12+4] 2. (a) Discuss about transmission in ATM Networks? (b) Discuss the importance of electromagnetic spectrum in communication? [8+8] 3. Write short notes on the following: (a) Stop-and wait protocol (b) LCP packets types (c) ATM cell reception. [4+6+6] 4. (a) What is pure ALOHA and slotted ALOHA? Mention the advantages of slotted ALOHA? (b) A seven-story office building has 15 adjacent offices per floor. Each office contains a wall socket for a terminal in the front wall, so the sockets from a rectangular grid in the vertical plane, with a separation of 4 m between sockets, both horizontally and vertically. Assuming that it is feasible to run a straight cable between any pair of sockets, horizontally, vertically, or diagonally, how many meters of cable are needed to connect all sockets using i. a star configuration with a single router in middle? ii. an 802.3 LAN? iii. a ring network (without a wire center)? [6+10] 5. A centralized router can compute all the routes and distribute them to all other routers. What are the disadvantages of this approach. How distributed routing is better than the centralized approach. Explain. [16] 6. What are the steps involved in congestion control? Explain. [16] 7. (a) Explain the protocol scenarios for establishing a connection using three way handshake. (b) Why abrupt connection release results in data loss? [12+4] 8. What is DNS? What is its use? How DNS works? [16] 1. (a) Compare point -to-point channels with broadcast channels along with suitable examples? (b) A collection of five routers is to be collected in a point-to-point subnet. Between each pair of routers, the designers may put a high speed line, a medium speed line, a low-speed line, or no line. If it takes 100ms of computer time to generate and inspect each topology, how long will it take to inspect all of them to find the one that best matches the expected load? [8+8] 2. (a) Television channels are 6MHz wide. How many bits/sec can be sent if four level digital signals are used? Assume a noiseless channel (b) How does a virtual circuit differ from a physical circuit? What advantages would a virtual circuit provide? [8+8] 3. (a) Explain one -bit sliding window protocol. Give the advantages and disadvantages of one-bit sliding window protocol?

(b) Discuss the services provided by the data link layer to the network layer? [8+8] 4. (a) Discuss about MAC addresses? (b) Explain about a bit-map collision free protocol? [8+8] 5. What is non- adaptive routing. Explain any two non- adaptive routing algorithms.[16] 6. (a) How connections are setup and released in ATM? (b) What is the Format of routing table in ATM? How it helps in routing cells? [8+8] 7. (a) Explain the techniques for controlling packet life time. (b) What is forbidden region? Explain how sequences numbers are given to TPDUS. [8+8] 8. (a) With the help of diagram explain the encryption model. (b) What is the role of key secrecy and algorithm secrecy in security? (c) What are the approaches for cryptanalysis? [8+4+4] 1. (a) What are the advantages of having layered architecture? Mention the layers of ISO-OSI reference model? (b) What is Internet? Mention some of the applications of Internet? [8+8] 2. (a) Television channels are 6MHz wide. How many bits/sec can be sent if fourlevel digital signals are used? Assume a noiseless channel (b) How does a virtual circuit differ from a physical circuit? What advantages would a virtual circuit provide? [8+8] 3. Explain in detail the two data link protocols widely used in the Internet? [16] 4. (a) Discuss about the file key assumptions in case of dynamic channel allocation in LANs and WANs? (b) Discuss in detail the working of token bus? [8+8] 5. Define route. Why routing algorithm is required. Routes can be predetermined and then use them when required (or) Routes can be determined when needed and use them immediately. First method is proactive and second method is reactive. Which one is preferred for wired networks? Justify your answer. [16] 6. (a) What is the format of Cell in ATM? (b) Compare Permanent V.C. with Switched V.C. in ATM. (c) How fixed size cells increases the speed of switching? [6+5+5] 7. (a) What are the different flags in TCP segment? Explain each of them. (b) How TCP uses sliding window to achieve flow control? [10+6] 8. (a) What is security? What is network security? What is information security? How network security and information security are related? (b) What are the Pros and Cons of providing security? (c) Who are the people who cause security problems? [6+5+5]

1. (a) Define the following terms: i. Computer Network ii. Peer process iii. Protocol iv. Interface. (b) Discuss various network applications and goals in detail. [8+8] 2. (a) Discuss in detail about Time division switches? (b) With a neat diagram explain ISDN system with a PBX for use in large businesses? [8+8] 3. (a) Explain one -bit sliding window protocol. Give the advantages and disadvantages of one-bit sliding window protocol? (b) Discuss the services provided by the data link layer to the network layer?[8+8] 4. (a) Explain how the token ring is maintained in detail? (b) Does the use of wire center have any influence on the performance of a token ring? [8+8] 5. What is adaptive routing. Is Distance vector routing adaptive algorithm or not. Justify your answer. Explain in detail Distance vector routing. [16] 6. (a) What is the format of Cell in ATM? (b) Compare Permanent V.C. with Switched V.C. in ATM. (c) How fixed size cells increases the speed of switching? [6+5+5] 7. (a) What is the role played by threshold value in congestion control?

(b) Assume network with links having abundant bandwidth. What are the pros and cons of using exponential increase and linear increase of congestion window? What happens if bandwidth is limited? (c) Explain how flow control is different from congestion control. [2+6+8] 8. (a) In E-mail system, where the E-mail messages are stored and why? (b) Explain any browser of your choice? 1. (a) Explain problems of the TCP/IP model and protocols? (b) With a neat diagram explain ARPANET design? [8+8] 2. (a) Discuss in detail about asynchronous communication? (b) Discuss in detail about broad band ISDN? [8+8] 3. (a) Discuss the use of a hamming code to correct burst errors? (b) Explain sliding window protocol using go-back-n? What are its advantages?and disadvantages? [8+8] 4. (a) What is the prime difference between a token bus and a token ring? (b) A large population of ALOHA users manages to generate 50 requests/sec,including both originals and retransmissions. Time is slotted in the units of 40 msec. i. What is the chance of success on the first attempt? ii. What is the probability of exactly k collisions and then a success? iii. What is the expected number of transmission attempts needed? [4+12] 5. What are the services provided by Network layer to Transport layer. Explain. [16] 6. (a) Explain how service differentiation can be achieved using type of service field. (b) The IP header checksum only verifies the integrity of IP header. Discuss the pros and cons of doing the checksum on the header part versus on the entire packet. (c) Identity the range of IPv6 addresses spanned by Class A, Class B and Class C. [5+6+5] 7. (a) Why Pseudo header is used in computing TCP Checksum? (b) Explain how TCP controls congestion? [6+10] 8. Explain in detail DES. [16] 1. (a) Compare point -to-point channels with broadcast channels along with suitable examples? (b) A collection of five routers is to be collected in a point-to-point subnet. Between each pair of routers, the designers may put a high speed line, a medium speed line, a low-speed line, or no line. If it takes 100ms of computer time to generate and inspect each topology, how long will it take to inspect all of them to find the one that best matches the expected load? [8+8] 2. (a) How does NRZ-L differ from NRZ-I? (b) Differentiate between base band coax and broad band coax? [8+8] 3. (a) Describe the different types of LCP packets? (b) A 3000-km long T1 trunk is used to transmit 64-byte frames using sliding window protocol using go-back-N. If the propagation speed is 6 sec/km, how many bits should the sequence numbers be? [8+8] 4. What is a token? Discuss the protocol of token ring LAN in general. Discuss with example how priority is implemented in a token ring LAN? [16] 5. (a) A source can completely determine the route to the destination, place the route in the packet header and transmit. What are the advantages & disadvantages of this approach. (b) Use of cache memory can increase the efficiency of the above approach. Comment. [10+6] 6. (a) What are the major goals of IPv6? (b) Give the format of IPv6 Header and explain different fields. [6+10] 7. (a) What are the different flags in TCP segment? Explain each of them. (b) How TCP uses sliding window to achieve flow control? [10+6] 8. (a) Explain Diffe-Hellman key exchange. (b) How Authentication is implemented using public-key cryptography? [6+10] 1. (a) Compare point -to-point channels with broadcast channels along with suitable examples? (b) A collection of five routers is to be collected in a point-to-point subnet. Between each pair of routers, the designers may put a high speed line, a mediumspeed line, a low-speed line, or no line. If it takes 100ms of computer time to generate and inspect each topology, how long will it take to inspect all of them to find the one that best matches the expected load? [8+8] 2. (a) What is the problem with the knock-out switch? Suggest a solution (b) Discuss about the two kinds of light sources used for signaling. [8+8]

3. (a) Discuss the error control technique which is commonly used in data network. What value of N is used in go-back-N ARQ technique used in ARPANET and why? (b) Imagine that you are writing the data link software for a line used to send data to you, but not from you. The other end uses HDLC, with a 3-bit sequence number and a window size of seven frames. You would like to buffer as many out of sequence frames as possible to enhance efficiency, but you are not allowed to modify the software on the sending side. Is it possible to have a receiver window greater than one, and still guarantee that the protocol will never fail? If so, what is the largest window that can be safely used? [8+8] 4. (a) Explain about adaptive tree walk protocol? (b) Explain about binary back off algorithm? [8+8] 5. Define Adaptive and Non-Adaptive routing. Classify the routing algorithms in to adaptive and non adaptive type with suitable justifications. [16] 6. (a) What are the message types used by ICMP? Explain. (b) Explain the network protocols: i. ARP ii. RARP. [6+10] 7. (a) What is multiplexing? Why multiplexing is required? What is the difference between upward multiplexing and downward multiplexing? (b) How to recover from host crashes and router crashes? [8+8] 8. (a) What are the fields in message header of e mail system? (b) What are SMTP types & subtypes? Explain them. [6+10] 1. (a) Compare point -to-point channels with broadcast channels along with suitable examples? (b) A collection of five routers is to be collected in a point-to-point subnet. Between each pair of routers, the designers may put a high speed line, a medium speed line, a low-speed line, or no line. If it takes 100ms of computer time to generate and inspect each topology, how long will it take to inspect all of them to find the one that best matches the expected load? [8+8] 2. (a) Explain about ISDN architecture? (b) Differentiate between optical fiber and coax? [10+6] 3. (a) Discuss about point-to-point protocol? (b) Discuss about various framing techniques? Mention their advantages and disadvantages? [8+8] 4. (a) Explain any two protocols that resolve the contention for the channel with out any collisions at all? (b) A very heavily loaded 1-km-long, 10-Mbps token ring has propagation speed of 200 m/sec. Fifty stations are uniformly spaced around the ring. Data frames are 256-bits, including 32 bits of overload. Acknowledgements are piggybacked onto the data frames and are included as spare bits within the data frames and are effectively free. The token is 8 bits. Is the effective data rate of this higher or lower than the effective data rate of a 10-Mbps CSMA/CD network? [8+8] 5. (a) Consider a network in which frequent link failures occur. In such an environment which one is preferred, Static/ Dynamic routing. Why.(b) What is the effect of router crashes on Virtual circuits. How do you restore virtual circuit when routers crash. [10+6] 6. (a) What is the format of Cell in ATM? (b) Compare Permanent V.C. with Switched V.C. in ATM. (c) How fixed size cells increases the speed of switching? [6+5+5] 7. (a) Explain the techniques for controlling packet life time. b) What is forbidden region? Explain how sequence numbers are given to TPDUS.[8+8] 8. (a) Explain Diffe-Hellman key exchange. (b) How Authentication is implemented using public-key cryptography? [6+10] 1. (a) Give a detailed description of the Novell Netware reference model. (b) With suitable examples explain simplex, half-duplex & full-duplex communication. [10+6] 2. (a) Discuss various channels supported by ISDN bit pipe? (b) Differentiate between virtual circuits and circuit switching? [8+8] 3. (a) To provide more reliability than a single parity bit can give, an error-detecting coding scheme uses one parity bit for checking all the odd numbered bits and a second parity bit for all the even numbered bits. What is the Hamming distance of this code?

(b) Discuss the functioning of SLIP? [8+8] 4. (a) What is the prime difference between a token bus and a token ring? (b) A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in the units of 40 msec. i. What is the chance of success on the first attempt? ii. What is the probability of exactly k collisions and then a success? iii. What is the expected number of transmission attempts needed? [4+12] 5. What is the effect of link failures in Virtual circuit subnet. Congestion can be easily controlled in Virtual circuit subnet. Explain. Why use of Virtual circuits, increases initial delay. [16] 6. (a) What is Fair queuing in the context of congestion control? What is the main problem with fair queuing? How it is solved? (b) Explain hop-by-hop choke packets method for congestion control. [8+8] 7. (a) What is multiplexing? Why multiplexing is required? What is the difference between upward multiplexing and downward multiplexing? (b) How to recover from host crashes and router crashes? [8+8] 8. (a) When external viewers are needed? How does a browser know which one to use? (b) What is the difference in transferring compressed and uncompressed video? [6+10] 1. (a) Although wireless networking and mobile computing are often related, they are not identical. Justify the statement. (b) With suitable examples compare point-to-point channels and broadcast channels? [8+8] 2. (a) Discuss various channels supported by ISDN bit pipe? (b) Differentiate between virtual circuits and circuit switching? [8+8] 3. (a) How will you determine the performance of stop & wait protocol? (b) What is piggybacking? What are its advantages? (c) A upper layer message is split into 10 frames, each of which has a 80 percent chance of arriving undamaged. If no error control is done by the data link protocol, how many times must the message be sent on the average to get the entire thing through? [5+5+6] 4. (a) Explain in detail binary count down collision free protocol? (b) Give the detailed description of 802.3 frame format? [8+8] 5. (a) Two approaches can be used for ordering of packets, buffering all the packets at the receiver and then reordering them or receiver accepts only packets in order and sender retransmits packets if necessary. Compare these two approaches. (b) Consider an environment in which probability of errors is high. What should be packet size in such an environment, Large/ Small? Justify your selection. [10+6] 6. Explain in detail CIDR. [16] 7. (a) Why does UDP exist? Would it now have been enough to just let user processes send raw IP packets? (b) A group of N users located in the same building are all using the same remote computer via an ATM network. The average user generates L lines of traffic (input + output) per hour, on the average, with the mean line length being P bytes, excluding the ATM headers. The packet carrier charges C cents per byte of user data transported, plus X cents per hour for each ATM virtual circuit open. Under what conditions is it cost effective to multiplex all N transport connections onto the same ATM virtual circuit, if such multiplexing adds 2 bytes of data to each packet? Assume that even one ATM virtual circuit has enough bandwidth for all the users. [8+8]8. What is DNS? What is its use? How DNS works?

1. (a) Compare point -to-point channels with broadcast channels along with suitable examples? (b) A collection of five routers is to be collected in a point-to-point subnet. Between each pair of routers, the designers may put a high speed line, a medium- speed line, a low-speed line, or no line. If it takes 100ms of computer time to generate and inspect each topology, how long will it take to inspect all of them to find the one that best matches the expected load? [8+8] 2. (a) Television channels are 6MHz wide. How many bits/sec can be sent if four level digital signals are used? Assume a noiseless channel (b) How does a virtual circuit differ from a physical circuit? What advantages would a virtual circuit provide? [8+8] 3. (a) A channel has a bit rate of 4 kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of atleast 50 percent?

(b) Discuss about the various types of frames in HDLC protocol? [8+8] 4. (a) Discuss about the file key assumptions in case of dynamic channel allocation in LANs and WANs? (b) Discuss in detail the working of token bus? [8+8] 5. (a) One potential disadvantage of multicasting is that it scales poorly to large networks. How core- based trees solves this problem. (b) What are the applications of multicasting. (c) What are the applications of broadcasting. [8+4+4] 6. Compare Leaky bucket and Token bucket algorithms for traffic shaping. [16] 7. (a) Explain the protocol scenarios for establishing a connection using three way handshake. (b) Why abrupt connection release results in data loss? [12+4] 8. Explain how privacy is achieved in e-mail system? [16] 1. (a) Differentiate between computer network and distributed system? (b) What are the important goals achieved through networking? (c) Explain about the four main applications of the Internet? [2+6+8] 2. (a) What is the purpose of the physical layer? Discuss various physical media for data transmission? (b) Why does ATM use small, fixed lengths cells? [12+4] 3. (a) Explain one -bit sliding window protocol. Give the advantages and disadvantages of one-bit sliding window protocol? (b) Discuss the services provided by the data link layer to the network layer? [8+8] 4. (a) Discuss about fast Ethernet cabling? (b) Explain various token bus control frames? [8+8] 5. (a) How the complexity at Network layer & Transport layer varies with connection oriented and connectionless service. (b) Suppose Network layer provides connection less service, Transport layer connection oriented service, then how reliability is achieved. (c) How Virtual circuit is different from Physical connection. [8+4+4] 6. (a) Explain the pros and cons of an organization using Class A, Class B & Class C addresses. (b) Discuss the difficulties with using actual time in the TTL field (c) Describe a way of reassembly of IP fragments at the destination. [6+5+5] 7. (a) What is multiplexing? Why multiplexing is required? What is the difference between upward multiplexing and downward multiplexing? (b) How to recover from host crashes and router crashes? [8+8] 8. (a) What are the facilities available on the web for locating information? (b) How web can be used for e-commerce? [8+8] 1. (a) Compare point -to-point channels with broadcast channels along with suitable examples? (b) A collection of five routers is to be collected in a point-to-point subnet. Between each pair of routers, the designers may put a high speed line, a medium speed line, a low-speed line, or no line. If it takes 100ms of computer time to generate and inspect each topology, how long will it take to inspect all of them to find the one that best matches the expected load? [8+8] 2. (a) Television channels are 6MHz wide. How many bits/sec can be sent if four level digital signals are used? Assume a noiseless channel (b) How does a virtual circuit differ from a physical circuit? What advantages would a virtual circuit provide? [8+8] 3. (a) What is flow control? Why is essential at the data link layer? Mention few techniques for the same? (b) Explain how the band width wastage is reduced in case of sliding window protocol with selective repeat? [8+8] 4. What is a token? Discuss the protocol of token ring LAN in general. Discuss with example how priority is implemented in a token ring LAN? [16] 5. (a) Explain Dijkstras shortest path algorithm. (b) Consider graph given figure 5b. Compute the shortest path from A to D. [8+8]

6. (a) What are the message types used by ICMP? Explain. (b) Explain the network protocols. i. ARP ii. RARP. [6+10] 7. (a) Why does the maximum packet lifetime, T, have to be large enough to ensure that not only the packet, but also its acknowledgments have vanished. (b) What are the applications which prefer UDP to TCP. Give suitable justifications? (c) What are the disadvantages when Nagles algorithm is used on badly congested network? [5+6+5] 8. (a) What is cipher block chaining? Why it is used. What are its advantages & disadvantages? (b) What is cipher feedback mode? Why it is used? [10+6] 1. a) What is the purpose of data modems? Describe the features of various types of data modems. b) Describe the OSI reference model. Explain the purpose of each layer. [8+8] 2. a) Write a brief note on Frame relay and X.25 networks. b) Write the features of various types of transmission media. [8+8] 3. a) Describe the significance of error detection and error correction mechanisms in data link layer. b) Discuss about BISYNC data link control protocol. [8+8] 4. Write a brief note on the following: a) IEEE 802.4 token bus standard b) ALOHA protocol. [16] 5. a) Describe the multicast routing algorithm. Explain its merits and limitations. b) Describe the significance of datagram approach in subnets.[8+8] 6. a) Describe about TCP protocol. b) Write a brief note on the transport layer. Explain the Connection establishment and connection release in transport layer. [8+8] 7. a) Describe the public key cryptography algorithm. b) Compare and contrast the differences between encryption and data compression techniques. [8+8] 8. a) Describe the significant features of application layer. b) Describe about FTAM services. [8+8] 1. a) What are the network services? Describe the TCP/IP reference model. b) Describe the OSI reference model and its merits. [8+8] 2. a) Describe the various types of transmission media and their merits. b) Write a note ATM networks. [8+8] 3. a) Describe the design issues for data link layer. b) Describe about HDLC data link control protocols. [8+8] 4. a) Describe the features of ALOHA protocol. Explain its merits. b) Describe IEEE 802.3 CSMA/CD standard and IEEE 802.5 token ring standard. [8+8] 5. a) Compare and contrast the differences between shortest path routing and hierarchical routing. b) Compare and contrast the differences between broadcast routing and multicast routing. [8+8] 6. a) Describe the congestion control algorithms. b) Describe the features of distance vector routing algorithm. [8+8] 7. a) What is meant by encryption ? Describe the public key Cryptography. b) Write the significance of data compression and syntax conversion. [8+8] 8. a) Describe the significance of DNS. b) Describe the salient features of multimedia. Also explain the applications of multimedia. [8+8]

1. a) Explain TCP/IP reference model. b) Write about RS-232 interface. [8+8] 2. a) Explain about fiber optic transmission media. b) Discuss about Broadband ISDN and ATM networks. [8+8] 3. a) Explain about IEEE 802.5 standard. b) Write short notes on wireless LANS. [8+8] 4. a) Compare virtual circuit and data gram approaches. b) Explain distance vector routing with one example. [4+12] 5. What is congestion? Explain different congestion control algorithms. [16] 6. a) Explain TCP and UDP protocols. b) Write short notes on data compression and Transport services. [8+8] 7. a) Explain about Domain Name systems(DNS). b) Explain about Multimedia. [8+8] 8. Write short notes on: (a) Word Wide Web. (b) FTAM (c) VTP. [16] 1. a) Draw the OSI reference model and explain each layer in it. b) Write a note on ATM networks. [8+8] 2. a) Write about data link layer design issues. b) Discuss about HDLC data link control protocols. [8+8] 3. a) Write about IEEE 802.3 standard. b) Write a note on inter networking devices. [8+8] 4. a) Compare virtual circuits and datagram subnet. b) Explain the shortest paths routing with one example. [8+8] 5. Write short notes on (a) Network layer in Internet. (b) Multicase-routing. (c) Broadcast routing. [16] 6. a) Explain connection establishment and connection release in transport layer. b) Explain the following (i) UDP (ii) Encryption [8+8] 7. a) Explain about FTAM services. b) Discuss about DNS. [8+8] 8. a) Explain about multimedia. b) Discuss about WWW. [8+8] 1. (a) List two advantages and two disadvantages of having international standards for network, Protocols? (b) Write short notes on interfaces and services of ISO layers. [8+8] 2. (a) The following data fragment occurs in the middle of a data stream for which the character-stuffing algorithm described in the text is used: DLE, STX, A, DLE, B, DLE, ETX. What is the output after stuffing? (b) When bit stuffing is used, is it possible for the loss, insertion, or modification of a single bit to cause an error not detected by the checksum? If not, why not? If so, how? Does the checksum length play a role here? (c) Data link protocols almost always put the CRC in a trailer, rather than in a header. Why? [6+6+4] 3. (a) What is collision free protocols? Explain Binary count down protocol. (b) Explain in detail, Adaptive free walk protocol. [8+8] 4. What is congestion? How does it differ from flow control? Discuss about the general principles of congestion? Briefly discuss about policies that affect congestion. [16] 5. (a) Briefly explain the concepts of Flow Control and Buffering. (b) Imagine that a two-way handshake rather than a three-way handshake were used to set up connections. In other words, the third message was not required. Are deadlocks now possible? Give an example or show that none exist. [8+8] 6. (a) Briefly discuss ICMP. (b) With an example, explain Address resolution protocol. [8+8] 7. (a) Draw and explain in detail the TCP Header. (b) Briefly discuss TCP connection Management. [8+8] 8. (a) PGP does not support canonicalization as does PEM. Why not? (b) Assuming that everyone on the Internet used PGP, could a PGP message be sent to an arbitrary Internet address and be decoded correctly by all concerned? Discuss your answer. [8+8] 1. (a) Explain in detail ISO-OSI reference model. (b) Write short notes on interface, service and protocol. [8+8]

2. (a) The following data fragment occurs in the middle of a data stream for which the character-stuffing algorithm described in the text is used: DLE, STX, A, DLE, B, DLE, ETX. What is the output after stuffing? (b) When bit stuffing is used, is it possible for the loss, insertion, or modification of a single bit to cause an error not detected by the checksum? If not, why not? If so, how? Does the checksum length play a role here? (c) Data link protocols almost always put the CRC in a trailer, rather than in a header. Why? [6+6+4] 3. (a) Explain the operation of source Routing Bridges. (b) Compare and contrast Transparent and Source routing bridges. [8+8] 4. (a) What is Broadcasting? With an example, explain about Reverse path forwarding (b) With an example, explain multicast Routing Algorithm. [8+8] 5. (a) Imagine that a two-way handshake rather than a three-way handshake were used to set up connections. In other words, the third message was not required. Are deadlocks now possible? Give an example or show that none exist. (b) Datagram fragmentation and reassembly are handled by IP and are invisible to TCP. Does this mean that TCP does not have to worry about data arriving in the wrong order? [8+8] 6. (a) Briefly discuss about connection less Internetworking. (b) Explain firewalls, packet filter and a proxy in detail. [8+8] 7. (a) What is Nagles algorithm? Explain the problem of silly window syndrome: suggest a solution to this problem. (b) Briefly discuss about TCP timer management. [8+8] 8. (a) What is the difference between message confidentiality and message integrity? Can you have one without the other? Justify your answer. (b) What is a key distribution centre? What is a certificate authority? (c) In what way does a public key encrypted message digest provide a better digital signature than using public key encrypted message? [6+6+4] 1. (a) Write any four reasons for using layered protocols. (b) Compare and contrast OSI and TCP/IP models. [8+8] 2. (a) Compare and contrast SLIP and PPP. (b) Draw and explain HDLC frame format. [8+8] 3. (a) Explain the operation of source Routing Bridges. (b) Measurements of a slotted ALOHA channel with an infinite number of users show that 10 percent of the slots are idle. i. What is the channel load, G? ii. What is the throughput? iii. Is the channel under loaded or overloaded? [8+8] 4. (a) With an example, explain Hierarchical Routing Algorithm. (b) With an example, explain multicast Routing Algorithm. [8+8] 5. (a) Imagine that a two-way handshake rather than a three-way handshake were used to set up connections. In other words, the third message was not required. Are deadlocks now possible? Give an example or show that none exist. (b) Datagram fragmentation and reassembly are handled by IP and are invisible to TCP. Does this mean that TCP does not have to worry about data arriving in the wrong order? [8+8] 6. (a) Briefly discuss about the ways network can differ. (b) Briefly discuss about IP address classes and special IP addresses. [8+8] 7. (a) Suppose that the TCP congestion window is set to 18K bytes and a timeout occurs. How bit will the window be if the next four transmission bursts are all successful? Assume that the maximum segment size is 1 KB. (b) If the TCP round-trip time, RTT, is currently 30 msec and the following acknowledgements come in after 26,32, and 24msec, respectively. What is the new RTT estimate? Use = 0.9. (c) Datagram fragmentation and reassembly are handled by IP and are invisible to TCP. Does this mean that TCP does not have to worry about data arriving in the wrong order? [6+6+4] 8. (a) Explain in detail methods of DES chaining. (b) Briefly discuss about IDEA. [8+8]

1. (a) Explain in detail ISO-OSI reference model. (b) Write short notes on interface, service and protocol. [8+8] 2. (a) Briefly, explain about the DLL design issues. (b) If the bit string 0111101111101111110 is bit stuffed. What is the output of the string? [8+8] 3. (a) What is meant by contention systems. (b) Explain CSMA/CD protocol. (c) Explain any one Collision free protocol. [4+6+6] 4. (a) Write short notes on: i. Choke packet ii. Load shedding iii. Jitter control. (b) With an example, explain any one adaptive routing algorithm. [8+8] 5. (a) Imagine that a two-way handshake rather than a three-way handshake were used to set up connections. In other words, the third message was not required. Are deadlocks now possible? Give an example or show that none exist. (b) Datagram fragmentation and reassembly are handled by IP and are invisible to TCP. Does this mean that TCP does not have to worry about data arriving in the wrong order? [8+8] 6. (a) What is internet work routing? Explain interior gateway and exterior gateway protocols. (b) What is three bears problem? Write short notes on CIDR. [8+8] 7. (a) Can AAL 1 handle messages shorter than 40 bytes using the scheme with the Pointer field? Explain your answer. (b) AAL 3/4 allows multiple sessions to be multiplexed onto a single virtual circuit. Give an example of a situation in which that has no value. Assume that one virtual circuit has sufficient bandwidth to carry all the traffic. (c) What is the payload size of the maximum length message that fits in a sinlge AAL 3/4 cell? [6+6+4] 8. (a) What is Cryptanalysis? Briefly discuss about substitution cipher, transposition ciphers and one-time pads. (b) Explain any one secrete key algorithm. [8+8]

You might also like