You are on page 1of 1

E

V Sem-B.Tech Roll no.EC)sd


Course Code- ECECC19
CND-SEMESAMINATION, MAY, 2022
Course Title- Computer Networks
Time- 3 Hours

Note: - Attempt any 2(out of 3) Max. Marks- 40


be suitably assumed &
mentionedParts in all the 5 questions. Missing data/ information (if any ), may
the answer.
Q.No.
Question
lay Discuss and compare the Marks CO

Explain the different


reesponsibilities of Data link layer and Transport layer. 3
types of network topologies using suitable diagrams. 3
le What is Ethernet? Discuss
the Variants of Ethernet offering high data rates. 3
28 The dataword 101110111
transmission, last 2 bits get 1s encoded using P(x) = x'+ x +1. During the 4 2
case would also be obtained ifflipped. Show that the
the initialdataword syndrome obtained in this
2h A channel has a data rate of4 kbps and a was|110001000.
Determine the frame propagation delay of 20 ms. 4
at least 50% assuminglength such that stop-and-wait 2
the probability of error is P. ARQ gives an efficiency of
2e Draw Markov chain for a random wallk
person can take one step at a time towardsand define the transition
left or right with equal matrix. The
4 2
3a STS switch supports 32 Tl-trunk probabilities.
factor of 1.5 is used between first lines, having 24
and second stage.channels. An expansion 4 4
probability of the switch if the inlet occupancy is 0.6 per What is the blocking
channel?
3b
Differentiate between circuit, packet and virtual circuit switching. 4 4
A 32x64 time-division switch
operates in sequential write/random read mode.
Determine the size of control memory and data 4 4
control memory if inlet 2 is connected to outlet 4.memory, and the contents of the
4a/ An ISP is granted a block of
to be distributed to 100 addresses starting with 150.80.0.0/1 7, which need 5
customers
customers requiring 16 addresses each. requiring 256 addresses each and 200
Show the address allocation process.
4b Explain the concept of NAT and private addresses with the help
of an example. 5
Apply Dijkstra's algorithm for creating routing table of node A.
5

2 2

2
5aDifferentiate between
TCP and UDP protocols. 4 3
Sh UDP datagram is
received as FEDÇP29N6014AB84502C in hexadecimal
notation. Using checksum, 4 3
show the process of error detection at receiver.
5e In TCP
protocol, the window SlZe for rounds 1 to 14 are given as 1,2,4,8,16, 3

17.18.1920,10.11,12,12, respectively-Page- 1/1


Explain with reasoning.
2

You might also like