How To Exam?

a knowledge trading engine...


Anna University Coimbatore 2010 B.Tech Information Technology - -computer networks-/ - Question Paper

Wednesday, 16 January 2013 09:10Web



ANNA UNIVERSITY OF TECHNOLOGY, COIMBATORE B.E. I B.TECH. DEGREE EXAMINATIONS : NOV / DEC 2010 REGULATIONS : 2008 FIFTH SEMESTER - INFORMATION TECHNOLOGY 080250021 - COMPUTER NETWORKS TIME : 3 Hours    Max.Marks : 100

PART-A

ANSWER ALL QUESTIONS

1.    State any two advantages of layered network architectures.

2.    Differentiate between simplex, half duplex and full duplex modes of transmission.

3.    State the advantages of using fiber optic cables as transmission medium.

4.    What is the significance of RS 232?

5.    State the use of parity bits in error detection algorithms.

6.    What is called stop-and-wait protocol? What is its drawback?

7.    State the reason why Ethernet always insists upon a minimum size for frames

8.    State the use of bridges. Name the OSl layer to which it is associated?

9.    List out any two major differences between datagram (Connectionless) and virtual circuit (connection-oriented) approaches.

10.    Name the address class of the following IP addresses:

i. 127.0.0.1 ii. 200.90.87.67

11.    Differentiate between adaptive and non adaptive routing algorithms.

12.    State the need for subnetting.

13.    Justify why certain applications prefer UDP over TCP.

14.    What is the significance of sockets?

15.    State how slow start mechanism controls congestion.

16.    What is the use of integrated services architecture?

17.    Differentiate between private key and public key encryption.

18.    State the use of the two connections used by FTP.

19.    Mention the layer in which email gateway function. Also mention some of its applications.

20.    What do you mean by digital signatures?

PART-B

(5 x 12 = 60 MARKS)

ANSWER ANY FIVE QUESTIONS

21.    a. Draw and explain the OSI architecture and the services of each layer.    9 b. What are the salient features of TCP architecture? 3

22.    \ a. Explain the CSMA/CD protocol with binary exponential back off algorithm 4

used in Ethernet.

b. Draw the frame format of Ethernet and explain its fields.    8

23.    Describe in detail the working of IEEE 802.5 based token ring networks.

24.    a. Explain the working of CRC algorithm with an example.    9 b. Differentiate CRC from LRC in terms of its merits. 3

25.    Explain the sliding window protocol and compare its performance against the simple stop and wait protocol.

26k a. - With a neat sketch, explain the IP datagram format.    9

b. What are the 3 primary IP address classes? Give the range of addresses in 3 each class.

2/. a. Explain the 3-way handshake protocol used to establish the connection in 3 the transport layer.

b. Draw the format of a TCP header and explain the use of each field.    9

28. Explain the DES encryption algorithm with suitable diagrams.


2







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Anna University Coimbatore 2010 B.Tech Information Technology - -computer networks-/ - Question Paper