Search This Blog

Wednesday, 5 February 2014

Computer networking-Model question paper for B.E/B.Tech Engineering


1(a) Explain 'client program' and 'server program'. Does a server program request and receive services from a client program? (6 Marks)
(b) List six access technologies. Classify each one as residential access, company access, or mobile access. (6 Marks)
(c)What is the difference between a POP and a NAP? (4 Marks)
(d)What is instant messaging? Are there any products that allow you to access an instant messaging service through a handheld device? (4 Marks)
2(a) What is the differe between network architecture and application architecture. (4 Marks)
(b) Why is it said that FTP sends control information “out-of-band”? (4 Marks)
(c)What is an overlay network in a P2P file sharing system? Does it include routers? What are the edges in the overlay network?How is the Guntella overlay network created and maintained? (8 Marks)
(d)Write a note on Apache web server. (4 Marks)
3(a) An application developer might choose to run an application over UDP rather than TCP. Describe why? (6 Marks)
(b) Write a note on TCP delay modeling. (5 Marks)
(c) Explain any two selective repeat sender events. (4 Marks)
(d)Suppose host A sends two TCP segments back to back to host B over a TCP connection. The first segment has sequence number 90. The second has sequence number 110. How much data is in the first segment? Suppose that the first segment is lost but the second segment arrives at B. In the acknowledgement that host B sends to host A, what will be the acknowledgement number? (5 Marks)
4(a) What are three most important network layer functions in a circuit switched network? (6 Marks)
(b) Describe how packet loss can occur at output ports. (4 Marks)
(c)Compare and contrast the IPv4 and IPv6 header fields. Do they have any fields in common? (6 Marks)
(d)Suppose datagrams are limited to 1500 bytes, including header, between source host A and destination host B. Assuming a 20-byte IP header, how many datagrams would be required to send an MP3 consisting of 4 million bytes? (4 Marks)
5 (a) Describe polling and token passing protocols using the analogy of cocktail party interactions. (6 Marks)
(b) Write short notes on MAC address space, IPv4 address space and IPv6 address space. (6 Marks)
(c) Graph the efficiency of slotted ALOHA and pure ALOHA as a function of p for N=100. (4 Marks)
(d)Explain the frame structure of Gigabit Ethernet. (4 Marks)
6 (a) Discuss the methods that are available to authenticate users for 802.11 networks. (6 Marks)
(b) Explain in detail how the RTS threshold works. (6 Marks)
(c)What effect will mobility have in mobile IP on end-to-end delays of datagrams between the source and the destination. (4 Marks)
(d)List 4 products on the market today that provide a Bluetooth or 802.15 interface. (4 Marks)
7 (a) What is meant by interactivity for streaming sored audio/video? What is meant by interactivity for real time interactive audio/video? (6 Marks)
(b) Why is a pcket that is received after its scheduled playout time considered lost? (4 Marks)
(c)Explain the difficulties associated with the Intserv model and perflow reservation of resources. (6 Marks)
(d)How is RTSP similar to HTTP? Does RTSP have methods? Can HTTP be used to request a stream? (6 Marks)
8 (a) Differentiate between a passive and an active intruder. (4 Marks)
(b) In what way does a public-key encrypted message digest provide a better digital signature than using the public-key encrypted message. (4 Marks)
(c)Suppose that an intruder could insert DNS messages into and remove DNS messages from the network. Give three scenarios showing the problems that such an intruder could cause. (6 Marks)
(d) What is meant by an SNMP engine? What is an important difference between a request response message and a trap message in SNMP? (6 Marks)

No comments:

Post a Comment