RR320503-COMPUTER-NETWORKS

RR320503-COMPUTER-NETWORKS - Code No RR320503 Set No 1 III...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Code No: RR320503 Set No. 1 III B.Tech II Semester Supplimentary Examinations, Aug/Sep 2008 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering, Computer Science & Systems Engineering and Electronics & Computer Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆ ⋆ ⋆ ⋆ ⋆ 1. (a) List two advantages and two disadvantages of having international standards for network, Protocols? (b) Write short notes on interfaces and services of ISO layers. [8+8] 2. (a) The following data fragment occurs in the middle of a data stream for which the character-stuffing algorithm described in the text is used: DLE, STX, A, DLE, B, DLE, ETX. What is the output after stuffing? (b) When bit stuffing is used, is it possible for the loss, insertion, or modification of a single bit to cause an error not detected by the checksum? If not, why not? If so, how? Does the checksum length play a role here? (c) Data link protocols almost always put the CRC in a trailer, rather than in a header. Why? [6+6+4] 3. (a) What is collision free protocols? Explain Binary count down protocol. (b) Explain in detail, Adaptive free walk protocol. [8+8] 4. What is congestion? How does it differ from flow control? Discuss about the general principles of congestion? Briefly discuss about policies that affect congestion. [16] 5. (a) Briefly explain the concepts of Flow Control and Buffering. (b) Imagine that a two-way handshake rather than a three-way handshake were used to set up connections. In other words, the third message was not required. Are deadlocks now possible? Give an example or show that none exist. [8+8] 6. (a) Briefly discuss ICMP. (b) With an example, explain Address resolution protocol. [8+8] 7. (a) Draw and explain in detail the TCP Header. (b) Briefly discuss TCP connection Management. [8+8] 8. (a) PGP does not support canonicalization as does PEM. Why not? (b) Assuming that everyone on the Internet used PGP, could a PGP message be sent to an arbitrary Internet address and be decoded correctly by all con- cerned? Discuss your answer. [8+8] ⋆ ⋆ ⋆ ⋆ ⋆ 1 of 1
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Code No: RR320503 Set No. 2 III B.Tech II Semester Supplimentary
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern