RR320503-COMPUTER-NETWORKS - Code No: RR320503 Set No. 1...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Code No: RR320503 Set No. 1 III B.Tech II Semester Supplimentary Examinations, Aug/Sep 2008 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering, Computer Science & Systems Engineering and Electronics & Computer Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆ ⋆ ⋆ ⋆ ⋆ 1. (a) List two advantages and two disadvantages of having international standards for network, Protocols? (b) Write short notes on interfaces and services of ISO layers. [8+8] 2. (a) The following data fragment occurs in the middle of a data stream for which the character-stuffing algorithm described in the text is used: DLE, STX, A, DLE, B, DLE, ETX. What is the output after stuffing? (b) When bit stuffing is used, is it possible for the loss, insertion, or modification of a single bit to cause an error not detected by the checksum? If not, why not? If so, how? Does the checksum length play a role here? (c) Data link protocols almost always put the CRC in a trailer, rather than in a header. Why? [6+6+4] 3. (a) What is collision free protocols? Explain Binary count down protocol. (b) Explain in detail, Adaptive free walk protocol. [8+8] 4. What is congestion? How does it differ from flow control? Discuss about the general principles of congestion? Briefly discuss about policies that affect congestion. [16] 5. (a) Briefly explain the concepts of Flow Control and Buffering. (b) Imagine that a two-way handshake rather than a three-way handshake were used to set up connections. In other words, the third message was not required. Are deadlocks now possible? Give an example or show that none exist. [8+8] 6. (a) Briefly discuss ICMP. (b) With an example, explain Address resolution protocol. [8+8] 7. (a) Draw and explain in detail the TCP Header. (b) Briefly discuss TCP connection Management. [8+8] 8. (a) PGP does not support canonicalization as does PEM. Why not? (b) Assuming that everyone on the Internet used PGP, could a PGP message be sent to an arbitrary Internet address and be decoded correctly by all con- cerned? Discuss your answer. [8+8] ⋆ ⋆ ⋆ ⋆ ⋆ 1 of 1 Code No: RR320503 Set No. 2 III B.Tech II Semester Supplimentary Examinations, Aug/Sep 2008III B....
View Full Document

This note was uploaded on 02/23/2012 for the course CS 101 taught by Professor Martand during the Spring '10 term at Punjab Engineering College.

Page1 / 7

RR320503-COMPUTER-NETWORKS - Code No: RR320503 Set No. 1...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online