0% found this document useful (0 votes)
26 views

CN 2

Uploaded by

u2203162
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

CN 2

Uploaded by

u2203162
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

211781

Reg No:___________________________ Name:_____________________________


RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY
(Autonomous)

Fifth Semester B.Tech Degree Examination (2020 admissions)

March 2023

Course Code : 100003/CS500B


Course Name : COMPUTER NETWORKS

Programme: Computer Science & Engineering


Max.Mark:100 Duration: 3 hours
Part A

Answer All Questions

1 Differentiate between AMI and Pseudo ternary encoding. (3)


2 List OSI service primitives for connection-oriented service? (3)
3 A bit string, 0111101111101111110, needs to be transmitted at the data link (3)
layer. If the flag used is 01111110, What is the string actually transmitted after
bit stuffing?
4 How does Pure-Aloha and Slotted-Aloha differ? (3)
5 Define the terms: (3)

i) Home agent

ii) Foreign agent


6 List out the disadvantages of flooding. (3)
7 How many usable IP addresses are there in the range 162.106.23.0 - (3)
255.255.240.0?
8 What are the advantages and disadvantages of subnetting? (3)
9 Give the significance of MIME. (3)
10 Differentiate between connection-oriented and connectionless services. (3)

Part B

Each question carries 14 Marks

11 With suitable diagrams, explain the different types of computer networks. (14)
OR

12 Explain in detail the performance indicators of a computer network. (14)

Page 1 of 2
13 a) List the devices operating in datalink layer and physical layer. Explain the (14)
function of each of them. (8 marks)
b) Draw and explain IEEE 802.11 Wireless LAN frame Structure. (6 Marks)
OR

14 a) Explain in detail the Hamming code scheme. (5 marks) (14)

b) If the 7-bit hamming word received by a receiver is 1011011. Assuming even


parity, state whether the received code word is valid or not. If not, locate the bit
having error and do the corrections. (9 marks)

15 a) Explain how the token bucket and leaky bucket algorithm perform congestion (14)
control. (10 marks)

b) Differentiate between Flooding and broadcasting. (4 marks)


OR

16 a) Explain Distance Vector Routing with an example. (8 marks) (14)

b) Explain the steps involved in Mobile host routing. (6 marks)

17 Explain in detail the working of the following protocols: (14)

a) Open Shortest Path First Protocol (8 marks)

b) Border Gateway Protocol (6 marks)


OR

18 a) What is the use of ARP? Explain ARP operation and packet format. (14)
(10 marks)

b) Explain the role of ICMP. (4 marks)

19 a) Explain in detail the purpose and functionality of Multipurpose Internet Mail (14)
Extension. (8 marks)

b) Explain the working of the SMTP protocol. (6 marks)


OR

20 a) Explain the TCP connection establishment process. (8 marks) (14)

b) With a neat diagram, explain the architecture of WWW. (6 marks)


꧁__________________________________________________________________꧂

Page 2 of 2

You might also like