Computer Networks 2 - May 2016
Computer Science Engg. (Semester 6)
TOTAL MARKS: 100
TOTAL TIME: 3 HOURS (1) Question 1 is compulsory.
(2) Attempt any four from the remaining questions.
(3) Assume data wherever required.
(4) Figures to the right indicate full marks. 1(a) Differentiate between connection oriented and connectionless services.(4 marks) 1(b) Define routing algorithm. Explain the Bellman ' Ford algorithm with an example.(10 marks) 1(c) A 64 ' kilobyte message is to be transmitted over two hops in a network. The network limits packets to a maximum size of 2 kilobytes, and each packet has a 32 -byte header. The transmission lines in the network are error and have a speed of 50 Mbps. Each hop is 1000 km long. How long does it take to get the message from source to destination?(6 marks) 2(a) With neat diagram explain leaky bucket algorithm used for policing.(8 marks) 2(b) Explain the FIFO and priority queue scheduling for managing traffic at packet level.(8 marks) 2(c) Write a note on closed loop control in packet switching network.(4 marks) 3(a) Explain the format of IPV4 basic header.(8 marks) 3(b) With neat diagram, explain UDP datagram.(8 marks) 3(c) Write a note on address resolution protocol(4 marks) 4(a) Explain the three ' way handshake for establishing a Tcp connection.(8 marks) 4(b) Write a note on RIP protocol.(4 marks) 4(c) Explain the border getway protocol.(8 marks) 5(a) Define domain name system. Explain DNS message format.(8 marks) 5(b) Explain in detail any two major categories of threats to network security.(8 marks) 5(c) Write note on network management system.(4 marks) 6(a) Explain the overview of differentiated services operation of QOS with neat diagram.(8 marks) 6(b) Explain multiprotocol Lable switching (MPLS) and its packet format.(6 marks) 6(c) Write a note on P2P connection in context with overlay networks.(6 marks) 7(a) Define data compression. Explain overview of digital voice process in netoworking.(8 marks) 7(b) Explain in brief SIP.(8 marks) 7(c) Write a short note on H-323 protocol.(4 marks) 8(a) Explain types of attack in Ad-hoc networks.(6 marks) 8(b) Explain LEACH clustering protocol in wireless sensor network.(8 marks) 8(c) Write a note on Zig-Bee technology.(6 marks)