0
3.1kviews
Computer Networks 2 Question Paper - Jun 15 - Computer Science (Semester 6) - Visveswaraya Technological University (VTU)
1 Answer
0
17views

Computer Networks 2 - June 2015

VTU Computer Science (Semester 6)

Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary
1 (a) Explain datagram and virtual circuit packet switching with delay calculation diagrams. 8 marks

1 (b) With neat diagram, explain the generic packet switch. 8 marks

1 (c) Consider the network in Fig Q1 (c).
i) Use the Dijkstra's algorithm to find the set of shortest paths from node 4 to other nodes.
ii) Find the set of associated routing table entries.
8 marks

2 (a) Discuss the priority and weighted fair queuing. 8 marks

2 (b) Explain the concept of Random Early Detection (RED). 8 marks

2 (c) Give the classification of congestion control algorithms. Explain the leaky bucket and token bucket traffic shaper with neat diagram. 8 marks

3 (a) Describes the various fields of IP version 4 header. 8 marks

3 (b) i) A small organization has a class C address for seven networks each with 24 hosts. What is an appropriate subnet mask? 8 marks

3 (b) ii) Perform CIDR aggregation on the /24 Ip address 200.96.86.0/24, 200.96.87.0/24, 200.96.88.0/24, 200.96.89.0/74. 8 marks

3 (c) Why transition from IPV4.0 to IPV6.0 is required? Explain the IPV6 network addressing. 8 marks

4 (a) Explain the TCP 3 way handshake for establishing a TCP connection. 8 marks

4 (b) What are the classification of internet routing protocols? Explain in detail routing information protocol (RIP). 8 marks

Write note on:

4 (c) i) Reverse path multicasting. 8 marks

4 (c) ii) Mobile IP 8 marks

5 (a) Explain the remote login protocols. 8 marks

5 (b) What are the elements of network management? Discuss the interaction between SNMP management station and SNMP agent. 8 marks

5 (c) Write RSA algorithm. For RSA algorithm of 4 bit message 1001, choose a =3 and b=11, find the public key and private keys for this and show the cipher text. 8 marks

6 (a) Describes the various types of resource allocation schemes. 8 marks

6 (b) Define VPN. Discuss the concept of tunnelling and points to points protocol in VPN. 8 marks

6 (c) What is MPLS network? Explain MPLS operation. 8 marks

7 (a) Explain the JPEG compression for still images. 8 marks

Explain the following:

7 (b) i) Huffman encoding. 8 marks

7 (b) ii) Lempel-Ziv-Welch encoding with an example. 8 marks

7 (c) Briefly explain with neat diagram, how Content Distribution Network (CDN) interaction with DNS (Domain Name System). 8 marks

8 (a) Explain DSDV, TORA routing protocol for mobile adhoc networks. 8 marks

8 (b) What are the classification of sensor networks? Explain with relevant diagram DEEP clustering protocol in sensor network. 8 marks

8 (c) Describe the direct or multihop intracluster routing protected with neat diagram. 8 marks

Please log in to add an answer.