Computer Networks 2 : Question Paper Jun 2014 - Computer Science Engg. (Semester 6) | Visveswaraya Technological University (VTU)

Computer Networks 2 - Jun 2014

Computer Science Engg. (Semester 6)

(1) Question 1 is compulsory.
(2) Attempt any four from the remaining questions.
(3) Assume data wherever required.
(4) Figures to the right indicate full marks.
1 (a) Differentiate between connection oriented and connectionless services.(5 marks) 1 (b) Compare the datagram packet switching and virtual packet switching.(6 marks) 1 (c) Explain the Dijkstra's routing algorithm, with an example.(9 marks) 2 (a) Explain the FIFO and priority queue scheduling for managing traffic at packet level.(8 marks) 2 (b) Define congestion control with graph. Explain the leaky bucket algorithm for policing the traffic at flow level.(12 marks) 3 (a) Explain:
i) IP address classification
ii) Subnet addressing.
(10 marks)
3 (b) Give the format of IPV6 basic header. Compare IPV6 with IPV4.(10 marks) 4 (a) Explain OSPF protocol and its operation.(10 marks) 4 (b) Write a note on:
i) IGMP protocol
ii) Mobile IP.
(10 marks)
5 (a) Write a note on only Two:
i) Remote login protocols
ii) File transfer and FTP
iii) World wide web and HTTP.
(8 marks)
5 (b) Define network management and explain SNMP and SNMP messages.(6 marks) 5 (c) Compare secret key and public key cryptography systems.(6 marks) 6 (a) Explain the differentiated services QoS with a neat diagram.(8 marks) 6 (b) Explain VPN and its types based on tunnelling.(8 marks) 6 (c) Explain the need for overlay networks.(4 marks) 7 (a) Briefly explain the MPEG standards and frame types of compression.(6 marks) 7 (b) Explain the Huffman encoding, with an example.(6 marks) 7 (c) With a neat diagram, explain the H.23 components and list the steps in signaling.(8 marks) 8 (a) Explain the wireless routing protocol for AD-HoC networks.(5 marks) 8 (b) Briefly explain the direct and multi-hop routing of intra-cluster routing protocol, with the help or relevant diagrams.(6 marks) 8 (c) Write short notes on:
i) Clustering in sensor networks
ii) Security vulnerabilities of AD-HoC networks.
(9 marks)


Continue reading

Find answer to specific questions by searching them here. It's the best way to discover useful content.

Find more