r05310504 Computer Networks
r05310504 Computer Networks
www.andhracolleges.com
⋆⋆⋆⋆⋆
3. (a) Explain one -bit sliding window protocol. Give the advantages and disadvan-
tages of one-bit sliding window protocol?
(b) Discuss the services provided by the data link layer to the network layer?
[8+8]
4. (a) What is the prime difference between a token bus and a token ring?
(b) A large population of ALOHA users manages to generate 50 requests/sec,
including both originals and retransmissions. Time is slotted in the units of
www.andhracolleges.com
40 msec.
i. What is the chance of success on the first attempt?
ii. What is the probability of exactly k collisions and then a success?
iii. What is the expected number of transmission attempts needed? [4+12]
⋆⋆⋆⋆⋆
www.andhracolleges.com
www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List
www.andhracolleges.com
⋆⋆⋆⋆⋆
3. (a) Discuss the error control technique which is commonly used in data network.
What value of N is used in go-back-N ARQ technique used in ARPANET and
why?
(b) Imagine that you are writing the data link software for a line used to send
data to you, but not from you. The other end uses HDLC, with a 3-bit
sequence number and a window size of seven frames. You would like to buffer
as many out of sequence frames as possible to enhance efficiency, but you are
not allowed to modify the software on the sending side. Is it possible to have
a receiver window greater than one, and still guarantee that the protocol will
www.andhracolleges.com
never fail? If so, what is the largest window that can be safely used? [8+8]
7. (a) What are the applications which use connection oriented service and which
use connection less service? Explain?
(b) What is the type of service that is required for uncompressed audio & video.
Explain?
(c) What is the type of service that is required for compressed audio & Video?
Explain? [6+5+5]
⋆⋆⋆⋆⋆
www.andhracolleges.com
www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List
www.andhracolleges.com
⋆⋆⋆⋆⋆
1. (a) Compare point -to-point channels with broadcast channels along with suitable
examples?
(b) A collection of five routers is to be collected in a point-to-point subnet. Be-
tween each pair of routers, the designers may put a high speed line, a medium-
speed line, a low-speed line, or no line. If it takes 100ms of computer time
to generate and inspect each topology, how long will it take to inspect all of
them to find the one that best matches the expected load? [8+8]
2. (a) Compare the two methods of serial transmission. Discuss the advantages and
disadvantages of each?
(b) With a neat diagram explain about Knockout switch? [8+8]
3. (a) Discuss the error control technique which is commonly used in data network.
What value of N is used in go-back-N ARQ technique used in ARPANET and
why?
(b) Imagine that you are writing the data link software for a line used to send
data to you, but not from you. The other end uses HDLC, with a 3-bit
sequence number and a window size of seven frames. You would like to buffer
www.andhracolleges.com
as many out of sequence frames as possible to enhance efficiency, but you are
not allowed to modify the software on the sending side. Is it possible to have
a receiver window greater than one, and still guarantee that the protocol will
never fail? If so, what is the largest window that can be safely used? [8+8]
4. What is a token? Discuss the protocol of token ring LAN in general. Discuss with
example how priority is implemented in a token ring LAN? [16]
5. What is non- adaptive routing. Explain any two non- adaptive routing algorithms.
[16]
6. Explain Network layer in ATM. [16]
7. (a) What are the similarities and differences between Data Link layer and Trans-
port layer?
(b) Explain addressing at Transport layer? [6+10]
8. What is Authentication? How it is different from Authorization? Explain in brief
different Authentication protocols with their relative merits and demerits. [16]
⋆⋆⋆⋆⋆
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List
www.andhracolleges.com
⋆⋆⋆⋆⋆
www.andhracolleges.com
4. (a) Discuss about the file key assumptions in case of dynamic channel allocation
in LANs and WANs?
(b) Discuss in detail the working of token bus? [8+8]
5. How buffering at receiver can help in solving out of order delivery of packets. What
are the limitations of it. What are the applications for which this strategy is suitable
and why. What are the applications for which this strategy is not suitable and why.
Explain. [16]
6. (a) What are the message types used by ICMP? Explain.
(b) Explain the network protocols.
i. ARP
ii. RARP. [6+10]
7. (a) Explain the protocol scenarios for releasing a connection.
(b) What is the relation between NSAP & TSAP? [12+4]
8. (a) What is security? What is network security? What is information security?
How network security and information security are related?
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List
⋆⋆⋆⋆⋆
www.andhracolleges.com
www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List