0% found this document useful (0 votes)
51 views2 pages

D G1071 Pages: 2: Answer Any Two Full Questions, Each Carries 15 Marks

This document appears to be an exam for a Computer Communication course, consisting of three parts with multiple choice and descriptive questions. Part A asks students to explain how layers in the OSI model work together and differentiate between circuit switching and packet switching. Part B focuses on networking layer topics like addressing and routing, asking students to apply Dijkstra's algorithm. Part C covers transport layer protocols like TCP and UDP, application layer protocols like HTTP and SMTP, and network security topics such as SSL, IPSec, and layers of defense. The exam tests students' understanding of computer networking concepts across the OSI model.

Uploaded by

christopher p
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views2 pages

D G1071 Pages: 2: Answer Any Two Full Questions, Each Carries 15 Marks

This document appears to be an exam for a Computer Communication course, consisting of three parts with multiple choice and descriptive questions. Part A asks students to explain how layers in the OSI model work together and differentiate between circuit switching and packet switching. Part B focuses on networking layer topics like addressing and routing, asking students to apply Dijkstra's algorithm. Part C covers transport layer protocols like TCP and UDP, application layer protocols like HTTP and SMTP, and network security topics such as SSL, IPSec, and layers of defense. The exam tests students' understanding of computer networking concepts across the OSI model.

Uploaded by

christopher p
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

D G1071 Pages: 2

Reg No.:_______________ Name:__________________________

APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY


SEVENTH SEMESTER B.TECH DEGREE EXAMINATION(S), MAY 2019
Course Code: EC407
Course Name: COMPUTER COMMUNICATION
Max. Marks: 100 Duration: 3 Hours

PART A
Answer any two full questions, each carries 15 marks. Marks

1 a) Write in detail how all the layers in OSI model work together for networking. (10)
b) Differentiate circuit switching and packet switching. (5)
2 a) Explain the architecture of IEEE 802.11 with suitable diagram. (10)
b) Explain how framing is done by data link layer. (5)
3 a) Explain how error control is done in the data link layer. Give an example. (8)
b) Explain different flow control mechanisms adopted by data link layer. (7)
PART B
Answer any two full questions, each carries 15 marks.
4 a) Explain classfull and classless addressing (5)
b) Describe the functionalities of the network layer. Explain the IP packet format (10)
with a neat diagram.
5 a) What is routing? Explain its different types. (5)
b) Apply Dijkstra’s Algorithm to find the shortest path from the source node S to all (10)
other nodes in the figure given below:

6 a) What are the problems associated with distance vector protocols. How is it (5)
overcome in other routing protocols?
b) How can we distinguish a multicast address in IPv4 addressing? How can we do (10)
so in IPv6 addressing? With the help of an example, explain the CIDR scheme.

PART C
Answer any two full questions, each carries 20 marks.
7 a) Draw the TCP segment header format. Explain the various fields in the TCP (7)

Page 1of 2
D G1071 Pages: 2

segment header.
b) What are the main features of UDP? Explain. (6)
c) Explain the various congestion control mechanisms to alleviate congestion after it (7)
happens.
8 a) Explain the services offered by TCP to the processes at the application layer. (5)
b) With the help of a diagram, explain how users download the email message using (8)
POP3.
c) What is the need of the second layer of defence in a secured network (7)
environment? Explain.
9 a) Explain the functionality of a) MIME b) SMTP c) HTTP. (6)
b) Explain the handshake protocol used in SSL. (7)
c) What is IPSec? Explain the two modes of operation of IPSec.
(2+5)
****

Page 2of 2

You might also like