4
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS2363 - COMPUTER NETWORKS - UNIT 3 & UNIT 4 Year/Semester & Branch: III year /VI Semester & B.E EEE Faculty Name: Date: Max. Marks: 100 Time: 3 hrs PART-A Answer ALL Questions (10x2=20 Marks) 1. How will you calculate the Estimated RTT, Difference, Deviation & timeout in Jacobson/karels Algorithm? 2. Techniques to Improve QoS? 3. What are the pointers maintained into the send buffer along with sliding window at sender side? 4. Draw the datagram format of UDP. 5. In RED, what are the rules for comparing Average Length between thresholds? 6. List out the two modes of IP security. 7. Define Kerberos authentication protocol & Give Short Notes. 8. Differentiate flow control from congestion control. 9. How is a secret key different from public key? 10. Give the operation in three way Handshaking with timeline diagram. PART-B Answer ALL Questions (5x16=80 Marks) 11. (a) (i)Explain the User Datagram protocol in detail. (8) (ii) Explain TCP-Flow Control with Sliding window revisited technique. (8) OR 11. (b) (i) Draw the TCP state-transition diagram for connection management and explain. (8) (ii) Explain in detail about key predistribution. (8) 12. (a) Briefly Explain the Queuing Disciplines Techniques to improve Quality of service. (16) OR 12. (b) (i) Explain the mechanism about triggering transmission. (10)

III Eee Cs2363 - Computer Networks Important Questions for Unit 3 & Unit 4 , For May-june 2014

Embed Size (px)

DESCRIPTION

III Eee Cs2363 - Computer Networks Important Questions for Unit 3 & Unit 4 , For May-june 2014

Citation preview

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CS2363 - COMPUTER NETWORKS - UNIT 3 & UNIT 4Year/Semester & Branch: III year /VI Semester & B.E EEE

Faculty Name:

Date:

Max. Marks: 100

Time: 3 hrs

PART-A Answer ALL Questions (10x2=20 Marks)

1. How will you calculate the Estimated RTT, Difference, Deviation & timeout in Jacobson/karels Algorithm? 2. Techniques to Improve QoS?3. What are the pointers maintained into the send buffer along with sliding window at sender side?4. Draw the datagram format of UDP.5. In RED, what are the rules for comparing Average Length between thresholds?6. List out the two modes of IP security.7. Define Kerberos authentication protocol & Give Short Notes.8. Differentiate flow control from congestion control.9. How is a secret key different from public key?10. Give the operation in three way Handshaking with timeline diagram.PART-B Answer ALL Questions (5x16=80 Marks)

11. (a)

(i)Explain the User Datagram protocol in detail.

(8)

(ii) Explain TCP-Flow Control with Sliding window revisited technique.

(8)

OR

11. (b)

(i) Draw the TCP state-transition diagram for connection management and explain.

(8)

(ii) Explain in detail about key predistribution.

(8)

12. (a) Briefly Explain the Queuing Disciplines Techniques to improve Quality of service. (16)

OR

12. (b)

(i) Explain the mechanism about triggering transmission.

(10)

(ii)Give Short Notes on Audio Compression (MP3).

(6)

13. (a) Describe in detail about TCP segment, features and connection management. (16)OR

13. (b)

(i) What is IP security? Explain in detail.

(8)

(ii) Explain in detail about Diffie-Hellmann Algorithm.

(8)

14. (a)Explain the algorithm for Adaptive Retransmission using TCP.

(16)

OR

14. (b)

(i) Describe how PGP can be used to provide security at the application layer? (10)

(ii) Explain how the firewall can prevent a system from harmful message?

(6)

15. (a)Discuss various categories of congestion control, and Briefly explain any two TCP

Congestion Control Mechanism.

(16)

OR

15. (b) Write a note on congestion avoidance mechanisms(RED and DEC-bit). (16)DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CS2363 - COMPUTER NETWORKS - UNIT 3 & UNIT 4Year/Semester & Branch: III year /VI Semester & B.E EEE

Faculty Name:

Date:

Max. Marks: 100

Time: 3 hrs

PART-A Answer ALL Questions (10x2=20 Marks)

1. How the Congestion windows incremented in AIMD - TCP Congestion control method?

2. How will you measure calculate the Estimated RTT & timeout in Original algorithm? 3. Draw the header format of TCP segment.

4. What are the pointers maintained into the send buffer along with sliding window at receiver side? 5. What are the three mechanisms used to trigger the Transmission?6. Give the Strengths and Weaknesses of Firewalls.7. What are the two multiplexing strategies used in Transport Layer.?8. What is meant by PGP?9. What is Symmetry Key Algorithm?10. Write the functions of Transport Layer.PART-B Answer ALL Questions (5x16=80 Marks)

11. (a) What are the mechanisms used for congestion avoidance.? Briefly explain any two mechanisms.

(16)

OR

11. (b) Discuss various categories of congestion control, and Briefly explain any two TCP

Congestion Control Mechanism.

(16)

12. (a)Discuss in detail the TCP segment and Discuss about connection management in TCP. (16)OR

12. (b)

(i)Explain the User Datagram protocol in detail.

(10)

(ii) Explain TCP-Flow Control with Sliding window revisited technique.

(6)

13. (a)

(i) Explain wireless Security (802.11i) using PSK and key management.

(6) (ii)Briefly explain Transport Layer Security over TLS/SSL through HTTP.

(10)OR

13. (b)

(i) Explain in detail the MPEG standards and its significance.

(8)

(ii) What is firewall? Describe briefly the functional operation of firewall in networking. (8)

14. (a)Briefly Explain Authentication Protocols and explain Public Key Authentication Protocols and Diffie-Hellman Key Agreement.

(16)

OR

14. (b)

(i) Explain the method of compressing the image by using JPEG.

(8)

(ii) Discuss in detail about symmetric-key cryptography.

(8)

15. (a)How the Queuing Disciplines algorithm are used to improve Quality of service? Explain any four parameters.

(16)OR

15. (b) Explain the algorithm for Adaptive Retransmission using TCP.

(16)