III EEE CS2363 - Computer Networks Model Question Paper Set - 1 for May-june 2014

Embed Size (px)

DESCRIPTION

MODEL QUESTION PAPER FOR STUDENTS THOSE WHO ARE FELT AS DIFFICULT IN THIS SUBJECT FOR UP COMING ANNA UNIVERSITY SEMESTER EXAMINATION - MAY / JUNE 2014

Citation preview

Reg.No.

ANNA UNIVERSITY SEMESTER EXAMINATION - MAY / JUNE 2014

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

MODEL QUESTION PAPER 1 CS2363 - COMPUTER NETWORKS

Year/Semester & Branch: III year /VI Semester & B.E EEE

Faculty Name: T.Selvakumar

Date:

Max. Marks: 100

Time: 3 hrs

PART-A Answer ALL Questions (10x2=20 Marks)

1. Show with an example how encoding can be done using NRZI technique?2. Differentiate ARP and RARP.3. Give the CIDR notation for Class A, B and C.4. Draw IPv6 header format.5. Give the operation in three way Handshaking with timeline diagram.6. Draw the datagram format of TCP.7. Define Kerberos authentication protocol & Give neat sketch.8. How is a secret key different from public key?9. Give the format of HTTP request message.10. Define MIB & MIB groups.PART-B Answer ALL Questions (5x16=80 Marks)

11. (a) Explain in detail about OSI reference model with neat sketches and its layer operations. (16) OR

11. (b)

(i) Discuss in detail on cyclic redundancy check with suitable examples.

(8)

(ii) What is the function of stop and wait flow control?

(8)12. (a) Illustrate with a neat sketch, the IPV 4 datagram format. Compare the fields in the main headers of IPV 4 and IPV 6.

(16)

OR

12. (b)

(i) Internet control message protocol.

(12)

(ii) Find the class and CIDR notation of each address

(1) 11000001 10000011 00011011 11111111

(2) 14.23.120.8

(4)

13. (a) How the Queuing Disciplines algorithm are used to improve Quality of service? Explain any four parameters.

(16)

OR

13. (b) Discuss in detail the TCP segment and Discuss about connection management in TCP. (16)14. (a) Briefly Explain Authentication Protocols and explain Public Key Authentication Protocols and Diffie-Hellman Key Agreement.

(16)

OR

14. (b)

(i) Describe how PGP can be used to provide security at the application layer?

(8)

(ii) Explain the method of compressing the image by using JPEG.

(8)

15. (a) Explain the working of electronic mail. Describe how the SMTP is used in E-mail applications.

(16)

OR

15. (b)

(i) Briefly explain simple network management protocol (SNMP).

(8)

(ii) Discuss the File Transfer Protocol (FTP) with suitable diagrams.

(8)

*****

Prepared by

Approved by

AP/CSE

HOD/CSE