VTU Computer Science (Semester 6)
Computer Networks 2
December 2014
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Differentiate between virtual circuit and datagram.
6 M
1 (b) Find shortest path tree from node 5 to all nodes and also find the associated routine table entries for node 5 using Dijkstra's algorithm.

8 M
1 (c) Suppose we wish to transmit a large message (L=106) over three hops. Now suppose that transmission line in each hop has an error rate of P=106 and each hop does error checking and transmission:
i) How many bits need to be transmitted using message switching?
ii) Now suppose the same above message is broken up into ten 105 bit packets, how many bits need to be transmitted over the three hops?
6 M

2 (a) Explain Fair queuing mechanism of traffic management at packet Level and also compute the expression for finish time in packet by packet fair queuing.
7 M
2 (b) Explain the leaky bucket algorithm used for policing.
6 M
2 (c) Suppose that ATM cells arrive at a leaky bucket policer at times t=1,2,3,5,6,811,12,13,15 and 19. Assume I=4 and L=4. Plot the bucket content and identify any nonconforming cells.
7 M

3 (a) Explain the IP addressing classification. Identify the following IP address to which class they belong to:
i) 200.58.20.165
ii) 128.167.23.20
iii) 16.196.128.50
iv) 150.156.10.10
7 M
3 (b) A host in an organization has an IP addressing 150.32.64.34 and subnet mask 255.255.254.0. What is the address of this subnet? What is the range of IP address that a host can have on this subnet?
7 M
3 (c) Write a note on user datagram protocol (UDP).
6 M

4 (a) Provide a structure of OSPF common header and write a note on OSPF operation.
8 M
4 (b) Write a note on internet group management protocol.
6 M
4 (c) What do you mean by mobile IP? Explain mobile IP routing operation.
6 M

5 (a) What do you mean by remote login and also explain secure shell (SSH) protocol.
6 M
5 (b) What are the elements of network security? Explain the threats to network security.
6 M
5 (c) Explain RSA algorithm. Using RSA algorithm encrypt a message m=9. Assume a=3 and b=11. Find public and private keys and also show the ciphertext.
8 M

6 (a) What do you mean by VLPN? Explain its types.
7 M
6 (b) Write a note on MLPS operation.
7 M
6 (c) Write a note on overlay networks.
6 M

7 (a) Write a note on overview of information process and compression in multimedia networks.
4 M
7 (b) Briefly explain various compression methods without loss.
12 M
7 (c) Explain voice over IP system.
4 M

8 (a) Briefly explain the classification routing protocol in wireless Ad-HoC networks.
6 M
8 (b) List the security issues in Ad-HoC networks. Explain types of attacks.
7 M
8 (c) Differentiate between inter cluster and intra cluster routing protocols in WSN.
7 M



More question papers from Computer Networks 2
SPONSORED ADVERTISEMENTS