VTU Computer Science (Semester 6)
Computer Networks 2
June 2015
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Explain datagram and virtual circuit packet switching with delay calculation diagrams.
8 M
1 (b) With neat diagram, explain the generic packet switch.
4 M
1 (c) Consider the network in Fig Q1 (c).

i) Use the Dijkstra's algorithm to find the set of shortest paths from node 4 to other nodes.
ii) Find the set of associated routing table entries.

8 M

2 (a) Discuss the priority and weighted fair queuing.
6 M
2 (b) Explain the concept of Random Early Detection (RED).
4 M
2 (c) Give the classification of congestion control algorithms. Explain the leaky bucket and token bucket traffic shaper with neat diagram.
10 M

3 (a) Describes the various fields of IP version 4 header.
6 M
3 (b) i) A small organization has a class C address for seven networks each with 24 hosts. What is an appropriate subnet mask?
3 M
3 (b) ii) Perform CIDR aggregation on the /24 Ip address 200.96.86.0/24, 200.96.87.0/24, 200.96.88.0/24, 200.96.89.0/74.
6 M
3 (c) Why transition from IPV4.0 to IPV6.0 is required? Explain the IPV6 network addressing.
8 M

4 (a) Explain the TCP 3 way handshake for establishing a TCP connection.
6 M
4 (b) What are the classification of internet routing protocols? Explain in detail routing information protocol (RIP).
8 M
Write note on:
4 (c) i) Reverse path multicasting.
3 M
4 (c) ii) Mobile IP
3 M

5 (a) Explain the remote login protocols.
6 M
5 (b) What are the elements of network management? Discuss the interaction between SNMP management station and SNMP agent.
8 M
5 (c) Write RSA algorithm. For RSA algorithm of 4 bit message 1001, choose a =3 and b=11, find the public key and private keys for this and show the cipher text.
6 M

6 (a) Describes the various types of resource allocation schemes.
6 M
6 (b) Define VPN. Discuss the concept of tunnelling and points to points protocol in VPN.
6 M
6 (c) What is MPLS network? Explain MPLS operation.
8 M

7 (a) Explain the JPEG compression for still images.
6 M
Explain the following:
7 (b) i) Huffman encoding.
4 M
7 (b) ii) Lempel-Ziv-Welch encoding with an example.
4 M
7 (c) Briefly explain with neat diagram, how Content Distribution Network (CDN) interaction with DNS (Domain Name System).
6 M

8 (a) Explain DSDV, TORA routing protocol for mobile adhoc networks.
8 M
8 (b) What are the classification of sensor networks? Explain with relevant diagram DEEP clustering protocol in sensor network.
6 M
8 (c) Describe the direct or multihop intracluster routing protected with neat diagram.
6 M



More question papers from Computer Networks 2
SPONSORED ADVERTISEMENTS